Email Encryption Solutions in Microsoft 365

Email Encryption Solutions in Microsoft 365 looks at how messages and attachments are protected both within the Microsoft 365 ecosystem and when they are sent to external recipients. This course outlines the various protection mechanisms at play, how they work, and how to use them. In addition to encryption and information rights management, we see how encrypted messages can be customized with an organization’s branding and what additional functionality comes with custom branding.

Learning Objectives

  • Gain an overview of Microsoft 365 email encryption
  • Learn how to implement email encryption
  • Understand advanced message encryption

Intended Audience

This course is intended for students working towards the SC-400: Microsoft Information Protection Administrator exam or those students wanting to learn about Microsoft 365 email message encryption.


There are no mandatory prerequisites required to take this course, but an understanding of how email works and previous experience with PowerShell would be beneficial.


Hi, and welcome to this Email Encryption Solutions in Microsoft 365 course. My name is Hallam Webber, and I'm an Azure instructor with 25-plus years of experience in the IT industry, and since 2014 I've focused on Microsoft Azure and related technologies.

This course is intended for students who want to learn about email encryption and protection in the context of Microsoft 365 and how to implement and use it. Spoiler alert, this course is not a deep dive into cryptographic algorithms. The information presented in this course will be helpful to students preparing for the SC-400: Microsoft Information Protection Administrator exam.

Broadly speaking, we will look at Microsoft Purview’s message encryption service, formerly known as Office Message Encryption, and information rights management.  All these services and features are built on existing technologies. For instance, information rights management is an extension of the Azure rights management service. 

While this is a beginner’s course, it does assume students are familiar with email basics, and we will be using the PowerShell terminal in the demonstrations. I will only look at information rights management in the context of email encryption, but you can view Configuring Information Rights Management in Microsoft 365 for an in-depth explanation.

When I created this course, all information was current. If you have any feedback, positive or negative, or if you notice anything that needs to be updated or corrected, please reach out to us at

About the Author
Learning Paths

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.