Platform Banner

Microsoft Video Training - Confidentiality and Sensitivity Labels in M365

Microsoft Video Training - Confidentiality and Sensitivity Labels in M365

  • 0h 15 min
  • Viewed 4 times

Training Theme

Microsoft 365 makes sharing documents extremely easy across Teams, OneDrive and Outlook — sometimes too easy. This convenience can unintentionally expose sensitive information if a file is shared too widely or leaves its intended perimeter. To address this, Microsoft 365 integrates several layers of protection, including sensitivity labels. These labels allow you to classify content and automatically apply security measures such as encryption, usage restrictions or visual markings. This module helps you understand how these protections work and how to strengthen confidentiality when handling files in your daily activities.

Training Objectives

By the end of this training, you will be able to:

  • Understand why data protection is essential in Microsoft 365
  • Identify the role and capabilities of sensitivity labels
  • Apply a sensitivity label across Microsoft 365 applications
  • Distinguish storage-based protections from content-based protections

Prerequisite and Target Audience

Target Audience: Any Microsoft 365 user working with internal or sensitive information.
Starting Level: Beginner.
Prerequisites: None.

Means and Methods

  • Tutorial Videos: A selection of videos designed to help you reach the defined learning objective.
  • Evaluation Quiz: A quiz will be provided at the end to validate your understanding.

Training Content

3 tutorial videos in 1 lesson:

  • Why protect your data in Microsoft 365?
  • Sensitivity labels: understanding what they do
  • Applying a label in your Microsoft 365 applications

1 knowledge-validation quiz

Learn more about Sensitivity Labels

Sensitivity labels are a core component of information protection in Microsoft 365. They provide a level of security that no longer depends on where a file is stored, but on the file itself. Encryption, blocking copy or forwarding, applying visual markings — all these protections can be automatically enforced according to the rules defined by your organization. With this approach, confidentiality remains in place even when the file moves beyond its original environment. Understanding how labels work and when to apply them is essential to reducing accidental data exposure and strengthening information governance across your organization.

Reminder

Show