Microsoft Video Training - Confidentiality and Sensitivity Labels in M365
Microsoft Video Training - Confidentiality and Sensitivity Labels in M365
- 0h 15 min
- Viewed 4 times
Training Theme
Microsoft 365 makes sharing documents extremely easy across Teams, OneDrive and Outlook — sometimes too easy. This convenience can unintentionally expose sensitive information if a file is shared too widely or leaves its intended perimeter. To address this, Microsoft 365 integrates several layers of protection, including sensitivity labels. These labels allow you to classify content and automatically apply security measures such as encryption, usage restrictions or visual markings. This module helps you understand how these protections work and how to strengthen confidentiality when handling files in your daily activities.
Training Objectives
By the end of this training, you will be able to:
- Understand why data protection is essential in Microsoft 365
- Identify the role and capabilities of sensitivity labels
- Apply a sensitivity label across Microsoft 365 applications
- Distinguish storage-based protections from content-based protections
Prerequisite and Target Audience
Target Audience: Any Microsoft 365 user working with internal or sensitive information.
Starting Level: Beginner.
Prerequisites: None.
Means and Methods
- Tutorial Videos: A selection of videos designed to help you reach the defined learning objective.
- Evaluation Quiz: A quiz will be provided at the end to validate your understanding.
Training Content
3 tutorial videos in 1 lesson:
- Why protect your data in Microsoft 365?
- Sensitivity labels: understanding what they do
- Applying a label in your Microsoft 365 applications
1 knowledge-validation quiz
Learn more about Sensitivity Labels
Sensitivity labels are a core component of information protection in Microsoft 365. They provide a level of security that no longer depends on where a file is stored, but on the file itself. Encryption, blocking copy or forwarding, applying visual markings — all these protections can be automatically enforced according to the rules defined by your organization. With this approach, confidentiality remains in place even when the file moves beyond its original environment. Understanding how labels work and when to apply them is essential to reducing accidental data exposure and strengthening information governance across your organization.
0h 15 min