Most organisations think sensitivity labels are “sorted” the moment they switch them on. The reality is very different. Behind the scenes, mislabelled data, broken policies, and confusing choices undermine security every single day, and most teams don’t realise it until something leaks, breaks, or blocks collaboration at the worst possible moment. If you’re relying on Purview sensitivity labels today, you might be far less protected than you think.
Sensitivity labels should be one of the easiest “wins” in Microsoft Purview. They promise control, visibility, and protection, all without disrupting the user’s flow.
But in practice? Labels often end up confusing, inconsistent, or ignored entirely. Across hundreds of organizations, the same patterns keep surfacing. Management doesn’t fully grasp their data risks, labels exist in name only (no enforcement), and users face a messy UI of overlapping options with zero guidance.
The result? No real data protection. Just a checkbox for an ISO certification and a document describing how things should work, not how they actually do.
If you’re rolling out Purview sensitivity labels or cleaning up a “legacy” mess, here are the seven mistakes you must avoid.
1. Treating labels like a compliance checkbox
Many organizations deploy labels because “we need to be compliant,” not because they have an operational goal. The result is labels that look great on an auditor’s spreadsheet but don’t actually stop a single data leak.
The Fix: Start with Risk, not Regulation. Ask: “What data, if leaked, would bankrupt us or ruin our reputation?” Build your labels around protecting that data, not around legal jargon.
2. Creating too many labels (the “label explosion”)
If users need a PhD to choose the right label, they’ll pick the wrong one—or just pick the first one on the list. I’ve seen tenants with:
- 20+ labels in a single policy.
- Labels that differ only by a hyphen or a period.
- Five different versions of “Confidential.”
The Fix: Keep it simple. Stick to a “Top 4” hierarchy:
- Public (External-facing)
- General/Internal (Standard business)
- Confidential (Restricted)
- Highly Confidential (Encryption/Strict ACLs)
Add sub-labels only when absolutely necessary (e.g., HR-only)..

⚠️ And for everything that is holy: DON’T set a default label.
Because the moment you do, users stop thinking. A default label becomes a autopilot, documents get classified without intent, content owners assume “the system handled it,” and suddenly your entire data estate is wearing the wrong label. Default labels don’t create security; they create false confidence, and that’s far more dangerous.
3. Forgetting about label descriptions
Admins spend hours designing the perfect taxonomy and then forget to tell the users what the labels actually mean. A label without a clear description is just a guessing game for the end-user.
The Fix: Use short, human-centric descriptions in the “Tooltip” field:
- “Use this for documents containing customer PII.”
- “Internal only; do not share with partners or guests.”
Rule of thumb: If your description is longer than two sentences, it’s too long.
4. Auto labelling rules that fail
Auto-labelling is powerful, but many orgs “set it and forget it.” Without validation, you end up with rules that are too broad (labelling everything) or too strict (labelling nothing).
The Fix: Don’t leave policies in “Simulation Mode” forever.
- Test with real-world documents.
- Review the Activity Explorer weekly.
- Treat auto-labelling as a living policy that requires tuning as your data evolves.
5. Not aligning labels with DLP
Labels and Data Loss Prevention (DLP) should be best friends. A common mistake is having a “Highly Confidential” label that doesn’t trigger a DLP action, or a DLP policy that blocks content the label explicitly allows.
The Fix: Map your labels to specific DLP actions. If a file is labelled Highly Confidential, the DLP policy should automatically block it from being attached to a personal Gmail or uploaded to a public Dropbox. If labels and DLP disagree, users will find workarounds.
6. Ignoring external collaboration
This is the big one. Organizations often set a default label to “Internal” and then wonder why their Teams meetings, SharePoint sharing, and guest access suddenly break for their partners.
The Fix: Decide your “External Strategy” upfront:
- What can be shared externally?
- Which labels should trigger encryption that blocks guests?
- Test with real guest accounts, not just your IT colleagues pretending to be guests.
7. No ownership or lifecycle management
Labels are not “set and forget.” Yet many organizations treat them that way.
Symptoms:
- Old labels no one uses
- New labels added without governance
- No one reviewing label usage
- No one responsible for cleanup
Fix: Assign ownership:
- No default label > Users takes ownership of their data
- Security owns the taxonomy
- IT owns the configuration
- Compliance owns the rules
- Someone owns the cleanup
Review labels quarterly. Remove what’s not used.

“Let users decide access” is the fastest way to destroy your entire labeling strategy.
⚠️ The “Let users decide access” Nightmare
“Let users decide access” isn’t a feature, it’s a governance time bomb.
The moment you enable it, every employee gets the power to override your entire classification model with a single click. And they do, often without understanding the risk or the long‑term consequences.
The worst part?
When that user leaves the organisation, you inherit a mess.
Suddenly you’re stuck with documents where access was manually granted to random individuals, external guests, or entire groups, and there’s no central record of why they were added, whether they still need access, or whether the decision even made sense in the first place. IT ends up reverse‑engineering permissions on sensitive files because one person, years ago, clicked “Sure, why not.”
This option doesn’t just weaken your labeling strategy, it breaks it.
If you care about data protection, “Let users decide access” shouldn’t be avoided.
It should be banned from every tenant.
The bottom line
Sensitivity labels are one of the most powerful features in Microsoft Purview. When done right, they make compliance feel natural. When done wrong, they frustrate users and provide a false sense of security.
Start small. Keep it simple. Test everything.
Discover more from Agder in the cloud
Subscribe to get the latest posts sent to your email.

