Summary
Within this chapter, we have covered a lot of different topics, including identifying roles and permissions for administering sensitivity labels, creating and managing sensitivity labels and applying them to Microsoft SaaS applications, configuring automatic labeling policies and monitoring label usage, applying bulk classification to on-premises data and managing protection settings, and applying and managing protections and restrictions.
By the end of this chapter, you will have completed multiple lab exercises; however, if you have not followed any of these, I strongly recommend that you do before moving on to the next chapter.
The next chapter will cover planning and implementing encryption for email messages.