Skip to content

Commit 96c8c16

Browse files
Englishredirect4
1 parent 17fb0a4 commit 96c8c16

4 files changed

+16
-605
lines changed
Lines changed: 4 additions & 105 deletions
Original file line numberDiff line numberDiff line change
@@ -1,105 +1,4 @@
1-
---
2-
layout: page
3-
title: 'Audit sensitivity labels with Powershell'
4-
hero_image: '/img/IMG_20220521_140146.jpg'
5-
show_sidebar: false
6-
hero_height: is-small
7-
date: '2022-08-17'
8-
---
9-
10-
11-
## Sensitivity labels
12-
13-
Sensitivity labels are part of Microsoft Information Protection solution. Sensitivity labels classify and protect your organization's data, by applying appropriate permissions and restrictions on the classified content. As opposed to retention labels, which are published to locations such as all Exchange mailboxes, sensitivity labels are published to users or groups. That means that everywhere where the labels are supported, your users will be able to use them. Apps that support sensitivity labels will display them to the users and groups they were published to.
14-
The sensitivity labels will show as already applied labels, if they are being applied automatically; or as labels that can be applied, if the Compliance Administrator decided that they can be applied by users.
15-
16-
17-
18-
## Prerequisites
19-
20-
Install Exchange Online module and Connect to Security & Compliance Center PowerShell.
21-
```powershell
22-
Install-Module -Name ExchangeOnlineManagement -RequiredVersion 2.0.5
23-
Connect-IPPSSession -UserPrincipalName [email protected]
24-
```
25-
26-
## Verify existing labels
27-
Use **Get-Label** cmdlet to see the available labels in your environment, their scopes and priorities.
28-
29-
```powershell
30-
Get-Label
31-
```
32-
<img src="/articles/images/sens30.PNG" width="400">
33-
34-
35-
36-
## Get All Details on a Label
37-
38-
```powershell
39-
Get-Label -Identity keyword-label | fl
40-
```
41-
<img src="/articles/images/sens31.PNG" width="400">
42-
43-
44-
## Get All Label Actions
45-
If you use **-IncludeDetailedLabelActions** parameter, you will see the particular actions assigned to each label.
46-
<br/>
47-
<img src="/articles/images/sens32.PNG" width="400">
48-
49-
## Which Label Causes Trouble
50-
If you are unsure which label is applying specific policy, you can check which labels perform which actions.
51-
52-
```powershell
53-
Get-Label -IncludeDetailedLabelActions $true | select Applywatermarkingtext, displayname
54-
```
55-
<img src="/articles/images/sens34.PNG" width="400">
56-
57-
58-
```powershell
59-
Get-Label -IncludeDetailedLabelActions $true | select EncryptionEnabled, displayname
60-
```
61-
<img src="/articles/images/sens35.PNG" width="400">
62-
63-
## Find auto-labeling labels
64-
Each label has a property called "capabilities". Using it, you can discover which labels are automatically applied to the content.
65-
66-
```powershell
67-
Get-Label | select Capabilities, DisplayName
68-
```
69-
70-
## Audit Matrix for Label Actions
71-
Audit matrix allows you to see the entire overview of labels, their actions, capabilities and settings at a given point of time. It is a simple Excel file, but may be useful if your organization needs to store the settings for compliance reasons.
72-
73-
<img src="/articles/images/sens36.PNG" width="400">
74-
75-
<img src="/articles/images/sens37.PNG" width="400">
76-
77-
78-
## See Also
79-
[M365 Information protection: Understanding Sensitivity labels vs sensitive information types](https://social.technet.microsoft.com/wiki/contents/articles/54457.m365-information-protection-understanding-sensitivity-labels-vs-sensitive-information-types.aspx)
80-
81-
[Sensitivity labels: Enable labels for groups and sites](https://social.technet.microsoft.com/wiki/contents/articles/54499.sensitivity-labels-enable-labels-for-groups-and-sites.aspx)
82-
83-
84-
<!-- Default Statcounter code for Audit sensitivity labels
85-
with PS
86-
https://powershellscripts.github.io/articles/en/InformationProtection/Audit%20your%20sensitivit
87-
-->
88-
<script type="text/javascript">
89-
var sc_project=12764960;
90-
var sc_invisible=1;
91-
var sc_security="9671f253";
92-
</script>
93-
<script type="text/javascript"
94-
src="https://www.statcounter.com/counter/counter.js"
95-
async></script>
96-
<noscript><div class="statcounter"><a title="Web Analytics"
97-
href="https://statcounter.com/" target="_blank"><img
98-
class="statcounter"
99-
src="https://c.statcounter.com/12764960/0/9671f253/1/"
100-
alt="Web Analytics"
101-
referrerPolicy="no-referrer-when-downgrade"></a></div></noscript>
102-
<!-- End of Statcounter Code -->
103-
104-
105-
1+
<meta charset="utf-8">
2+
<title>Redirecting</title>
3+
<meta http-equiv="refresh" content="0; URL=https://powershellscripts.github.io/articles/en/InformationProtection/Audit%20your%20sensitivity%20labels%20with%20Powershell/">
4+
<link rel="canonical" href="https://powershellscripts.github.io/articles/en/InformationProtection/Audit%20your%20sensitivity%20labels%20with%20Powershell/">
Lines changed: 4 additions & 113 deletions
Original file line numberDiff line numberDiff line change
@@ -1,113 +1,4 @@
1-
---
2-
layout: page
3-
title: 'Site classification with PnP'
4-
menubar: docs_menu
5-
image: 'https://unsplash.com/s/photos/random'
6-
hero_image: '/img/IMG_20220521_140146.jpg'
7-
show_sidebar: false
8-
hero_height: is-small
9-
date: '2022-05-16'
10-
---
11-
12-
## First: Enable the capability
13-
Site classification has to be enabled at the Azure AD level.
14-
After enabling the site classification capability at the Azure AD level, you see an additional field *How sensitive is your data?* while creating new sites. Site classification allows you to define the sensitivity of your data on site level and group your sites based on the sensitivity of the information they contain.
15-
16-
You can enable the capability using [**Enable-PnPSiteClassification**](https://pnp.github.io/powershell/cmdlets/Enable-PnPSiteClassification.html) cmdlet.
17-
18-
If you are interested in more details, you can find them in a more dev-oriented [Implement Sharepoint site classification solution Guidance](https://docs.microsoft.com/en-us/sharepoint/dev/solution-guidance/implement-a-sharepoint-site-classification-solution) from Microsoft.
19-
20-
If you are getting any errors at this point, you may want to resort to AzureADPreview Powershell module and check your AD settings for any existing templates, using [**Get-AzureADDirectorySetting**](https://docs.microsoft.com/en-us/powershell/module/azuread/get-azureaddirectorysetting?view=azureadps-2.0-preview) cmdlet.
21-
22-
### Troubleshoot with AzureADPreview module
23-
```
24-
# Install the Azure AD Preview Module for PowerShell
25-
Install-Module AzureADPreview
26-
27-
# Connect to Azure AD
28-
Connect-AzureAD
29-
30-
# Get existing settings
31-
Get-AzureADDirectorySetting
32-
```
33-
34-
<img src="/articles/images/classification8.PNG" width="400">
35-
36-
37-
If you see any existing settings like in the screenshot above, probably someone else in your organization already set them.
38-
39-
40-
## Verify the existing site classification
41-
42-
### Using PnP
43-
Use **Get-PnPSiteClassification** cmdlet to retrieve the existing site classification settings. As a result, you receive the values of UsageGuidelinesUrl, Classifications, and DefaultClassification. DefaultClassification value has to be also in the list of values you see under Classifications.
44-
45-
```
46-
Get-PnPSiteClassification
47-
```
48-
<img src="/articles/images/classification3.PNG" width="400">
49-
50-
51-
### Using AzureADPreview
52-
Use [**Get-AzureADDirectorySetting**](https://docs.microsoft.com/en-us/powershell/module/azuread/get-azureaddirectorysetting?view=azureadps-2.0-preview) cmdlet to retrieve the existing site classification settings. As a result, you receive the values of UsageGuidelinesUrl, Classifications, and DefaultClassification.
53-
54-
55-
56-
### Results
57-
In the User Interface you can see these values when you create a new site:
58-
59-
<img src="/articles/images/classification2.PNG" width="400">
60-
61-
62-
63-
64-
## Update Site Classification
65-
Use **Update-PnPSiteClassification** cmdlet to set the available classifications or usage guidelines url.
66-
67-
### Update Site classification options
68-
```
69-
Update-PnPSiteClassification -Classifications "HBI", "CRI", "LBI"
70-
```
71-
<img src="/articles/images/classification4.PNG" width="400">
72-
73-
74-
### Update usage guidelines url
75-
```
76-
Update-PnPSiteClassification -UsageGuidelinesUrl "https://powershellscripts.github.io/"
77-
```
78-
<img src="/articles/images/classification6.PNG" width="400">
79-
80-
81-
82-
# See Also
83-
84-
Another solution for classifying your sites - sensitivity labels,
85-
offering a more holistic approach on entire tenant scale, including also e.g. Exchange Online <br/>
86-
[Protecting your information: the power of labels](https://social.technet.microsoft.com/wiki/contents/articles/54468.protecting-your-information-the-power-of-labels.aspx) <br/>
87-
[Sensitivity labels: Powershell your way around](https://social.technet.microsoft.com/wiki/contents/articles/54497.sensitivity-labels-powershell-your-way-around.aspx) <br/>
88-
[Audit your sensitivity labels with Powershell](https://powershellscripts.github.io/articles/en/InformationProtection/Audit%20your%20sensitivity%20labels%20with%20Powershell/)<br/>
89-
<br/>
90-
91-
Absolutely necessary one-time step to enable sensitivity labels on site level:<br/>
92-
[Sensitivity labels: Enable labels for groups and sites](https://social.technet.microsoft.com/wiki/contents/articles/54499.sensitivity-labels-enable-labels-for-groups-and-sites.aspx)
93-
94-
95-
<!-- Default Statcounter code for Site classification with
96-
PnP
97-
https://powershellscripts.github.io/articles/en/InformationProtection/Your%20SharePoint%20Onlin
98-
-->
99-
<script type="text/javascript">
100-
var sc_project=12941097;
101-
var sc_invisible=1;
102-
var sc_security="a9c90e89";
103-
</script>
104-
<script type="text/javascript"
105-
src="https://www.statcounter.com/counter/counter.js"
106-
async></script>
107-
<noscript><div class="statcounter"><a title="Web Analytics
108-
Made Easy - Statcounter" href="https://statcounter.com/"
109-
target="_blank"><img class="statcounter"
110-
src="https://c.statcounter.com/12941097/0/a9c90e89/1/"
111-
alt="Web Analytics Made Easy - Statcounter"
112-
referrerPolicy="no-referrer-when-downgrade"></a></div></noscript>
113-
<!-- End of Statcounter Code -->
1+
<meta charset="utf-8">
2+
<title>Redirecting</title>
3+
<meta http-equiv="refresh" content="0; URL=https://powershellscripts.github.io/articles/en/InformationProtection/Your%20SharePoint%20Online%20site%20classification%20with%20PnP/">
4+
<link rel="canonical" href="https://powershellscripts.github.io/articles/en/InformationProtection/Your%20SharePoint%20Online%20site%20classification%20with%20PnP/">

0 commit comments

Comments
 (0)