Retention & Sensitivity Labels
Teams messages don't live forever — unless you configure retention. Learn how retention policies and sensitivity labels work specifically in Teams, including meeting label policies.
Retention and labels in Teams
Imagine your office has a document shredding policy.
Retention policies are like saying: “Keep all meeting notes for 7 years, then shred them.” They control how long Teams messages, chats, and channel posts are kept — and when they’re automatically deleted.
Sensitivity labels are like stamping “CONFIDENTIAL” on a document. When you label a Teams meeting as “Highly Confidential,” it automatically enforces rules — like disabling recording, turning on the lobby, or encrypting the meeting content.
Retention policies for Teams
What Teams retention covers
Teams retention policies target three distinct content locations — you can create separate policies for each:
| Content Location | What It Covers | Where Content Is Stored |
|---|---|---|
| Teams channel messages | Posts and replies in standard and private channels | Azure-hosted storage (not Exchange) |
| Teams chats | 1:1 chats, group chats, meeting chats | Azure-hosted storage (user’s cloud mailbox for compliance) |
| Copilot interactions | Microsoft 365 Copilot chat history in Teams | Azure-hosted storage |
Critical exam point: Teams chat and channel messages are retained via Exchange Online mailboxes (chat messages in participants’ mailboxes, channel messages in the group mailbox). A compliance copy is preserved in a hidden SubstrateHolds folder for eDiscovery and retention processing. Files shared in Teams are stored separately in SharePoint/OneDrive and follow SharePoint/OneDrive retention policies.
Retention vs. deletion
| Feature | Behaviour | User Experience | Example |
|---|---|---|---|
| Retain only | Content is kept for the specified period, then nothing happens (no auto-delete) | Users see no change — messages stay visible | Keep all Teams chats for 7 years |
| Delete only | Content is deleted after the specified period | Messages disappear from Teams after the retention period | Delete all channel messages older than 1 year |
| Retain then delete | Content is kept for the retention period, then permanently deleted | Messages visible during retention, then disappear | Keep Teams chats for 5 years, then delete |
Creating a Teams retention policy
- Go to Microsoft Purview compliance portal → Data lifecycle management → Retention policies
- Click New retention policy
- Name the policy and choose the scope (adaptive or static)
- Select location: Teams channel messages, Teams chats, or Teams Copilot interactions
- Configure: retain for X days/months/years, then delete (or retain only)
- Review and create
Scenario: Nadia's retention strategy at Sterling Financial
Sterling Financial must comply with financial regulations that require 7-year message retention. Nadia creates three retention policies:
- Teams channel messages: Retain for 7 years, then delete — covers all trading desk and compliance channels
- Teams chats: Retain for 7 years, then delete — includes 1:1 chats between traders (regulatory requirement)
- Teams Copilot interactions: Retain for 7 years, then delete — new requirement since traders use Copilot for analysis
She also creates a separate delete-only policy for the company social channel: delete messages older than 90 days (no regulatory value, reduces storage).
Important: These policies run in the background. Users at Sterling Financial see no change — messages appear normally. But behind the scenes, Purview ensures nothing is permanently deleted before the 7-year mark, even if a user deletes a message manually.
Key exam concepts for retention
- Retention wins over deletion. If one policy says “retain for 7 years” and another says “delete after 1 year,” the content is retained for 7 years.
- The longest retention period wins when multiple retain policies conflict.
- Explicit deletion wins over implicit (no action) when retention periods are the same.
- Users can delete messages from their Teams view, but the compliance copy is preserved for the full retention period.
- Adaptive scopes target users/groups dynamically (e.g., “all users in the Finance department”). Static scopes target specific locations you manually select.
Sensitivity labels for Teams
What sensitivity labels can protect
Sensitivity labels in Teams go beyond just marking content — they enforce settings automatically:
| Label Setting | What It Controls | Example |
|---|---|---|
| Meeting lobby | Who bypasses the lobby | ”Confidential” → only invited people bypass lobby |
| Meeting recording | Whether recording is allowed | ”Highly Confidential” → recording disabled |
| Meeting chat | Whether chat is available | ”Restricted” → chat disabled during meeting |
| Watermarking | Content watermark on shared screen and video | ”Highly Confidential” → watermark shows user’s email |
| End-to-end encryption | E2E encryption for meeting audio/video | ”Top Secret” → E2E encrypted (limits features) |
| Who can present | Presenter restrictions | ”Confidential” → only organisers can present |
| Copilot | Whether Copilot can access meeting content | ”Highly Confidential” → Copilot disabled |
Exam point: Sensitivity labels for Teams meetings are configured in the Microsoft Purview compliance portal under Information protection → Labels. The meeting-specific settings are in the label’s Meetings tab.
Creating and publishing sensitivity labels
Step 1: Create the label
- Microsoft Purview → Information protection → Labels → Create a label
- Define scope: Items (files, emails), Groups & sites (Teams, SharePoint sites), and Meetings
- For meetings: configure lobby, recording, chat, watermark, encryption, presenter, Copilot settings
- For groups & sites: configure privacy (public/private), external sharing, Conditional Access
Step 2: Publish the label
- Create a label publishing policy
- Choose which labels to publish and to which users/groups
- Set a default label (optional) — auto-applied to new Teams meetings if configured
- Configure mandatory labelling — require users to apply a label before creating a meeting
Scenario: Nadia's sensitivity labels at Sterling Financial
Nadia creates three sensitivity labels for Teams meetings:
| Label | Lobby | Recording | Chat | Watermark | Copilot | Applied By |
|---|---|---|---|---|---|---|
| General | Everyone bypasses | Allowed | Enabled | Off | Enabled | Default for all meetings |
| Confidential | Only invited people bypass | Allowed (saved to restricted location) | Enabled | On for video | Enabled | User-selected |
| Highly Confidential | Only organisers bypass | Disabled | In-meeting only (no post-meeting chat) | On for video and shared content | Disabled | User-selected, mandatory for Board meetings |
She publishes all three labels to all Sterling Financial users with “General” as the default. The Chief Compliance Officer Elena is satisfied — every board meeting automatically gets the highest protection.
Labels for Teams and M365 Groups
Sensitivity labels can also control team-level settings (not just meetings):
- Privacy: Force team to be Private
- Guest access: Allow or block guest access to the team
- External sharing: Control SharePoint sharing level for the team’s site
- Conditional Access: Require specific CA policies (e.g., managed devices only)
When a user creates a new team and selects “Confidential,” these settings are automatically enforced on the underlying M365 Group and SharePoint site.
🎬 Video walkthrough
🎬 Video coming soon
Retention & Sensitivity Labels — MS-700 Module 3
Retention & Sensitivity Labels — MS-700 Module 3
~11 minFlashcards
Knowledge Check
Sterling Financial must retain all Teams chat messages for 7 years for regulatory compliance. A trader manually deletes a sensitive chat message. What happens?
Nadia needs to ensure that all Teams meetings labelled 'Highly Confidential' at Sterling Financial have recording disabled, watermarks on shared content, and Copilot disabled. What should she configure?
Which statement about Teams retention policies is TRUE?
Next up: DLP & Conditional Access — how to prevent sensitive data from leaking through Teams and control who can access Teams based on conditions.