Most organizations stop at “we have labels now.” They think the job is done. It isn’t.
A clean taxonomy is just a dictionary; it doesn’t stop a single data leak. If you’ve already fixed the 7 common mistakes we covered previously, you have a foundation. But a foundation isn’t a fortress.
If your strategy relies on users making the “right” choice every time (bless them), your data is already at risk. Real security doesn’t come from the labels themselves, it comes from the enforcement, automation, and governance you build on top of them.
Here is the practical roadmap to moving past “Level 1” and actually protecting your data.
1. Enforce the labels you just cleaned up
A clean taxonomy is great, but it’s meaningless if users can ignore it.
This is where many organisations fall into the trap I described in Protect the users against themselves, assuming users will make the right decision when handling sensitive data. They won’t. Not because they’re careless, but because they’re human.
Do this:
- Turn on mandatory labelling across Office apps.
- DO NOT set default labels for documents and emails, defaults create lazy habits and false confidence. Make users choose the label themselves.
- Remove the nightmare option: “Let users decide access”.
- Ensure labels apply consistently across SharePoint, OneDrive, Teams, and endpoints.
Avoid this:
- Allowing unlabeled documents.
- Letting users downgrade labels without justification.
- Publishing labels without enforcement policies.
2. Automate what users shouldn’t decide
Users are not data-classification engineers. They’re busy, distracted, and inconsistent, and that’s normal.
If you want automation to work, you need strong Sensitive Info Types. Weak or noisy SITs will sabotage everything downstream.
For example: if your SIT for “employee ID” fires on every random six‑digit number, your auto‑labeling will be useless — you’ll drown in false positives before you even get started.
Bad signals create bad automation, and once automation breaks, users stop trusting the entire system.
I covered this in Get Copilot ready(-ish) – Sensitive info types, where I explained how SITs form the backbone of auto-labelling and DLP.
Do this:
- Configure auto-labelling for high-risk data.
- Use trainable classifiers for business-specific content.
- Apply sensitivity-based DLP.
- Tie labels to Conditional Access for real protection.
Avoid this:
- Relying on users to spot sensitive data.
- Overusing pop-ups and prompts.
- Creating automation that’s too broad or too aggressive.
3. Build the Governance layer you wish you had earlier
This is where most organisations fall apart, not because they’re careless, but because nobody owns the taxonomy.
Jennifer nailed this in A DIY Purview Journey for Small Admin Teams: Copilot Starts with You: governance isn’t a luxury for big companies, it’s the only way small teams survive.
Do this:
- Assign clear ownership for label changes.
- Document who approves new labels.
- Review labels quarterly.
- Track label usage and mislabelling patterns.
Avoid this:
- Letting labels multiply without control.
- Allowing “temporary” labels that never get removed.
- Treating governance as a one-time project.
4. Fix the user experience before it breaks adoption
Even perfect labels fail if users hate using them.
Oversharing is a human problem, not a technical one, something I explored in Oversharing hangover?.
If users don’t understand why labels matter, they’ll bypass them, ignore them, or misapply them.
Do this:
- Train users on why labels matter.
- Keep the number of labels low.
- Use clear, predictable naming.
- Provide examples of when to use each label.
Avoid this:
- Confusing names like “Confidential – Internal Only – V2”.
- Labels that look identical.
- Making users guess what the organisation wants.
5. Connect labels to the rest of Purview
This is where your investment starts paying off.
Labels are not a standalone feature, they’re the foundation for everything else in Purview. Without them, DLP, Insider Risk, and Records Management are half-blind.
Do this:
- Integrate labels with Insider Risk Management.
- Use labels in eDiscovery.
- Apply labels to Records Management. If you need a refresher on retention, see the post about Retention Policies.
- Extend protection to Endpoint DLP.
- Monitor risky apps via Defender for Cloud Apps.
Avoid this:
- Treating labels as a standalone feature.
- Ignoring downstream systems that rely on classification.
6. Measure What’s Actually Happening
If you don’t measure adoption, you’re guessing, without metrics, you can’t prove progress or spot failures.
Do this:
- Track label usage across workloads.
- Identify overuse of “Internal” or “Confidential”.
- Monitor downgrades and overrides.
- Review where auto-labelling triggers.
Avoid this:
- Assuming users are doing the right thing.
- Ignoring mislabelling patterns.
- Treating metrics as optional.
7. Plan your next maturity level
This is where you stop thinking in checklists and start thinking in maturity levels. It’s not just about whether you’ve “done labels”, it’s about how well they’re actually working. Are they enforced? Automated? Integrated with the rest of your security stack? Are you measuring what’s happening and improving over time? This model gives you a brutally honest way to assess where you are today and what’s left to do.
Spoiler: most organisations are stuck at Level 1 or 2, proudly waving their taxonomy around while their data leaks out the back door. Don’t be that org.
To make this real, here’s what the journey actually looks like in practice.
| Level | Name | What It Means |
|---|---|---|
| 🔥 – 0 | No Labels | No classification, no protection. Real danger |
| ⚠️ – 1 | Labels Exist | Taxonomy created, but optional. False security. |
| 🛠️ – 2 | Labels Enforced | Mandatory labelling and default labels in place. |
| ⚙️ – 3 | Labels Automated | Auto-labelling and classifiers in use. Scalling up. |
| 🛡️ – 4 | Labels Integrated | DLP, Conditional Access, Insider Risk, Endpoint. Hardened. |
| 🏰 – 5 | Continuous Governance | Metrics, reviews, lifecycle management, and maturity tracking. |

Once you know your level, the path forward becomes obvious — and the gaps you need to close become impossible to ignore.
The real work starts after labels
Sensitivity labels aren’t the finish line, they’re the starting point. Once your taxonomy is clean, the real value comes from enforcement, automation, governance, integration, and measurement. That’s where organisations move from “we have labels” to “we actually protect our data.”
Labels alone don’t protect anything, it’s everything you build around them that keeps your data safe. The organisations that win are the ones that treat labels as the beginning of their security story, not the end.
Discover more from Agder in the cloud
Subscribe to get the latest posts sent to your email.

