Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Data Classification Labels: Integrating with Microsoft Information Protection (MIP)

1 min read
Published March 29, 2020
Last updated July 7, 2023

We’re thrilled to announce the beta release of Data Classification Labels: integrating with Microsoft Information Protection (MIP) to enable users to better track and secure sensitive files across enterprise data stores.

Discover your weak points and strengthen your resilience: Run a Free Ransomware Readiness Test

By integrating with Microsoft Information Protection, customers will be able to automatically apply classification labels and encrypt files that Varonis has identified as sensitive. Users can manually tag documents, and Varonis will ingest this information to provide additional context around the data.

Data Classification Labels utilizes our sophisticated rule capabilities to target specific data, and leverages our extensive pattern repository to build even more labeling rules.

In addition, Varonis can find mislabeled files that contain sensitive data based on our advanced classification engine and re-apply the correct labels. Varonis customers can analyze existing classification results for labeling, intercept existing labels and apply new ones automatically.

Data Classification Labels uses both Azure and AD RMS encryption to protect incoming and outgoing data.

Want to see it in action? Get in touch with your SE and ask for a tour of Data Classification Labels – and test it out on with your own policies.

Benefits Overview:

  • Classify a file based on its MIP label
  • Decrypt and scan the content of MIP encrypted files
  • Automatically apply an MIP label according to the configuration, while skipping any file which was manually labeled
  • Automatically correct (and report on) mislabeled files
  • Automatically perform bulk re-label when a policy is changed
  • Enrich Varonis classification report with classification labels data

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Keep reading
threat-update-56-–-sso-imposter:-targeting-box
Threat Update 56 – SSO Imposter: Targeting Box
In the final part of the series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team walk through how attackers could target Box. They investigate how an attacker…
threat-update-55-–-sso-imposter:-targeting-google
Threat Update 55 – SSO Imposter: Targeting Google
In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can…
threat-update-54-–-sso-imposter:-intrusion
Threat Update 54 – SSO Imposter: Intrusion
Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…
threat-update-53-–-proxyshell-and-petitpotam-and-ransomware…-oh-my!
Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!
Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication…