1. Home
  2. Training Library
  3. Microsoft 365
  4. Microsoft 365 Courses
  5. Configuring Information Rights Management in Microsoft 365

Introduction to Microsoft Defender Application Guard

Introduction to Microsoft Defender Application Guard
Overview
Difficulty
Intermediate
Duration
19m
Students
35
Ratings
5/5
starstarstarstarstar
Description

This course explores Information Rights Management in Microsoft 365 and how to configure it for different workloads including SharePoint, OneDrive, and Exchange Online.

Learning Objectives

  • Learn what Information Rights Management is and what it does
  • Learn how to set up and use the service
  • Learn how to set up Information Rights Management for SharePoint Online and apply Information Rights Management to SharePoint lists and libraries
  • Understand how to configure Information Rights Management for OneDrive
  • Learn how to check the status of Information Rights Management in Exchange Online and how to enable it

Intended Audience

This quick course is intended for those who wish to learn about Information Rights Management in Microsoft 365.

Prerequisites

To get the most out of this course, you should have a basic understanding of Microsoft 365.

Transcript

Hello and welcome to Information Rights Management. In this lesson, we'll take a quick look at what it is and what it's used for. Information Rights Management, or IRM, is used by organizations to prevent unauthorized recipients of protected documents from printing, forwarding, or copying of that sensitive information. The permissions that control these actions are actually stored directly within the documents themselves, and then IRM server performs the authentication. You can use Information Rights Management to restrict content wherever it is sent, and to set a file expiration.

When you set an expiration on a document, that document can no longer be viewed after the specified amount of time. You can also use IRM to enforce corporate policies governing the use and dissemination of content within your organization. Now, however, there are a few different things that you cannot do with Information Rights Management. For example, you can't use Information Rights Management to protect content from being erased, or stolen through attacks like Trojan horses or keystroke loggers. It also doesn't protect your documents from loss or corruption as a result of computer viruses.

And of course, as you might expect, IRM cannot protect documents from being photographed or hand-copied from a user's screen. It would be cool if it could, but it can't. Now, before you can use IRM to protect your documents, you have to first activate the Rights Management service, or RMS, features of your Microsoft 365 apps or services. Once you've activated the necessary Rights Management features, you can begin protecting your documents and emails. Information Rights Management integrates with several kinds of workloads in Microsoft 365, including SharePoint Online, Exchange Online, OneDrive, Microsoft Word, and others.

In the upcoming demonstrations, I'll show you how to set up rights management for several types of workloads.

About the Author
Avatar
Thomas Mitchell
Instructor
Students
59671
Courses
71
Learning Paths
30

Tom is a 25+ year veteran of the IT industry, having worked in environments as large as 40k seats and as small as 50 seats. Throughout the course of a long an interesting career, he has built an in-depth skillset that spans numerous IT disciplines. Tom has designed and architected small, large, and global IT solutions.

In addition to the Cloud Platform and Infrastructure MCSE certification, Tom also carries several other Microsoft certifications. His ability to see things from a strategic perspective allows Tom to architect solutions that closely align with business needs.

In his spare time, Tom enjoys camping, fishing, and playing poker.