Applying Microsoft Sensitivity Labels

Summary

Article explains how to apply Microsoft Sensitivity Labels to documents in both the desktop and browser versions of Microsoft software.

Body

Overview

Article explains how to apply Microsoft Sensitivity Labels to documents in both the desktop and browser versions of Microsoft software.

Instructions

You can apply and change Microsoft Sensitivity Labels in different ways. When opening files from both desktop and browser versions of Microsoft software, you can see a dropdown menu from the ribbon named “Sensitivity”. From here you can select the various sensitivity labels. Hovering on the name of the labels will give a description of the label, or you can click on the “Learn More” link to be directed to a Knowledgebase article that will give you more detailed information about the Sensitivity Labels.

Sensitivity menu drop down      senstivity menu dropdown, restricted data selected 

You may also see what label has been applied to the file near the top of the browser app or desktop application. You can also click on this shield to view a description of the Sensitivity Label or change it.

Image of tool bar with shield selected

Home tab highlighted

Home tab highlighted

Still need help?  Click the 'Purdue IT Request' button to start a ticket.

Details

Details

Article ID: 1649
Created
Tue 6/3/25 3:28 PM
Modified
Thu 7/10/25 10:52 AM

Related Articles

Related Articles (5)

Instructions to encrypt an email using either Outlook desktop or Web client.
Article explains the differences bewteween the "Sensitive Data - Purdue Only" and the "Restricted Data - Purdue Only" sensitivity labels.
Microsoft Sensitivity Labels are labels that should be applied to files and emails where sensitive or restricted data is involved. This article will explain the usage of these sensitivity labels.
SharePoint Restricted Data Storage is the designated location for the storage of restricted data within the Purdue Multi-Campus Production Microsoft 365 tenant.
When managing access to data within Purdue's systems, understanding the nuances of sharing permissions is essential to maintaining security and compliance.

Related Services / Offerings

Related Services / Offerings (2)

Taking action to personally ensure computer security helps protect everyone from data and identity theft, viruses, hackers, and other threats. Every member of the Purdue community who uses a computing device can make Purdue’s computing environment more secure.
Secure Computing Request