Introduction to Service-side Auto-labeling: Benefits and Purpose

Published Jan 20 2022 08:43 AM 2,874 Views
Microsoft

The intent of this blog series is to help customers refresh their understanding of service side auto-labeling with hero scenarios explained. In addition to the Playbook we recently released, this series will help guide you in setting up auto-labeling policies and take action to enforce those policies in simulation mode. We will add new content to this blog every few weeks to cover a range of topics related to auto-labeling.

 

How can auto-labeling help your organization?

 

Microsoft Information Protection (MIP) provides a unified set of capabilities to know your data, protect your data, and protect against data loss across Microsoft 365 apps and services. Foundational to Microsoft are its classification capabilities—from out-of-the-box sensitive information types to machine learning trainable classifiers to automatically finding and classifying sensitive content at scale. MIP’s auto-labeling capability helps customers to quickly classify more of their ever-increasing data and protect sensitive content.

Sensitivity labels are at their basic level a tag, that is customizable, persistent, accessible to applications, and visible to users. Labels once applied to documents and email become the basis for enforcing data protection policies throughout the tenants’ digital estate. When a label is applied to a file or email it is persisted as document metadata. When a label is applied to a SharePoint site or OneDrive for business the label persists as container metadata.

With auto-labeling policies, administrators can automatically apply sensitivity labels to email messages, OneDrive files, and SharePoint files that contain sensitive information. This labeling is applied by services rather than applications, so you don’t need to worry about what type of client the user is using. This label will be automatically applied to content that matches the rules and related conditions here. Auto-labeling also places labels on emails sent to users for whom the policy applies.

 

When to use service-side auto-labeling?

 

There are two different methods for automatically applying a sensitivity label to content in Microsoft 365 – Client-side labeling and Service-side labeling. For the purposes of this blog, we’re focusing on Service-side auto-labeling.

Service-side auto-labeling is sometimes referred to as auto-labeling for data at rest and data in transit. Unlike client-side auto-labeling, service-side auto-labeling does not depend on the client to analyze the document content while it is being created. Instead, service-side auto-labeling reviews content that is stored (at-rest) in SharePoint or OneDrive document libraries, or that is "in-flight" or being sent within Exchange. Because this labeling is applied by services rather than by applications, you don't need to worry about what apps users have and what version. As a result, this capability is immediately available throughout your organization and is suitable for labeling at scale. Auto-labeling policies don't support recommended labeling because the user doesn't interact with the labeling process. Instead, the administrator runs the policies in simulation mode to help ensure the correct labeling of content before applying the label.

 

This ability to apply sensitivity labels to content automatically is important because:

  • You don't need to train your users when to use each of your classifications.
  • You don't need to rely on users to classify all content correctly.
  • Users no longer need to know about your policies—they can instead focus on their work.

What's new in auto-labeling?

 

Introducing our new admin feedback feature in auto-labeling

Our admin feedback feature that was made Generally Available in January 2022 now allows admins an inside view of the labeling progress of their auto-labeling policies.

 

After your auto-labeling policy is turned on, you can view the labeling progress for files in your chosen SharePoint and OneDrive locations. Emails are not included in the labeling progress because they are automatically labeled as they are sent.

The labeling progress includes the files to be labeled by the policy, the files labeled in the last 7 days, and the total files labeled. Because of the maximum of labeling 25,000 files a day, this information provides you with visibility into the current labeling progress for your policy and how many files are still to be labeled.

 

When you first turn on your policy, you will initially see a value of 0 for files to be labeled until the latest data is retrieved. This progress information updates every 48 hours, so you can expect to see the most current data every other day. We are working on reducing this SLA. When you select an auto-labeling policy, you can see more details about the policy in a flyout pane, which includes the labeling progress by the top 10 sites. The information on this flyout pane might be more current than the aggregated policy information displayed on the Auto-labeling main page.

 

You can also see the results of your auto-labeling policy by using content explorer when you have the appropriate permissions:

  • Content Explorer List Viewer role group lets you see a file's label but not the file's contents.
  • Content Explorer Content Viewer role group, and Information Protection and Information Protection Investigators role groups (currently in preview) let you see the file's contents.

 Tip: You can also use content explorer to identify locations that have documents with sensitive information but are unlabeled. Using this information, consider adding these locations to your auto-labeling policy, and include the identified sensitive information types as rules.

 

How to get started with Auto-labeling?

 

Easy Trials

  • One of the feedback we often hear from customers is where to start? To that effect, we've designed an easy setup process to help you leverage and get started with our E5 capabilities in one click. Our default policies help protect credit card information in your tenant through the default MIP labels based on Microsoft Industry recommendations, auto-labeling policies, and data loss prevention protecting devices and Teams messages. E5 customers or Compliance E5 Trial customers can interact with the Banner module in the Information Protection's Overview tab.  The recommended set of features on the banner is based on the existing setup. We help you set up features you haven’t dabbled with yet. Following is an example of the banner.

Easy Trials.jpg

Learn about the default labels and policies for Microsoft Information Protection - Microsoft 365 Com...

 

If you’re not an E5 customer, you can sign up for our Compliance trial to gain access to our default policies or leverage our default MIP label schema by manually creating the labels following our documentation above. Learn about the Microsoft 365 compliance trial - Microsoft 365 Compliance | Microsoft Docs

 

Hero Scenarios

  • To help customers classify their sensitive data accurately, we have several out-of-the-box policy templates tailored to different industry and geographical regulations instead of creating custom policies from scratch.
    • Some of our most popular templates include:
      • GDPR Enhanced
      • US Financial Data
      • US HIPPA Enhanced
    • Our enhanced policy templates extend several of the original templates by also detecting named entities (such as full names and physical addresses). Just look for the templates labeled 'Enhanced' to start protecting even more personal data.
  • Recent additions to auto-labeling allow for the inclusion of advanced classifies like named entities. Combine named entities (All Full Names and All Physical Addresses) to your custom policies to reduce false positives and detect identifiable sensitive information. Learn about named entities (preview) - Microsoft 365 Compliance | Microsoft Docs
  • Many of our healthcare customers leverage Exact Data Match to specifically define and detect patient/customer data to auto label. Learn more about Implementing Microsoft Exact Data Match (EDM) Part 1 - Microsoft Tech Community
  • For more information on some of the specific scenarios please refer to the auto-labeling use cases section in the service side auto-labeling playbook.

 

Other topics you can look forward to seeing over the next few weeks:

  • Container labels vs Auto-labeling
  • Impact of changing labels to auto-labeling
  • How to fine-tune policies
%3CLINGO-SUB%20id%3D%22lingo-sub-3066451%22%20slang%3D%22en-US%22%3EIntroduction%20to%20Service-side%20Auto-labeling%3A%20Benefits%20and%20Purpose%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3066451%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20intent%20of%20this%20blog%20series%20is%20to%20help%20customers%20refresh%20their%20understanding%20of%20service%20side%20auto-labeling%20with%20hero%20scenarios%20explained.%20In%20addition%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoft.github.io%2FComplianceCxE%2Fplaybooks%2Fservice-side-auto-labeling%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3EPlaybook%3C%2FA%3E%20we%20recently%20released%2C%20this%20series%20will%20help%20guide%20you%20in%20setting%20up%20auto-labeling%20policies%20and%20take%20action%20to%20enforce%20those%20policies%20in%20simulation%20mode.%20We%20will%20add%20new%20content%20to%20this%20blog%20every%20few%20weeks%20to%20cover%20a%20range%20of%20topics%20related%20to%20auto-labeling.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-335635699%22%20id%3D%22toc-hId-337364475%22%3E%3CSTRONG%3EHow%20can%20auto-labeling%20help%20your%20organization%3F%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20Information%20Protection%20(MIP)%20provides%20a%20unified%20set%20of%20capabilities%20to%20know%20your%20data%2C%20protect%20your%20data%2C%20and%20protect%20against%20data%20loss%20across%20Microsoft%20365%20apps%20and%20services.%20Foundational%20to%20Microsoft%20are%20its%20classification%20capabilities%E2%80%94from%20out-of-the-box%20sensitive%20information%20types%20to%20machine%20learning%20trainable%20classifiers%20to%20automatically%20finding%20and%20classifying%20sensitive%20content%20at%20scale.%20MIP%E2%80%99s%20auto-labeling%20capability%20helps%20customers%20to%20quickly%20classify%20more%20of%20their%20ever-increasing%20data%20and%20protect%20sensitive%20content.%3C%2FP%3E%0A%3CP%3ESensitivity%20labels%20are%20at%20their%20basic%20level%20a%20tag%2C%20that%20is%20customizable%2C%20persistent%2C%20accessible%20to%20applications%2C%20and%20visible%20to%20users.%20Labels%20once%20applied%20to%20documents%20and%20email%20become%20the%20basis%20for%20enforcing%20data%20protection%20policies%20throughout%20the%20tenants%E2%80%99%20digital%20estate.%20When%20a%20label%20is%20applied%20to%20a%20file%20or%20email%20it%20is%20persisted%20as%20document%20metadata.%20When%20a%20label%20is%20applied%20to%20a%20SharePoint%20site%20or%20OneDrive%20for%20business%20the%20label%20persists%20as%20container%20metadata.%3C%2FP%3E%0A%3CP%3EWith%20auto-labeling%20policies%2C%20administrators%20can%20automatically%20apply%20sensitivity%20labels%20to%20email%20messages%2C%20OneDrive%20files%2C%20and%20SharePoint%20files%20that%20contain%20sensitive%20information.%20This%20labeling%20is%20applied%20by%20services%20rather%20than%20applications%2C%20so%20you%20don%E2%80%99t%20need%20to%20worry%20about%20what%20type%20of%20client%20the%20user%20is%20using.%20This%20label%20will%20be%20automatically%20applied%20to%20content%20that%20matches%20the%20rules%20and%20related%20conditions%20here.%20Auto-labeling%20also%20places%20labels%20on%20emails%20sent%20to%20users%20for%20whom%20the%20policy%20applies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1471818764%22%20id%3D%22toc-hId--1470089988%22%3E%3CSTRONG%3EWhen%20to%20use%20service-side%20auto-labeling%3F%3C%2FSTRONG%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere%20are%20two%20different%20methods%20for%20automatically%20applying%20a%20sensitivity%20label%20to%20content%20in%20Microsoft%20365%20%E2%80%93%20Client-side%20labeling%20and%20Service-side%20labeling.%20For%20the%20purposes%20of%20this%20blog%2C%20we%E2%80%99re%20focusing%20on%20Service-side%20auto-labeling.%3C%2FP%3E%0A%3CP%3EService-side%20auto-labeling%20is%20sometimes%20referred%20to%20as%20auto-labeling%20for%20data%20at%20rest%20and%20data%20in%20transit.%20Unlike%20client-side%20auto-labeling%2C%20service-side%20auto-labeling%20does%20not%20depend%20on%20the%20client%20to%20analyze%20the%20document%20content%20while%20it%20is%20being%20created.%20Instead%2C%20service-side%20auto-labeling%20reviews%20content%20that%20is%20stored%20(at-rest)%20in%20SharePoint%20or%20OneDrive%20document%20libraries%2C%20or%20that%20is%20%22in-flight%22%20or%20being%20sent%20within%20Exchange.%20Because%20this%20labeling%20is%20applied%20by%20services%20rather%20than%20by%20applications%2C%20you%20don't%20need%20to%20worry%20about%20what%20apps%20users%20have%20and%20what%20version.%20As%20a%20result%2C%20this%20capability%20is%20immediately%20available%20throughout%20your%20organization%20and%20is%20suitable%20for%20labeling%20at%20scale.%20Auto-labeling%20policies%20don't%20support%20recommended%20labeling%20because%20the%20user%20doesn't%20interact%20with%20the%20labeling%20process.%20Instead%2C%20the%20administrator%20runs%20the%20policies%20in%20simulation%20mode%20to%20help%20ensure%20the%20correct%20labeling%20of%20content%20before%20applying%20the%20label.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20ability%20to%20apply%20sensitivity%20labels%20to%20content%20automatically%20is%20important%20because%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EYou%20don't%20need%20to%20train%20your%20users%20when%20to%20use%20each%20of%20your%20classifications.%3C%2FLI%3E%0A%3CLI%3EYou%20don't%20need%20to%20rely%20on%20users%20to%20classify%20all%20content%20correctly.%3C%2FLI%3E%0A%3CLI%3EUsers%20no%20longer%20need%20to%20know%20about%20your%20policies%E2%80%94they%20can%20instead%20focus%20on%20their%20work.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH2%20id%3D%22toc-hId-1015694069%22%20id%3D%22toc-hId-1017422845%22%3E%3CFONT%20size%3D%225%22%3EWhat's%20new%20in%20auto-labeling%3F%3C%2FFONT%3E%3C%2FH2%3E%0A%3CH3%20id%3D%22toc-hId-1706255543%22%20id%3D%22toc-hId-1707984319%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22toc-hId--101198920%22%20id%3D%22toc-hId--99470144%22%3EIntroducing%20our%20new%20admin%20feedback%20feature%20in%20auto-labeling%3C%2FH3%3E%0A%3CP%3EOur%20admin%20feedback%20feature%20that%20was%20made%20Generally%20Available%20in%20January%202022%20now%20allows%20admins%20an%20inside%20view%20of%20the%20labeling%20progress%20of%20their%20auto-labeling%20policies.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20your%20auto-labeling%20policy%20is%20turned%20on%2C%20you%20can%20view%20the%20labeling%20progress%20for%20files%20in%20your%20chosen%20SharePoint%20and%20OneDrive%20locations.%20Emails%20are%20not%20included%20in%20the%20labeling%20progress%20because%20they%20are%20automatically%20labeled%20as%20they%20are%20sent.%3C%2FP%3E%0A%3CP%3EThe%20labeling%20progress%20includes%20the%20files%20to%20be%20labeled%20by%20the%20policy%2C%20the%20files%20labeled%20in%20the%20last%207%20days%2C%20and%20the%20total%20files%20labeled.%20Because%20of%20the%20maximum%20of%20labeling%2025%2C000%20files%20a%20day%2C%20this%20information%20provides%20you%20with%20visibility%20into%20the%20current%20labeling%20progress%20for%20your%20policy%20and%20how%20many%20files%20are%20still%20to%20be%20labeled.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhen%20you%20first%20turn%20on%20your%20policy%2C%20you%20will%20initia%3CFONT%20size%3D%223%22%3Elly%20see%20a%20value%20of%200%20for%20files%20to%20be%20labeled%20until%20the%20latest%20data%20is%3C%2FFONT%3E%20retrieved.%20This%20progress%20information%20updates%20every%2048%20hours%2C%20so%20you%20can%20expect%20to%20see%20the%20most%20current%20data%20every%20other%20day.%20We%20are%20working%20on%20reducing%20this%20%3CFONT%20size%3D%223%22%3ESLA.%20When%20you%20select%20an%20auto-labeling%20policy%2C%20you%20can%20see%20more%20details%20about%20the%20policy%20in%20a%20flyout%20pane%2C%20which%20includes%20the%20labeling%20progress%20by%20the%20top%2010%20sites.%20The%20information%20on%20this%20flyout%20pane%20might%20be%20more%20current%20than%20the%20aggregated%20policy%20information%20displayed%20on%20the%26nbsp%3B%3CSTRONG%3EAuto-labeling%3C%2FSTRONG%3E%26nbsp%3Bmain%20page.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3EYou%20can%20also%20see%20the%20results%20of%20your%20auto-labeling%20policy%20by%20using%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fdata-classification-content-explorer%3Fview%3Do365-worldwide%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Econtent%20explorer%3C%2FA%3E%26nbsp%3Bwhen%20you%20have%20the%20appropriate%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fdata-classification-content-explorer%3Fview%3Do365-worldwide%23permissions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Epermissions%3C%2FA%3E%3A%3C%2FFONT%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3E%3CSTRONG%3EContent%20Explorer%20List%20Viewer%3C%2FSTRONG%3E%26nbsp%3Brole%20group%20lets%20you%20see%20a%20file's%20label%20but%20not%20the%20file's%20contents.%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3E%3CSTRONG%3EContent%20Explorer%20Content%20Viewer%3C%2FSTRONG%3E%26nbsp%3Brole%20group%2C%20and%26nbsp%3B%3CSTRONG%3EInformation%20Protection%3C%2FSTRONG%3E%26nbsp%3Band%26nbsp%3B%3CSTRONG%3EInformation%20Protection%20Investigators%3C%2FSTRONG%3E%26nbsp%3Brole%20groups%20(currently%20in%20preview)%20let%20you%20see%20the%20file's%20contents.%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CFONT%20size%3D%223%22%3E%3CSTRONG%3E%26nbsp%3BTip%3A%26nbsp%3B%3C%2FSTRONG%3EYou%20can%20also%20use%20content%20explorer%20to%20identify%20locations%20that%20have%20documents%20with%20sensitive%20information%20but%20are%20unlabeled.%20Using%20this%20information%2C%20consider%20adding%20these%20locations%20to%20your%20auto-labeling%20policy%2C%20and%20include%20the%20identified%20sensitive%20information%20types%20as%20rules.%3C%2FFONT%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--111702024%22%20id%3D%22toc-hId--109973248%22%3E%3CFONT%20size%3D%225%22%3EHow%20to%20get%20started%20with%20Auto-labeling%3F%3C%2FFONT%3E%3C%2FH2%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20size%3D%223%22%3EEasy%20Trials%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EOne%20of%20the%20feedback%20we%20often%20hear%20from%20customers%20is%20%3CEM%3Ewhere%20to%20start%3C%2FEM%3E%3F%20To%20that%20effect%2C%20we've%20designed%20an%20easy%20setup%20process%20to%20help%20you%20leverage%20and%20get%20started%20with%20our%20E5%20capabilities%20in%20one%20click.%20Our%20default%20policies%20help%20protect%20credit%20card%20information%20in%20your%20tenant%20through%20the%20default%20MIP%20labels%20based%20on%20Microsoft%20Industry%20recommendations%2C%20auto-labeling%20policies%2C%20and%20data%20loss%20prevention%20protecting%20devices%20and%20Teams%20messages.%20E5%20customers%20or%20Compliance%20E5%20Trial%20customers%20can%20interact%20with%20the%20Banner%20module%20in%20the%20Information%20Protection's%20Overview%20tab.%26nbsp%3B%20The%20recommended%20set%20of%20features%20on%20the%20banner%20is%20based%20on%20the%20existing%20setup.%20We%20help%20you%20set%20up%20features%20you%20haven%E2%80%99t%20dabbled%20with%20yet.%20Following%20is%20an%20example%20of%20the%20banner.%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22Easy%20Trials.jpg%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F352917iEDB66C5EFE2EE993%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22Easy%20Trials.jpg%22%20alt%3D%22Easy%20Trials.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin%3A%200in%3B%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fmip-easy-trials%3Fview%3Do365-worldwide%23default-sensitivity-labels%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ELearn%20about%20the%20default%20labels%20and%20policies%20for%20Microsoft%20Information%20Protection%20-%20Microsoft%20365%20Compliance%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin%3A%200in%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20style%3D%22margin%3A%200in%3B%22%3E%3CEM%3E%3CFONT%20size%3D%223%22%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3EIf%20you%E2%80%99re%20not%20an%20E5%20customer%2C%20you%20can%20sign%20up%20for%20our%20Compliance%20trial%20to%20gain%20access%20to%20our%20default%20policies%20or%20leverage%20our%20default%20MIP%20label%20schema%20by%20manually%20creating%20the%20labels%20following%20our%20documentation%20above%3C%2FSPAN%3E%3CSPAN%20style%3D%22font-size%3A%2011.0pt%3B%20font-family%3A%20'Calibri'%2Csans-serif%3B%22%3E.%20%3C%2FSPAN%3E%3CFONT%20size%3D%222%22%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fcompliance-easy-trials%3Fview%3Do365-worldwide%23set-up-a-compliance-trial%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ELearn%20about%20the%20Microsoft%20365%20compliance%20trial%20-%20Microsoft%20365%20Compliance%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FFONT%3E%3C%2FFONT%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%20style%3D%22margin%3A%200in%3B%22%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%3CFONT%20size%3D%223%22%3EHero%20Scenarios%3C%2FFONT%3E%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3ETo%20help%20customers%20classify%20their%20sensitive%20data%20accurately%2C%20we%20have%20several%20out-of-the-box%20policy%20templates%20tailored%20to%20different%20industry%20and%20geographical%20regulations%20instead%20of%20creating%20custom%20policies%20from%20scratch.%3C%2FFONT%3E%3C%2FLI%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3ESome%20of%20our%20most%20popular%20templates%20include%3A%3C%2FFONT%3E%3C%2FLI%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EGDPR%20Enhanced%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EUS%20Financial%20Data%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EUS%20HIPPA%20Enhanced%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EOur%20enhanced%20policy%20templates%20extend%20several%20of%20the%20original%20templates%20by%20also%20detecting%20named%20entities%20(such%20as%20full%20names%20and%20physical%20addresses).%20Just%20look%20for%20the%20templates%20labeled%20'Enhanced'%20to%20start%20protecting%20even%20more%20personal%20data.%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3ERecent%20additions%20to%20auto-labeling%20allow%20for%20the%20inclusion%20of%20advanced%20classifies%20like%20named%20entities.%20Combine%20named%20entities%20(All%20Full%20Names%20and%20All%20Physical%20Addresses)%20to%20your%20custom%20policies%20to%20reduce%20false%20positives%20and%20detect%20identifiable%20sensitive%20information.%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fmicrosoft-365%2Fcompliance%2Fnamed-entities-learn%3Fview%3Do365-worldwide%23examples-of-named-entity-sits%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3ELearn%20about%20named%20entities%20(preview)%20-%20Microsoft%20365%20Compliance%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EMany%20of%20our%20healthcare%20customers%20leverage%20Exact%20Data%20Match%20to%20specifically%20define%20and%20detect%20patient%2Fcustomer%20data%20to%20auto%20label.%20Learn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fsecurity-compliance-and-identity%2Fimplementing-microsoft-exact-data-match-edm-part-1%2Fba-p%2F1345360%23%3A~%3Atext%3DImplementing%2520Microsoft%2520Exact%2520Data%2520Match%2520%2528EDM%2529%2520Part%25201%2C%2520Los%2520Angeles%2520%252017%2520more%2520rows%2520%22%20target%3D%22_blank%22%3EImplementing%20Microsoft%20Exact%20Data%20Match%20(EDM)%20Part%201%20-%20Microsoft%20Tech%20Community%3C%2FA%3E%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EFor%20more%20information%20on%20some%20of%20the%20specific%20scenarios%20please%20refer%20to%20the%20%3CA%20href%3D%22https%3A%2F%2Fmicrosoft.github.io%2FComplianceCxE%2Fplaybooks%2Fservice-side-auto-labeling%2F%23auto-labeling-use-cases-from-our-customers%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noreferrer%22%3Eauto-labeling%20use%20cases%3C%2FA%3E%20section%20in%20the%20service%20side%20auto-labeling%20playbook.%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CH4%20id%3D%22toc-hId--1218091909%22%20id%3D%22toc-hId--1216363133%22%3E%26nbsp%3B%3C%2FH4%3E%0A%3CH4%20id%3D%22toc-hId-1269420924%22%20id%3D%22toc-hId-1271149700%22%3EOther%20topics%20you%20can%20look%20forward%20to%20seeing%20over%20the%20next%20few%20weeks%3A%3C%2FH4%3E%0A%3CUL%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EContainer%20labels%20vs%20Auto-labeling%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EImpact%20of%20changing%20labels%20to%20auto-labeling%3C%2FFONT%3E%3C%2FLI%3E%0A%3CLI%3E%3CFONT%20size%3D%223%22%3EHow%20to%20fine-tune%20policies%3C%2FFONT%3E%3C%2FLI%3E%0A%3C%2FUL%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-3066451%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20intent%20of%20this%20blog%20series%20is%20to%20help%20customers%20refresh%20their%20understanding%20of%20service%20side%20auto-labeling%20with%20hero%20scenarios%20explained.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22MSFT_SCI_EndtoEnd_Security_Visibility_01.jpg%22%20style%3D%22width%3A%20539px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F341055iE5F2A8ACF0BEB520%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22MSFT_SCI_EndtoEnd_Security_Visibility_01.jpg%22%20alt%3D%22MSFT_SCI_EndtoEnd_Security_Visibility_01.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3066451%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EMicrosoft%20Information%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Co-Authors
Version history
Last update:
‎Mar 04 2022 09:20 AM
Updated by: