🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided SC-900 Domain 4
Domain 4 — Module 3 of 7 43%
24 of 28 overall

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit

SC-900 Study Guide

Domain 1: Security, Compliance & Identity Concepts

  • Security Foundations: Shared Responsibility & Defence-in-Depth Free
  • Zero Trust: Never Trust, Always Verify Free
  • Encryption, Hashing & GRC Free
  • Identity: The New Security Perimeter Free

Domain 2: Microsoft Entra Capabilities

  • Microsoft Entra ID: Your Identity Hub Free
  • Hybrid & External Identities
  • Authentication: Passwords, MFA & Passwordless
  • Password Protection & Self-Service Reset
  • Conditional Access: Smart Access Decisions
  • Entra Roles and RBAC
  • Identity Governance: Entitlements and Access Reviews
  • PIM and Identity Protection

Domain 3: Microsoft Security Solutions

  • Azure Network Defence: DDoS, Firewall & WAF
  • Azure Infrastructure Security: VNets, NSGs, Bastion & Key Vault
  • Microsoft Defender for Cloud
  • Microsoft Sentinel: SIEM Meets SOAR
  • Defender XDR: The Unified Threat Platform
  • Microsoft Defender for Office 365
  • Microsoft Defender for Endpoint
  • Defender for Cloud Apps & Defender for Identity
  • Vulnerability Management & Threat Intelligence

Domain 4: Microsoft Compliance Solutions

  • Service Trust Portal, Privacy Principles & Microsoft Priva
  • The Purview Portal & Compliance Manager
  • Data Classification & Sensitivity Labels
  • Data Loss Prevention (DLP)
  • Records Management & Retention
  • Insider Risk Management
  • eDiscovery & Audit
Domain 4: Microsoft Compliance Solutions Premium ⏱ ~12 min read

Data Classification & Sensitivity Labels

How Microsoft Purview finds sensitive data, classifies it with patterns and AI, and protects it with sensitivity labels that travel with the document.

You can’t protect what you don’t know about

☕ Simple explanation

Think of a hospital filing room.

Imagine thousands of patient files scattered across desks, drawers, and shared folders — some confidential, some routine, all mixed together. You can’t lock up the sensitive ones if you don’t know which files contain patient records.

Data classification is the process of finding sensitive data and labelling it, so you know what needs protection. Microsoft Purview does this automatically — scanning documents for credit card numbers, medical records, passport numbers, and more.

Data classification in Microsoft Purview is the foundation of information protection. It uses pattern matching, machine learning, and manual labels to identify sensitive content across your Microsoft 365 environment.

Once data is classified, you can apply sensitivity labels to enforce protection (encryption, access restrictions, visual markings) and create DLP policies to prevent inappropriate sharing.

How Purview classifies data

Microsoft Purview uses three methods to find and classify sensitive information:

1. Sensitive information types (SITs)

SITs use pattern matching to detect specific data formats. Think of them as smart templates that recognise data patterns.

SIT CategoryExamplesHow It Detects
FinancialCredit card numbers, bank account numbersNumber patterns + checksum validation
Personal IDSocial Security numbers, passport numbersFormat patterns + context keywords nearby
HealthMedical record numbers, drug namesPatterns + proximity to health-related terms
CustomYour organisation’s patient ID format, internal codesYou define the pattern and keywords

Key exam concept: SITs use patterns and keywords, not AI. They look for specific formats (like 16 digits starting with 4 for Visa cards) plus supporting evidence (like the word “Visa” nearby). Microsoft includes 300+ built-in SITs and you can create custom ones.

2. Trainable classifiers

When patterns aren’t enough, trainable classifiers use machine learning to recognise types of documents based on their content — not just specific data formats.

Examples of built-in trainable classifiers:

  • Legal documents — contracts, NDAs, settlement agreements
  • Financial statements — balance sheets, income statements
  • Resumes/CVs — candidate applications
  • Source code — programming files
  • Healthcare — clinical trial documentation, discharge summaries

Key exam concept: Trainable classifiers identify document types, not data patterns. A SIT finds a credit card number; a classifier recognises an entire document as a “financial statement.”

3. Sensitivity labels (classification + protection)

We’ll cover labels in detail below, but the key point: labels are how you classify AND protect data. SITs and classifiers find the data; labels tell the world what it is and enforce rules.

Three complementary approaches: detect patterns, recognise documents, classify and protect
FeatureSensitive Information TypesTrainable ClassifiersSensitivity Labels
What it doesDetects specific data patternsRecognises document types using MLClassifies AND protects data
How it worksPattern matching + keywordsMachine learning models trained on examplesMetadata tags with enforced protection
ExampleFinds a credit card number in a spreadsheetIdentifies a document as a legal contractMarks a file as Confidential and encrypts it
Learns from examples?No — uses fixed patternsYes — trained on sample documentsNo — applied by users, policies, or auto-labelling

Content Explorer and Activity Explorer

Once Purview classifies your data, you need visibility into what was found and what’s happening to it. That’s where the two Explorers come in.

Content Explorer

Content Explorer lets you browse the actual documents that contain sensitive data. Think of it as a search engine for classified content.

  • See exactly which files contain credit card numbers, patient IDs, or other SIT matches
  • Drill into a document to see the specific sensitive data detected
  • Requires Content Explorer Content Viewer or Content Explorer List Viewer roles (not everyone should see the actual data)

Activity Explorer

Activity Explorer shows what actions are happening with classified and labelled content:

  • A sensitivity label was applied or changed
  • A file was shared externally
  • A DLP policy was matched
  • A labelled document was printed or copied to USB
Content Explorer shows what's there; Activity Explorer shows what's happening
FeatureContent ExplorerActivity Explorer
What it answersWhat sensitive data exists and where is it?What are people doing with sensitive data?
ShowsDocuments, the sensitive data found inside them, locationActions: label applied, file shared, DLP match, download, print
Use caseNadia needs to know how many files contain patient SSNsNadia needs to know if anyone shared labelled files externally this week
PermissionsRequires specific Content Explorer rolesRequires Activity Explorer role
💡 Scenario: Nadia investigates a data concern

MedGuard’s IT Director, Liam, reports that users have been sharing spreadsheets externally. Nadia investigates:

  1. Content Explorer — she searches for files containing “patient SSN” SIT matches. She finds 340 files across SharePoint and OneDrive
  2. Activity Explorer — she filters for “shared externally” actions on files with sensitivity labels. She spots 12 files shared with external partners in the last 30 days

Nadia now has the evidence to create a DLP policy targeting external sharing of patient data — and she knows exactly the scope of the problem.

Sensitivity labels

Sensitivity labels are the action part of data classification. They don’t just tag data — they enforce protection.

What can a sensitivity label do?

ProtectionHow It Works
EncryptOnly authorised users can open the document, even if it’s leaked
Restrict accessBlock specific users or groups from accessing the content
Visual markingsAdd headers, footers, or watermarks (e.g., “CONFIDENTIAL” watermark)
Protect containersControl settings on Teams, SharePoint sites, and Microsoft 365 Groups

Key exam concept: Sensitivity labels travel with the document. If you email a labelled file to someone outside your organisation, the encryption and restrictions still apply. The label is embedded in the file’s metadata.

Label policies

Creating a label is only half the job. Label policies control how labels are published and enforced:

Policy SettingWhat It Does
Publish to usersChoose which users and groups see which labels
Default labelAutomatically apply a label to new documents (e.g., “General” by default)
Mandatory labellingUsers must choose a label before saving — no unlabelled documents allowed
Auto-labellingAutomatically apply labels based on SIT matches (e.g., if a document contains 5+ credit card numbers, label it “Confidential”)
Justification for downgradeIf a user tries to lower a label from “Highly Confidential” to “General,” they must explain why

Label priority

Labels have a priority order (set by the admin). Higher-priority labels override lower ones.

Example priority:

  1. Public (lowest)
  2. General
  3. Confidential
  4. Highly Confidential (highest)

If auto-labelling detects patient data and wants to apply “Highly Confidential” but the user already applied “General,” the higher-priority label replaces it. However, if a user manually applied “General,” auto-labelling will not override it by default — an admin must explicitly enable this in the auto-labelling policy settings.

💡 Scenario: Nadia sets up labelling for MedGuard

Nadia configures MedGuard’s labelling strategy:

  • Labels created: Public, General, Confidential, Highly Confidential - Patient Data
  • Default label: “General” applied to all new documents
  • Mandatory labelling: Enabled — staff must label every document before saving
  • Auto-labelling: If a document contains 3+ patient SSN matches, automatically apply “Highly Confidential - Patient Data” (which adds encryption + “PATIENT DATA” watermark)
  • Justification required: Anyone downgrading from “Highly Confidential” must provide a reason

Now every document at MedGuard is classified, and patient data gets automatic protection without relying on staff to remember.

💡 Exam tip: Labels vs SITs — the exam tests both

The exam often presents a scenario and asks whether to use a SIT, a classifier, or a label. Here’s the decision tree:

  • “We need to detect credit card numbers in documents” → SIT (pattern detection)
  • “We need to identify which documents are legal contracts” → Trainable classifier (ML-based)
  • “We need to encrypt documents containing patient data” → Sensitivity label (protection)
  • “We need to find credit card numbers AND encrypt the files” → SIT (to detect) + auto-labelling with a sensitivity label (to protect)

🎬 Video walkthrough

🎬 Video coming soon

Data Classification & Sensitivity Labels — SC-900 Domain 4.3

Data Classification & Sensitivity Labels — SC-900 Domain 4.3

~10 min

Flashcards

Question

What is the difference between a Sensitive Information Type (SIT) and a Trainable Classifier?

Click or press Enter to reveal answer

Answer

SITs detect specific data patterns (like credit card numbers) using regex and keywords. Trainable classifiers use machine learning to recognise entire document types (like legal contracts or resumes). SITs find data; classifiers recognise documents.

Click to flip back

Question

What is the difference between Content Explorer and Activity Explorer?

Click or press Enter to reveal answer

Answer

Content Explorer shows WHAT sensitive data exists and WHERE it is (browse actual documents). Activity Explorer shows WHAT ACTIONS are happening with sensitive data (label applied, file shared, DLP match, file downloaded).

Click to flip back

Question

What can a sensitivity label do?

Click or press Enter to reveal answer

Answer

Encrypt files, restrict access, add visual markings (watermarks, headers, footers), and protect containers (Teams, SharePoint sites, M365 Groups). Labels travel with the document — protection persists even outside your organisation.

Click to flip back

Question

What is mandatory labelling in a label policy?

Click or press Enter to reveal answer

Answer

A policy setting that requires users to apply a sensitivity label before saving a document. Combined with a default label, it ensures no document is left unclassified. Users must also provide justification if they downgrade a label.

Click to flip back

Question

How does label priority work?

Click or press Enter to reveal answer

Answer

Labels have an admin-defined priority order. Higher-priority labels override lower ones when auto-applied. However, auto-labelling does NOT override manually applied labels by default — this must be enabled by the admin. Users cannot downgrade labels without justification.

Click to flip back

Knowledge Check

Knowledge Check

MedGuard needs to automatically detect patient Social Security numbers stored in SharePoint documents. Which classification method should Nadia configure?

Knowledge Check

Nadia wants to see which labelled documents were shared with external users in the last 30 days. Which tool should she use?

Knowledge Check

Nadia configures a sensitivity label called 'Highly Confidential - Patient Data' that encrypts the document and adds a watermark. A doctor applies this label to a patient report and emails it to an external specialist. What happens to the protection?

← Previous

The Purview Portal & Compliance Manager

Next →

Data Loss Prevention (DLP)

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.