Forum Discussion

B2B's avatar
B2B
Copper Contributor
Jun 13, 2025
Solved

Purview - Default Labelling Issue

There is a proposition to simplify the current sensitivity labelling architecture since we had too many labels that basically is going out of hand. We basically simplified by choosing the most used labels and copying them as new using the same set of permissions and encryption policies applied. We duplicated instead of using the existing one's since we do not want to use sub categories and simplified by just have a drop down list.

Everything is looking fine during the test phase but the issue is that the default label is still pointing out to the old label instead of the new one for random users on the office client apps.  And some users doesn't have any issue at all. 

For instance - I have no issues on my Office client apps or OWA on my laptop where as on the CPC, the default label is still pointing to the old label on Office client apps and not being applied at all on OWA.

I have set the highest priority to the new labels and all that. Issue still persists. Any advice / help would be greatly appreciated.

  • This is now resolved and the solution really humbled me.

    Default template (Normal.dotm) file was replaced with org branded deault fonts and colours. This file also picked up old labels. Therefore, issue on devices that has this policy applied.. 

3 Replies

  • B2B's avatar
    B2B
    Copper Contributor

    This is now resolved and the solution really humbled me.

    Default template (Normal.dotm) file was replaced with org branded deault fonts and colours. This file also picked up old labels. Therefore, issue on devices that has this policy applied.. 

  • B2B's avatar
    B2B
    Copper Contributor

    Thank you Surya, I have applied all the above and currently is in touch with Microsoft as well.

    Web clients started to work after we reset the priority of the policy. i.e. the policy was given the highest priority, changed it to the lowest and changed it back to the highest after 24 hours. My guess is it isn't anything more than a caching issue.

    The default label is now applied on all the client apps as well except Word. Microsoft advised the below for the issue but we do not have luck yet. Waiting for Microsoft to get back.

     

    • Close all office apps
    • Open "Registry Editor" and Rename the location from the Office registry: Computer\HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\word to "word.old"
    • Clear the following folders in the local machine, as they are the folders for the OfficeFileCache: C:\Users\%userprofile%\AppData\Local\Microsoft\Office\16.0\OfficeFileCache
    • Open a regular PowerShell window and run: Install-Module -Name ComplianceUtility -AllowClobber -Scope CurrentUser
    • Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy RemoteSigned -Force
    • ComplianceUtility
    • R – to reset (make sure that all Office apps are closed)
    • Check if the issue persists

     

     

  • Hi B2B​  you're dealing with a common and frustrating issue in Microsoft Purview Sensitivity Labels—especially when refactoring or replacing label structures. The inconsistent default label behavior across different clients (Office apps, OWA, CPC) is usually due to label publishing caching, label policy sync delays, or residual client-side configuration.

     

    Root Causes to Check

    1.Label Policy Not Updated for All Users

    • Even though you’ve created new labels, have you updated the label policy to include the new default label for all target users?
    • Merely creating or assigning a priority doesn't override policy scoping or default label assignments.

    Check:

    • Go to Microsoft Purview Portal > Information Protection > Label Policies
    • Open the relevant label policy and:
      • Ensure the new label is added.
      • Set it as the default label (there's a specific toggle).
      • Confirm target users/groups include all affected users.

     

    2.Client-Side Label Caching

    Office apps cache label policy settings. So, changes like default label updates don’t apply instantly.

    Fix:

    • Ask affected users to run this on their local machine (CMD or PowerShell):

    ipconfig /flushdns

    And more importantly:

      • In Word/Excel, go to:
        • File > Options > Trust Center > Trust Center Settings > Privacy Options
        • Uncheck and re-check “Let Office connect to online services” to refresh settings.
      • Or fully reset the Office cache using:

    Clear-AIPAuthentication

    Reset-AIPConfiguration

    (Requires AIP client installed)

     

    3.OWA / Outlook Web – Azure Sync Delay

    OWA sometimes lags in reflecting label changes because it pulls settings from Azure Information Protection unified labeling service, which may take up to 24 hours to fully propagate across services.

    Try:

    • Revoke and re-sign into OWA
    • Use Outlook on the Web > Settings > View all Outlook settings > Mail > Sensitivity labels to confirm visible list

     

    4.Conflicting Label Policies

    Sometimes users are assigned multiple overlapping label policies, and a legacy policy might still push the old default label.

    Fix:

    • Use PowerShell to list policies per user:

    powershell

    CopyEdit

    Get-LabelPolicy | Where-Object {$_.AssignedUsers -contains "email address removed for privacy reasons"}

    • Remove user from legacy policies pushing the old label.

     

    Diagnostic Steps Summary

    Step

    Description

    Check label policy assignments

    Ensure new label is set as default in the correct policy

    Confirm user policy membership

    Use PowerShell or UI to check label policy targeting

    Clear Office cache or reset AIP client

    To force policy refresh

    Wait for Azure sync (esp. OWA)

    Can take up to 24 hours

    Remove legacy label policy overlap

    Especially if older policy is still being applied

     

    If Still Not Working

    Use Microsoft Support’s built-in label policy analyzer tool:

    • Go to Compliance Center > Information Protection
    • Under “Label Policies,” use the “Simulate Policy Evaluation” tool (if available in your tenant).

    Or run diagnostic via PowerShell:

    Connect-AipService

    Get-AipServiceConfiguration

     

     

Resources