Texas A&M UniversityWork In Progress

Implement sensitivity labels and auto-labeling as the foundation for meaningful data governance.

Classification & Protection

Apply labels FIRST so that discovery, DSPM, and governance reports are meaningful.


Sensitivity Labels {#sensitivity-labels}

Goal: Create a label taxonomy that classifies data by sensitivity level and applies appropriate protections.

2.1 Design Label Taxonomy

Before creating labels, establish a classification framework approved by leadership.

Common Higher Education Label Taxonomy
LabelProtectionUse Case
PublicNonePress releases, marketing, public websites
InternalNone (visual marking only)General internal documents, announcements
ConfidentialEncrypt, no external sharingHR data, financials, contracts
FERPAEncrypt, no forwardingStudent records, transcripts
HIPAAEncrypt, audit, watermarkHealth records, counseling notes
Research - ControlledEncrypt, no copy, auditCUI, CMMC, export-controlled
Highly ConfidentialEncrypt, expire, revoke accessBoard materials, legal privilege

2.2 Create Sensitivity Labels

Navigate to Microsoft Purview portalSolutionsInformation protectionLabels.

PowerShell: Create Label Taxonomy

:::note Module Requirement Requires ExchangeOnlineManagement module v3.0+:

Install-Module ExchangeOnlineManagement -MinimumVersion 3.0.0

:::

# Connect to Security & Compliance PowerShell
Connect-IPPSSession

# Create parent labels (groups)
New-Label -DisplayName "Public" -Name "Public" -Tooltip "No protection required"

New-Label -DisplayName "Internal" -Name "Internal" -Tooltip "General internal use"

New-Label -DisplayName "Confidential" -Name "Confidential" -Tooltip "Sensitive business data"

New-Label -DisplayName "Regulatory" -Name "Regulatory" -Tooltip "Data subject to regulations"

# Create sublabels under Regulatory
New-Label -DisplayName "FERPA" -Name "FERPA" -ParentId "Regulatory" `
    -Tooltip "Student education records"

New-Label -DisplayName "HIPAA" -Name "HIPAA" -ParentId "Regulatory" `
    -Tooltip "Protected health information"

2.3 Configure Label Encryption

For labels that require encryption, configure protection settings in the label definition. Encryption is a native sensitivity label capability in Microsoft Purview Information Protection.

Encryption Settings Reference
SettingPublicInternalConfidentialFERPAHIPAA
Encrypt
Allow offline access30 days7 days7 days
Co-authoring
External recipients
Do not forward
Content expiresNeverNever1 year

2.4 Apply Visual Markings

Configure headers, footers, and watermarks to indicate classification level.

# Add visual markings to Confidential label
Set-Label -Identity "Confidential" `
    -ApplyContentMarkingHeaderEnabled $true `
    -ApplyContentMarkingHeaderText "CONFIDENTIAL" `
    -ApplyContentMarkingHeaderFontColor "#FF0000" `
    -ApplyContentMarkingHeaderFontSize 12

Set-Label -Identity "Confidential" `
    -ApplyContentMarkingFooterEnabled $true `
    -ApplyContentMarkingFooterText "For internal use only"

2.5 Publish Labels to Users

Create a label policy to make labels available in Office apps.

PowerShell: Publish Label Policy
# Create label policy for all users
New-LabelPolicy -Name "Enterprise Labels" `
    -Labels "Public","Internal","Confidential","FERPA","HIPAA" `
    -ExchangeLocation "All" `
    -SharePointLocation "All" `
    -OneDriveLocation "All" `
    -ModernGroupLocation "All"

# Configure policy settings
Set-LabelPolicy -Identity "Enterprise Labels" `
    -AdvancedSettings @{
        "requiredowngradejustification" = "true"
        "outlookdefaultlabel" = "Internal"
    }

2.6 Validation Checkpoint

CheckExpected Result
Labels appear in Word/Excel/Outlook5 labels visible
Encrypted label blocks external sharingBlocked
Visual markings appearHeader/footer visible
Downgrade requires justificationPrompt appears

Auto-Labeling {#auto-labeling}

Goal: Automatically classify content based on sensitive information types (SITs), reducing reliance on users to label correctly.

2.5.1 Client-Side Auto-Labeling

Configure labels to automatically apply when Office apps detect sensitive content.

Auto-Labeling Conditions Matrix
LabelAuto-Apply When...
FERPAStudent ID + Name + Grade/GPA
HIPAASSN + Medical Terms + Provider ID
ConfidentialSSN (alone) or Credit Card + Amount
Research - ControlledCUI Markings or Export Control Terms
# Configure auto-labeling for FERPA label
Set-Label -Identity "FERPA" `
    -AutoApplyType "Recommend" `
    -SensitiveInformationType @(
        @{Name="U.S. Social Security Number (SSN)"; minCount=1},
        @{Name="All Full Names"; minCount=1}
    ) `
    -Locale "en-us" `
    -AutoLabelingMessage "This document may contain FERPA-protected data."

2.5.2 Service-Side Auto-Labeling

For content already in SharePoint, OneDrive, and Exchange, create auto-labeling policies that run server-side.

PowerShell: Create Auto-Labeling Policy
# Create auto-labeling policy for FERPA content in SharePoint
New-AutoSensitivityLabelPolicy -Name "Auto-Label FERPA" `
    -SharePointLocation "All" `
    -OneDriveLocation "All" `
    -ApplySensitivityLabel "FERPA" `
    -Mode "Simulation" # Start in simulation mode

# Add conditions
New-AutoSensitivityLabelRule -Policy "Auto-Label FERPA" `
    -Name "Student Records Rule" `
    -ContentContainsSensitiveInformation @(
        @{
            Name="U.S. Social Security Number (SSN)"
            MinCount=1
        },
        @{
            Name="All Full Names"
            MinCount=1
        }
    )

2.5.3 Auto-Labeling Workflow

flowchart LR
    A[Create Policy] --> B[Simulation Mode]
    B --> C{Review Matches}
    C -->|False Positives| D[Refine Conditions]
    D --> B
    C -->|Accurate| E[Enable Policy]
    E --> F[Monitor & Tune]

2.5.4 Simulation Best Practices

Run Simulation for 2+ Weeks
  • Review matched items for false positives
  • Check that high-value targets are captured
  • Refine SIT confidence levels if needed
  • Get stakeholder sign-off before enabling

2.5.5 Validation Checkpoint

CheckExpected Result
Simulation mode shows matches100+ items matched
No critical false positives<5% false positive rate
Auto-labeled files in SharePointLabels visible in library

Data Lifecycle Management {#data-lifecycle}

Goal: Establish retention and deletion policies to manage the complete data lifecycle.

3.1 Retention Policy Strategy

Design retention policies based on regulatory requirements and business needs.

Common Retention Periods
Content TypeRetainThen...Regulation
Student Records7 years after graduationDeleteFERPA
Financial Records7 yearsDeleteIRS
HR Employee Files7 years after separationDeleteState law
Email (General)3 yearsDeletePolicy
Teams Chats1 yearDeletePolicy
Research Data (Grant)Duration + 3 yearsArchiveNSF/NIH
Legal HoldsIndefiniteManual releaseLitigation

3.2 Create Retention Policies

Navigate to Microsoft Purview portalSolutionsData lifecycle managementPoliciesRetention policies.

PowerShell: Create Retention Policies

:::note Module Requirement Requires ExchangeOnlineManagement module v3.0+:

Install-Module ExchangeOnlineManagement -MinimumVersion 3.0.0

:::

# Connect to Security & Compliance PowerShell
Connect-IPPSSession

# Step 1: Create the policy (defines WHERE)
New-RetentionCompliancePolicy -Name "Email Retention - 3 Years" `
    -ExchangeLocation "All" `
    -Enabled $true

# Step 2: Create the rule (defines HOW LONG and WHAT ACTION)
New-RetentionComplianceRule -Name "Email 3 Year Rule" `
    -Policy "Email Retention - 3 Years" `
    -RetentionDuration 1095 `
    -RetentionDurationDisplayHint Days `
    -RetentionComplianceAction Delete

# Example: SharePoint site-specific retention
New-RetentionCompliancePolicy -Name "Student Records - 7 Years" `
    -SharePointLocation "https://tenant.sharepoint.com/sites/StudentRecords"

New-RetentionComplianceRule -Name "Student Records Rule" `
    -Policy "Student Records - 7 Years" `
    -RetentionDuration 2555 `
    -RetentionDurationDisplayHint Days `
    -RetentionComplianceAction Delete

# Example: Teams retention (channels and chats)
New-RetentionCompliancePolicy -Name "Teams Chat - 1 Year" `
    -TeamsChannelLocation "All" `
    -TeamsChatLocation "All"

New-RetentionComplianceRule -Name "Teams 1 Year Rule" `
    -Policy "Teams Chat - 1 Year" `
    -RetentionDuration 365 `
    -RetentionDurationDisplayHint Days `
    -RetentionComplianceAction Delete

3.3 Retention Labels for Records Management

For content requiring formal records management (declaration, disposition review), use retention labels instead of policies.

Retention Labels vs. Policies
FeatureRetention PolicyRetention Label
Applied toLocations (all of Exchange, SharePoint)Individual items
User can apply(admin only)
Records declaration
Disposition review
Event-based retention
Regulatory records

3.4 Create Records Labels

# Create retention label for contract records
New-ComplianceTag -Name "Contract - Final" `
    -Comment "Final executed contracts requiring records management" `
    -RetentionAction "Keep" `
    -RetentionDuration 2555 `
    -RetentionType "CreationAgeInDays" `
    -IsRecordLabel $true `
    -Regulatory $false `
    -ReviewerEmail "records@tamu.edu"

# Publish label policy
New-RetentionCompliancePolicy -Name "Records Labels" `
    -RetentionComplianceTag "Contract - Final" `
    -PublishComplianceTag $true `
    -SharePointLocation "All"

3.5 Records Management Setup

For formal records management with disposition reviews:

  1. Navigate to Microsoft Purview portalRecords management
  2. Create File plan with retention labels
  3. Configure Disposition reviewers
  4. Set up Event types for event-based retention

3.6 Validation Checkpoint

CheckExpected Result
Retention policies in portal3+ policies active
Email retention appliesPolicy shows in mailbox
SharePoint retention appliesPolicy visible in site
Records labels availableLabels in dropdown
Disposition review queue worksItems appear after expiration

Classification Completion Checklist

Before moving to Discovery & DSPM, validate:

ComponentStatusNotes
Label taxonomy approvedLeadership sign-off
5+ sensitivity labels publishedVisible in Office apps
Encryption working on protected labelsTest with external recipient
Auto-labeling simulation complete<5% false positive rate
Auto-labeling enabled (production)At least 1 policy active
Retention policies createdEmail, SharePoint, Teams
Records labels published (if needed)For regulatory records

Next Steps

With labels and lifecycle policies in place, you're ready to discover and measure:

  • Discovery & DSPM — Now DSPM can report on labeled vs. unlabeled content, oversharing, and Copilot exposure