Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
After you define Information Barriers (IB) policies, you might need to change those policies or your user segments as part of troubleshooting or regular maintenance.
Tip
If you're not an E5 customer, use the 90-day Microsoft Purview solutions trial to explore how additional Microsoft Purview capabilities can help your organization manage data security and compliance needs. Start now at the Microsoft Purview trials hub. Learn details about signing up and trial terms.
What do you want to do?
Action | Description |
---|---|
Edit user account attributes | Fill in attributes in Microsoft Entra ID that you can use to define segments. Edit user account attributes when users aren't included in segments they should be, to change which segments users are in, or to define segments by using different attributes. |
Edit a segment | Edit segments when you want to change how you define a segment. For example, you might have originally defined segments by using Department and now want to use another attribute, such as MemberOf. |
Edit a policy | Edit an Information Barriers policy when you want to change how a policy works. For example, instead of blocking communications between two segments, you might decide you want to allow communications to occur only between certain segments. |
Set a policy to inactive status | Set a policy to inactive status when you want to make changes to a policy, or when you don't want a policy to be in effect. |
Remove a policy | Remove an Information Barriers policy when you no longer need a particular policy in place. |
Remove a segment | Remove an Information Barriers segment when you no longer need a particular segment. |
Remove a policy and a segment | Remove an Information Barriers policy and a segment at the same time. |
Stop a policy application | Take this action when you want to stop the process of applying Information Barriers policies. Stopping a policy application isn't instant, and it doesn't undo policies that are already applied to users. |
Enable or disable user discoverability | Enable or disable if users are displayed in the people picker. |
Define policies for Information Barriers | Define an Information Barriers policy when you don't already have such policies in place, and you must restrict or limit communications between specific groups of users. |
Troubleshooting Information Barriers | Refer to this article when you run into unexpected issues with Information Barriers. |
Important
To perform the tasks described in this article, you must be assigned an appropriate role, such as one of the following:
- Microsoft 365 Enterprise Global Administrator
- Global Administrator
- Compliance Administrator
- IB Compliance Management (this is a new role!)
To learn more about prerequisites for Information Barriers, see Prerequisites (for Information Barriers policies).
Make sure to connect to the Security & Compliance PowerShell.
Important
Microsoft recommends that you use roles with the fewest permissions. Minimizing the number of users with the Global Administrator role helps improve security for your organization. Learn more about Microsoft Purview roles and permissions.
Edit user account attributes
Use this procedure to edit attributes that segment users. For example, if you're using a Department attribute and one or more user accounts don't currently have any values listed for Department, edit those user accounts to include Department information. Use user account attributes to define segments so you can assign Information Barriers policies.
Use the Get-InformationBarrierRecipientStatus cmdlet with Identity parameters to view details for a specific user account, such as attribute values and assigned segments.
Syntax Example Get-InformationBarrierRecipientStatus -Identity <value> -Identity2 <value>
Use any value that uniquely identifies each user, such as name, alias, distinguished name, canonical domain name, email address, or GUID.
(You can also use this cmdlet for a single user:Get-InformationBarrierRecipientStatus -Identity <value>
)Get-InformationBarrierRecipientStatus -Identity meganb -Identity2 alexw
In this example, we refer to two user accounts in Microsoft 365: meganb for Megan, and alexw for Alex.Decide which attribute to edit for your user account profiles. For more information, see Attributes for Information Barriers policies.
Edit one or more user accounts to include values for the attribute you selected in the previous step. Use one of the following procedures:
To edit a single account, see Add or update a user's profile information using Microsoft Entra ID.
To edit multiple accounts (or use PowerShell to edit a single account), see Configure user account properties with Office 365 PowerShell.
Edit a segment
Use this procedure to edit the definition of a user segment. For example, you might change the name of a segment or the filter that determines who is included in the segment.
Use the Get-OrganizationSegment cmdlet to view all existing segments.
Syntax:
Get-OrganizationSegment
You see a list of segments and details for each segment, such as the segment type, its UserGroupFilter value, who created or last modified it, GUID, and more.
Tip
Print or save your list of segments for reference. For example, if you want to edit a segment, you need to know its name or identify value (used with the Identity parameter).
Use the Set-OrganizationSegment cmdlet with the Identity parameter and relevant details to edit a segment.
Syntax Example Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"
Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'HRDept'"
In this example, you update the department name to HRDept for the segment with GUID c96e0837-c232-4a8a-841e-ef45787d8fcd.When you finish editing segments for your organization, you can either define or edit Information Barriers policies.
Edit a policy
Use the Get-InformationBarrierPolicy cmdlet to view a list of current Information Barriers policies.
Syntax:
Get-InformationBarrierPolicy
In the list of results, find the policy that you want to change. Note the policy's GUID and name.
Use the Set-InformationBarrierPolicy cmdlet with an Identity parameter, and specify the changes you want to make.
Example: Suppose you defined a policy to block the Research segment from communicating with the Sales and Marketing segments. You defined the policy by using this cmdlet:
New-InformationBarrierPolicy -Name "Research-SalesMarketing" -AssignedSegment "Research" -SegmentsBlocked "Sales","Marketing"
Suppose you want to change it so that users in the Research segment can only communicate with users in the HR segment. To make this change, use this cmdlet:
Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471 -SegmentsAllowed "HR"
In this example, you change SegmentsBlocked to SegmentsAllowed and specify the HR segment.
When you finish editing a policy, make sure to apply your changes. For more information, see Apply Information Barriers policies.
Set a policy to inactive status
Use the Get-InformationBarrierPolicy cmdlet to view a list of current Information Barriers policies.
Syntax:
Get-InformationBarrierPolicy
In the list of results, find the policy that you want to change or remove. Note the policy's GUID and name.
Use the Set-InformationBarrierPolicy cmdlet with the Identity parameter and the State parameter set to Inactive to set the policy's status to inactive.
Syntax Example Set-InformationBarrierPolicy -Identity GUID -State Inactive
Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c9377247 -State Inactive
In this example, the Information Barriers policy that has GUID 43c37853-ea10-4b90-a23d-ab8c9377247 is set to an inactive status.Use the Start-InformationBarrierPoliciesApplication cmdlet to apply your changes.
Syntax:
Start-InformationBarrierPoliciesApplication
Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours or more for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
One or more Information Barriers policies are set to inactive status. From here, you can take any of the following actions:
- Keep it as is (a policy set to inactive status has no effect on users)
- Edit a policy
- Remove a policy
Remove a policy
Use the Get-InformationBarrierPolicy cmdlet to view a list of current Information Barriers policies.
Syntax:
Get-InformationBarrierPolicy
In the list of results, find the policy that you want to remove. Note the policy's GUID and name.
Make sure the policy is set to inactive status. To set the policy's status to inactive, use the Set-InformationBarrierPolicy cmdlet with an Identity parameter and the State parameter set to Inactive.
Syntax Example Set-InformationBarrierPolicy -Identity GUID -State Inactive
Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c9377247 -State Inactive
In this example, you set an Information Barriers policy that has GUID 43c37853-ea10-4b90-a23d-ab8c9377247 to an inactive status.To apply your changes on the policy, use the Start-InformationBarrierPoliciesApplication cmdlet.
Syntax:
Start-InformationBarrierPoliciesApplication
Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours or more for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
Use the Remove-InformationBarrierPolicy cmdlet with an Identity parameter.
Syntax Example Remove-InformationBarrierPolicy -Identity GUID
Remove-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471
In this example, you remove the policy that has GUID 43c37853-ea10-4b90-a23d-ab8c93772471.When prompted, confirm the change.
Remove a segment
Use the Get-OrganizationSegment cmdlet to view all existing segments.
Syntax:
Get-OrganizationSegment
You see a list of segments and details for each segment, such as the segment type, its UserGroupFilter value, who created or last modified it, GUID, and more.
Tip
Print or save your list of segments for reference later. For example, if you want to edit a segment, you need to know its name or identify value (this value works with the Identity parameter).
Identify the segment to remove and make sure you remove the IB policy associated with the segment. For more information, see the Remove a policy procedure.
Edit the segment to remove the relationship of users to that segment. This action updates the segment definition and removes all users from the segment. Use the UserGroupFilter parameter to disassociate users from the segment before removal.
Use the Set-OrganizationSegment cmdlet with the Identity parameter and relevant details to edit a segment.
Syntax Example Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"
Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'FakeDept'"
In this example, for the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd, you define the department name as FakeDept to remove users from the segment. This example uses the Department attribute, but you can use other attributes as appropriate. The example uses FakeDept because this doesn't exist and is certain to not contain any users.Use the Start-InformationBarrierPoliciesApplication cmdlet to apply your changes.
Syntax:
Start-InformationBarrierPoliciesApplication -CleanupGroupSegmentLink
Note
The CleanupGroupSegmentLink attribute removes group associations with the segment with no user associations.
Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours or more for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
Use the Remove-OrganizationSegment cmdlet with the Identity parameter and relevant details to remove a segment.
Syntax Example Remove-OrganizationSegment -Identity GUID
Remove-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd
In this example, you remove the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd.
Remove a policy and segment
Use the Get-InformationBarrierPolicy cmdlet to view a list of current Information Barriers policies.
Syntax:
Get-InformationBarrierPolicy
In the list of results, find the policy that you want to remove. Note the policy's GUID and name.
Use the Get-OrganizationSegment cmdlet to view all existing segments.
Syntax:
Get-OrganizationSegment
You see a list of segments and details for each, such as segment type, its UserGroupFilter parameter value, who created or last modified it, GUID, and so on.
Tip
Print or save your list of segments for reference later. For example, if you want to edit a segment, you need to know its name or identify value (this value works with the Identity parameter).
Use the Set-InformationBarrierPolicy cmdlet with an Identity parameter and the State parameter set to Inactive to set the status of the policy to be removed to inactive.
Syntax Example Set-InformationBarrierPolicy -Identity GUID -State Inactive
Set-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471 -State Inactive
In this example, we set an Information Barriers policy that has GUID 43c37853-ea10-4b90-a23d-ab8c93772471 to an inactive status.Edit the segment that you want to remove to remove the relationship of users to that segment. This action updates the segment definition and removes all users from the segment. Use the UserGroupFilter parameter to disassociate users from the segment before removal.
Use the Set-OrganizationSegment cmdlet with the Identity parameter and relevant details to edit a segment.
Syntax Example Set-OrganizationSegment -Identity GUID -UserGroupFilter "attribute -eq 'attributevalue'"
Set-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd -UserGroupFilter "Department -eq 'FakeDept'"
In this example, for the segment that has the GUID c96e0837-c232-4a8a-841e-ef45787d8fcd, we updated the department name to FakeDept to remove users from the segment. This example uses the Department attribute, but you can use other attributes as appropriate. The example uses FakeDept because this doesn't exist and is certain to contain no users.Use the Start-InformationBarrierPoliciesApplication cmdlet to apply your changes.
Syntax:
Start-InformationBarrierPoliciesApplication -CleanupGroupSegmentLink
Note
The CleanupGroupSegmentLink attribute removes group associations with the segment with no user associations.
Changes are applied user-by-user for your organization. If your organization is large, it can take 24 hours or more for this process to complete. As a general guideline, it takes about an hour to process 5,000 user accounts.
Use the Remove-InformationBarrierPolicy cmdlet with an Identity parameter.
Syntax Example Remove-InformationBarrierPolicy -Identity GUID
Remove-InformationBarrierPolicy -Identity 43c37853-ea10-4b90-a23d-ab8c93772471
In this example, the policy that has GUID 43c37853-ea10-4b90-a23d-ab8c93772471 is removed.When prompted, confirm the change.
Use the Remove-OrganizationSegment cmdlet with the Identity parameter and relevant details to remove a segment.
Syntax Example Remove-OrganizationSegment -Identity GUID
Remove-OrganizationSegment -Identity c96e0837-c232-4a8a-841e-ef45787d8fcd
In this example, the segment with GUID c96e0837-c232-4a8a-841e-ef45787d8fcd was removed.
Stop applying a policy
If you started applying Information Barriers policies and want to stop applying those policies, use the following procedure. It takes about 30 to 35 minutes for the process to start.
Use the Get-InformationBarrierPoliciesApplicationStatus cmdlet to view the status of the most recent Information Barriers policy application.
Syntax:
Get-InformationBarrierPoliciesApplicationStatus
Note the application's GUID.
Use the Stop-InformationBarrierPoliciesApplication cmdlet with an Identity parameter.
Syntax Example Stop-InformationBarrierPoliciesApplication -Identity GUID
Stop-InformationBarrierPoliciesApplication -Identity 46237888-12ca-42e3-a541-3fcb7b5231d1
In this example, you're stopping the application of Information Barriers policies.
Enable or disable user discoverability
Important
Support for enabling or disabling search restrictions is only available when your organization isn't in Legacy mode. Organizations in Legacy mode can't enable or disable search restrictions. Enabling or disabling search restrictions requires additional actions to change the Information Barriers mode for your organization. For more information, see Use multi-segment support in Information Barriers.
Organizations in Legacy mode are eligible to upgrade to the newest version of Information Barriers in the future. For more information, see the Information Barriers roadmap.
To enable the people picker search restriction by using PowerShell, complete the following steps:
- Use the Set-PolicyConfig cmdlet to enable the people picker restriction:
Set-PolicyConfig -InformationBarrierPeopleSearchRestriction 'Enabled'
To disable the people picker search restriction by using PowerShell, complete the following steps:
- Use the Set-PolicyConfig cmdlet to disable the people picker restriction:
Set-PolicyConfig -InformationBarrierPeopleSearchRestriction 'Disabled'
Resources
- Get an overview of Information Barriers
- Define policies for Information Barriers
- Learn more about Information Barriers in Microsoft Teams
- Learn more about Information Barriers in SharePoint Online
- Learn more about Information Barriers in OneDrive
- Use multi-segment support in Information Barriers
- Attributes for IB policies
- Troubleshooting Information Barriers