Section 2 – Implement information protection – Implement and manage sensitivity labels

This will be a two part section as there is a lot to talk about Sensitivity labels.

Implement and manage sensitivity labels

In this section we are talking on how to Protect your data scope. There is a clear story line on this journey as we can see.

What are labels?

Sensitivity labels are like customizable tags for your documents. They clearly show how sensitive the information is, with options like Personal, Public, General, Confidential, and Highly Confidential. You can tweak them to match your organization’s needs.

These labels are stored in plain text (Metadata) with your files and emails, so other apps can understand them. This means those apps can add extra security when needed.

In your organization, users see these labels as easy-to-spot tags in their everyday apps. It helps them work smoothly and securely.

Implement roles and permissions for administering sensitivity labels

By default, global administrators of your tenant can access this admin center and grant access to compliance officers and others without assigning them full tenant admin privileges. To provide this restricted administrative access, you can utilize the following role groups:

  • Information Protection
  • Information Protection Admins
  • Information Protection Analysts
  • Information Protection Investigators
  • Information Protection Readers

You can access the permissions tab from here https://compliance.microsoft.com/permissions

And you can find Compliance portal permissions here https://compliance.microsoft.com/compliancecenterpermissions

Or if you want to use the built-in permission available.

RoleDescription
Global administratorAccess to all administrative features in all Microsoft 365 services. Only global administrators can assign other administrator roles. For more information, see Global Administrator / Company Administrator.
Compliance data administratorKeep track of your organization’s data across Microsoft 365, make sure it’s protected, and get insights into any issues to help mitigate risks. For more information, see Compliance Data Administrator.
Compliance administratorHelp your organization stay compliant with any regulatory requirements, manage eDiscovery cases, and maintain data governance policies across Microsoft 365 locations, identities, and apps. For more information, see Compliance Administrator.
Security operatorView, investigate, and respond to active threats to your Microsoft 365 users, devices, and content. For more information, see Security Operator.
Security readerView and investigate active threats to your Microsoft 365 users, devices, and content, but (unlike the Security operator) they don’t have permissions to respond by taking action. For more information, see Security Reader.
Security administratorControl your organization’s overall security by managing security policies, reviewing security analytics and reports across Microsoft 365 products, and staying up-to-speed on the threat landscape. For more information, see Security Administrator.
Global readerThe read-only version of the Global administrator role. View all settings and administrative information across Microsoft 365. For more information, see Global Reader.
Attack simulation administratorCreate and manage all aspects of attack simulation creation, launch/scheduling of a simulation, and the review of simulation results. For more information, see Attack Simulation Administrator.
Attack payload authorCreate attack payloads but not actually launch or schedule them. For more information, see Attack Payload Author.

You can find Azure roles here https://compliance.microsoft.com/aadpermissions

Administrative Units

Licensing needed for AU.

  • Entra ID:
    • Microsoft Entra ID P1 or P2 license for each administrative unit administrator
      • Microsoft Entra ID Free licenses for administrative unit members
      • Privileged Role Administrator role
      • Microsoft.Graph module when using Microsoft Graph PowerShell
      • Azure AD PowerShell module when using PowerShell
      • AzureADPreview module when using PowerShell and restricted management administrative units
      • Admin consent when using Graph explorer for Microsoft Graph API
  • Microsoft Purview licensing:
    • Microsoft 365 E5/A5
    • Microsoft 365 E5/A5/F5 Compliance and F5 Security & Compliance
    • Microsoft 365 E5/A5/F5 Information Protection & Governance

If you want to use Administrative Units (AU) you can use them in the following.

SolutionConfiguration support
Data lifecycle managementRole groups, retention policies, and retention label policies
Data Loss Prevention (DLP)Role groups and DLP policies
Communication complianceAdaptive scopes
Records managementRole groups, retention policies, retention label policies, and adaptive scopes
Sensitivity labelingRole groups, sensitivity label policies, and auto-labeling policies

Read more on the permissions from Learn

Enable Labels for Microsoft 365 groups

When encryption-enabled sensitivity labels are used on Office files in SharePoint and OneDrive, web versions of Word, Excel, and PowerPoint won’t be able to access the content. Consequently, coauthoring, eDiscovery, data loss prevention, search, Delve, and other features won’t function. Enabling this setting allows these features to work even with encrypted labels applied.

And when you start to create an Label, you will see this.

No worries, this is how you can Enable labels for M365 groups.

Close PowerShell and reopen then. Otherwise you won’t find all the commands.

If the value of EnableMIPLabels is False

Then run this

And you will see MIPLabels as Enabled.

Then we can see creation of labels.

Define and create sensitivity labels

When you create an label, you can define Client-side processing for it by defining Classifiers or SITs to discover from the content and recommending or requiring a label

When you want to create a label, Information protection tab from Compliance portal and first Define the visuals

Then the scope of the label, which means the service you can use it.

Author note! Did you know that you can use the same labels inside Purview Data Governance portal and with Data maps

Next you can enable Encryption, apply watermark, header and footer if you want, you don’t have to. You can just label files.

But it’s strongly suggested to keep the content you labeled protected. If you do, you will be presented this page.

Assign permissions now or let users decide

If you choose “Let users assign” you will be presented with the following and you have to choose at least Prompt users to specify

User access to content expires

To restrict user access to content labeled, set an expiration date or a duration. Files with this label won’t open after the specified time. Note that email expiration may not always apply due to caching. If you choose a date, it’s effective at midnight in your local time zone. If you opt for days, the countdown starts when the label is applied.

Allow offline access

When you set labeled content to be offline-unavailable or offline-available for a limited time, users must reauthenticate and their access is logged once the time limit is reached. If their credentials aren’t cached, they’ll be prompted to sign into Microsoft 365 before accessing the document or email.

From the permissions you can select the following.

Any authenticated users Includes any user who:

  • Has an email account that’s authenticated by Azure AD or a federated social provider.
  • Is authenticated by a Microsoft account.
  • Uses a one-time passcode for email only.

And with specific email or domain you can add external domain names and email addresses for internal and external users and groups. Be sure to click ‘Add’ after entering the address or domain.

And from the permissions menu you add the following with different predefined sets or with the custom mode

You can define the Auto-labeling options or not, if you choose to do so, you can use SITs and Classifiers to find predefined information from the content and Require or Recommend a label for it.

Client-side auto-labeling

Client-side auto-labeling occurs directly on the user’s workstation while they are creating or editing a document or email within applications. It assesses the content and, depending on what it detects, automatically assigns a label or suggests one to the user based on label properties. It’s also possible to designate a default label for documents and emails. Unlike service-side auto-labeling, client-side labeling does not assess document content against conditions specified in a global policy; instead, it relies on the properties defined for each individual label.

Note that Automatic and recommended labeling works differently for items in Office 365 vs. files stored on Windows devices.

If you select Groups and Sites to the scope, you will the following properties to configure.

Those Privacy settings that define Groups to be Public, Private or let at the owner decide.

And External sharing settings

And we are done, just click Create

So now we have a label but it’s now visible to anyone and we need to publish it.

Configure and manage sensitivity label policies

In this list, label order matters as it mirrors their priority. Place the most restrictive label, like ‘Highly Confidential,’ at the bottom and the least restrictive, like ‘Public,’ at the top

You can assign the priority by moving the label to the top and just upward. If the the label has a high priority you can lower it by moving it down or to the bottom.

Now you have to publish the label with a Label policy, just choose Publish label.

From here you can specify Admin units

And / or users and groups

And choose settings for the policy.

  • Choose which users and groups see the labels: Determine which users and groups can view labels. Labels can be shared with specific users, email-enabled security groups, distribution groups, or Entra ID Microsoft 365 groups, including those with dynamic membership.
  • Specify a default label: Set a default label for unlabeled documents, emails, meeting invites, new containers (in cases where sensitivity labels are enabled for Teams, Microsoft 365 groups, and SharePoint sites), and Power BI content. You can use the same label for all these items or choose different ones. Users can change the default sensitivity label to better match their content’s sensitivity.
  • Require a justification for changing a label: Implement label change justifications. When users attempt to remove or replace a label with a lower-order number (e.g., changing from Confidential to Public), they must provide a reason, except for teams and groups. Administrators can access this justification along with the label change details.
  • Require users to apply a label: Enforce mandatory labeling for various item types and supporting containers. Also known as mandatory labeling, this ensures users apply a label before saving documents, sending emails, creating groups or sites, or using unlabeled Power BI content. Labels for documents and emails can be assigned manually, automatically through configured conditions, or by default, as explained earlier.
  • Provide help link to a custom help page: Include a link to a customized help page. If your users have questions about the meaning and usage of sensitivity labels, you can offer a “Learn More” URL. This link will be displayed following the list of available sensitivity labels within Office apps.

And to define a Default label if required

For emails you can specify the inheritance from Attachments.

Once you have create the Label policy it can take up to 24 hours to publish the labels to the selected users’ apps.

Closure

Quick recap on what was in this section.

Labels are like customizable tags for your documents. They clearly show how sensitive the information is, with options like Personal, Public, General, Confidential, and Highly Confidential. You can tweak them to match your organization’s needs.

What permissions are available for Compliance https://learn.microsoft.com/en-us/microsoft-365/security/office-365-security/scc-permissions

You can use the same labels inside Purview Data Governance portal and with Data maps.

What permissions are available and from where to add them. You can still see more here https://learn.microsoft.com/en-us/purview/microsoft-365-compliance-center-permissions

That you can use Administrative Units in the following:

SolutionConfiguration support
Data lifecycle managementRole groups, retention policies, and retention label policies
Data Loss Prevention (DLP)Role groups and DLP policies
Communication complianceAdaptive scopes
Records managementRole groups, retention policies, retention label policies, and adaptive scopes
Sensitivity labelingRole groups, sensitivity label policies, and auto-labeling policies

That Client-side auto-labeling occurs directly on the user’s workstation while they are creating or editing a document or email within applications. It assesses the content and, depending on what it detects, automatically assigns a label or suggests one to the user based on label properties.

That you can use SITs and Classifiers on Client-side Auto-labeling.

How to create policies and their different settings, which include.

  • Control Visibility: Choose who can see labels by sharing them with specific users, email-enabled security groups, distribution groups, or Entra ID Microsoft 365 groups.
  • Set Default Labels: Specify default labels for documents, emails, meeting invites, containers, and Power BI content. You can use the same label or different ones for each type.
  • Justify Label Changes: Require users to provide a reason when changing labels, except for teams and groups. Administrators can review these justifications.
  • Mandatory Labeling: Make it mandatory for users to apply labels before saving documents, sending emails, creating groups, sites, or using unlabeled Power BI content. Labels can be assigned manually, automatically, or by default.

Link to main post

Author: Harri Jaakkonen

Leave a Reply

Your email address will not be published. Required fields are marked *