Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

3.1.3. Insider Risk Management and Communication Compliance

šŸ’” First Principle: Insider Risk Management detects patterns of risky user behavior — not individual violations, but sequences of actions that together suggest a data security risk. Communication Compliance detects violations in what people say. Both tools are about identifying risk that DLP alone can't catch.

DLP catches a specific action: a file being shared. But what about the user who, over two weeks, downloads 500 files, creates a new personal email account, and then resigns? No single action triggers DLP — but the pattern is a serious exfiltration risk. Insider Risk Management surfaces these patterns.

Insider Risk Management (IRM):
  • Monitors signals like bulk file downloads, USB transfers, access to sensitive files, printing, browser uploads
  • Combines signals into risk scores for users
  • Creates alerts when a user's risk score exceeds a threshold
  • Requires sensitive handling: access is limited to specific roles, and investigation findings are pseudonymized until explicitly deanonymized
Policies you can create in IRM:
Policy TemplateScenario
Data theft by departing usersUser is tagged as "leaving" in HR system; IRM watches for data exfiltration
General data leaksBroad monitoring for unusual data movement across all users
Security policy violationsDisabling antivirus, installing software, accessing dark web
Patient data misuseHealthcare-specific: accessing records of patients not in their care
Communication Compliance:
  • Monitors email, Teams messages, and Viva Engage posts for policy violations
  • Common policies: regulatory compliance (financial services, healthcare), workplace conduct (harassment, discrimination), sensitive data in communications
  • Reviewers are assigned to investigate flagged communications
  • Integrates with eDiscovery for legal holds

āš ļø Exam Trap: Insider Risk Management identifies patterns of behavior — it is not a real-time blocking tool like DLP. IRM flags risks for human investigation; it doesn't automatically prevent actions.

Reflection Question: A healthcare organization wants to automatically flag emails that contain offensive language for HR review. Which Purview tool is most appropriate, and what is the role of a "reviewer" in that workflow?

Alvin Varughese
Written byAlvin Varughese
Founder•15 professional certifications