Purview Network DLP with Global Secure Access

Purview Network DLP with Global Secure Access

February 4, 2026

In this blog post, we will explore how to set up and utilize Purview Network Data Loss Prevention (DLP) in conjunction with Global Secure Access (GSA) to safeguard sensitive data as it moves across your network. We will cover the configuration steps, best practices, and real-world scenarios where this integration can enhance your organization’s data security posture.

Prerequisites

  • Enterprise Mobility & Security E5 License

GSA is a paid offering. While the M365 traffic profile in GSA is included with E5, to leverage Network DLP capabilities, you will need one of the following licenses that include Entra Internet Access:

  • Microsoft Entra Internet Access Standalone License
  • Microsoft Entra Suite License

Global Secure Access (GSA) Setup

The GSA setup is lengthy. We won’t cover all of the details here, but you can refer to the official documentation for a comprehensive guide: Get started with Global Secure Access.

At a bare minimum, you will need:

Purview Network DLP Setup

On the Purview side, there are two main capabilities that are enabled when you integrate GSA & Purview: Collection Policies and DLP Policies. Each can be used independently, but they also complement each other well.

Collection Policies

If you haven’t used Collection Polices before, they can be a bit confusing. Collection policies in Microsoft Purview have two main purposes:

  • Limiting events and telemetry ingested from specific data sources, locations, activities, and content conditions to reduce noise and meet regional or regulatory requirements. A prime example is Audit data from Endpoint DLP
  • Enabling the collection of full content for specific data sources and activities, particularly with Network and Edge in-browser protections.

In the context of Network DLP (and Edge in-browser protections), collection policies enable the collection of sensitive data sent to the following sources:

  • Unmanaged cloud apps
  • Adaptive App Scopes, albeit only the All unmanaged AI apps scopes

Additionally, you can capture the full text of prompts and responses sent to consumer AI services like Gemini, ChatGTP and Deepseek.

Creating a Network DLP Collection Policy

In DLP, navigate to Classifiers → Collection policies and create a new policy:

SettingValue
NameNetwork DLP Collection Policy
DescriptionCollection policy to capture sensitive data in transit via Global Secure Access
Data to DetectAll Classifiers
Activities to Detect
  • Text sent to or shared with cloud or AI app
  • File uploaded to or shared with cloud or AI app
  • Text received from cloud or AI app
  • File downloaded from cloud or AI app

alt text
Data Sources
Reference
Unmanaged Cloud Apps: Individual Cloud Apps
Adaptive App Scope: All unmanaged AI Apps
Currently the only supported scope supported for Browser & Network
Data Sources dialogChoose Edit Scope to include or Exclude users/groups
Where to Apply
  • Content Capture: Choose Capture content
  • Cloud apps detection: Choose Network

Once created, you should start seeing events populate in Activity Explorer, either in DSPM for AI (classic) or DSPM (preview).

Network DLP Policies

DLP Policies that target Network are created using the new Inline Web Traffic option in the wizard. This a fork in the road from a policy standpoint - the two types of policies cannot be combined.

Creating a Network DLP Policy - Location selection

Note

As you may have guessed, you cannot edit an existing policy to add Network as a location; it must be created from scratch.

Caution

Network DLP inspection is a pay-as-you-go feature and NOT included in E5. It is billed based on number of requests. Currently, that price is $0.50/10K Requests. For more details, see Microsoft Purview pricing.

Creating a Network DLP Policy

In DLP, navigate to Policies and create a new policy:

SettingValue
What type of policy do you want to create?Choose Inline web traffic
TemplateCustom Policy
Currently there are no templates available
NameNetwork DLP Policy
DescriptionDLP policy to protect sensitive data in transit via Global Secure Access
Cloud AppsUnmanaged Cloud Apps: Individual Cloud Apps
Adaptive App Scope: Choose any combination of app scopes
Cloud Apps ScopingChoose Edit Scope to include or Exclude users/groups, or leave at the default, All
App Scoping
Enforcement OptionsChoose Network

After completing those steps, you’ll be presented with the familiar DLP policy rule builder. From here, you can configure the policy rules as you would for any other DLP policy.

Conditions

For conditions, Network DLP supports the typical content inspection and file metadata properties.

  • Content contains (sensitive info types, sensitivity labels, trainable classifiers)
  • Content not fully scanned
  • File cannot be scanned
  • File extension is
  • File is not labeled
  • File is password protected
  • File size equals or is greater than
  • File type is
  • Insider risk level for Adaptive Protection is
Actions

The only action available is Restrict browser and network activities, which allows audit or block for the following activities:

  • Text sent to or shared with cloud or AI apps
  • File uploaded to or shared with cloud or AI apps
  • Text received from cloud or AI apps
  • File received from cloud or AI apps

Network DLP Actions

Testing Network DLP

To test Network DLP, ensure you have the GSA client installed and configured on your test device. Then, attempt to upload or share sensitive data that matches the conditions defined in your DLP policy using an unmanaged cloud app. If the policy is configured to block, you should see a block page indicating that the action has been blocked.

Tip

Because GSA is performing TLS inspection, instead of the typical certificate error you might see when intercepting HTTPS traffic, GSA will present its own block page. So you have that going for you … which is nice.

Looking at a match in Activity Explorer, you can see the the Enforcement Plane is listed as Network, confirming that the event was captured via Network DLP. In my example below, I targeted the “cloud app” DLP Test, and attempted to download a file containing a credit card number. The DLP policy blocked the download, and the event was logged in Purview.

Network DLP Event in Activity Explorer

Conclusion

Integrating Purview Network DLP with Global Secure Access provides a robust solution for protecting sensitive data in transit across your network. Since you’re operating at the network level, you can effectively control data egress from desktop apps and APIs, instead of just the typical egress point of Web Browsers.

Network is still a relatively new capability in Purview DLP, so expect to see additional features and enhancements over time. It’s just one part of a comprehensive data protection strategy, but when combined with endpoint DLP, information protection, and other security measures, it can significantly bolster your organization’s defenses against data loss.