MS Purview DLP and Google workspace

Karol 0 Reputation points
2025-08-05T05:41:05.63+00:00

Hello community,

I'm trying to audit my Google Workspace (Gdrive files specifically). I've connected Google Workspace as Cloud App in my Defender portal. On Purview portal I've created policy that should match some of my files and I choose Google instance in Locations.

Yet I don't see any alerts after couple of days, I'm clueless what to troubleshoot as I can see Google instance in Purview, help :(

Microsoft Security | Microsoft Purview
{count} votes

1 answer

Sort by: Most helpful
  1. Smaran Thoomu 28,310 Reputation points Microsoft External Staff Moderator
    2025-08-05T19:42:07.0433333+00:00

    Hi Karol

    Thanks for sharing your scenario. You're on the right track by connecting Google Workspace as a Cloud App in Microsoft Defender and targeting it in your Microsoft Purview DLP policy.

    Here are some key things to check to help troubleshoot why your Purview DLP policy isn’t triggering for Google Drive:

    Confirm Google Workspace Integration Health

    1. In Microsoft Defender for Cloud Apps, go to Settings > Cloud Discovery > Connected apps and ensure Google Workspace is showing a green/healthy connection.
    2. Check under Cloud Apps > Connected Apps > Google Workspace for ingestion status and account coverage.

    Verify File Activity and DLP Signal Flow

    • DLP on third-party apps like Google Drive triggers only on file activity (e.g., sharing, editing, or downloading a file with sensitive info).
    • Simply storing sensitive content without user interaction may not trigger a DLP match.

    Try this for testing:

    • Upload a test file containing known sensitive info (e.g., passport number).
    • Share the file externally or edit the file.
    • Wait 15–30 mins and check Purview alerts.

    Review DLP Policy Configuration in Purview

    1. Ensure the policy includes Google Workspace in the "locations" setting.
    2. Confirm that:
      • The right sensitive info types are selected.
      • Audit or block actions are enabled in the policy.
      • Policy is in "On" state (not just testing mode).

    Confirm Licensing and Permissions

    Microsoft Purview DLP for third-party apps requires:

    • Microsoft 365 E5 Compliance or equivalent
    • Proper connector permissions granted during onboarding (OAuth for Google)

    Suggested next step:

    • Simulate an activity (e.g., share a file with credit card number externally).
    • Monitor Activity Explorer in Defender for Cloud Apps or DLP Alerts in Purview.
    • If still no activity shows up, try re-authenticating the Google connector in Defender.

    Let us know how it goes - happy to help troubleshoot further if needed.

    I hope this information helps. Please do let us know if you have any further queries.


    If this answers your query, do click Accept Answer and Yes for was this answer helpful. And, if you have any further query do let us know.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.