Domain 1
Label taxonomy
The single biggest reason label rollouts fail is taxonomy: too many labels, labels named in legal language, or labels that staff cannot tell apart at a glance. A working taxonomy has 4–6 labels, plain-English names, clear examples, and is grounded in the organisation's actual data classes (HR, finance, legal, customer, regulatory).
Domain 2
Policy scope & coverage
Labels that are only deployed to a subset of users mean unlabelled content keeps being created. The control needs scope across all knowledge workers, all relevant services (Word, Excel, PowerPoint, Outlook, Teams, SharePoint, OneDrive), and consistent default labels per scope.
Domain 3
Auto-labelling & client-side classification
Manual labelling alone fails for the ~80 percent of content that is already in the tenant before labels rolled out. Auto-labelling against sensitive information types (TFNs, Medicare numbers, credit card numbers, BSB/account numbers, AU passport numbers) catches the back catalogue. Client-side recommended labels prompt staff at point of save without forcing them.
Domain 4
Container labels (sites, teams, groups)
Container labels enforce the privacy and external-sharing boundary at the workspace level, not just the file. They are a critical control because file-level labels fail when files are bulk-copied between containers. Container labels also drive default file-level labels on content created inside them.
Domain 5
Copilot enablement & monitoring
For Copilot-safe tenants, labels need to drive Copilot behaviour: DLP rules that exclude Highly Confidential content from Copilot grounding, monitoring of which Copilot prompts touch labelled content, and a feedback loop that surfaces oversharing risk discovered through Copilot use.