🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-401 Domain 1
Domain 1 — Module 6 of 8 75%
6 of 25 overall

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring

SC-401 Study Guide

Domain 1: Implement Information Protection

  • Know Your Data: Sensitive Info Types Free
  • Custom Sensitive Info Types: Build Your Own Free
  • EDM & Fingerprinting: Detect Exact Data
  • Trainable Classifiers: AI-Powered Detection Free
  • Sensitivity Labels: Create & Protect Free
  • Sensitivity Labels: Publish & Auto-Apply
  • Email Encryption: Lock Down Messages
  • Purview IP Client: Classify Files at Scale

Domain 2: Implement DLP and Retention

  • DLP Foundations: Stop Data Leaks
  • DLP Policies: Build, Manage & Extend
  • DLP: Precedence & Adaptive Protection
  • Endpoint DLP: Setup & Configuration
  • Endpoint DLP: Advanced Rules & Monitoring
  • Retention: Plan Your Data Lifecycle
  • Retention Labels: Publish & Auto-Apply
  • Retention: Policies, Precedence & Recovery

Domain 3: Manage Risks, Alerts, and Activities

  • Insider Risk: Foundations & Setup
  • Insider Risk: Policies & Indicators
  • Insider Risk: Investigate & Close Cases
  • Adaptive Protection: Risk Levels Meet DLP
  • Purview Audit: Investigate & Retain
  • Activity Explorer & Content Search
  • Alert Response: Purview, XDR & Cloud Apps
  • DSPM for AI: Setup & Controls
  • DSPM for AI: Policies & Monitoring
Domain 1: Implement Information Protection Premium ⏱ ~14 min read

Sensitivity Labels: Publish & Auto-Apply

Labels only work if users can see them. Publish labels via policies, configure auto-labeling to classify at scale, and extend labels to containers like Teams and SharePoint sites.

Publishing labels — making them visible

☕ Simple explanation

Creating a label is like printing a “Confidential” stamp. Publishing it is like handing that stamp to your team.

Until you publish a label, nobody can use it. A label policy is the delivery mechanism — it decides which users see which labels, sets defaults, and controls behaviour like mandatory labeling and downgrade justification.

Auto-labeling goes further — Purview automatically stamps documents without users lifting a finger, based on what sensitive data it finds inside.

Label policies publish sensitivity labels to specific users, groups, or the entire organisation. Without a policy, labels exist in the admin portal but are invisible to end users. Policies also configure enforcement settings: default labels, mandatory labeling, justification requirements, and help links.

Auto-labeling policies operate at the service level — they scan content at rest in SharePoint, OneDrive, and Exchange to automatically apply labels based on SIT detections. Client-side auto-labeling (configured within the label itself) recommends or applies labels in real time as users work in Office apps.

Label publishing policies

A label policy has three components:

1. Which labels to publish

Select which sensitivity labels appear in users’ label pickers. You can publish different label sets to different groups — interns may see only Public and General, while executives see all labels including Highly Confidential.

2. Who receives the labels

ScopeExample
All usersEntire organisation sees the published labels
Specific groupsOnly Finance team sees “Financial — Restricted”
Specific usersTest labels with pilot users before broad rollout

3. Policy settings

SettingWhat It Controls
Default label for documentsAutomatically applies a label (e.g., “General”) to new Office documents
Default label for emailsAutomatically applies a label to new emails
Require users to apply a labelMandatory labeling — users must choose a label before saving or sending
Require justification to downgradeForces users to explain why they’re removing or lowering a label
Help linkCustom URL for label guidance (e.g., your org’s data classification policy)
💡 Scenario: Priya rolls out labels at Meridian

Priya’s rollout plan at Meridian Financial:

Phase 1 — Pilot (50 users): Publish all four labels (Public, General, Confidential, Highly Confidential) to the compliance team. Default label: General. No mandatory labeling yet. Observe usage patterns for 2 weeks.

Phase 2 — Broad deployment: Publish to all users. Enable mandatory labeling for documents and emails. Default label: General. Require justification for downgrades.

Phase 3 — Enforcement: Enable auto-labeling for content containing credit card numbers and client account numbers. Add default container labels for new Teams.

This phased approach lets Priya identify issues early before affecting 3,000 users.

Auto-labeling — two approaches

Auto-labeling removes the dependency on users to classify correctly. There are two distinct methods:

Client-side works in real time in Office apps; service-side scans content at rest
FeatureClient-side Auto-LabelingService-side Auto-Labeling
Where it runsIn Office apps on the user's device (Word, Excel, Outlook)In the Microsoft 365 service (SharePoint, OneDrive, Exchange)
When it triggersIn real time as the user editsAsynchronously — scans content at rest
Configured inThe sensitivity label definition itselfA separate auto-labeling policy in Purview
Can recommend?Yes — can show 'We recommend labeling this as Confidential'No — applies the label directly (no user interaction)
Can auto-apply?Yes — if set to auto-apply instead of recommendYes — always auto-applies
ScopeNew and edited content only (as the user works)Existing content at rest (retroactive) + new content
Best forReal-time guidance during document creationClassifying large volumes of existing content

Service-side auto-labeling policies

Created separately in Microsoft Purview portal → Information protection → Auto-labeling:

StepWhat You Configure
1. Name and describePolicy name and admin description
2. Choose locationsSharePoint sites, OneDrive accounts, Exchange mailboxes
3. Set conditionsWhich SITs trigger the label (e.g., credit card numbers with high confidence)
4. Choose the labelWhich sensitivity label to apply
5. Simulation modeTest the policy first — see what WOULD be labelled without actually labeling
6. Turn onSwitch from simulation to enforcement when satisfied with results
💡 Exam tip: simulation mode is critical

Auto-labeling policies always start in simulation mode. This shows you exactly which items would be labelled — without actually applying labels. You MUST review simulation results and explicitly turn on the policy for it to take effect.

The exam frequently tests this. If a question says “an admin configured an auto-labeling policy but no labels are being applied,” the answer is often: the policy is still in simulation mode.

Labels for containers

Container labels protect the environments where data lives:

What container labels control

SettingWhat It Does
PrivacyPublic, Private, or default — controls who can discover and join
External user accessAllow or block guest access to the Team/Group
External sharing from SharePointControl sharing: anyone, new/existing guests, only internal, or no sharing
Access from unmanaged devicesFull, limited (web-only), or block
Authentication contextRequire Conditional Access — e.g., MFA before accessing

Where container labels apply

ContainerSupported?
Microsoft TeamsYes — applied when creating or updating a Team
Microsoft 365 GroupsYes — applied to the underlying Group
SharePoint sitesYes — applied to team sites and communication sites
Microsoft Power BIYes — applied to workspaces

Enabling container labels

Container labels require additional prerequisites beyond item labels:

  1. Enable sensitivity labels for containers in the Microsoft Purview portal
  2. Azure AD (Entra ID) group settings must be configured via PowerShell:
    • EnableMIPLabels = True in the directory settings template
  3. After enabling, it can take up to 24 hours to propagate

Labels via Defender for Cloud Apps

Microsoft Defender for Cloud Apps extends sensitivity labels to third-party cloud applications and provides additional governance actions:

CapabilityWhat It Does
Apply labels to third-party filesLabel documents in Box, Dropbox, Google Workspace
File policy + label actionAutomatically apply a label when a file policy condition matches
Monitor label activitySee who changed or removed labels in cloud apps
Alert on label changesTrigger alerts when high-priority labels are downgraded
💡 Scenario: Marcus extends labels to NovaTech's cloud apps

NovaTech uses Microsoft 365 plus Google Drive for some client projects. Marcus wants sensitivity labels to protect files in both environments.

He connects Google Drive to Defender for Cloud Apps, creates a file policy that detects unprotected documents containing source code (using the pre-trained classifier), and configures the action: automatically apply the “Confidential — NovaTech IP” sensitivity label.

Now, even files in Google Drive get NovaTech’s labeling and appear in Activity Explorer alongside M365 content.

Question

What is the difference between client-side and service-side auto-labeling?

Click or press Enter to reveal answer

Answer

Client-side auto-labeling runs in Office apps as users work — it can recommend or auto-apply labels in real time on new/edited content. Service-side auto-labeling runs as a background service that scans existing content at rest in SharePoint, OneDrive, and Exchange — it auto-applies labels retroactively and to new content.

Click to flip back

Question

A new auto-labeling policy has been created but no labels are being applied. What is the most likely reason?

Click or press Enter to reveal answer

Answer

The policy is still in simulation mode. All auto-labeling policies start in simulation mode, which shows what WOULD be labelled without actually applying labels. An admin must review the simulation results and explicitly turn on the policy.

Click to flip back

Question

What additional prerequisite is required to use sensitivity labels on Teams and Microsoft 365 Groups?

Click or press Enter to reveal answer

Answer

You must enable sensitivity labels for containers in the Purview portal AND configure Azure AD (Entra ID) group settings via PowerShell (set EnableMIPLabels = True). Propagation can take up to 24 hours.

Click to flip back

Knowledge Check

Priya at Meridian Financial enabled mandatory labeling in the label policy. An analyst creates a new Excel spreadsheet but tries to save it without choosing a label. What happens?

Knowledge Check

Dr. Liam at St. Harbour Health configured a service-side auto-labeling policy to label documents containing patient health identifiers as 'Patient Data — Confidential'. After a week, he checks and finds that only 200 of an estimated 50,000 matching documents have been labelled. What is the MOST likely cause?

🎬 Video coming soon


Next up: Email Encryption: Lock Down Messages — protect messages with Microsoft Purview Message Encryption and Advanced Message Encryption.

← Previous

Sensitivity Labels: Create & Protect

Next →

Email Encryption: Lock Down Messages

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.