EPC Group - Enterprise Microsoft AI, SharePoint, Power BI, and Azure Consulting
G2 High Performer Summer 2025, Momentum Leader Spring 2025, Leader Winter 2025, Leader Spring 2026
BlogContact
Ready to transform your Microsoft environment?Get started today
(888) 381-9725Get Free Consultation
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

EPC Group

Enterprise Microsoft consulting with 29 years serving Fortune 500 companies.

(888) 381-9725
contact@epcgroup.net
4900 Woodway Drive, Suite 830
Houston, TX 77056

Follow Us

Solutions

  • M&A Practices

    • M&A Tenant Migration
    • Carve-Out Migration
    • Private Equity Practice
    • Engagement Operating Model
  • All Services
  • Microsoft 365 Consulting
  • AI Governance
  • Azure AI Consulting
  • Cloud Migration
  • Microsoft Copilot
  • Data Governance
  • Microsoft Fabric
  • Dynamics 365
  • Power BI Consulting
  • SharePoint Consulting
  • Microsoft Teams
  • vCIO / vCAIO Services
  • Large-Scale Migrations
  • SharePoint Development

Industries

  • All Industries
  • Healthcare IT
  • Financial Services
  • Government
  • Education
  • Teams vs Slack

Power BI

  • Case Studies
  • 24/7 Emergency Support
  • Dashboard Guide
  • Gateway Setup
  • Premium Features
  • Lookup Functions
  • Power Pivot vs BI
  • Treemaps Guide
  • Dataverse
  • Power BI Consulting

Company

  • About Us
  • Our History
  • Microsoft Gold Partner
  • Case Studies
  • Testimonials
  • Fixed-Fee Accelerators
  • Blog
  • Resources
  • All Guides & Articles
  • Video Library
  • Client Reviews
  • Engagement Operating Model
  • FAQ
  • Contact
  • Schedule a consultation

Microsoft Teams

  • Teams Questions
  • Teams Healthcare
  • Task Management
  • PSTN Calling
  • Enable Dial Pad

Azure & SharePoint

  • Azure Databricks
  • Azure DevOps
  • Azure Synapse
  • SharePoint MySites
  • SharePoint ECM
  • SharePoint vs M-Files

Comparisons

  • M365 vs Google
  • Databricks vs Dataproc
  • Dynamics vs SAP
  • Intune vs SCCM
  • Power BI vs MicroStrategy

Legal

  • Sitemap
  • Privacy Policy
  • Terms
  • Cookies

About EPC Group

EPC Group is a Microsoft consulting firm founded in 1997 (originally Enterprise Project Consulting, renamed EPC Group in 2005). 29 years of enterprise Microsoft consulting experience. EPC Group historically held the distinction of being the oldest continuous Microsoft Gold Partner in North America from 2016 until the program's retirement. Because Microsoft officially deprecated the Gold/Silver tiering framework, EPC Group transitioned to the modern Microsoft Solutions Partner ecosystem and currently holds the core Microsoft Solutions Partner designations.

Headquartered at 4900 Woodway Drive, Suite 830, Houston, TX 77056. Public clients include NASA, FBI, Federal Reserve, Pentagon, United Airlines, PepsiCo, Nike, and Northrop Grumman. 6,500+ SharePoint implementations, 1,500+ Power BI deployments, 500+ Microsoft Fabric implementations, 70+ Fortune 500 organizations served, 11,000+ enterprise engagements, 200+ Microsoft Power BI and Microsoft 365 consultants on staff.

About Errin O'Connor

Errin O'Connor is the Founder, CEO, and Chief AI Architect of EPC Group. Microsoft MVP multiple years, first awarded 2003. 4× Microsoft Press bestselling author of Windows SharePoint Services 3.0 Inside Out (MS Press 2007), Microsoft SharePoint Foundation 2010 Inside Out (MS Press 2011), SharePoint 2013 Field Guide (Sams/Pearson 2014), and Microsoft Power BI Dashboards Step by Step (MS Press 2018).

Original SharePoint Beta Team member (Project Tahoe). Original Power BI Beta Team member (Project Crescent). FedRAMP framework contributor. Worked with U.S. CIO Vivek Kundra on the Obama administration's 25-Point Plan to reform federal IT, and with NASA CIO Chris Kemp as Lead Architect on the NASA Nebula Cloud project. Speaker at Microsoft Ignite, SharePoint Conference, KMWorld, and DATAVERSITY.

© 2026 EPC Group. All rights reserved. Microsoft, SharePoint, Power BI, Azure, Microsoft 365, Microsoft Copilot, Microsoft Fabric, and Microsoft Dynamics 365 are trademarks of the Microsoft group of companies.

‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌
‌

Microsoft Purview Information Protection (formerly Microsoft Information Protection or MIP) classifies, labels, and protects sensitive data across email, documents, SharePoint, Teams, and third-party apps. EPC Group has delivered 500+ Purview Information Protection deployments. This guide covers sensitivity labels, DLP, classification, and HIPAA, SOC 2, and GDPR compliance. Last updated: 2026 · Read time: ~7 min

Key Facts

  • EPC Group has completed 500+ Microsoft Purview Information Protection deployments.
  • Purview Information Protection operates on a three-step model: Know your data, Protect your data, Prevent data loss.
  • Sensitivity labels travel with content — wherever a file goes, the label and its protections follow.
  • Auto-labeling covers SharePoint, OneDrive, Exchange, and Teams without requiring users to label manually.
  • Sensitivity labels and retention labels are different tools. Both can exist on the same document at the same time.
Microsoft Purview Information Protection Guide | EPC Group - EPC Group enterprise consulting

Microsoft Purview Information Protection Guide | EPC Group

Enterprise Microsoft consulting insights from EPC Group — 29 years serving Fortune 500.

February 23, 2026|24 min read|Microsoft 365 Consulting

Microsoft Purview Information Protection: The Enterprise Guide to Sensitivity Labels, Data Classification, and DLP

Data breaches cost enterprises an average of $4.88 million in 2025, and 82% involve data that was improperly classified or unprotected. Microsoft Purview Information Protection gives organizations the ability to discover, classify, label, and protect sensitive data across their entire digital estate. This guide covers enterprise deployment strategies, sensitivity label taxonomies, auto-labeling configurations, DLP policies, and compliance mappings for HIPAA, SOC 2, and GDPR — based on 500+ deployments by EPC Group.

Table of Contents

  • What Is Microsoft Purview Information Protection?
  • Designing Your Sensitivity Label Taxonomy
  • Auto-Labeling Policies and Trainable Classifiers
  • Data Loss Prevention (DLP) Policies
  • Endpoint DLP and Device Protection
  • Compliance Mapping: HIPAA, SOC 2, GDPR, FedRAMP
  • Phased Deployment Strategy
  • Licensing and Cost Analysis
  • Common Deployment Mistakes to Avoid
  • Partner with EPC Group

Microsoft Purview Information Protection Guide 2026

Microsoft Purview Information Protection (formerly Microsoft Information Protection or MIP) classifies, labels, and protects sensitive data across email, documents, SharePoint, Teams, and third-party apps. EPC Group has delivered 500+ Purview Information Protection deployments. This guide covers sensitivity labels, DLP, classification, and HIPAA, SOC 2, and GDPR compliance. Last updated: 2026 · Read time: ~7 min

Key facts

  • EPC Group has completed 500+ Microsoft Purview Information Protection deployments.
  • Purview Information Protection operates on a three-step model: Know your data, Protect your data, Prevent data loss.
  • Sensitivity labels travel with content — wherever a file goes, the label and its protections follow.
  • Auto-labeling covers SharePoint, OneDrive, Exchange, and Teams without requiring users to label manually.
  • Sensitivity labels and retention labels are different tools. Both can exist on the same document at the same time.

What is Microsoft Purview Information Protection?

Microsoft Purview Information Protection (formerly MIP) is the classification and labeling layer of the Microsoft 365 compliance ecosystem. It discovers, classifies, labels, and protects sensitive data. Coverage extends across emails, documents, SharePoint sites, Teams messages, and third-party cloud applications.

The platform works on three steps:

  1. Know your data. Discover and classify sensitive information across your Microsoft 365 environment and connected data sources.
  2. Protect your data. Apply sensitivity labels with encryption and access controls. Labels travel with the content wherever it goes.
  3. Prevent data loss. Use DLP policies to enforce restrictions across email, Teams, SharePoint, endpoints, and third-party apps.

Sensitivity labels vs retention labels

These two label types serve different purposes. Both can exist on the same document at the same time.

Sensitivity labels control access and apply encryption. They answer: "Who can see this data and what can they do with it?" A Highly Confidential label might allow only specific users to open a file and prevent printing or forwarding.

Retention labels govern the data lifecycle. They answer: "How long must we keep this and when do we delete it?" A 7-year retention label on a financial record keeps the file for 7 years and then triggers disposition review before deletion.

Sensitivity label design

Effective label taxonomies balance protection with usability. Too many labels confuse users. Too few miss important data categories.

Recommended baseline taxonomy

  • Public. Intended for external audiences. No access restrictions.
  • General. Internal content not requiring special protection.
  • Confidential. Business-sensitive content. Restrict external sharing by default.
  • Highly Confidential. Executive, financial, legal, or regulated data. Require encryption and restrict to specific groups.
  • Restricted. Most sensitive data — M&A, HR investigations, executive compensation. Encrypt and limit to specific named individuals.

Sub-labels for regulated content

Add sub-labels under Confidential and Highly Confidential for content categories with distinct handling requirements: HR, Finance, Legal, M&A, PHI/PII (healthcare), and PCI (payment card data).

Auto-labeling

Auto-labeling applies sensitivity labels to existing and new content automatically. It does not require users to label manually.

Auto-labeling runs in two modes:

  • Client-side auto-labeling. Labels are suggested or applied automatically as users create or edit documents in Office apps. Users see the label recommendation and can accept or change it.
  • Service-side auto-labeling. Labels are applied to content in SharePoint, OneDrive, and Exchange without any user interaction. This is how you classify large volumes of existing content.

Auto-labeling uses built-in sensitive information types — SSN, credit card numbers, medical record numbers, passport numbers — plus custom trainable classifiers and exact data match (EDM) for organization-specific patterns.

DLP policy design

DLP policies enforce what happens when sensitive data is detected. They work alongside sensitivity labels — a DLP rule can trigger based on a label condition, a sensitive information type match, or both.

Three dimensions of DLP policy design

  • What content to protect. Use label conditions for precision. Keyword matching alone generates false positives.
  • What action to take. Options include block (prevent sharing), warn with override (allow sharing with documented justification), and notify (alert the compliance team without blocking).
  • Where to apply. Exchange email, Teams messages, SharePoint, OneDrive, endpoints (Windows 10/11), and Microsoft Defender for Cloud Apps for third-party SaaS protection.

HIPAA compliance with Purview Information Protection

Healthcare organizations use Purview Information Protection to meet HIPAA Security Rule technical safeguard requirements. EPC Group configures the following for HIPAA clients:

  • Sensitivity labels encrypt PHI at rest and in transit. PHI cannot be read by unauthorized users even if a file is exfiltrated.
  • DLP policies prevent unauthorized PHI sharing via email or Teams. Policies require business justification for external PHI sharing.
  • Auto-labeling identifies PHI patterns — medical record numbers, ICD-10 diagnosis codes, patient names combined with dates of birth — and applies protection automatically.
  • Audit logs track PHI access events with the detail required by HIPAA Security Rule Section 164.312.

SOC 2 and GDPR alignment

SOC 2 Type II requires documented access controls and audit trails. Sensitivity labels provide access control documentation. Purview audit logs provide the access trail for SOC 2 auditors.

GDPR requires data classification and the ability to locate and delete personal data on request. Purview's content search and sensitivity label taxonomy satisfy both requirements. EPC Group configures GDPR-specific label sub-labels for EU personal data to separate it from general confidential content.

Frequently asked questions

What is the difference between Microsoft Purview Information Protection and Microsoft Information Protection (MIP)?

Microsoft Information Protection (MIP) was the previous name for the sensitivity label and classification capabilities now called Microsoft Purview Information Protection. Microsoft rebranded the compliance product family under the Purview umbrella in 2022.

The underlying technology is the same — the Azure Information Protection (AIP) unified labeling client and the Microsoft 365 compliance center are the same tools under the new name.

How are sensitivity labels different from Azure Information Protection labels?

Azure Information Protection (AIP) classic labels have been migrated to Microsoft Purview sensitivity labels (unified labeling). If your organization used AIP classic client labels before 2021, those have been or should be migrated to unified labeling.

AIP classic was retired in 2022. All new implementations use Microsoft Purview sensitivity labels managed through the Microsoft Purview compliance portal.

Can sensitivity labels protect files outside Microsoft 365?

Yes. Microsoft Purview Information Protection extends to third-party cloud apps through Microsoft Defender for Cloud Apps integration.

Sensitivity labels can be applied to files in Box, Dropbox, Salesforce, and other connected apps. The Azure Information Protection scanner also applies labels to on-premises file shares and SharePoint Server content.

How many sensitivity labels should an enterprise use?

EPC Group recommends starting with 5 top-level labels and 10–15 sub-labels for a standard enterprise. More than 25 total labels typically creates user confusion and reduces adoption.

The goal is a taxonomy that is specific enough to drive meaningful DLP policy decisions without requiring users to choose among too many options. Trainable classifiers and auto-labeling reduce the burden on users to make the right choice manually.

Does Purview Information Protection work with macOS and mobile devices?

Yes. Sensitivity labels apply in Microsoft 365 apps on macOS (Word, Excel, PowerPoint, Outlook) and in Outlook Mobile on iOS and Android.

Built-in labeling in Office apps requires Microsoft 365 Apps for Enterprise (formerly Office 365 ProPlus). The Azure Information Protection unified labeling client extends coverage to File Explorer on Windows for non-Office file types.

Ready to deploy Purview Information Protection for your enterprise? Contact EPC Group for a classification and labeling assessment.

Frequently Asked Questions

What is Microsoft Purview Information Protection?

Microsoft Purview Information Protection (formerly Microsoft Information Protection or MIP) is a suite of tools within the Microsoft 365 compliance ecosystem that helps organizations discover, classify, label, and protect sensitive data across emails, documents, SharePoint sites, Teams messages, and third-party cloud applications. It includes sensitivity labels, auto-labeling policies, data loss prevention (DLP), and encryption — all managed from the Microsoft Purview compliance portal. EPC Group has deployed Purview Information Protection for over 500 enterprise clients.

How do sensitivity labels work in Microsoft Purview?

Sensitivity labels are metadata tags applied to documents, emails, and containers (SharePoint sites, Teams, Microsoft 365 Groups) that define the classification level and enforce protection actions. When a user applies a "Confidential" label, Purview can automatically encrypt the file, add watermarks, restrict copy/paste, prevent forwarding, and control who can access the content. Labels can be applied manually by users, recommended by Purview based on content inspection, or automatically enforced through auto-labeling policies that scan for sensitive data patterns like SSNs, credit card numbers, or HIPAA identifiers.

How long does it take to deploy Microsoft Purview Information Protection?

A phased Purview Information Protection deployment typically takes 12-20 weeks for enterprise organizations. Phase 1 (weeks 1-4) covers planning, taxonomy design, and pilot group deployment. Phase 2 (weeks 5-10) involves auto-labeling policies, DLP rules, and expanded user rollout. Phase 3 (weeks 11-16) includes endpoint DLP, third-party app integration, and compliance validation. Organizations with HIPAA or FedRAMP requirements should add 4-6 weeks for additional audit documentation and validation testing.

What is the difference between sensitivity labels and retention labels?

Sensitivity labels protect data by controlling access and applying encryption — they answer "who can see this data and what can they do with it." Retention labels govern the data lifecycle by defining how long data must be kept and when it should be deleted — they answer "how long must we keep this and when do we dispose of it." Both label types can coexist on the same document. For example, a healthcare record might have a "Highly Confidential - HIPAA" sensitivity label (encrypts, restricts access) and a "Retain 7 Years" retention label (prevents deletion for regulatory compliance).

Can Microsoft Purview protect data in non-Microsoft applications?

Yes. Microsoft Purview extends protection beyond Microsoft 365 through several mechanisms: Microsoft Defender for Cloud Apps applies sensitivity labels to files in Box, Dropbox, Google Workspace, and Salesforce. The Azure Information Protection unified labeling client protects PDFs and non-Office file types. Microsoft Purview Data Map scans and classifies data in Azure SQL, AWS S3, Google Cloud Storage, on-premises SQL Server, and SAP. Endpoint DLP policies protect sensitive data on Windows and macOS devices regardless of the application being used.

What licenses are required for Microsoft Purview Information Protection?

Basic sensitivity labels (manual application) are included in Microsoft 365 E3/A3/G3 and Microsoft 365 Business Premium. Advanced features require Microsoft 365 E5/A5/G5 or the Microsoft 365 E5 Compliance add-on ($12/user/month): automatic labeling, trainable classifiers, exact data match, endpoint DLP, and Defender for Cloud Apps integration. For organizations needing only specific features, standalone add-ons include Microsoft 365 E5 Information Protection & Governance ($10/user/month) and Microsoft 365 E5 Insider Risk Management ($10/user/month).

How does Microsoft Purview support HIPAA compliance?

Microsoft Purview supports HIPAA compliance through multiple layers: sensitivity labels encrypt Protected Health Information (PHI) at rest and in transit, DLP policies prevent unauthorized sharing of patient data via email or Teams, auto-labeling identifies PHI patterns (medical record numbers, diagnosis codes, patient names) and applies protection automatically, and audit logs provide the access trail required by HIPAA Security Rule Section 164.312. EPC Group has implemented HIPAA-compliant Purview configurations for over 100 healthcare organizations.

Ready to get started?

EPC Group has completed over 10,000 implementations across Power BI, Microsoft Fabric, SharePoint, Azure, Microsoft 365, and Copilot. Let's talk about your project.

contact@epcgroup.net(888) 381-9725www.epcgroup.net
Schedule a Free Consultation