Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.1.3. Insider Risk Management and Communication Compliance

💡 First Principle: Insider Risk Management detects patterns of risky user behavior — not individual violations, but sequences of actions that together suggest a data security risk. Communication Compliance detects violations in what people say. Both tools are about identifying risk that DLP alone can't catch.

DLP catches a specific action: a file being shared. But what about the user who, over two weeks, downloads 500 files, creates a new personal email account, and then resigns? No single action triggers DLP — but the pattern is a serious exfiltration risk. Insider Risk Management surfaces these patterns.

Insider Risk Management (IRM):
  • Monitors signals like bulk file downloads, USB transfers, access to sensitive files, printing, browser uploads
  • Combines signals into risk scores for users
  • Creates alerts when a user's risk score exceeds a threshold
  • Requires sensitive handling: access is limited to specific roles, and investigation findings are pseudonymized until explicitly deanonymized
Policies you can create in IRM:
Policy TemplateScenario
Data theft by departing usersUser is tagged as "leaving" in HR system; IRM watches for data exfiltration
General data leaksBroad monitoring for unusual data movement across all users
Security policy violationsDisabling antivirus, installing software, accessing dark web
Patient data misuseHealthcare-specific: accessing records of patients not in their care
Communication Compliance:
  • Monitors email, Teams messages, and Viva Engage posts for policy violations
  • Common policies: regulatory compliance (financial services, healthcare), workplace conduct (harassment, discrimination), sensitive data in communications
  • Reviewers are assigned to investigate flagged communications
  • Integrates with eDiscovery for legal holds

⚠️ Exam Trap: Insider Risk Management identifies patterns of behavior — it is not a real-time blocking tool like DLP. IRM flags risks for human investigation; it doesn't automatically prevent actions.

Reflection Question: A healthcare organization wants to automatically flag emails that contain offensive language for HR review. Which Purview tool is most appropriate, and what is the role of a "reviewer" in that workflow?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications