Section 14 – Implement and manage Microsoft Purview Communication Compliance

Plan for communication compliance

This tool helps you identify and address potential risks before they become problems. It can detect inappropriate messages like harassment or threats, as well as leaks of sensitive information across various communication channels, including email, Microsoft Teams, and Microsoft Copilot for Microsoft 365.

Capabilities and Limitations

FeatureBenefitRole
Role-based access controlEnsures users only have permissions for their assigned tasks.All Users
Multiple conditions in policiesRefines policy accuracy with keyword matching, sensitive information detection, or domain scoping.Administrator
End user reportingProactive approach to identifying communication risks.Message Recipient
Keyword highlightingProvides clarity on flagged phrases and triggering classifiers.Investigator
PseudonymizationMinimizes investigator bias during reviews.All Users
Selecting communication channelsAllows users to choose channels for content pattern detection.All Users
Feedback loop for misclassified itemsImproves future classifier performance.All Users
LimitationImpacted UsersMitigation Strategy
False positive messagesMessage sendersReport misclassified items for classifier improvement. Human review before action.
False negative messagesAdmins, message recipientsCombine machine learning with keyword matching or user scoping.
Limited support for evasive typingMessage recipientsBasic coverage for letter-number swaps, future improvements planned.
Limited language supportMessage recipients12 most used languages currently supported.

Breakdown of the key steps

1. Identify Stakeholders

  • Collaborate with key departments like IT, Compliance, Privacy, Security, HR, and Legal to define a communication compliance workflow.
  • Assign dedicated personnel to investigate and review alerts within the Microsoft Purview portal.

2. Permissions and Roles

  • Ensure users have the necessary roles (6 pre-defined groups) to access Communication Compliance features. Refer to “Enable permissions for communication compliance” for details.

3. Define Scoped Users

  • Determine who needs their communications reviewed by specifying user email addresses or groups (Microsoft 365 Groups, Distribution Lists, Teams channels etc.) in your policy. You can also exclude specific users or groups.
  • Users must have a qualifying Microsoft 365 license to be covered by communication compliance policies.

4. Assign Reviewers

  • Designate reviewers (individuals or groups with Exchange Online mailboxes) who will analyze messages from the scoped users. Reviewers need specific role assignments (“Communication Compliance Analysts” or “Communication Compliance Investigators”) within the policy they investigate.

5. Groups for Efficiency

  • Consider creating dedicated groups for both users under review and reviewers to simplify setup. Distribution or Microsoft 365 groups can be used here.
  • Note limitations for groups like dynamic distribution or nested distribution lists.

6. Privacy Settings

  • Choose a privacy setting for usernames displayed in communication compliance alerts:
    • Show anonymized versions: Usernames are hidden for “Communication Compliance Analysts” but visible for “Investigators.”
    • Do not show anonymized versions: Usernames and profile information are displayed for all reviewers.

7. Planning Communication Compliance Policies

  • Utilize pre-defined templates to quickly create policies for inappropriate content, sensitive information, and regulatory compliance.
  • Consider including all users in your organization for policies like harassment or discrimination detection.
  • Initially, set the communication review percentage to 100% to identify all potential issues.
  • Leverage third-party connectors to analyze communication from external sources imported into Microsoft 365 mailboxes.
  • For languages other than English, build custom keyword dictionaries or trainable classifiers in Microsoft 365.
  • Define specific detection criteria using policy conditions and custom sensitive information types to meet your organization’s unique needs.

Create and manage communication compliance policies

  • Communication compliance policies are created and managed within the Microsoft Purview compliance portal, not through PowerShell.
  • These policies define:
    • Which communications and users are reviewed.
    • Custom conditions communications must meet for flagging.
    • Who conducts the reviews.
  • Communication Compliance Admins can set up and access policies and global settings.
  • Policy modification history can be exported as a CSV file, including:
    • Pending review alerts
    • Escalated items
    • Resolved items
  • Policies cannot be renamed but can be deleted when no longer needed.

You find the communication compliance overview page from https://purview.microsoft.com/cc/overview and from there you can create a custom policy or use templates

Communication Compliance Policy Templates

AreaPolicy TemplateDetails
Copilot InteractionsDetect Copilot for Microsoft 365 interactionsLocation: Copilot for Microsoft 365
Direction: Inbound, Outbound, Internal
Review Percentage: 100%
Conditions: No default conditions (select at least one)
Inappropriate Content (Preview)Detect inappropriate contentLocation: Microsoft Teams
Direction: Inbound, Outbound, Internal
Review Percentage: 100%
Conditions: Hate, Violence, Sexual, Self-harm classifiers
Inappropriate TextDetect inappropriate textLocations: Exchange Online, Microsoft Teams, Viva Engage Direction: Inbound, Outbound, Internal
Review Percentage: 100%
Conditions: Threat, Discrimination, and Targeted harassment classifiers
Inappropriate ImagesDetect inappropriate imagesLocations: Exchange Online, Microsoft Teams
Direction: Inbound, Outbound, Internal
Review Percentage: 100%
Conditions: Adult and Racy image classifiers
Sensitive InformationDetect sensitive info typesLocations: Exchange Online, Microsoft Teams, Viva Engage
Direction: Inbound, Outbound, Internal
Review Percentage: 10%
Conditions: Sensitive information, pre-built content patterns and types, custom dictionary option, attachments larger than 1 MB
Regulatory ComplianceDetect financial regulatory complianceLocations: Exchange Online, Microsoft Teams, Viva Engage
Direction: Inbound, Outbound
Review Percentage: 10%
Conditions: Customer complaints, Gifts & entertainment, Money laundering, Regulatory collusion, Stock manipulation, and Unauthorized disclosure classifiers
Conflict of InterestDetect conflict of interestLocations: Exchange Online, Microsoft Teams, Viva Engage
Direction: Internal
Conditions: None

Custom policy

Choose user, groups or use Adaptive scopes

And you can choose the locations to be detected

And the conditions for the direction and you can even limit the conditions further

You can use OCR to search from images for handwritten text. And exclude Mass mailer services.

Once done, you will see the policy activating.

Then it’s time for the next step

Investigate and remediate communication compliance alerts and reports

Once communication compliance policies are configured, you’ll receive alerts for messages flagged by policy conditions. Here’s what you need to investigate and remediate these issues.

Required Permissions

  • Communication Compliance Analyst or Communication Compliance Investigator role group membership
  • Reviewer designation in the specific policy associated with the alert

Investigating Policy Matches and Alerts

  • Policies Page (Microsoft Purview):
    • Review policy details like new pending alerts, total pending/resolved alerts, status, last modification/scan dates.
    • Select a policy to launch the “Policy details” page for further actions.
  • Alerts Page (Microsoft Purview):
    • View the last 30 days of alerts grouped by policy (most to least alerts).
    • Note: An alert represents multiple policy matches triggering email notifications.
  • Reports Page (Microsoft Purview):
    • Access communication compliance report widgets for insights into policy matches and remediation actions.

Tips for Reviewing Policy Matches

  • Pending/Resolved Tabs:
    • A yellow banner highlights the triggering condition(s) at the top of the “Source” tab for each reviewed message.
    • Select “View all” in the banner to see all conditions causing the match (currently limited to trainable classifiers and sensitive information types).
  • Policy Settings Button:
    • Quickly review policy conditions without opening the entire policy (useful for comparing multiple policies).
    • View and edit settings (Communication Compliance/Admins role) or view only (Analysts/Investigators).

Policy Matches and Alerts

This table summarizes the steps involved in reviewing and remediating policy matches and alerts in Communication Compliance:

StageDescriptionOptions
Examine Message BasicsQuickly assess message for remediation based on source or subject.Resolve – Item was misclassified: Classify message as incorrect and remove it from pending queue (applicable to trainable classifiers only).
Tag as or Escalate: Assign tags or send messages to designated reviewers.
Examine Message DetailsView complete message details to determine further action.Sentiment: Analyze message sentiment (Positive, Negative, Neutral) to prioritize review. Attachments: View extracted text content of modern attachments. Source: Standard message view with header information and body. Plain Text: Line-numbered text with keyword highlighting for sensitive information. Conversation: View up to 10 messages before/after flagged message for context (Teams chats only). Download conversation details as image and CSV files. User History: See past alerts generated for the message sender. Pattern Detected: Identify recurring harassing/bullying behavior by a user (applicable to policies). Translation: Automatically translate message text to reviewer’s configured language.
Decide on Remediation ActionChoose an action based on message details.Resolve: Remove message from pending queue (no further action possible). Power Automate: Use a flow to automate message processing tasks. Tag as: Classify message as compliant, non-compliant, or questionable. Notify: Send a warning notice to the message sender using a pre-configured template. Escalate: Send message to additional reviewers for further review. Escalate for Investigation: Create a new eDiscovery (Premium) case for the message(s). Remove message in Teams: Block inappropriate messages and content in Teams channels and chats. (For Teams messages only).
Review Microsoft Teams Meetings Transcripts (Preview)Analyze transcripts for actionable alerts (if Teams transcripts are enabled).Review transcripts for scheduled, recurring, and unscheduled meetings based on specific user roles and participation.

You can read the detailed instructions from Learn

Closure

Breakdown

  1. Stakeholders & Permissions:
    • Collaborate with relevant departments to define workflow.
    • Assign roles for investigating and reviewing alerts.
  2. Scoped Users:
    • Define users/groups whose communications are reviewed.
    • Assign reviewers with proper roles.
  3. Groups (Optional):
    • Create dedicated groups for users and reviewers for easier setup.
  4. Privacy Settings:
    • Choose a privacy setting for usernames displayed in alerts.
  5. Communication Compliance Policies:
    • Use templates for common policy types.
    • Consider including all users for sensitive topics.
    • Set a high review percentage initially.
    • Explore third-party connectors for external communications.
    • Build custom dictionaries/classifiers for non-English languages.
    • Define specific detection criteria using policy conditions.

Create and manage policies

  • Communication compliance policies are created and managed within the Microsoft Purview compliance portal, not through PowerShell.
  • These policies define:
    • Which communications and users are reviewed.
    • Custom conditions communications must meet for flagging.
    • Who conducts the reviews.
  • Communication Compliance Admins can set up and access policies and global settings.
  • Policy modification history can be exported as a CSV file, including:
    • Pending review alerts
    • Escalated items
    • Resolved items
  • Policies cannot be renamed but can be deleted when no longer needed.

Required Permissions

RoleActions
Communication Compliance Analyst or Communication Compliance InvestigatorInvestigate policy matches and alerts
Reviewer (assigned to specific policy)Review messages flagged by the associated policy

Portals

LocationInformation
Policies Page (Microsoft Purview)* Review policy details (pending/resolved alerts, status, dates) * Launch “Policy details” page for further actions
Alerts Page (Microsoft Purview)View the last 30 days of alerts grouped by policy
Reports Page (Microsoft Purview)Access communication compliance report widgets

Reviewing Policy Matches

FeatureDescription
Yellow Banner (Pending/Resolved Tabs)Highlights triggering conditions for reviewed messages
“View all” Button (Yellow Banner)Shows all conditions causing the policy match
Policy Settings ButtonQuickly review policy conditions without opening the entire policy

Link to main post

Author: Harri Jaakkonen