Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
In preview, Microsoft Purview Data Loss Prevention (DLP) monitoring and protection are built right into the Microsoft Edge for Business browser. You don’t need to onboard the device into Microsoft Purview. This integration helps you stop users from sharing sensitive information to and from cloud apps using Edge.
Licensing requirements
To use this feature, you need one of these licenses:
- Microsoft 365 E5/A5/G5, Microsoft 365 Business Premium
- Office 365 E5/A5/G5
- Microsoft 365 E5/A5/G5/F5 Compliance and F5 Security & Compliance
Important
Licensing and billing details for preview features may change.
Permissions
The account you use to create and deploy policies must be a member of one of these role groups:
- Compliance administrator
- Compliance data administrator
- Information Protection
- Information Protection Admin
- Security administrator
Managed Devices
You can protect Windows 10/11 devices that are managed by Intune. Users must sign in with their work or school account.
On these devices, Edge connects directly with Microsoft Purview and Edge services to get policy updates and apply protections. Edge configuration policies block users from using protected apps in noncompliant browsers. If users try to access an unmanaged app in a noncompliant browser, they’ll be blocked and prompted to use Microsoft Edge.
In preview, browser DLP can Help prevent sharing via Microsoft Edge for Business to unmanaged AI apps from managed devices.
Unmanaged devices
Unmanaged devices aren’t connected to Intune or joined to your organization using Entra. Users don’t sign into the device with their work or school account. Instead, they sign into their Edge work profile to access organization managed apps.
Browser DLP policies only apply to the work profile in Edge. These policies don’t apply when users use a Personal or InPrivate profile.
In preview, these protections can Help Prevent Users from Sharing Sensitive Info with Cloud Apps in Edge for Business.
Supported cloud apps
Entra Connected (Managed) Apps
Entra connected (managed) apps are business apps set up for Entra Single Sign-On (SSO). Policies apply when users access them with their work or school account.
Unmanaged cloud Apps
These apps aren’t managed by your organization. Users access them without signing in with their Microsoft work or school account. Supported unmanaged cloud apps include:
- OpenAI ChatGPT
- Google Gemini
- DeepSeek
- Microsoft Copilot
Important
Unmanaged cloud app features only apply to the consumer version of Microsoft 365 Copilot. Learn more about Microsoft 365 Copilot Enterprise protections.
Supported Browsers
DLP policies for cloud apps in the browser work directly in Microsoft Edge for Business.
Edge for Business
These features are available in the two latest stable versions of Edge, starting with version 138. For more information on the supported versions of Edge, see Microsoft Edge Releases.
Tip
Get started with Microsoft Security Copilot to explore new ways to work smarter and faster using the power of AI. Learn more about Microsoft Security Copilot in Microsoft Purview.
Activities you can monitor and take action on
You can audit and manage these activities on sensitive items in the browser:
Activity | Device Type | App Type | Supported Policy Actions |
---|---|---|---|
Upload text | Managed | Unmanaged | allow, block, both actions audited |
Upload file | Managed, Unmanaged | Managed | allow, block, both actions audited |
Download file | Managed, Unmanaged | Managed | allow, block, both actions audited |
Cut/copy data | Managed, Unmanaged | Managed | allow, block, both actions audited |
Paste data | Managed, Unmanaged | Managed | allow, block, both actions audited |
Print data | Managed, Unmanaged | Managed | allow, block, both actions audited |
Policies for Managed App Interactions
DLP policies targeting managed apps in the browser apply on desktop devices running Microsoft Edge in Windows 10/11 and macOS.
Edge disables developer tools automatically when policies apply to managed apps (in both audit and block modes).
To activate protections in Edge for managed apps:
- Onboard apps to Conditional Access app control
- Import user groups from connected apps
- Set up an Entra Conditional Access policy with custom session controls
- Configure Edge for Business in-browser protection
- Create a Purview DLP policy targeting managed app interactions
For full implementation details, see Help Prevent Users from Sharing Sensitive Info with Cloud Apps in Edge for Business.
Important
If a user is scoped in Purview DLP policies for managed cloud apps in Edge and Microsoft Defender session policies or Purview Endpoint DLP policies, protections might not apply in Edge from the Purview browser policy. Remove or exclude users from the other policies to allow the Purview policy for managed cloud apps in Edge to apply.
When you add users to policies for the first time, the policy might not be applied right away if they’re already signed in to the app. The policy applies after their token expires and they sign in again. You can change the sign in frequency using conditional access session controls to shorten the wait time.
There are some known limitations in Conditional Access app control that can impact Purview policies targeting managed apps in the browser. For more information, see known limitations in Conditional Access app control
Policies for Unmanaged App Interactions
DLP policies targeting unmanaged apps in the browse apply can monitor and protect sensitive data shared from managed desktop devices in Edge on Windows 10/11.
To activate protections in Edge:
- Create a Purview DLP policy
- Set up an Edge configuration policy
For full setup details, see Help prevent sharing via Microsoft Edge for Business to unmanaged AI apps from managed devices.
Default Policies for AI Apps from Microsoft Data Security Posture Management for AI
Microsoft Purview Data Security Posture Management for AI (DSPM for AI) offers recommended policies to monitor and block generative AI apps. Use one-click policies in DSPM for AI to apply them.
Accessing Data from Managed App Interactions
You can view policy data and alerts in Defender XDR investigations.
Accessing Data from Unmanaged App Interactions
You can view activities and audit log entries in activity explorer, audit logs, and Defender XDR investigations. In activity explorer, filter by enforcement plane set to browser. Data specific to AI apps is also visible in DSPM for AI.