Microsoft Purview Information Protection (MIP) is the capability most commonly cited by organisations as a reason to upgrade from M365 E3 to E5 — yet most organisations on E3 do not have a complete picture of what they actually get. The gap between E3 and E5 Information Protection is not a small feature delta: it is the difference between a manual labelling system and a fully automated, policy-driven data classification and protection infrastructure. For organisations in regulated industries, getting this wrong means compliance exposure. For all organisations, it means paying for deployment work that may not achieve the regulatory outcome intended.
Independent Advisory. Zero Vendor Bias.
500+ Microsoft EA engagements. $2.1B in managed spend. 32% average cost reduction. We negotiate on your behalf — never Microsoft's.
View Advisory Services →E3 vs E5 Information Protection: The Capability Map
| Capability | M365 E3 | M365 E5 / E5 Compliance | Compliance Impact |
|---|---|---|---|
| Sensitivity label creation | ✅ Included | ✅ Included | Framework only — no enforcement |
| Manual labelling (Office apps) | ✅ Included | ✅ Included | User-dependent — not audit-grade |
| Label-based encryption (AIP) | ✅ Included | ✅ Included | Protects labelled content |
| Client-side auto-labelling | ❌ Not included | ✅ E5 Compliance | Required for consistent classification |
| Service-side auto-labelling (Exchange/SPO) | ❌ Not included | ✅ E5 Compliance | Classifies data at rest in M365 |
| Trainable classifiers | ❌ Not included | ✅ E5 Compliance | Essential for unstructured data identification |
| Exact Data Match (EDM) | ❌ Not included | ✅ E5 Compliance | Required for custom PII detection |
| Label analytics and activity explorer | Limited | ✅ Full (E5) | Audit evidence for regulators |
| On-premises scanner (AIP scanner) | ❌ Not included | ✅ E5 Compliance | Required for on-premises data estate |
| Double Key Encryption | ❌ Not included | ✅ E5 Compliance | For highest-sensitivity data with customer-held keys |
| MDCA integration (third-party apps) | ❌ Not included | ✅ E5 only (not E5 Compliance) | Required for non-Microsoft app labelling |
| Content explorer (data discovery) | Limited | ✅ Full (E5 Compliance) | Data estate visibility for GDPR mapping |
The fundamental distinction is that M365 E3 gives you the labelling framework — the ability to create labels and have users apply them manually. M365 E5 or the E5 Compliance add-on gives you the automation and intelligence layer that makes information protection operational at enterprise scale. Manual labelling alone does not meet the bar for GDPR Article 32 technical controls in most regulatory assessments.
Auto-Labelling: Why It Matters
Client-Side vs Service-Side Auto-Labelling
Auto-labelling has two distinct modes, each with different licensing requirements and different operational characteristics. Both require E5 Compliance.
Client-side auto-labelling operates within Office applications. When a user creates or edits a document, the MIP client analyses content in real time and either recommends a sensitivity label or automatically applies one based on policy rules. This is the mode most visible to end users. Its limitation is that it only applies to documents being actively worked on — it does not retroactively classify existing content at rest.
Service-side auto-labelling operates as a cloud service, scanning content in Exchange Online (emails and attachments), SharePoint Online, and OneDrive for Business. It classifies and labels content at rest, retroactively processes existing documents, and applies protection without requiring any user action. For an organisation with 500,000 existing documents containing PII, service-side auto-labelling is the only mechanism that can systematically protect that data estate. Without it, you are relying on users to correctly classify every document they create — a control that fails at scale.
Sensitive Information Types vs Trainable Classifiers
Auto-labelling policies can use two detection mechanisms. Sensitive Information Types (SITs) are pattern-based detectors — they look for regex patterns, keyword proximity, and checksum validation to identify things like credit card numbers, UK National Insurance numbers, or SWIFT codes. SITs are reliable for structured data with known patterns. They are ineffective for unstructured content like "confidential contracts" or "board minutes" that do not contain typical sensitive data patterns.
Trainable classifiers fill this gap. A trainable classifier is a machine learning model trained on sample documents to recognise content by context. Microsoft provides a set of pre-built classifiers (Financial Projections, Legal Agreements, HR, Source Code, etc.) as well as the ability to train custom classifiers. Custom classifier training requires curating 200–500 positive sample documents and a comparable set of negative examples. Training takes 7–14 days of system processing before the classifier is deployable.
Both SITs and trainable classifiers in auto-labelling policies require E5 Compliance. Organisations attempting to run classification programmes on E3 licences are operating with manual labelling only — a control that auditors will correctly characterise as insufficient for enterprise-scale compliance.
On-Premises Data Estate: The Scanner
The majority of enterprise organisations in a Purview Information Protection engagement have significant data in on-premises repositories — file servers, NAS devices, and SharePoint Server. The Microsoft Purview Information Protection scanner (formerly Azure Information Protection scanner) can extend classification and labelling to these repositories.
The scanner is a Windows service that scans configured repositories, identifies sensitive content using SITs and trainable classifiers, and either reports findings or applies labels (and encryption, where configured). It requires E5 Compliance licences for users whose files are in scope — the scanner licensing is user-based, not based on the volume of files scanned.
A practical scanner deployment for a 10TB file share with 5 million documents takes approximately 2–4 weeks for initial scan completion. Post-initial scan, incremental scanning runs on a configurable schedule. The scanner's output is a classification report showing the distribution of sensitive data types across the file share — a valuable output for GDPR data mapping, PCI DSS scope identification, and security risk assessment.
Get an Independent Second Opinion
Before you sign your next Microsoft agreement, speak with an adviser who has no commercial relationship with Microsoft.
Request a Consultation →Exact Data Match: Custom PII Detection
Exact Data Match (EDM) enables organisations to create custom sensitive information types based on their own data sets — customer lists, employee IDs, patient record numbers, or proprietary identifier formats. EDM works by hashing and indexing the sensitive data set, then detecting when those exact values appear in communications or documents. It is fundamentally different from regex-based SITs: EDM knows that "account number 4521-8834-1209" belongs to your specific customer, not just that it matches an account number pattern.
EDM is required in several financial services scenarios — detecting specific customer account numbers in outgoing communications, for example. It is also used in healthcare for detecting patient identifiers that don't follow standard format patterns. EDM requires E5 Compliance and involves a data onboarding process (hashing and uploading the reference dataset) that must be refreshed as the reference data changes. The maximum EDM data set size is 100 million rows.
Information Protection and DLP: The Integration
Information Protection and Data Loss Prevention are deeply integrated in Purview — a sensitivity label applied to a document or email triggers DLP policy evaluation, and DLP policies can target content based on sensitivity label. This integration means the licensing for both features operates in parallel: you need E5 Compliance to use auto-labelling, and you also need E5 Compliance to apply DLP policies to endpoint and Teams channels based on those labels.
The common deployment pattern is to deploy Information Protection labelling first, establish a classification baseline over 30–60 days, then layer DLP policies that respond to the established classification. This sequenced approach reduces false positives in DLP and enables policies that are both more precise and less disruptive to users.
For the DLP tier analysis, see the companion guide on Purview DLP licensing tiers. For the broader Purview suite overview, see the Microsoft Purview Licensing Complete Guide.
EA Negotiation for Information Protection
Lever 1: Phased Auto-Labelling Deployment Commitment
Information Protection auto-labelling deployment typically takes 4–8 months for a 1,000-user organisation from policy design through production deployment and tuning. Negotiate EA payment terms that align with deployment milestones — some Microsoft account teams will accept quarterly payment structuring for E5 Compliance where the first payment covers the deployment period before full activation. This is not standard but has been achieved in EA negotiations above $2M/year in contract value.
Lever 2: Competitive Displacement Documentation
Purview Information Protection competes with Varonis Data Security Platform, Trellix (formerly McAfee) DLP, Symantec DLP, and Forcepoint. If your organisation has an existing investment in one of these platforms with remaining contract term, document the switching cost and migration timeline, and use this as leverage for licence price reduction or extended payment terms. We have achieved 8–15% reductions on E5 Compliance pricing in scenarios where the client had documented competing contracts with 6–18 months remaining.
Lever 3: Subset Deployment vs Universal Coverage
Not every user requires auto-labelling. Frontline workers who work exclusively in Teams mobile and have no access to SharePoint document libraries do not benefit from service-side auto-labelling. Build a segmented model where E5 Compliance is deployed for knowledge workers with document access, and F3 licences (with basic protection capabilities) are used for frontline workers. This can reduce E5 Compliance seat count by 15–30% in organisations with large frontline workforces.
📄 Free Guide: Microsoft Security Licensing Guide
Defender, Purview, Sentinel, and Entra licensing — with bundle optimisation framework and EA negotiation tactics.
Download Free Guide →Frequently Asked Questions
Does M365 E3 include sensitivity labels?
Yes — M365 E3 includes basic sensitivity label creation and manual labelling for Office documents and emails. What E3 does not include is automatic labelling, trainable classifiers, label-based conditional access, advanced protection actions, and scanner for on-premises repositories. If your organisation needs any of these features, E5 Compliance is required.
What is auto-labelling and which licence does it require?
Auto-labelling automatically applies sensitivity labels to content based on detection of sensitive information types or trainable classifiers. Service-side auto-labelling (applied as content moves through Exchange, SharePoint, OneDrive) requires M365 E5 or E5 Compliance. Client-side auto-labelling in Office apps also requires E5 Compliance. E3 only includes manual labelling.
What are trainable classifiers and do they require E5?
Trainable classifiers are machine learning models that identify content by pattern and context rather than keyword matching — useful for detecting financial projections, HR documents, or IP content. They require M365 E5 or the E5 Compliance add-on. Microsoft provides pre-built classifiers and allows training of custom classifiers, which requires review of 200–500 sample documents per category.
Does Purview Information Protection extend to on-premises repositories?
Yes, through the Microsoft Purview Information Protection scanner. The scanner can classify and label files in on-premises file shares and SharePoint Server. It requires E5 Compliance licences for users whose files are scanned. For large repositories (10M+ files), initial scan cycles can take 2–4 weeks to complete.
Can sensitivity labels protect content in third-party applications?
Sensitivity labels with AIP encryption protect Office documents opened in applications that support the MIP SDK. Label enforcement in non-Microsoft cloud services (Box, Dropbox, Google Drive) requires Microsoft Defender for Cloud Apps integration — included in full E5 but not in the E5 Compliance add-on alone. Third-party app labelling is therefore a full E5 dependency.
Microsoft Purview Licensing — Related Guides
- Microsoft Purview Licensing Complete Guide — Full Purview suite overview and cost framework
- Purview DLP Licensing Tiers — E3 DLP gaps and endpoint/Teams coverage requirements
- Purview Insider Risk Management Licensing — Per-user requirements and policy scope
- Microsoft 365 Compliance Add-Ons — Full catalogue of compliance add-on options
- Microsoft 365 Security Add-Ons — Defender suite licensing that complements MIP
- Entra Conditional Access Licensing — Label-based conditional access requirements
- Microsoft Compliance Manager — Using compliance score alongside MIP deployment