Julian Kusenberg IT Beratung

Microsoft Purview · Compliance · AI Governance

Microsoft Purview · Compliance · Data Security

SharePoint IRM Is Not Purview Encryption

·

Your file is in SharePoint. So it is protected. Right? Wrong. And this one assumption quietly breaks more Microsoft Purview projects than almost anything else. The confusion goes back to a real Microsoft technology:…

Your file is in SharePoint. So it is protected. Right?

Wrong. And this one assumption quietly breaks more Microsoft Purview projects than almost anything else.

The confusion goes back to a real Microsoft technology: classic SharePoint IRM. It built a mental model that still circulates in architecture discussions, customer workshops, and project kickoffs today. If your data protection strategy is built on that model, you are making decisions about encryption, external sharing, DLP, eDiscovery, and Copilot readiness based on something that no longer reflects how Microsoft Purview actually works.

The Myth That Keeps Coming Back

Someone remembers that protected files uploaded to SharePoint were decrypted, then governed by SharePoint permissions. From there, the conclusion is usually simple:

„Once the file is in SharePoint, SharePoint permissions take over.“

That statement is not completely random. It comes from a real Microsoft technology history. But it is the wrong mental model for modern Microsoft Purview Information Protection.

The Old World: SharePoint IRM

Classic SharePoint Information Rights Management was designed around lists and libraries. The protection was attached to the SharePoint location. A library could be configured with IRM settings, and when a user accessed or downloaded a document, SharePoint applied protection before the file left the SharePoint boundary.

Microsoft’s own migration documentation makes this explicit: with IRM-enabled lists, files are stored in SharePoint in an unencrypted format. When a user accesses a file in an IRM-protected list, the file is protected before transit.

🏛️

Classic SharePoint IRM — the mental model

SharePoint was the control point. The library was protected. The document became protected when it left that library through a supported access path. That made sense for its time. But it created a mental shortcut that is still repeated today.

The Modern World: Sensitivity Labels with Encryption

Microsoft Purview Sensitivity Labels are not a SharePoint library setting. A sensitivity label can classify content, mark content, and apply encryption. When encryption is configured for documents, emails, or meeting invites, it uses Azure Rights Management from Microsoft Purview Information Protection.

That changes the model completely. The protection is no longer only tied to the place where the file currently lives. It is tied to the content itself.

SharePoint Permission

„Who can reach this file in this location?“

Sensitivity Label with Encryption

„Who is allowed to open and use this protected content, wherever it goes?“

Those two questions are related, but they are not the same question.

Location-Based vs. Content-Based Protection

This distinction matters because SharePoint permissions and Purview encryption solve different problems.

SharePoint permissions protect access to a location. They decide who can access a site, library, folder, or item. If a user does not have access to the SharePoint location, they cannot retrieve the file from that location.

Purview encryption protects access to the content. If a user somehow receives a protected document outside of SharePoint, the file still carries its protection. The client evaluates whether the user is allowed to open it and what they are permitted to do with it.

SharePoint controls access to the location.
Purview controls access to the protected content.

You need both layers — but you should not confuse them.

What Actually Happens When Encrypted Files Are Stored in SharePoint?

Modern SharePoint and OneDrive can work with sensitivity labels — but the tenant capability must be explicitly enabled. When sensitivity labels for files in SharePoint and OneDrive are enabled, users can apply labels in Office for the web, see label names in library columns, and SharePoint can process the contents of encrypted Office files and optionally PDFs.

When users download or access these files, the sensitivity label and any encryption settings remain with the file — wherever it is stored. The permissions assigned with the encryption are enforced as well.

❌ Outdated Model

„Upload to SharePoint and SharePoint strips the protection.“

✅ Modern Reality

„SharePoint recognizes and processes the protected file — while the label and encryption remain with the file.“

Why This Matters for Real Projects

This is not a technical detail. It changes how organizations should design their Microsoft Purview Information Protection architecture.

If your protection model is only based on SharePoint locations, your main question becomes: „Which site should contain this data?“ That question still matters. But it is not enough.

Modern collaboration does not stop at the SharePoint site boundary. Files are synced, downloaded, attached to emails, shared externally, copied into Teams chats, included in eDiscovery matters, evaluated by DLP policies, and surfaced in Microsoft 365 Copilot experiences.

So the better question is:

„What should happen to this content when it moves?“

A document labeled Highly Confidential should not lose its meaning because someone moved it from one library to another. It should not become less sensitive because it was downloaded. It should not depend entirely on the current storage location to remain protected.

The Governance Mistake: Treating Labels Like Prettier SharePoint Permissions

One mistake I often see is that organizations treat sensitivity labels as if they were just another layer of SharePoint permissions. They are not.

A label should represent the sensitivity and handling requirements of the content. It answers questions such as:

  • What type of information is this?
  • Who is allowed to access it?
  • Can it be shared externally?
  • Should it be encrypted, and with what usage rights?
  • Should DLP react differently?
  • Should eDiscovery or audit teams be able to filter based on this classification?
  • Should Copilot and agents treat this content with additional care?

Sensitivity labels are not only about preventing access. They are a governance signal that can be used across workloads and policy layers — encryption, visual markings, container protection, auto-labeling, eDiscovery, DLP, Microsoft 365 Copilot scenarios, Power BI, Microsoft Fabric, and integrations through the Microsoft Information Protection SDK.

That is much bigger than SharePoint.

The Important Caveat: Do Not Ignore Limitations

This does not mean every scenario is magically solved. There are real limitations and design decisions to account for.

⚠️ Known Limitations

  • SharePoint and OneDrive behavior differs when encryption uses HYOK or Double Key Encryption — coauthoring, eDiscovery, DLP, and search may not work the same way.
  • Existing files may need to be downloaded and re-uploaded before they benefit from newer SharePoint and OneDrive sensitivity label capabilities.
  • Limitations apply for certain encrypted files, password-protected documents, expiration-based encryption configurations, and mixed scenarios where classic IRM and sensitivity labels are used together.
  • Coauthoring with encrypted labels requires a specific tenant setting. Without it, users may experience a reduced collaboration experience in Office desktop apps.

The correct message is not „everything works everywhere.“ It is: the modern protection model is content-based, but you still need to design and test the scenarios that matter.

A Practical Design Model

For real-world Microsoft Purview projects, I recommend thinking in three distinct layers:

Layer 1 Location Access

Your SharePoint, Teams, OneDrive, and Microsoft 365 group permission model. This layer is still critical — bad permissions still create oversharing.

Key questions: Who can access the workspace? Who can share externally? Are guests and unmanaged devices allowed? Are sharing links restricted?

Layer 2 Content Classification

Your sensitivity label model. This layer gives the content a meaning that can persist beyond the original location.

Key questions: What is Public, Internal, Confidential, Highly Confidential? Which labels apply encryption? Which only classify and mark?

Layer 3 Policy Response

Where Purview and related controls react to the classification. The value is not the label name itself — it is what the organization can do because the data is labeled.

Key questions: Should DLP block or warn? Should Endpoint DLP prevent copy to USB? Should eDiscovery search by label? Should auto-labeling recommend or apply labels?

The Article in One Sentence

Classic SharePoint IRM protected documents when they left a protected SharePoint library. Modern Microsoft Purview Sensitivity Labels protect the document itself.

That shift means your data protection strategy should not stop at SharePoint permissions. It must include persistent classification, encryption, usage rights, DLP, eDiscovery, auditability, and clear governance rules for how sensitive content is handled across Microsoft 365. Because in the real world, sensitive files do not stay politely inside one library. They move. And your protection model needs to move with them.

Autor

  • Julian Kusenberg

    Julian Kusenberg ist Senior Consultant bei SoftwareOne und unterstützt Unternehmen bei der Implementierung von Microsoft Purview, insbesondere in den Bereichen Information Governance, Datenschutz und Insider Risk Management. Mit langjähriger Erfahrung in der Umsetzung von Compliance- und Datenschutzlösungen hilft er Organisationen, regulatorische Anforderungen in Microsoft-365-Umgebungen effizient zu erfüllen. Seine Expertise umfasst komplex eDiscovery- und Forensikprojekte, bei denen er technisches Know-how mit strategischer Beratung kombiniert.

Kommentare

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

About Julian

Microsoft MVP für Purview, Senior Consultant bei SoftwareOne und Speaker rund um Microsoft 365 Compliance, eDiscovery, Insider Risk Management, Data Security und AI Governance.


Topics

  • Microsoft Purview
  • eDiscovery
  • Insider Risk Management
  • DLP und Data Security
  • Copilot und AI Governance