Insider Risk Management
Detect and investigate risky user activities that could harm your organization. Insider risk management uses signals from across Microsoft 365 to identify potential data theft, security violations, and policy breaches by employees.
Note: Insider Risk Management requires Microsoft 365 E5, Microsoft 365 E5 Compliance, or Microsoft 365 E5 Insider Risk Management add-on.
Dashboard Overview
| Metric | Description |
|---|---|
| High Severity Alerts | Alerts requiring immediate attention |
| Active Cases | Ongoing investigations |
| Users in Scope | Users monitored by active policies |
| Active Policies | Number of insider risk policies enabled |
Risk Categories
Data Theft by Departing Users
Detect potential data exfiltration by employees who have resigned or been terminated. Correlates HR signals with data movement. Risk: High
Data Leaks
Identify unintentional or intentional sharing of sensitive information outside the organization. Includes DLP policy matches. Risk: Medium
Security Policy Violations
Detect violations of security policies like disabling security tools, accessing blocked sites, or installing prohibited software. Risk: High
Patient Data Misuse (Healthcare)
Healthcare-specific template for detecting unauthorized access to electronic health records (EHR) and HIPAA violations. Category: Healthcare
Risky Browser Usage
Detect potentially risky browsing activities like accessing competitor sites, job boards, or data storage services. Risk: Medium
Cumulative Exfiltration
Detect gradual data exfiltration over time that might evade single-event detection thresholds. Risk: High
Signal Sources
Insider risk correlates signals from multiple sources:
Microsoft 365
- SharePoint file downloads
- Email to personal accounts
- Teams file sharing
- OneDrive sync activity
Endpoint (Defender)
- USB file copies
- Cloud storage uploads
- Print activity
- Browser activity
HR Connectors
- Resignation date
- Termination notice
- Performance issues
- Job level changes
Security Signals
- DLP policy matches
- Sensitivity label downgrades
- Defender alerts
Physical Access
- Badge reader data
- After-hours access
- Access to restricted areas
Healthcare Systems
- EHR access logs
- Patient record views
- Break-the-glass events
Policy Configuration
1. Choose Template
Start with a pre-built template targeting specific risk scenarios: data theft, data leaks, security violations, or custom.
2. Define Users in Scope
- All users (organization-wide)
- Specific groups (e.g., Finance, Engineering)
- Priority users (high-risk roles)
- HR connector triggers (departing employees)
3. Configure Indicators
Select which activities to monitor and their risk weighting:
- File Activities — Downloads, copies, prints
- Email Activities — External sends, attachments
- Cloud Activities — 3rd party cloud uploads
- Device Activities — USB, removable media
4. Set Thresholds
Define when activities become alerts. Use defaults or customize based on your organization’s normal behavior patterns.
Alert Investigation
- Review Alert — Examine alert details: triggering activities, risk score, timeline, and user context.
- View Activity Explorer — See all user activities leading up to the alert. Filter by activity type, date, and risk level.
- Confirm or Dismiss — Determine if alert represents real risk. Dismiss false positives or escalate to case.
- Create Case (if needed) — Escalate to formal investigation. Add additional evidence, coordinate with HR/Legal.
Case Management
Case Actions
- Add related alerts to case
- Add case notes and findings
- Share with HR or Legal
- Send user notifications
- Export case for external review
Integration Actions
- Create ServiceNow ticket
- Escalate to eDiscovery case
- Trigger Power Automate workflow
- Send to SIEM (Sentinel)
Privacy Controls
Built-in privacy protections balance security with employee privacy:
- Anonymization — User names pseudonymized until case is created
- Role-based access — Only designated investigators can view details
- Audit logging — All investigator actions are logged
- Data retention — Configure how long alert data is retained
- Notice requirements — Configure user notification policies
Best Practices
- Connect HR data — HR connector dramatically improves detection of departing employee risks
- Start with templates — Use pre-built templates and tune thresholds based on your data
- Coordinate with HR and Legal — Involve stakeholders in policy design and investigation procedures
- Review alerts promptly — Timely review prevents alert fatigue and ensures risks are addressed
API Reference
GET /api/compliance/insider-risk/alerts— List insider risk alertsGET /api/compliance/insider-risk/cases— List investigation casesGET /api/compliance/insider-risk/policies— List active policiesPUT /api/compliance/insider-risk/alerts/:id— Update alert statusGET /api/compliance/insider-risk/analytics— Get risk analytics summary