Examples/Resources/SCDLPComplianceRule/1-AddingNewDLPComplianceRule.ps1
<#
This example is used to test new resources and showcase the usage of new resources being worked on. It is not meant to use as a production baseline. #> Configuration Example { param ( [Parameter(Mandatory = $true)] [PSCredential] $Credscredential ) Import-DscResource -ModuleName Microsoft365DSC node localhost { SCDLPComplianceRule 'ConfigureDLPComplianceRule' { Name = 'Low volume EU Sensitive content found' Policy = 'General Data Protection Regulation (GDPR)' AccessScope = 'InOrganization' BlockAccess = $True BlockAccessScope = 'All' ContentContainsSensitiveInformation = MSFT_SCDLPContainsSensitiveInformation { SensitiveInformation = @( MSFT_SCDLPSensitiveInformation { name = 'EU Debit Card Number' id = '0e9b3178-9678-47dd-a509-37222ca96b42' maxconfidence = '100' minconfidence = '75' classifiertype = 'Content' mincount = '1' maxcount = '9' } ) } Disabled = $False DocumentIsPasswordProtected = $False DocumentIsUnsupported = $False ExceptIfDocumentIsPasswordProtected = $False ExceptIfDocumentIsUnsupported = $False ExceptIfHasSenderOverride = $False ExceptIfProcessingLimitExceeded = $False GenerateIncidentReport = @('SiteAdmin') HasSenderOverride = $False IncidentReportContent = @('DocumentLastModifier', 'Detections', 'Severity', 'DetectionDetails', 'OriginalContent') NotifyUser = @('LastModifier') ProcessingLimitExceeded = $False RemoveRMSTemplate = $False ReportSeverityLevel = 'Low' StopPolicyProcessing = $False Ensure = 'Present' Credential = $Credscredential } } } |