Skip to main content

Module 2 Overview

Module 2 of 3
Data Protection
Apply DLP Controls to Prevent Data Loss
⏱ ~90 minutes⚗ Lab Tenant (Read/Write)👤 Alex + KevinLabs 5 – 8

Alex now understands where sensitive data lives, how it moves, and which exposures represent the highest risk. Visibility alone does not reduce risk. Protection requires enforcing controls that prevent data from leaving authorized boundaries. In this module, Alex transitions from observation to action — building detection logic, applying enforcement policies, and testing those policies through realistic user behavior.

🔄

Confirm Tenant Switch
You should now be logged into the Lab Tenant (Tenant 2). This is a clean environment with no active DLP policies. You will build them from scratch.

Module Objectives

QuestionCapability
What defines sensitive data?DLP Dictionaries
How is sensitive data detected?DLP Engines
How is data protected during network transfer?Inline Web DLP
How is data protected on the device?Endpoint DLP
How is data protected inside the browser?Browser DLP

Labs in This Module

🎓
Lab Assistant
Zenith Live 2026 · Dataparity
Introduction
Browse all topics