Platform Banner

Office 365 - Sensitivity labels: understanding what they do Tutorial

Unlock the power of Microsoft 365 sensitivity labels in our video, "sensitivity labels: understanding what they do." Discover how these labels classify and protect your sensitive content, ensuring security no matter where it goes—whether shared, downloaded, or stored. Learn the crucial differences between labels and permissions, and find out how automated labeling keeps your information secure and accessible only to authorized users. Don't miss this chance to enhance your security knowledge!

  • 03:57
  • 1 views

 

00:00:05
a sensitivity label serves two essential functions
00:00:08
to classify content and protect it.
00:00:11
It truly has two main functions.
00:00:13
The first one is classification,
00:00:16
clearly indicating that a document or email contains sensitive information.
00:00:20
The second is protection.
00:00:22
The label automatically applies tailored security measures.
00:00:26
What makes it so specific is that this
00:00:28
protection is directly embedded within the file's metadata.
00:00:31
The label is quite literally welded to the content itself.
00:00:35
It follows the document everywhere it goes,
00:00:37
whether it's stored in OneDrive,
00:00:38
downloaded onto a computer,
00:00:40
copied to a USB drive,
00:00:42
or even sent outside of the company.
00:00:44
Protection remains active wherever the file is stored.
00:00:48
A label can activate 3 main types of protection.
00:00:52
Encryption,
00:00:53
it's your digital padlock.
00:00:55
Only authorized recipients can open the file or read the message.
00:01:00
Others will simply be denied access.
00:01:03
This encryption can be based on predefined rules or
00:01:06
on permissions chosen when the label is applied.
00:01:10
Visual marking
00:01:11
An assigned label can automatically add a header,
00:01:14
a footer,
00:01:15
or a watermark.
00:01:17
These elements immediately remind users of the document's sensitivity level
00:01:21
and help prevent overly quick sharing.
00:01:25
Content control
00:01:27
According to the parameters defined by the organization,
00:01:30
a label can block printing,
00:01:32
prevent copying,
00:01:33
forbid the transfer of an email,
00:01:35
or demand a justification when there's a drop in sensitivity.
00:01:39
And of course,
00:01:40
strengthen access traceability.
00:01:44
There is often confusion between labels and permissions.
00:01:48
The difference is quite simple.
00:01:50
Traditional permissions control the container.
00:01:53
Labels,
00:01:54
however,
00:01:55
control the content.
00:01:56
It's the file itself that is protected no matter where it is.
00:01:59
With standard permissions,
00:02:01
everything functions correctly as long as the
00:02:02
document remains in its original location.
00:02:05
However,
00:02:06
as soon as it's downloaded,
00:02:07
copied to a USB drive,
00:02:09
or sent to another place,
00:02:10
the protection disappears.
00:02:12
With a tag,
00:02:13
it's the opposite.
00:02:14
Protection is integrated directly into the file's metadata.
00:02:18
Permissions answer a simple question.
00:02:20
Who can access the location where the file is stored?
00:02:23
Labels,
00:02:23
however,
00:02:24
answer a different question.
00:02:26
Who truly has the right to open or modify this file,
00:02:29
even after it has left its storage location?
00:02:33
Labeling doesn't rely solely on the user.
00:02:36
Based on the licenses and rules set by the organization,
00:02:39
it can be automated.
00:02:41
Microsoft 365 can apply a label when the system detects sensitive data,
00:02:45
such as personal information,
00:02:47
financial data,
00:02:48
or confidential keywords.
00:02:50
The protection is triggered automatically.
00:02:52
The labeling is suggested.
00:02:54
In other instances,
00:02:55
a simple recommendation appears.
00:02:57
The system then suggests a label that is better suited to the file's content.
00:03:02
The user chooses but is guided at the right time.
00:03:06
Default labeling.
00:03:08
Some organizations automatically apply a basic label
00:03:11
to all new documents upon their creation.
00:03:14
This ensures nothing circulates without a minimum level of protection.
00:03:18
This automation prevents omissions and applies the
00:03:21
correct protection at the right time.
00:03:23
A sensitivity label functions like a digital lock embedded within the file.
00:03:28
Protection no longer depends on its location,
00:03:31
it travels with the document.
00:03:33
A file downloaded,
00:03:34
copied,
00:03:35
or even sent by mistake
00:03:36
becomes much less risky.
00:03:38
Without the key,
00:03:39
the content remains unreadable.
00:03:41
Only authorized people can open it.
00:03:44
We're moving from storage-based security to
00:03:46
security directly linked to the information.
00:03:49
The real question is no longer
00:03:51
where is the file,
00:03:52
but rather,
00:03:53
who can open it.

No elements match your search in this video....
Do another search or back to content !

 

Mandarine AI: WHAT YOU SHOULD KNOW

Reminder

Show