Custom sensitive information types are used to help prevent inadvertent or inappropriate sharing of sensitive information. As an administrator, you can use the Security & Compliance Center or PowerShell to define a custom sensitive information type based on patterns, evidence (keywords such as employee, badge, ID, and so on), character proximity (how close evidence is to characters in a particular pattern), and confidence levels. Such custom sensitive information types meet business needs for many organizations

References:
This webinar was presented on Wed Apr 22nd, 2020, and the recording can be found here.
Attached to this post are:
- The FAQ document that summarizes the questions and answers that came up over the course of both Webinars; and
- A PDF copy of the presentation.
Thanks to those of you who participated during the two sessions and if you haven’t already, don’t forget to check out our resources available on the Tech Community.
Thanks!
@Adam Bell on behalf of the MIP and Compliance CXE team
When upgrading a Content DB from Sharepoint 2016 to Sharepoint 2019 fails with following error message
Microsoft.SharePoint.Upgrade.SPUpgradeException: An extension defined in the database is not registered with the farm.
at Microsoft.SharePoint.Administration.SPContentDatabaseExtensionValidator.LogAndThrowIfNotSubset(IEnumerable`1 farmExtensionTypes, SPContentDatabaseExtensionCollection databaseExtensions)
at Microsoft.SharePoint.Administration.SPContentDatabaseExtensionValidator.VerifyDatabaseCompatibility(SPContentDatabase database)
at Microsoft.SharePoint.Administration.SPContentDatabaseCollection.Add(SPContentDatabase database, Boolean provision, Guid webApplicationLockId, Int32 addFlags)
at Microsoft.SharePoint.Administration.SPContentDatabaseCollection.Add(Guid newDatabaseId, String strDatabaseServer, String strDatabaseName, String strDatabaseUsername, String strDatabasePassword, String strDatabaseFailOverServer, Int32 warningSiteCount, Int32 maximumSiteCount, Int32 status, Boolean provision, Guid lockId, Int32 addFlags)
at Microsoft.SharePoint.Administration.SPWebApplication.AddContentDatabase(SPWebApplication application, String strDatabaseServer, String strDatabase, String strDatabaseUser, String strDatabasePassword, String strDatabaseFailOverServer, Int32 cSiteWarning, Int32 cSiteLimit, Boolean bAssignDatabaseId, Int32 iAddFlags)
at Microsoft.SharePoint.PowerShell.SPCmdletNewContentDatabase.InternalProcessRecord()
at Microsoft.SharePoint.PowerShell.SPCmdlet.ProcessRecord()
The ULS Log clearly shows
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbd
|
Medium
|
Ensuring farm m_extensions.
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbe
|
Medium
|
Ensuring database m_extensions.
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopa1
|
Verbose
|
m_extensions is already initialized
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopa1
|
Verbose
|
m_extensions is already initialized
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbi
|
High
|
The m_extensions of the database were not a subset of the m_extensions of the farm.
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbk
|
High
|
farm extension: System.RuntimeType
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopa1
|
Verbose
|
m_extensions is already initialized
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbl
|
High
|
database extension: Microsoft.SharePoint.Administration.SPGlobalExtension, value 16.0.6.0, latestVersion 16.0.8.0
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopbl
|
High
|
database extension: Microsoft.Office.Project.Server.Database.Extension.ProjectDatabaseExtension, value 16.1.310.0, latestVersion 17.0.288.0
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aopa1
|
Verbose
|
m_extensions is already initialized
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aq4ea
|
Medium
|
Calling extension method for SPGlobalExtension on object SPContentDatabase Name=SP19_Content.
|
|
PowerShell.exe (0x2478)
|
0x2EFC
|
SharePoint Foundation
|
Database Extensions
|
aq4ea
|
Medium
|
Calling extension method for ProjectDatabaseExtension on object SPContentDatabase Name=SP19_Content.
|
Compare the extensions registered and we can see project extension is missing. here is how you can compare.
$contentservice=[Microsoft.sharepoint.Administration.SPwebservice]::ContentService
$contentservice.RegisteredDatabaseExtensionTypes >>SP2016Farm_registered_Extn.txt
$contentservice=[Microsoft.sharepoint.Administration.SPwebservice]::ContentService
$contentservice.RegisteredDatabaseExtensionTypes >>SP2019Farm_registered_Extn.txt
Resolution:
Execute the following to register the missing extension
$svc = [Microsoft.SharePoint.Administration.SPWebService]::ContentService
[System.Reflection.Assembly]::LoadWithPartialName(“Microsoft.Office.Project.Server.Database.Extension”) | FL
$svc.RegisteredDatabaseExtensionTypes.EnsureAdded([Microsoft.Office.Project.Server.Database.Extension.ProjectDatabaseExtension])
$svc.Update($true)
While eDiscovery provides a range of search, hold, and export functionality, advanced eDiscovery gives compliance administrators more tools to identify data sources and analyze their contents.
Need to conduct an internal investigation of Teams content? We’ve got you covered. Join us to learn how to complete common eDiscovery processes on Teams content.
May 14, 2020: 16:00 GMT
Download Outlook Calendar Invite https://aka.ms/GetInvite-eDiscoveryForTeamsWebinarEMEA
May 14, 2020: 12:00 PST
Download Outlook Calendar Invite https://aka.ms/GetInvite-eDiscoveryForTeamsWebinarUS
Join live
May 14, 2020: 16:00 GMT
Attendee URL: https://aka.ms/Join-eDiscoveryForTeamsWebinarEMEA
May 14, 2020: 12:00 PST
Attendee URL: https://aka.ms/Join-eDiscoveryForTeamsWebinarUS
Microsoft runs on trust. With the growing digital data in your organizations and sophistication of online threats, it’s increasingly important to have intelligent security and simplified governance tools to safeguard your corporate data.
At Microsoft, our goal is to provide a built-in, intelligent, unified, and extensible solution to protect sensitive data across your digital estate – in Microsoft 365 cloud services, on-premises, third-party SaaS applications, and more. With Microsoft Information Protection (MIP), we are building a unified set of capabilities for classification, labeling, and protection not only in Office apps, but also in Microsoft 365 productivity services like OneDrive, SharePoint, Teams, and Exchange Online.
Sensitivity labels are central to how your business-critical data is protected using Microsoft Information Protection (MIP). You create a sensitivity label and associate protection policies like encryption and visual marking, then your end users simply label their important documents and emails. You can also be assured that the protection will persist with the file throughout its life cycle.
Today, we are excited to announce general availability of sensitivity labels with protection for Office files in SharePoint and OneDrive. This is one more step to providing you comprehensive protection across documents and emails in Microsoft 365 services.
Now your users can apply sensitivity labels, with protection policies, not just in Office apps on Windows, Mac, iOS and Android but also in Office on the web. Users will see sensitivity as an option on the ribbon of the Office on the web, and as the applied label name on the status bar.

Figure 1. Manual classification using sensitivity labels shown in PowerPoint web app when used in a browser
In addition, for files labeled and protected with encryption and stored in SharePoint and OneDrive, the following capabilities will empower your end users:
- Coauthoring using Office web apps
- Searching for content within these documents
- Protection using encryption will persist even after the file is downloaded
For security and compliance administrators, Office 365 Data Loss Prevention (DLP) and eDiscovery will also work. Office 365 eDiscovery now supports full-text search for these label encrypted files. Office 365 Data Loss Prevention (DLP) policies cover content in these label encrypted files.
Getting Started

Figure 2. The compliance center has new option to turn on this feature
As a Microsoft 365 customer, you can turn on this feature in the Microsoft 365 compliance center as shown above. To learn more about this feature, please read our feature documentation.
Let us know what you think, we are always open to feedback via UserVoice and continued dialog in the Security & Compliance community and SharePoint community in the Microsoft Tech Community.
If you are new to Microsoft 365, learn how to try or buy a Microsoft 365 subscription.
Lastly, as you navigate this challenging time, we have additional resources to help. For more information about securing your organization in this time of crisis, visit our Remote Work site. We’re here to help in any way we can.
FAQs
- What is the license requirement for using this feature?
Refer to the Information Protection section in Microsoft 365 security & compliance licensing guidance.
- I use AIP/RMS today, how can I take advantage of this new feature in SharePoint and OneDrive services?
Migrate to unified labeling solution using instructions here, then you can advantage of this feature. Learn more in our feature documentation.
- Is this feature supported in Files tab experience in Teams?
Yes, it is. Learn more in our feature documentation.
Thank you!
Sesha Mani, Principal Group Product Manager, Microsoft
It’s never been more critical that employees and the partners they collaborate with can work remotely and stay more secure. In the months leading up to this monumental shift, phishing and malware attacks were at the top of the list of cybersecurity threats. Now, attackers are capitalizing on fear, leveraging this time of uncertainty and change as an opportunity. Phishing and malware attacks are on the rise, many of which now include COVID-19 related lures. In the circumstances we are living through, these threats continue to be some of the most considerable risks to organizations.
What’s available to you today
Office 365 Advanced Threat Protection provides industry-leading protection for all of Office 365. This includes protection against phishing and malware for Exchange, SharePoint, Teams, OneDrive, and Office applications. O365 ATP is built-in to Office 365, so you won’t need multiple solutions to maintain a threat protection solution for email and collaboration.
If you’ve got our P2 license, you have access to our post-breach capabilities, which include hunting, automated investigation, and response capabilities, as well as Attack Simulator which provides end-user training simulations.
Guidance for rapid onboarding
Office 365 ATP provides a variety of threat protection features for your organization. Many of these can be enabled quickly with little impact to your users. Remember that you can extend phishing and malware protection beyond the mailbox, to SharePoint, OneDrive, Teams, and Office, with a single click. For guidance on configuring these policies, such as Safe Links and Safe Attachments, visit our Protect against threats documentation. If you need additional help, our FastTrack service is free for all Office 365 ATP customers, and is extending coverage in support of COVID-19 response efforts. Visit the FastTrack site to request assistance.
Our recommendations
Across the Office 365 service we see that misconfigurations cause 20% of phishing emails to be delivered to users’ inboxes. In this critical time, review your configurations to ensure that your organization is protected. If a portion of your users have transitioned to remote work, ensure that your existing configurations support this change safely, and that you haven’t broadened your attack surface more than is necessary. The O365 ATP Recommended Configuration Analyzer (ORCA) can help you review your configurations and ensure that you are maintaining a secure posture.
We’ve also published recommended settings in both a standard and strict variant. Each customer’s environment and needs are different, but we believe that these levels of mail filtering configurations will help prevent unwanted mail from reaching your employees’ inbox in most situations.
Visualize the threats to your organization with Campaign Views and view the full story of how attackers targeted your users and how your defenses handled the threats. Armed with this information, security teams can more rapidly remediate compromised users, improve security posture, and hunt and track threats. Learn more about Campaign Views here.
Microsoft is here to help
In case of a security incident, Microsoft incident response (IR) services are available through the Microsoft Detection and Response Team (DART). DART provides both reactive incident response and pro-active cyber-resilient services, some delivered remotely and some on-site. The team responds to security incidents and helps customers and partners around the world. You can reach out to your Microsoft Account Manager, Technical Account Manager, or Premier Support contact if you need help from DART.
To learn more about what Microsoft is doing to address the current threat landscape, view our recent blog post on threat intelligence here.
At Microsoft, we understand that securing a remote workforce poses unique challenges. We’re committed to helping customers protect their users and resources, empower their security teams, and focus on what’s most important during this unprecedented time.