Jaa


Get started with Data loss prevention policies for Fabric and Power BI

This article is a general overview of Microsoft Purview Data Loss Prevention (DLP) policies Fabric and Power BI. The target audience is Fabric administrators, security and compliance teams, and Fabric data owners. If you're a data owner and want to know how to respond when a policy tip tells you your item has a DLP policy match, see Respond to a DLP policy match in Fabric. If you're a Fabric admin or a security and compliance admin and need to audit alerts on DLP policy matches, see Monitor DLP policy matches in Fabric.

Overview

To help organizations detect and protect their sensitive data, Fabric supports Microsoft Purview Data Loss Prevention (DLP) polices. When a DLP policy for Fabric detects a supported item type containing sensitive information, the actions configured in the policy are triggered. These actions can include:

  • Attaching a policy tip to the item that explains the nature of the sensitive content.
  • Registering an alert for administrators on the data loss prevention Alerts page in the Microsoft Purview portal.
  • Sending email alerts to administrators and specified users.
  • Restricting access to the item.

For more detail, see How do DLP policies for Fabric and Power BI work.

Tip

Get started with Microsoft Security Copilot to explore new ways to work smarter and faster using the power of AI. Learn more about Microsoft Security Copilot in Microsoft Purview.

Licensing and permissions

Licensing

For information on licensing, see

Permissions

Data from DLP for Fabric and Power BI can be viewed in Activity explorer. There are four roles that grant permission to Activity explorer; the account you use for accessing the data must be a member of any one of them.

To view the Activity explorer, the account you use for accessing the data must be a member of any of the following roles or higher.

  • Compliance administrator
  • Security administrator
  • Compliance data administrator

Important

Microsoft recommends that you use roles with the fewest permissions. This helps improve security for your organization. Global Administrator is a highly privileged role that should only be used in scenarios where a lesser privileged role can't be used.

Billing

DLP evaluation workloads impact capacity consumption. For information about how this is metered and billed, see Learn about Microsoft Purview billing models.

How DLP policies for Fabric and Power BI work

You define a DLP policy in the data loss prevention section of the Microsoft Purview portal. In the policy, you specify the conditions, such as which sensitivity labels and/or sensitive info types you want to detect. You also specify the actions that the system will take when a policy match is detected.

When a supported item type is evaluated by DLP policies, if it matches the conditions specified in a DLP policy, the actions specified in the policy occur. DLP policies are initiated by the following actions:

Semantic models:

A semantic model is evaluated against DLP policies whenever one of the following events occurs:

  • Publish
  • Republish
  • On-demand refresh
  • Scheduled refresh

Note

DLP evaluation of the semantic model doesn't occur if either of the following is true:

  • The initiator of the event (publish, republish, on-demand refresh, scheduled refresh) is an account using service principal authentication.
  • The semantic model owner is a service principal.

Lakehouse:

A lakehouse is evaluated against DLP policies When the data within a lakehouse undergoes a change, such as getting new data, connecting a new source, adding or updating existing tables, and more.

What happens when an item is flagged by a Fabric DLP policy

When a DLP policy detects an issue with an item:

  • If "user notification" is enabled in the policy, the item will be marked in Fabric with an icon that indicates that a DLP policy has detected an issue with the item. Hover over the icon to display a hover card that provides an option to see the full details in a side panel. For more information about what you see in the side panel, see Respond to a DLP violation in Fabric.

    Screenshot of policy tip icon in the OneLake data hub.

    For semantic models, opening the details page will show a policy tip that explains the policy violation and how the type of sensitive information detected should be handled. Selecting View all opens a side panel with all the policy details.

    Screenshot of policy tip on semantic model details page.

    Note

    If you hide the policy tip, it doesn’t get deleted. It will appear the next time you visit the page.

    For lakehouses, the indication will appear in the header in edit mode, and opening the fly out makes it possible to see more details about the policy tips affecting the lakehouse. Selecting View all opens a side panel with all the policy details.

    Screenshot of policy tip in lakehouse header flyout.

  • If alerts are enabled in the policy, an alert will be recorded on the data loss prevention Alerts page in the Microsoft Purview portal, and (if configured) an email will be sent to administrators and/or specified users. For more information, see Monitor and manage DLP policy violations.

Supported actions

When a semantic model or lakehouse is evaluated by DLP policies, if it matches the conditions specified in a DLP policy, the actions specified in the policy occur. DLP policies for Fabric and Power BI support three actions:

  • User notification via policy tips.
  • Alerts. Alerts can be sent by email to administrators and users. Additionally, administrators can monitor and manage alerts on the Alerts tab in the Purview portal.
  • Restrict access. When a policy is configured with the restrict access action, in case of a policy match, access to the item is restricted, either to the data owners or to members of the organization, depending on how the policy is configured. All other users lose access to the item.

For information about what triggers DLP evaluation, see How DLP policies for Fabric and Power BI work.

Supported item types

DLP policies for Fabric and Power BI currently support (preview) the following item types.

  • Semantic models
  • Lakehouses

See Considerations and limitations for exceptions.

Supported condition types

DLP policy rules for Fabric and Power BI support sensitivity labels and a subset of sensitive info types (see considerations and limitations) as conditions.

Configure a DLP policy for Fabric and Power BI

For information about creating a DLP policy for Fabric or Power BI, see Create and Deploy data loss prevention policies. In particular, follow the procedures in Scenario 7 Block Power BI reports with credit card numbers and adapt them to your own particular scenario.

Considerations and limitations

  • DLP policies apply to workspaces. Only workspaces hosted in Fabric or Premium capacities are supported. For more information, see Microsoft Fabric concepts and licenses.
  • DLP policy templates aren't yet supported for Fabric DLP policies. When creating a DLP policy for Fabric, choose the "custom policy" option.
  • DLP policies for Fabric aren't supported for sample semantic models, streaming datasets, or semantic models that connect to their data source via DirectQuery or live connection. This includes semantic models with mixed storage, where some of the data comes via import-mode and some comes via DirectQuery.
  • DLP policies for Fabric apply only on data in Lakehouse Tables/ folder stored in Delta format.
  • DLP policies for Fabric support all the primitive Delta types except timestamp_ntz.
  • DLP policies for Fabric aren't supported for the following Delta Parquet data types:
    • Binary, timestamp_ntz, Struct, Array, List, Map, Json, Enum, Interval, Void.
    • Data with LZ4, Zstd, and Gzip compression codecs.
  • Exact data match (EDM) classifiers and trainable classifiers aren't supported by DLP for Fabric. If you select an EDM or trainable classifier in the condition of a policy, the policy will yield no results even if the semantic model or lakehouse does in fact contain data that satisfies the EDM or trainable classifier. Other classifiers specified in the policy will return results, if any.
  • DLP policies for Fabric aren't supported in the China North region. See How to find the default region for your organization to learn how to find your organization's default data region.
  • Azure capacities aren't supported for DLP in Fabric in the following clusters:
    • WUS3
    • WUS2
    • SCUS
  • Onboarding a new tenant to DLP can take a few hours, depending on the number of supported workspaces that are being onboarded.

See also