Data Classification Sensitive Info Type Modification Procedure

This admin procedure will provide background information on how to modify an existing sensitive information type that will be enforced through security and compliance policies.

This article is intended for employees of organizations that use Sittadel's security. Additionally, there are some actions that can only be accomplished by those with administrative privileges.

Sensitive Information Types

Sensitive info types (SITs) are pattern-based data classifiers, Microsoft has 300+ built-in sensitive info types at your disposal. Sensitive information types are used to help identify sensitive items so that you can prevent them from being inadvertently or inappropriately shared. They are also used to help in locating relevant data in eDiscovery, and to apply governance actions to certain types of information.

 

Procedure Scope: Administrators

Required Group Membership: Admin.DataLossPrevention

 

Modifying a Sensitive Info Type Data Classifier

  1. Navigate to Sensitive Info Types - Purview, locate the rule you wish to alter by utilizing the search bar.
  2. You will be redirected to a new page, select Edit to begin the modification process.
  3. Upon opening the policy, all the information of the policy will be displayed. 3 points of interest will be available to Edit. You can modify the sections as needed.
    1. Name: Adjust the non-functional elements of the pattern, such as Name or Description.
    2. Patterns: Specifies the elements that will be analyzed and the frequency that must be present for a compliance failure to be issued.
    3. Recommended Confidence Level: Specifies the confidence level that will be used to identify the presence of defined pattern in compliance enforcement.
  4. Once the modification has been made, proceed to the finish section. Select Save to finalize the modification process.
  5. A prompt will be displayed showing the successful modification of the rule. Select Done to finalize the process.

You're Finished!

You should have successfully modified an existing sensitive information type that will be enforced through other policies to determine possible data exfiltration or targeted attacks. For any other problems or questions, reach out to us!