Presentation is loading. Please wait.

Presentation is loading. Please wait.

Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.

Similar presentations


Presentation on theme: "Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311."— Presentation transcript:

1 Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311

2

3

4 Across on-premises & cloud Integrate and extend security across the enterprise Block from: Enable CostValue SiloedSeamless to: Simplify the security experience, manage compliance Protect everywhere, access anywhere Highly Secure & Interoperable Platform

5 Microsoft Business Ready Security AD RMS Bulk Protection Tool AD RMS & File Classification Infrastructure AD RMS PowerShell Exchange 2010 & AD RMS Integration Features On the Horizon…

6 E-discovery of content for litigation or audit purposes Bulk decryption Safeguarding existing sensitive information Classifying and protecting sensitive information with File Classification Infrastructure (FCI) Bulk encryption

7

8 Bulk Decryption RMSBulk.exe /decrypt \\Share\Folder\ /log RMSBulk.log\\Share\Folder\ Bulk Encryption RMSBulk.exe /encrypt \\Share\Folder\file.doc ContosoConfidential.xml /log C:\Logs\RMSBulk.log\\Share\Folder\file.doc ContosoConfidential.xml

9

10

11 Microsoft Business Ready Security AD RMS Bulk Protection Tool AD RMS & File Classification Infrastructure AD RMS PowerShell Exchange 2010 & AD RMS Integration Features On the Horizon…

12 FCI Classify 2 Identify and protect sensitive documents on file servers Complement manual RMS protection with automated server-side IT policies for complete ownership of security infrastructure and prevention of inadvertent data leakage Mgmt Task: RMS Protect 3 4 5 User creates a file “marketing.docx” on Windows Server 2008 R2 file server File Classification Infrastructure (FCI) classifies file as “sensitive” based on content, including “Confidential” and “Internal only” Automated File Management Task invokes RMS protection to restrict access to “Full-Time Employees” only Full-Time Employee can access “marketing.docx” A malicious user getting access to the file through unintentional leak is not able to access file content Businesses can automatically RMS protect 1,000s of confidential files on their file servers c c 1

13

14 Microsoft Business Ready Security AD RMS Bulk Protection Tool AD RMS & File Classification Infrastructure AD RMS PowerShell Exchange 2010 & AD RMS Integration Features On the Horizon…

15

16

17 Microsoft Business Ready Security AD RMS Bulk Protection Tool AD RMS & File Classification Infrastructure AD RMS PowerShell Exchange 2010 & AD RMS Integration Features On the Horizon…

18 Transport Protection Rule Protected Voice Message Outlook Protection Rule Automatic Content Based Privacy RMS Integration in OWA Streamline End User Experience Transport Pipeline Decryption Journal Report Decryption Enable IT Infrastructure

19 Transport Protection Rule Protected Voice Message Outlook Protection Rule Automatic Content Based Privacy RMS Integration in OWA Streamline End User Experience Transport Pipeline Decryption Journal Report Decryption Enable IT Infrastructure

20 Enforcement Tools are required. Content Protection should be automated. Enforcement Tools are required. Content Protection should be automated.

21 Automatic Content-Based Privacy: Transport Rule action to apply RMS template to e-mail message Transport Rules support regex scanning of attachments in Exchange 2010 Do Not Forward policy available out of box Automatic Content-Based Privacy: Transport Rule action to apply RMS template to e-mail message Transport Rules support regex scanning of attachments in Exchange 2010 Do Not Forward policy available out of box

22

23

24

25

26 Transport Protection Rule Protected Voice Message Outlook Protection Rule Automatic Content Based Privacy RMS Integration in OWA Streamline End User Experience Transport Pipeline Decryption Journal Report Decryption Enable IT Infrastructure

27

28

29 Transport Protection Rule Protected Voice Message Outlook Protection Rule Automatic Content Based Privacy RMS Integration in OWA Streamline End User Experience Transport Pipeline Decryption Journal Report Decryption Enable IT Infrastructure

30

31

32 Journal Report Decryption Agent Attaches clear-text copies of RMS protected messages and attachments to journal mailbox Attaches clear-text copies of RMS protected messages and attachments to journal mailbox Requires super-user privileges, off by default Requires super-user privileges, off by default Journal Report Decryption Agent Attaches clear-text copies of RMS protected messages and attachments to journal mailbox Attaches clear-text copies of RMS protected messages and attachments to journal mailbox Requires super-user privileges, off by default Requires super-user privileges, off by default Archive/Journal

33

34 Microsoft Business Ready Security AD RMS Bulk Protection Tool AD RMS & File Classification Infrastructure AD RMS PowerShell Exchange 2010 & AD RMS Integration Features On the Horizon…

35 Mac Office Exchange 2010 SP1

36

37 Exchange 2007 Exchange 2010 RTM Exchange 2010 SP1 View Protected attachments in OWA IRM in Exchange Active Sync Enhanced collaboration using Microsoft Federation Gateway Cross Premises IRM support for Exchange Online

38 View Protected attachments in OWA

39 IRM in EAS policy can be configured on a per user basis EAS transactions must be made over SSL All encryption/decryption operations are executed at CAS

40 6 2 1. Author sends protected mail to recipient at Trey Engineering 2. Exchange (Trey Engineering) receives message and performs service discovery against Woodgrove Bank’s AD RMS Server 3. Exchange (Trey Engineering) requests a token from the MFG 4. MFG validates the claims and returns the token to Exchange (Trey Engineering) 5. Exchange (Trey Engineering) creates a bootstrapping request including the token to the AD RMS server. 6. AD RMS Server validates the token and then returns a RAC for Exchange(Trey Engineering) 7. Exchange (Trey Engineering ) then requests a token on behalf of the recipient from the MFG 8. Repeat Steps 4-6 for a licensing request 9. The message is delivered and the recipient can consume the content via OWA Woodgrove Bank Trey Engineering Exchange3 57 UL 9 1 AD RMS 4 5

41 Import TPD

42

43 SIA313 Secure Collaboration: All You Need to Know about Extending Active Directory Rights Management Services (AD RMS) Protected Content to External Parties SIA322 Business Ready Security: Protecting Information with Microsoft Forefront and Windows Server 2008 R2 Active Directory SIA08-INT Information Protection: Implementing Information Protection Using Active Directory Rights Management Services SIA03-HOL | Information Protection using Active Directory Rights Management Services (AD RMS) SIA07-HOL | Information Protection Solution: Business Ready Security with Microsoft Forefront and Active Directory Red SIA-2 | Microsoft Forefront Information Protection Solution

44

45

46

47

48 IRM protectors control the conversion of documents to their encrypted, rights-managed format and the decryption of documents from their rights-managed format back to their original format

49


Download ppt "Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311."

Similar presentations


Ads by Google