Generating and testing fake data to validate DLP policies in Office 365

During your data loss prevention policies implementation, you will look for ways to test it, and in this article, we will cover the process to generate the info required to do so in the Office 365 console. First of all, generating the DLP policies information to test has to be our starting point. There are plenty of sites out there to generate fake information about credit cards that you can use to generate this data. One of my favorites is Fake Person Generator. Just select the brand of the credit card, the quantity, and if you want to test from a specific country. Then click on generate.

The next step is to grab all the credit card information provided on the website and save it in a word document.

Then logged in the Office 365 Security and Compliance page, click on Classifications, sensitive info types, and select the information that we want to validate, in our case Credit Card Number. A new blade will be displayed on the right side. Click on test type.

In the new blade, click on the square box and provide the Word document that has all fake credit card information, and click on Test.

In the Match results page, the confidence level, number of matches, and the actual matches will be displayed.

Now that we have a piece of solid information about the data that we are testing, we can use that data to perform the actual tests on Exchange, SharePoint, Teams, and OneDrive DLP policies.

Featured image: Shutterstock

Anderson Patricio

Anderson Patricio is a Canadian MVP in Cloud and Datacenter Management, and Office Server and Services, besides of the Microsoft Award he also holds a Solutions Master (MCSM) in Exchange, CISSP and several other certifications. Anderson contributes to the Microsoft Community with articles, tutorials, blog posts, twitter, forums and book reviews. He is a regular contributor here at Techgenix.com, MSExchange.org, ITPROCentral.com and Anderson Patricio.org (Portuguese).

Share
Published by
Anderson Patricio

Recent Posts

Hold the phone! Voice communication is becoming cool again

Business telephone conversations have largely been supplanted by email. But voice communication is far from dead — and it may…

41 mins ago

What are the potential disadvantages of SSL/TLS?

There’s wide consensus on the benefits of SSL/TLS. However, not as much attention has been given to SSL/TLS disadvantages.

3 days ago

Exploring native software inventory logging in Windows Server

Windows Server has built-software inventory logging that can be very useful. Here’s how to use this little-known feature.

3 days ago

Passwordless authentication: Safer, better, and about time

Passwordless authentication has quickly become one of the primary means by which users access their laptops, phones, and tablets because…

3 days ago

Automated Incident Response in Office 365 ATP simplifies cybersecurity

Microsoft has pumped up Office 365 Advanced Threat Protection with a new feature, Automated Incident Response. Here’s what you need…

4 days ago

IFA 2019: Smart TVs and even smarter wearables unveiled

What will be in your living room or on your wrist this year? It may very likely be one of…

4 days ago