Deployment Guides

Step-by-step deployment for the full Microsoft 365 security stack

live data
0

Product guides

MDE · MDO · MDI · Intune · more

0

Checklist steps

Interactive progress tracking

0

Pitfalls documented

With fixes for each

0

Validation checks

Post-deployment testing

All deployment guides

Pillar guide · Data Security

Data Security

Deployment Best Practices

Business Premium + Purview Suite Updated 2026-04-08

Overview

Establish foundational protection with Business Premium by creating sensitivity labels, setting defaults, applying basic DLP policies, and enabling audit logging — typically achievable within 1-2 weeks. Expand protection to endpoints and automate classification with Purview Suite. The guide follows a Good → Better → Best progression across three priority levels.

Audience: IT administrators in SMBs with less than 300 employees, and managed service providers deploying security baselines

Deployment phases

1

Baseline visibility & readiness

Activities

Enable audit logging and baseline data discovery

Role

Global Administrator (or Compliance Administrator if audit already enabled)

Purpose

Establishes visibility into user and admin activity before enforcement

2

Policy enforcement (DLP & retention)

Activities

Deploy DLP policies (Exchange, SharePoint, OneDrive, Teams, Endpoint); configure retention policies

Role

Compliance Administrator (Compliance Data Administrator for retention)

Purpose

Prevents data leakage and enforces governance requirements

3

Automation & scale

Activities

Configure client-side and service-side auto-labeling; create custom SITs (optional)

Role

Compliance Administrator

Purpose

Reduces reliance on users and scales protection automatically

4

Advanced risk-based protection

Activities

Enable DSPM

Role

Compliance Administrator + Insider Risk Admin + Conditional Access Administrator

Purpose

Identifies risky behavior and dynamically increases protection

Recommended label taxonomy

Starting-point Purview sensitivity labels. Tune auto-labeling, permissions, and DLP limits to match the client’s data classification policy.

Public

Unrestricted data meant for public consumption

Manual labeling
ScopeFile, Email
External / GuestAllowed

General

Business data not meant for public consumption

Manual labeling
ScopeFile, Email, Meetings, Sites
External / GuestAllowed
DLP limitsBlock anyone
Default forEmail

Confidential / All Employees

Sensitive business data, limited distribution

Auto labeling
ScopeFile, Email, Meetings, Sites
External / GuestNot allowed
PermissionsFTE
DLP limitsBlock anyone, Block external
Default forDocuments, Sites

Confidential / Specific People

Sensitive data shared with named recipients

Manual labeling
ScopeFile, Email, Meetings, Sites
External / GuestAllowed (with SAM)
PermissionsUser specified
DLP limitsBlock anyone

Confidential / Internal Exception

Allows users to lower severity and share externally — leverage DLP/IRM to manage deviations

Manual labeling
ScopeFile, Email, Meetings, Sites
External / GuestNot allowed
DLP limitsBlock anyone, Block external

Highly Confidential / All Employees

Most critical data, auto-labeling defines what constitutes highly confidential

Optional labeling
ScopeFile, Email, Meetings, Sites
External / GuestNot allowed
PermissionsFTE
DLP limitsBlock anyone, Block external

Highly Confidential / Specific People

DLP for Copilot label candidate — auto-labeled by SIT

Auto labeling
ScopeFile, Email, Meetings, Sites
External / GuestNot allowed
PermissionsUser specified
DLP limitsBlock anyone, Block external

Highly Confidential / Internal Exception

DLP for Copilot label candidate

Manual labeling
ScopeFile, Email, Meetings, Sites
External / GuestNot allowed
DLP limitsBlock anyone, Block external

References & Microsoft Learn

Enable unified audit log

Label creation, publishing, and priority

Classic to Modern label scheme migration

Container labels for Teams, Groups, SharePoint sites

DLP policy design guidance

DLP policy creation for all workloads

Copilot-specific DLP policies

Data lifecycle management

Retention policy configuration

Client-side and service-side auto-labeling

Data Security Posture Management deployment

Role requirements for Purview portal

Partner data security resources