Skip to content

Commit 6fa0b5a

Browse files
authored
Merge pull request #9649 from simonxjx/ci-7334
AB#7334: Create copy of Purview article in MAGIC's repo to move to Su…
2 parents cbcc54b + f7d0161 commit 6fa0b5a

File tree

4 files changed

+226
-0
lines changed

4 files changed

+226
-0
lines changed
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
---
2+
title: include file
3+
description: include file
4+
services: azure-policy
5+
author: aashishr
6+
7+
ms.service: azure-policy
8+
ms.topic: include
9+
ms.collection: M365-security-compliance
10+
ms.date: 04/11/2024
11+
ms.author: aashishr
12+
ms.custom: include file
13+
---
14+
15+
16+
> [!NOTE]
17+
> **Are you looking for [Microsoft Purview Information Protection](/purview/information-protection)**, formerly Microsoft Information Protection (MIP)?
18+
>
19+
>The Azure Information Protection add-in is [retired](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/retirement-notification-for-the-azure-information-protection/ba-p/3791908) and replaced with labels that are [built in to your Microsoft 365 apps and services](/purview/sensitivity-labels#sensitivity-labels-and-azure-information-protection). Learn more about the [support status of other Azure Information Protection components](https://techcommunity.microsoft.com/t5/security-compliance-and-identity/azure-information-protection-and-the-information-protection/ba-p/3671070).
20+
>
21+
> The [Microsoft Purview Information Protection client](https://www.microsoft.com/en-us/download/details.aspx?id=53018) (without the add-in) is [generally available](/purview/information-protection-client-relnotes).

Microsoft365/purview/purviewtoc/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -125,6 +125,8 @@
125125
items:
126126
- name: Can't send encrypted email to many recipients
127127
href: ../sensitivity-labels/encrypted-email-cannot-send-many-recipients.md
128+
- name: Known issues for Information Protection client
129+
href: ../sensitivity-labels/known-issues-ip-client.md
128130
- name: Mail contacts lose access to encrypted content
129131
href: ../sensitivity-labels/mail-contacts-lose-access-encrypted-content.md
130132
- name: Sensitivity labels are missing
Lines changed: 203 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,203 @@
1+
---
2+
# required metadata
3+
4+
title: Known issues for the information protection client
5+
description: Describes known issues with the Microsoft Purview Information Protection client.
6+
author: cloud-writer
7+
ms.author: meerak
8+
manager: dcscontentpm
9+
ms.date: 09/04/2025
10+
ms.topic: troubleshooting
11+
ms.service: information-protection
12+
---
13+
# Known issues for the information protection client
14+
15+
[!INCLUDE [looking-for-mip](../includes/looking-for-mip.md)]
16+
17+
Use the lists and tables below to find details about known issues and limitations related to Azure Information Protection features.
18+
19+
## Other digital signing and encryption solutions
20+
21+
Azure Information Protection can't protect or decrypt files\emails that are digitally signed or encrypted with other solutions, such as removing protection from mails that are signed or encrypted with S/MIME.
22+
23+
## Client support for container files, such as .zip files
24+
25+
Container files are files that include other files, with a typical example being .zip files that contain compressed files. Other examples include .rar, .7z, .msg files and PDF documents that include attachments.
26+
27+
You can classify and protect these container files, but the classification and protection isn't applied to each file inside the container.
28+
29+
If you have a container file that includes classified and protected files, you must first extract the files to change their classification or protection settings. However, you can remove the protection for all files in supported container files by using the [Set-AIPFileLabel](/powershell/module/purviewinformationprotection/set-filelabel) cmdlet.
30+
31+
Encryption for .msg files is supported in the [MIP SDK](/information-protection/develop/concept-email) only.
32+
33+
The Azure Information Protection viewer can't open attachments in a protected PDF document. In this scenario, when the document is opened in the viewer, the attachments aren't visible.
34+
35+
For more information, see [Admin Guide: File types supported by the Azure Information Protection client](/previous-versions/azure/information-protection/rms-client/client-admin-guide-file-types).
36+
37+
## Known issues for watermarks
38+
39+
When you're adding a watermark to a label, keep in mind that if you use font size one, it automatically adjusts to fit the page. However, if you use any other font size, it uses the size you specified in the font settings.
40+
41+
## PowerShell support for the Azure Information Protection client
42+
43+
The current release of the **AzureInformationProtection** PowerShell module that's installed with the Azure Information Protection client has the following known issues:
44+
45+
- **Outlook personal folders (*.pst* files)**. Natively protecting *.pst* files isn't supported using the **AzureInformationProtection** module.
46+
47+
- **Outlook protected email message (.msg files with a .rpmsg attachment)**. Unprotecting Outlook protected email messages is supported by the **AzureInformationProtection** module for messages inside an Outlook personal folder (.pst file), or on disk in an Outlook message file (.msg file).
48+
49+
- **PowerShell 7**. Currently PowerShell 7 isn't supported by the AIP Client. Using PS7 results in the error: "Object reference not set to an instance of an object."
50+
51+
For more information, see [Admin Guide: Using PowerShell with the Azure Information Protection client](/previous-versions/azure/information-protection/rms-client/client-admin-guide-powershell).
52+
53+
## Known issues AIP Scanner
54+
55+
- Scanning of .msg files with signed PDF files is currently not supported.
56+
57+
- Sensitive Information Types (SIT) that are Trainable Classifiers and EDM (Exact Data Match) classifiers.
58+
59+
- Password protected files.
60+
61+
### Known issues for coauthoring
62+
63+
Known issues for coauthoring are relevant only when coauthoring is [enabled in your tenant](/microsoft-365/compliance/sensitivity-labels-coauthoring).
64+
65+
Known issues for coauthoring in AIP include:
66+
67+
- [Supported versions for coauthoring and sensitivity labels](#supported-versions-for-coauthoring-and-sensitivity-labels)
68+
69+
- [Policy updates](#policy-updates)
70+
71+
- [Unsupported features for coauthoring](#unsupported-features-for-coauthoring)
72+
73+
> [!IMPORTANT]
74+
> Coauthoring and sensitivity labels can't be deployed to some users only, as any new labels won't be visible to users with an older version of the Office client.
75+
>
76+
> For more information about coauthoring support, see the [Microsoft 365 documentation](/microsoft-365/compliance/sensitivity-labels-coauthoring), especially [documented limitations](/microsoft-365/compliance/sensitivity-labels-coauthoring).
77+
>
78+
79+
#### Supported versions for coauthoring and sensitivity labels
80+
81+
All apps, services, and operation tools in your tenant must support coauthoring.
82+
83+
Before you start, make sure that your system complies with the version requirements listed in the [Microsoft 365 prerequisites for coauthoring](/microsoft-365/compliance/sensitivity-labels-coauthoring#prerequisites).
84+
85+
We recommend that you always use the latest Office version available. Earlier versions might cause unexpected results, such as not being able to see labels in Azure Information Protection, or no policy enforcement.
86+
87+
> [!NOTE]
88+
> While sensitivity labels can be applied on files in Office 97-2003 formats, such as **.doc**, **.ppt**, and **.xls**, coauthoring for these file types isn't supported. Once a label is applied on a newly-created file, or a file in the advanced file format, such as **.docx**, **.pptx**, and **.xlsx**, saving the file in an Office 97-2003 format will cause the label to be removed.
89+
>
90+
91+
#### Policy updates
92+
93+
If your labeling policy was updated while an Office application was opened with Azure Information Protection, any new labels are displayed, but applying them results in an error.
94+
95+
If this occurs, close and reopen your Office application to be able to apply your labels.
96+
97+
> [!NOTE]
98+
> Unlike the Microsoft Azure Information Protection dialog box, the **Restricted Access** dialog box doesn't support specifying a domain name to automatically include all users in the organization.
99+
>
100+
101+
#### Unsupported features for coauthoring
102+
103+
The following features aren't supported or are partially supported when [coauthoring is enabled](/microsoft-365/compliance/sensitivity-labels-coauthoring) for files encrypted with sensitivity labels:
104+
105+
- **DKE templates and DKE user-defined properties**. For more information, see [Double Key Encryption (DKE)](/purview/rights-management-tenant-key#double-key-encryption-dke).
106+
107+
- This means that applying a label with user-defined permissions prevents you from working on the document with others at the same time.
108+
109+
- **Removing external content marking in apps**. External content marking is removed only when a label is applied, and not when the document is saved. For more information, see [The client side of Azure Information Protection](/purview/sensitivity-labels-office-apps#office-built-in-labeling-and-the-azure-information-protection-client).
110+
111+
- Features listed in the [Microsoft 365 documentation](/microsoft-365/compliance/sensitivity-labels-coauthoring#limitations) as coauthoring limitations.
112+
- Labelbycustomproperties for mapping other labeling solutions won't work with co-auth enabled.
113+
114+
## Sharing external doc types across tenants
115+
116+
When users share external doc types, such as PDFs, across tenants, recipients receive a consent prompt that requires them to accept the sharing of the listed permissions. For example:
117+
118+
:::image type="content" source="media/known-issues-ip-client/cross-tenant-consent.png" alt-text="Cross-tenant consent prompt.":::
119+
120+
Depending on your application, you might see this prompt repeatedly for the same document. When the prompt appears, select **Accept** to continue to the shared document.
121+
122+
## Known issues in policies
123+
124+
Publishing policies might take up to 24 hours.
125+
## Known issues for the AIP viewer
126+
127+
- [External users](#external-users-and-the-aip-viewer)
128+
- [ADRMS protected files on Android devices](#adrms-protected-files-on-android-devices)
129+
130+
For more information, see [**Unified labeling client**: View protected files with the Azure Information Protection viewer](https://support.microsoft.com/topic/9fb56fae-7989-48b0-850f-f446e057cf73).
131+
132+
### External users and the AIP viewer
133+
134+
If an external user already has a guest account in Microsoft Entra ID, the AIP Viewer might display an error when the user opens a protected document, telling them that they can't sign in with a personal account.
135+
136+
If such an error appears, the user must install [Adobe Acrobat DC with the MIP extension](https://helpx.adobe.com/il_en/acrobat/kb/mip-plugin-download.html) in order to open the protected document.
137+
138+
When a user opens the protected document after installing Adobe Acrobat DC with the MIP extension, that user might still see an error showing that the selected user account doesn't exist in the tenant, and prompting them to select an account.
139+
140+
This is an expected error. In the prompt window, select **Back** to continue opening the protected document.
141+
142+
>[!NOTE]
143+
> The AIP Viewer supports guest *organizational* accounts in Microsoft Entra ID, but not personal or Windows Live accounts.
144+
>
145+
146+
### ADRMS protected files on Android devices
147+
148+
On Android devices, ADRMS-protected files can't be opened by the AIP Viewer app.
149+
150+
## Known issues for track and revoke features
151+
152+
Tracking and revoking document access using the unified labeling client has the following known issues:
153+
154+
- [Password-protected documents](#password-protected-documents)
155+
156+
- [Documents accessed via SharePoint or OneDrive](#documents-accessed-via-sharepoint-or-onedrive)
157+
158+
For more information, see the [Admin Guide](/purview/track-and-revoke-admin) and [User Guide](https://support.microsoft.com/office/1de9a543-c2df-44b6-9464-396b23018f96) procedures.
159+
160+
#### Password-protected documents
161+
162+
Password-protected documents aren't supported by track and revoke features.
163+
#### Documents accessed via SharePoint or OneDrive
164+
165+
- Protected documents that are uploaded to SharePoint or OneDrive lose their **ContentID** value, and access can't be tracked or revoked.
166+
167+
- If a user downloads the file from SharePoint or OneDrive and accesses it from their local machine, a new **ContentID** is applied to the document when they open it locally.
168+
169+
Using the original **ContentID** value to track data won't include any access performed for the user's downloaded file. Additionally, revoking access based on the original **ContentID** value won't revoke access for any of the downloaded files.
170+
171+
If administrators have access to the downloaded files, they can use PowerShell to identify a document's **ContentID** for track and revoke actions.
172+
173+
### Known issues for the AIP client and OneDrive
174+
175+
If you have documents stored in OneDrive with a sensitivity label applied, and an administrator changes the label in the labeling policy to add protection, the newly applied protection isn't automatically applied to the labeled document.
176+
177+
In such cases, relabel the document manually to apply the protection as needed.
178+
179+
## AIP-based Conditional Access policies
180+
181+
External users who receive content protected by [Conditional Access policies](/azure/active-directory/conditional-access/concept-conditional-access-policy-common) must have a Microsoft Entra business-to-business (B2B) collaboration guest user account in order to view the content.
182+
183+
While you can invite external users to activate a guest user account, allowing them to authenticate and pass the conditional access requirements, it might be difficult to ensure that this occurs for all external users required.
184+
185+
We recommend enabling AIP-based conditional access policies for your internal users only.
186+
187+
**Enable conditional access policies for AIP for internal users only**:
188+
189+
1. In the Azure portal, navigate to the **Conditional Access** blade, and select the conditional access policy you wish to modify.
190+
2. Under **Assignments**, select **Users and groups**, and then select **All users**. Make sure that the **All guest and external users** option is *not* selected.
191+
3. Save your changes.
192+
193+
You can also entirely disable/exclude CA within Azure Information Protection if the functionality isn't required for your organization, in order to avoid this potential issue.
194+
195+
For more information, see the [Conditional Access documentation](/azure/active-directory/conditional-access/concept-conditional-access-users-groups).
196+
197+
## Can't publish or use labels with sub-labels as standalone labels
198+
199+
If a label contains any sub-labels in the [Microsoft Purview compliance portal](/microsoft-365/compliance/sensitivity-labels#sensitivity-labels-and-azure-information-protection), this label must not be published as a standalone label to any AIP users.
200+
201+
Similarly, AIP doesn't support labels that contain sub-labels as default labels, and you can't configure automatic labeling for these labels.
202+
203+
Additionally, using a label with UDP (User Defined Permissions) as a default label isn't supported in the Unified Labeling Client.
62.8 KB
Loading

0 commit comments

Comments
 (0)