Microsoft 365: Microsoft Purview – Information protection – Sensitivity Label – Securing Business Data with Sensitivity Labels and Information protection in Microsoft 365 – Data Governance
Make each day your masterpiece.
Hello Everyone,
Hope you all are doing well.
Today, we’ll delve into Microsoft Purview Information protection and how it utilizes sensitivity labels to enhance the security of business data. We’ll explore how these sensitivity labels play a crucial role in safeguarding and classifying important information within your organization.
If you want to know about Microsoft Purview, then you can read the previous article link for following is given below – https://knowledge-junction.in/2023/05/11/microsoft-365-exploring-microsoft-purview-introduction-simplifying-concepts-study-material-for-exam-sc-900-microsoft-security-compliance-and-identity-fundamentals/
Key takeaways from this article
At the end of this article we will understand
- We will understand about Sensitivity label in Microsoft Purview
- Licenses requirement to access the Information protection in Microsoft Purview
- Roles/Permission for performing the operation on Microsoft Purview Information protection
- Understand how to securing Business Data with Sensitivity labels and Information protection in Microsoft 365.
- Additionally, we’ll explore the practical applications of Content explorer and Activity explorer, gaining insights into how these tools can help us manage and navigate our data effectively.
Let take a Practical Scenario:
- Imagine you’re the managing partner of a law firm, and one day, you ask your assistant to send an email to all the members of your staff to let them know about an upcoming barbecue party. You’ve even prepared a Word document with all the important details for the party.
- Now, your assistant is swamped with work and has just finished compiling a document containing the salary information of everyone in your firm. In a moment of accidental mishap, she clicks on the wrong email and sends out the staff salaries instead of the barbecue party details.
- Instances like these are not uncommon; they are simple user errors that can happen to anyone. However, such mistakes can potentially lead to serious repercussions for both you and your business.
How can we protect our business data?
- In the past, companies used to store all their files and folders on servers, and access to these files was controlled through permissions. For example, there might be a finance folder, and only employees from the finance department were granted permission to access it.
- Nowadays, with the shift to cloud-based systems like Microsoft 365, these permissions have transitioned to the cloud environment. In Microsoft 365, for instance, you might store your data in a SharePoint site, and you can still assign the right users to permission groups. This way, those users are allowed to access and view the data within the SharePoint.
- However, it’s important to note that these traditional permissions alone may not provide adequate protection against certain risks or scenarios, like the one I mentioned earlier: accidental data exposure or misuse. In such cases, additional security measures and safeguards are often necessary to ensure the safety and privacy of sensitive data in the cloud.
So, that is mind is there a better way to protect our business data well it possible if we are using Microsoft 365 there is something called sensitivity labels.
Sensitivity Labels

- A sensitivity label in Information protection is a way of categorizing and marking digital documents or data to indicate their level of sensitivity or importance.
- These labels are used to help organizations manage and safeguard their information effectively.
- Sensitivity labels can convey various aspects of a piece of data, including its confidentiality, regulatory compliance requirements, or handling instructions.
- For example, an organization might use sensitivity labels like “Public,” “Internal Use Only,” “Confidential,” or “Highly Restricted” to classify their data.
- Each label comes with specific rules and permissions that dictate who can access, modify, or share that data.
By applying sensitivity labels to documents or files, organizations can:
- Enforce Access Controls: Ensure that only authorized individuals or groups can access sensitive data, thus reducing the risk of unauthorized access or data breaches.
- Facilitate Compliance: Help organizations comply with data protection regulations and industry standards by clearly marking and managing sensitive information.
- Support Data Retention: Specify how long certain data should be retained and when it should be securely deleted or archived.
- Enable Secure Sharing: Define how data can be shared, both internally and externally, while maintaining security and compliance.
Information Protection

- Information protection in Microsoft Purview is like a digital security guard for your data. It helps make sure that your important information, like documents and files, stays safe and doesn’t end up in the wrong hands.
- Think of it as putting a lock on a door. With information protection, you can control who can see, edit, or share your data. It also keeps an eye out for any suspicious activity and can even encrypt your data, which is like turning it into a secret code that only the right people can decipher.
- So, in simple terms, Microsoft Purview’s Information protection is like a guardian that watches over your data and ensures it stays safe and secure.
Licensing Essentials for Accessing Information Protection in Microsoft Purview
- Office 365 E5
- Microsoft 365 E5
- Office 365 E3
- Microsoft 365 E3
- Microsoft 365 E5 with Advanced Compliance E5 add-on
- Microsoft 365 E5 information protection and governance
- Microsoft 365 A5 information protection and governance
Roles / Permissions to get access to the Microsoft Purview Information Protection
- Global administrator
- Compliance administrator
- Security administrator
- Information Protection Admins
- Information Protection
- Information Protection Analyst
- Information Protection Investigators
- Information Protection Readers
But how do we know what sensitive data we’ve already got in our tenant?

- To determine what sensitive data, we already have in our tenant, we can use a tool called Content Explorer, but there’s a requirement.
- We need to have specific roles assigned in addition to being a Global Admin. These additional roles are Content explorer List Viewer and Content explorer Content Viewer.
- Content explorer is like a specialized search engine that allows us to browse and view the content stored in our Microsoft tenant.
- It helps us identify and locate sensitive information that might be stored within our organization’s data.
- With these roles and the Content explorer tool, we can take a closer look at what’s already in our tenant.
- This information is essential for understanding our data landscape, assessing potential risks, and implementing appropriate security measures to protect sensitive data effectively.
- The information you’ve gathered using Content explorer reveals various data items such as names, Australian Business Numbers, and more, found in both emails and OneDrive for Business. This is expected because these are common pieces of information in business communications and documents.
- However, it’s worth noting that sometimes, the system might flag certain terms or phrases as sensitive data when they are not. For example, the mention of “Diseases identification” could be a false positive, meaning the system incorrectly identified it as sensitive information.
- With the appropriate permissions, you can dig deeper into individual documents and even preview their contents. This capability allows you to examine the context of the data and verify whether it contains genuinely sensitive information.
If you want to know more about Content explorer, then you can read my previous article link for following is given below –https://knowledge-junction.in/2023/09/19/microsoft-365-microsoft-purview-how-to-access-the-content-of-content-explorer-by-assigning-the-required-roles-to-the-user-data-governance/
Activity explorer

- Activity explorer on the other hand shows us what users are doing with documents and when we begin using labels and protections for our documents, Activity explorer goes a step further by showing us how these labels and protection settings are being utilized. For example, it can reveal who is accessing protected documents, who is attempting to modify them, or who is sharing them with others.
- In essence, Activity explorer is a valuable resource for monitoring and tracking document-related activities in your organization. It helps you ensure that your document protection measures are effectively implemented, and that sensitive data remains secure.
Expanding Data Labelling and Protection Across Diverse Platforms
- In today’s digital landscape, the ability to apply labels and classifications extends beyond just files and emails. You can now also use these labels for SharePoint sites and M365 groups.
- However, it’s important to note that labelling these containers doesn’t automatically apply to the documents inside them, unlike NTFS permissions.
- Instead, it allows you to control the external sharing of documents stored within those locations.
- Furthermore, Microsoft Purview (formerly known as Azure Purview) takes the concept of labelling even further.
- You can now apply M365 Information Protection labels and policies to various types of data beyond traditional documents.
- This includes databases like SQL, Cosmos DB, Amazon RDS, and others, as well as cloud storage and data lakes. This extension of labelling capabilities ensures that data across diverse platforms and sources can be appropriately categorized, protected, and managed in accordance with your organization’s policies and security requirements.
I hope that this article will provide you with insights into Information Protection and guide you in understanding how to bolster the security of your business data through Sensitivity Labels and Information Protection within Microsoft 365
Also get my article updates on my social media handles.
LinkedIn – https://www.linkedin.com/in/prajyot-yawalkar-093716224/
Twitter – https://twitter.com/PrajyotYawalkar?t=oovP0r9FnDtz5nNSJGKO0Q&s=09
Have a wonderful day.
Thanks for reading.

4 Responses
[…] If you’re looking to explore Information Protection and Sensitivity Labels further, I recommend checking out the previous article through the provided link for an in-depth understanding –https://knowledge-junction.in/2023/10/10/microsoft-365-microsoft-purview-information-protection-sens… […]
[…] If you’re looking to explore Information Protection and Sensitivity Labels further, I recommend checking out the previous article through the provided link for an in-depth understanding –https://knowledge-junction.in/2023/10/10/microsoft-365-microsoft-purview-information-protection-sens… […]
[…] If you’re looking to explore Information Protection and Sensitivity Labels further, I recommend checking out the previous article through the provided link for an in-depth understanding –https://microsoft365junction.com/2023/10/10/microsoft-365-microsoft-purview-information-protection-s… […]
[…] If you’re looking to explore Information Protection and Sensitivity Labels further, I recommend checking out the previous article through the provided link for an in-depth understanding –https://microsoft365junction.com/2023/10/10/microsoft-365-microsoft-purview-information-protection-s… […]