In today’s data-driven world, information protection is no longer optional—it’s a business imperative. Organizations must safeguard sensitive information while ensuring employees can still collaborate effectively. One of the most effective ways to achieve this balance is by implementing a clear, well-structured label taxonomy in Microsoft Purview Information Protection.
Why a Label Taxonomy Matters
A label taxonomy provides a simple, intuitive framework for classifying and protecting data.
When labels are designed with both security and usability in mind, users can easily choose the right classification while automated policies enforce the organization’s compliance requirements.
Without a consistent taxonomy, organizations risk:
- Confusion for employees about which label to apply.
- Over-protection, which can slow down productivity.
- Under-protection, which can expose critical information.
Microsoft’s Recommended Label Structure
Microsoft recommends a four-tier label taxonomy that scales across organizations of all sizes:
- Public (Blue)
- For unrestricted data meant for public consumption (e.g., press releases, public financial reports).
- Default sharing: unrestricted.
- General (Green)
- For internal business data not intended for public release, but safe to share within the organization and trusted partners.
- Email default label.
- Confidential (Yellow)
- For sensitive business data crucial to organizational goals.
- Typically restricted to internal use or specific groups.
- Supports exceptions for specific people.
- Highly Confidential (Red)
- For the organization’s most critical data.
- Access limited to named individuals or small groups.
- Often combined with Data Loss Prevention (DLP) and auto-labeling policies.
Example: Recommended Taxonomy in Action
| Label | Auto-labeling | Scope | External guest | Default Sharing | DLP limits |
|---|---|---|---|---|---|
| Public | – | File, Email | Allowed | – | – |
| General | Email default | File, Email, Meetings, Sites | Allowed | People in company | Block anyone |
| Confidential\All employees | Documents default + retroactive | File, Email, Meetings, Sites | Not allowed | People in company | Block anyone, Block external |
| Confidential\Specific People | Manual | File, Email, Meetings, Sites | Allowed* | Specific People | Block anyone |
| Highly Confidential\All employees | Optional | File, Email, Meetings, Sites | Not allowed | Specific People | Block anyone, Block external |
| Highly Confidential\Specific People | Auto (SIT) | File, Email, Meetings, Sites | Not allowed | Specific People | Block anyone, Block external |
Best Practices for Labels
- ✅ Use intuitive names that make sense to users.
- ✅ Limit complexity: follow the 5×5 rule (no more than 5 parent labels, each with up to 5 sub-labels).
- ✅ Align labels with business needs (HR, Finance, Legal).
- ✅ Enable auto-labeling for sensitive information types (SITs).
- ✅ Plan for DLP policies to enforce rules on sharing, downloading, or printing sensitive data.
Looking Ahead
As organizations adopt AI tools such as Microsoft Copilot, having a robust label taxonomy becomes even more critical. Labels help ensure sensitive data isn’t inadvertently exposed to generative AI or external collaboration.
By starting with this Microsoft-recommended taxonomy, organizations can build a scalable, enforceable information protection strategy that balances security and productivity.