top of page

People-First Purview (Strategy): Labeling

  • Writer: E.C. Scherer
    E.C. Scherer
  • Dec 28, 2025
  • 5 min read

Updated: Jan 13

Make It Work or Know How to Pivot


I’m going to start with the uncomfortable part.


If users are complaining that they have to apply a sensitivity label before they can even save a file, the problem isn’t resistance. It’s the design isn't thinking about "people-first."


That complaint usually means one of three things happened:

  • auto-labeling wasn’t trusted, so it wasn’t deployed

  • labeling was turned on because “best practice” said it should be

  • or no one tested this with people who don’t live in security tools all day


None of those are user failures. They’re implementation decisions.


Why users skip labels (and why that matters)

Users don’t skip labels because they’re careless. They skip labels because they’re under pressure.


They need to send the invoice. They need to get paid. They need to onboard someone now. They’re five minutes from a deadline and something is blocking “Save.”


When security adds friction at that moment, users don’t slow down and reflect. They route around it.


The idea that labeling becomes “muscle memory” only applies to security teams. For everyone else, it becomes a recurring annoyance they adapt to, not a habit they embrace.

That’s the reality you have to design for.


What sensitivity labels are actually for

Sensitivity labels are not a test users pass.


They’re metadata. Metadata should be inferred.


The system should do the first round of thinking. Humans should confirm or adjust when it matters.


“Yes, this is Highly Confidential / Internal Only.”

“No, this is Highly Confidential / External.”


That interaction is reasonable. Asking users to classify data from scratch every time is not.


K.I.S.S. (keep it simple, silly)

Data created → Auto-label kicks in → User confirms or adjusts → DLP responds based on label

Why this series starts with people-first labeling

Labeling comes first because labeling is how you learn what data actually matters to your organization.


Not every full name is HIPAA.

Not every SSN is data your org is responsible for.


If that were true, none of us could email ourselves a W-2.


Labels give you discovery with context:

  • what data is sensitive to you

  • where it lives

  • who works with it

  • how it moves


Without that foundation, everything else is guesswork.


The most common labeling mistake I see

Labels that:

  • don’t align to the data classification policy

  • aren’t backed by auto-labeling or recommendations

  • rely entirely on users doing the right thing


That isn’t a people-first strategy. That’s hope.


If the system isn’t doing any of the work, the program won’t scale.


Labels should enable work, not block it

Before I design labels, I ask departments how data actually moves.


Not how policy says it should. How it really does.


Short and Sweet

Build off this

Question

Answer

What sensitive data do you send externally?


Who do you send it to?


What breaks if this is blocked?


Are there deadlines that make delays unacceptable?


Is monitoring first acceptable before enforcement?


The Full Questionnaire

...or copy off my test

Question Area

Question

Why We Ask This

Data Types

What types of sensitive data does your team create or handle? (Invoices, contracts, HR records, financial data, student data, etc.)

Helps determine which sensitivity labels and detections actually apply

External Sharing

Does your team send sensitive data outside the organization?

Identifies workflows that must be enabled, not blocked

Recipients

Who do you send this data to? (Vendors, customers, partners, regulators)

Informs domain allowlists and label-based DLP exceptions

Frequency

How often does this sharing occur? (Daily, weekly, monthly, ad hoc)

Helps assess risk and prioritize enforcement vs monitoring

Time Sensitivity

Are there deadlines where delays would impact operations or revenue?

Highlights where friction will cause workarounds

Tools Used

Where does this data live and move? (Email, SharePoint, OneDrive, Teams, third-party apps)

Ensures policies are scoped to the right locations

What Breaks

What would stop working if this data could not be shared externally?

Identifies business-critical exceptions

Current Workarounds

Are there any existing workarounds when security controls block work?

Early warning sign of trust erosion

Approved Destinations

Are there known external domains or partners that should always be allowed?

Enables label-based and domain-scoped DLP rules

Audit vs Enforcement

Would monitoring first be acceptable before enforcing restrictions?

Sets expectations for phased rollout

Escalation Path

Who should security contact if a workflow is blocked incorrectly?

Reduces frustration and ticket churn

Success Criteria

What does “this is working” look like for your team?

Aligns security metrics with business reality


This step changes policies more than any compliance requirement ever has.

Because now you’re designing controls around real workflows, not assumptions.


When labeling gets rejected or watered down

Sometimes leadership says no. Sometimes labels are optional. Sometimes they exist only to satisfy an audit.


When that happens, I don’t pretend labeling is working. I pivot.


If labeling is too much friction, then we need:

  • managed devices

  • endpoint DLP

  • DLP in alert or monitor mode


Not because it’s ideal, but because visibility matters.


I would rather prevent issues. But if prevention is off the table, I at least want to see where data is going so we can respond early and intelligently.


A program with no safety net isn’t bold. It’s fragile.


Imperial moth (Eacles imperialis) resting calmly on pavement during a quiet pause
Mandatory brain break:  An Imperial Moth, (Eacles imperialis). Large, calm, and completely uninterested in your labeling policy.

Auto-labeling: audit first, always

Auto-labeling should start in audit mode. Everywhere.


Every organization is surprised by what they find:

  • sensitive data in places they forgot about

  • systems that need exceptions

  • teams handling high-risk data they never scoped


From there, you pilot intentionally. Legal. HR. Finance. Sales. Teams that handle sensitive data and still need to collaborate externally.


The goal isn't perfection. It's understanding.


Labels as controlled exceptions

Here’s where labeling starts to earn trust.


Some teams have to send sensitive data externally. That shouldn’t be a fight. It should be designed.


This label allows Finance to send invoices externally. This label bypasses a DLP rule by design. This label restricts sharing to specific domains.


If you haven’t mapped those workflows, you don’t have a data security program. You have a theory.


How you know you’ve gone too far

If labels don’t match:

  • the classification policy

  • the training language

  • what a normal person can understand


Users don’t just complain. They stop reporting issues. They start working around the tools. They stop trusting the program.


At that point, more enforcement makes things worse, not better.


What I tell security leaders to measure instead

Stop asking whether users are manually labeling “correctly.”


Start asking whether labels are:

  • auto-applied

  • auto-recommended

  • present before users have to think about them


Turn on auto-labeling in simulation for the data you actually care about. Map labels to DLP policies that support real workflows.


Finance sending credit card numbers to approved vendors because the data is labeled correctly isn’t a failure.


It’s the control working as intended.


The takeaway

People-first labeling doesn’t lower standards.


It makes them survivable.


It shifts responsibility away from individual users and onto systems that can actually carry it.


Next in this series: People-First DLP, where we take what labeling teaches us and apply it using Microsoft Purview as a guardrail, not a brick wall.

Comments


©2026 by E.C. Scherer

bottom of page