🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 1
Domain 1 — Module 5 of 8 63%
5 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 1: Implement Information Protection Free ⏱ ~14 min read

Sensitivity Labels: Create & Protect

Sensitivity labels are the enforcement layer of information protection. Create labels that encrypt documents, add watermarks, restrict access, and follow your data wherever it goes.

What are sensitivity labels?

☕ Simple explanation

Think of colour-coded wristbands at a concert.

A green wristband gets you into the general area. A blue wristband gets you backstage. A gold wristband gets you into the VIP lounge. The wristband travels with you — security checks it at every door.

Sensitivity labels are the wristbands for your data. When you label a document “Confidential,” that label travels with the file — even if someone downloads it, emails it, or copies it to a USB drive. The label tells every Microsoft 365 service (and even third-party apps) what level of protection to enforce.

Labels can encrypt content, add watermarks, block external sharing, restrict copy/paste, and more. SITs detect the data. Labels protect it.

Sensitivity labels in Microsoft Purview apply persistent metadata and protection to files, emails, meetings, and containers (Teams, Groups, SharePoint sites). Unlike SITs that only detect, labels actively enforce protection — encryption via Microsoft Purview Information Protection (formerly Azure Information Protection), content marking (headers, footers, watermarks), access restrictions, and sharing controls.

Labels are defined centrally in the Microsoft Purview portal and published to users via label policies. They persist with the content across M365 workloads, on-premises file servers, and third-party cloud apps. Labels support a priority ordering — higher-priority labels override lower ones and require justification to downgrade.

Labels for items vs labels for containers

Sensitivity labels apply to two scope types:

Item labels protect content; container labels protect the environment
FeatureItem Labels (Files & Emails)Container Labels (Teams, Groups, Sites)
What they protectIndividual documents, emails, meetingsTeams, Microsoft 365 Groups, SharePoint sites
Protection typeEncryption, content marking, access restrictionsPrivacy settings, external sharing, guest access, device access
Travels with content?Yes — label persists when file is downloaded, copied, or forwardedNo — label applies to the container, not individual files inside
Applied byUsers manually, auto-labeling policies, default labelsUsers when creating a Team/Group, or admins via policy
Example'Confidential' label encrypts a Word doc so only Sales team can read it'Confidential' label on a Team prevents guest access and external sharing

Key exam concept: A container label does NOT automatically label the files inside it. A Team labelled “Highly Confidential” controls who can join and share, but individual documents in that Team still need their own item-level labels for encryption.

Roles and permissions

Not everyone should create or manage sensitivity labels. Microsoft Purview uses specific admin roles:

RoleWhat It Can Do
Compliance AdministratorFull access to create, edit, delete labels and label policies
Compliance Data AdministratorSame as above — create and manage labels
Security AdministratorCan view labels and policies but typically focused on security alerts
Information Protection role groupCreate and manage labels, view reports
Information Protection AdminFull label management in Purview
Information Protection ReaderView-only access to labels and policies
💡 Exam tip: who can create sensitivity labels?

The exam tests whether you know which roles can create and manage sensitivity labels. The key roles are:

  • Compliance Administrator — yes, full management
  • Information Protection Admin — yes, full management
  • Global Administrator — yes (but overprivileged — use least privilege)
  • Security Reader — no, view-only
  • Helpdesk Administrator — no, not a compliance role

The principle of least privilege says: use Information Protection Admin for label management, not Global Admin.

Creating a sensitivity label

Step 1: Define the label

In Microsoft Purview portal → Information protection → Labels → Create a label:

SettingWhat It Controls
NameInternal name (admins see this)
Display nameWhat users see in Office apps
Description for usersTooltip explaining when to use this label
Description for adminsInternal notes about the label’s purpose
Label colourVisual indicator in the label picker
ScopeItems (files/emails), Containers (Teams/Groups/Sites), or both

Step 2: Choose protection settings

ProtectionWhat It DoesBest For
EncryptionRestricts who can open and what they can do (view, edit, print, forward)Confidential and highly confidential content
Content markingAdds headers, footers, and/or watermarks to documentsVisual indicators of classification
Auto-labeling for files and emailsAutomatically applies this label when SITs are detected in contentHands-free classification of sensitive documents

Step 3: Encryption options

When encryption is enabled, you configure access:

OptionWhat It Controls
Assign permissions nowYou define exactly who can access and what actions they can perform (view, edit, print, copy, forward)
Let users assign permissionsUsers choose recipients when they apply the label (e.g., “Do Not Forward” in Outlook)
Offline accessHow long users can access encrypted content without an internet connection (days or never)
Content expirationWhen access expires — a specific date or number of days after labeling
💡 Scenario: Priya designs Meridian's label taxonomy

Priya creates four sensitivity labels for Meridian Financial, ordered by priority (highest last):

PriorityLabelEncryptionContent MarkingContainer
0PublicNoneFooter: “Meridian Financial — Public”Open sharing
1GeneralNoneFooter: “Meridian Financial — Internal”Standard Teams
2ConfidentialYes — internal users only, full edit rightsHeader + footer + watermarkNo guest access
3Highly ConfidentialYes — named users only, view-only, no print/copyHeader + footer + watermark “RESTRICTED”No guest, no external sharing, managed devices only

The priority order means: a user can upgrade from General to Confidential freely, but downgrading from Highly Confidential to General requires a justification reason.

Content marking

Content marking adds visual indicators to documents:

Marking TypeWhere It AppearsCustomisable?
HeaderTop of every pageText, font size, colour, alignment
FooterBottom of every pageText, font size, colour, alignment
WatermarkDiagonal across each pageText, font size, colour

Important: Content markings are applied when a user saves a document in an Office app. They are NOT applied retroactively to existing documents until the document is opened and saved.

Label priority and downgrade justification

Labels have a numeric priority. Lower numbers = lower sensitivity. Higher numbers = higher sensitivity.

Upgrade (lower → higher): Users can freely apply a more restrictive label.

Downgrade (higher → lower): Requires justification. The user must provide a reason, which is logged in the audit log. Admins can make justification mandatory via label policy settings.

Removal: Same as downgrade — requires justification if configured in the label policy.

Question

What is the difference between item-scope and container-scope sensitivity labels?

Click or press Enter to reveal answer

Answer

Item-scope labels protect individual files, emails, and meetings with encryption, content marking, and access restrictions. They travel with the content. Container-scope labels protect Teams, M365 Groups, and SharePoint sites by controlling privacy, external sharing, guest access, and device requirements. Container labels do NOT encrypt individual files inside them.

Click to flip back

Question

Which admin role follows least privilege for managing sensitivity labels?

Click or press Enter to reveal answer

Answer

Information Protection Admin. This role can create, edit, delete, and publish sensitivity labels without the broad permissions of Global Administrator or Compliance Administrator.

Click to flip back

Question

What happens when a user tries to downgrade a sensitivity label from 'Highly Confidential' to 'General'?

Click or press Enter to reveal answer

Answer

If the label policy requires justification, the user must provide a business reason before the downgrade is allowed. The justification and the label change are logged in the audit log. Admins can review these justifications to detect potential data handling issues.

Click to flip back

Question

Does a container-level sensitivity label automatically encrypt the files inside the container?

Click or press Enter to reveal answer

Answer

No. A container label (applied to a Team, Group, or SharePoint site) controls the environment — privacy, sharing, guest access. Individual files still need their own item-level sensitivity labels for encryption and content marking.

Click to flip back

Knowledge Check

Dr. Liam at St. Harbour Health creates a sensitivity label called 'Patient Data' with encryption that restricts access to the Clinical Staff security group. He also adds a header ('CONFIDENTIAL — Patient Data') and a watermark. A nurse applies this label to a discharge summary. What happens when someone outside the Clinical Staff group tries to open the file?

Knowledge Check

Zara at Atlas Global notices that files in a SharePoint site labelled 'Confidential' (container label) are being downloaded by external consultants. The container label restricts guest access to the site. Why are the files not encrypted?

🎬 Video coming soon


Next up: Sensitivity Labels: Publish & Auto-Apply — get labels into users’ hands with publishing policies and automatic application.

← Previous

Trainable Classifiers: AI-Powered Detection

Next →

Sensitivity Labels: Publish & Auto-Apply

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.