Azure RMS: file is not protected (HRESULT: 0x80070002)

image

Hi guys, after I set Azure RMS integrated with File Server I tried some scenario to make sure it is working or not. I got one issue where the file status in the sharing folder File server unprotected.

Then I tried troubleshoot using PowerShell:

powershell.exe -Noprofile -Command “<path>\RMS-Protect-FCI.ps1 -File ‘<full path and name of a file>’ -TemplateID <template GUID>”

and the result: Error protecting file (logo.jpg) HRESULT: 0x80070002

image

Continue reading

AZURE RMS: Enable IRM in SharePoint Online

image

What is IRM?

Information Right Management in SharePoint enables you to limit the actions that users can take on files that have been downloaded from lists or libraries. IRM encrypts the downloaded files and limits the set of users and programs that allowed to decrypt these files. IRM can also limit the rights of the users who are allowed to read files, so that they cannot take actions such as print copies of the files or copy text from them.

You can use IRM on lists or libraries to limit the dissemination of sensitive content. For example, if you are creating a document library to share information about upcoming products with selected marketing representatives, you can use IRM to prevent the individuals from sharing content with other employees in the company.

On a site, you apply IRM to an entire list or library, rather than individual files. This makes it easier to ensure a consistent level of protection for an entire set of documents or files. IRM can thus help your organization to enforce corporate policies that govern the use and dissemination of confidential or proprietary information.

Continue reading

AZURE RMS: Configure IRM in Exchange Online

image

What is IRM?

People often use email to exchange sensitive information, such as financial data, legal contracts, confidential product information, sales reports and projections, patient health information, or customer and employee information. As a result, mailboxes can become repositories for large amounts of potentially sensitive information and information leakage can become a serious threat to your organization.

To help prevent information leakage, Exchange Online includes Information Right Management (IRM) functionality that provides online and offline protection of email messages and attachments. IRM protection can be applied by user in Microsoft Outlook or Outlook Web App, and it can be applied by administrators using transport protection rules or Outlook protection rules. IRM helps you and your users control who can access, forward, print, or copy sensitive data within an email.

For this case I will give you step by step how to configure IRM in Exchange Online with Azure RMS so users are able to use Azure RMS templates when they are using Outlook Web App.

Continue reading

AZURE RMS: CUSTOM PROTECTION ON FILE SERVER USING SCRIPT

image_thumb2

Overview

Hi Folks, after I post about integrating Azure RMS with FCI: https://fazarsusanto.wordpress.com/2016/06/05/azure-rms-rms-connector-with-file-clasification-infrastructure-fci/ . Now I want to post about making automatic Azure RMS protection for non-MS Office Files.

image

(https://docs.microsoft.com/en-us/rights-management/rms-client/configure-fci)

Continue reading

AZURE RMS: RMS CONNECTOR WITH FILE CLASIFICATION INFRASTRUCTURE (FCI)

image

Overview

Hi Folks, as we know that Azure RMS is able to integrate with Windows Server File Classification Infrastructure (FCI). We must install File Server Resource Manager (FSRM) in order to get Azure RMS templates.

This solution lets you automatically protect all files in a folder on a file server running Windows Server, or automatically protect files that meet specific criteria. For example, files that have been classified as containing confidential or sensitive information. This solution uses Azure Rights Management (Azure RMS) to protect the files, so you must have this technology deployed in your organization.

Continue reading

AZURE RMS:Templates

image

Refresh template for users

After you have activated Azure Rights Management (Azure RMS), users are automatically able to use two default templates that make it easy for them to apply policies to sensitive files that restrict access to authorized users in your organization.

When you use Azure RMS, templates are automatically downloaded to client computers so that users can select them from their applications. However, you might need to take additional steps if you make changes to the templates:

image

Continue reading

OFFICE 365+AZURE RMS:Message Encryption Part 4

image

Customizing Encrypted Messages

As an administrator, you can add your company’s brand to encrypted messages. For example, you can customize the introduction and disclaimer text in the email message that accompanies encrypted messages as well as some text that appears on the portal where the recipient views the messages. You can also add a logo to the email message and encrypted message viewing portal.

· Introductory text of the email that contains the encrypted message

· Disclaimer text of the email that contains the encrypted message

· Portal text that will appear in the message viewing portal

· Logo that will appear in the email message and viewing portal

Continue reading

OFFICE 365+AZURE RMS:Message Encryption Part 3

image

Remove encryption from email replies

When your email users send encrypted messages, recipients of those messages can respond with encrypted replies. You can create transport rules to automatically remove encryption from replies so email users in your organization don’t have to sign in to the encryption portal to view them. You can use the EAC or Windows PowerShell cmdlets to define those rules. You can only decrypt messages that are either sent from within your organization or messages that are replies to messages sent from within your organization. Encrypted messages originating from outside of your organization cannot be decrypted.

Continue reading

OFFICE 365+AZURE RMS:Message Encryption Part 2

image

Defining rules for Office 365 Message Encryption

Administrators enable Office 365 Message Encryption by creating Exchange transport rules that determine under what conditions email messages should be encrypted. There are also rules for defining conditions where encryption should be removed from messages. Once you’ve set the encryption action within the rule, any messages that match the rule conditions are encrypted before they’re sent out.

Transport rules are flexible, letting you combine conditions so you can meet specific security requirements in a single rule. For example, you can create a rule to encrypt all messages that contain specified keywords and are addressed to external recipients. Office 365 Message Encryption also encrypts replies from recipients of encrypted email, and you can create a rule that decrypts those replies as a convenience for your email users. That way, users in your organization won’t have to sign in to the encryption portal to view replies.

Continue reading

OFFICE 365+AZURE RMS:Message Encryption Part 1

image

Encryption in Office 365

If your company already have Azure RMS, you can encrypted your email with one of azure RMS templates but this action only effecting internally. One day you want sending an email to your customers with encryption, how to do this action? This the reason why I post about message encryption on Office 365 because this feature is one option for encrypting email and send it to your customers.

Office 365 Message Encryption is an easy-to-use service that lets email users send encrypted messages to people inside or outside their organization. Designated recipients can easily view their encrypted messages and return encrypted replies. Regardless of the destination email service—whether it’s Outlook.com, Yahoo, Gmail, or another service—email users can send confidential business communications with an added level of protection against unauthorized access.

Continue reading