Information Rights Management (IRM) is the management of a users right to information. Do they have the right permission to work with this file? Within Microsoft you can setup labels, and apply restriction policies to these labels. For example a email or document tagged as 'confidential' may prevent the user from edited, printing, downloading, or forwarding it. If the user tries to copy and paste some content the paste action will be blank, if they try to screenshot it will turn out black and even taking a photo of the screen applies an invisible watermark to identify which authorized user had it open when the photo was taken.
Common labels include public, internal, financial and confidential, and can be applied manually during email/document creation, to whole libraries/folders or automatically by policies that look for specific triggers; for example if bank details are detected, it automatically applied the financial label to prevent editing or forwarding.
Click Read more to watch a video and find out more.
Azure Information Protection
Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels. Labels can be applied:
Labels can both classify, and optionally protect your documents, enabling you to:
How labels apply classification with AIP
Use Azure Information Protection to apply classification labels to both documents and emails.
Labeling content includes:
In this example, the label also:
How AIP protects your data
Azure Information Protection uses the Azure Rights Management service (Azure RMS) to protect your data.
Azure RMS is integrated with other Microsoft cloud services and applications, such as Office 365 and Azure Active Directory, and can also be used with your own or third-party applications and information protection solutions. Azure RMS works with both on-premises and cloud solutions.
Azure RMS uses encryption, identity, and authorization policies. Similar to AIP labels, protection applied using Azure RMS stays with the documents and emails, regardless of the document or email's location, ensuring that you stay in control of your content even when it's shared with other people.
Protection settings can be:
For example, you may want to configure a report or sales forecast spreadsheet so that it can be accessed only by people in your organization. In this case, you'd apply protection settings to control whether that document can be edited, restrict it to read-only, or prevent it from being printed.
Rights Management templates
As soon as the Azure Rights Management service is activated, two default rights management templates are available for you to restrict data access to users within your organization. Use these templates immediately, or configure your own protection settings to apply more restrictive controls in new templates.
Rights Management templates can be used with any applications or services that support Azure Rights Management.
The following image shows an example from the Exchange admin center, where you can configure Exchange Online mail flow rules to use RMS templates:
Note: Creating an AIP label that includes protection settings also creates a corresponding Rights Management template that can be used separately from the label.
AIP and end-user integration for documents and emails
The AIP client installs the Information Protection bar to Office applications and enables end users to integrate AIP with their documents and emails.
For example, in Excel, using the unified labeling client:
While labels can be applied automatically to documents and emails, removing guesswork for users or to comply with an organization's policies, the Information Protection bar enables end users to select labels and apply classification on their own.
Additionally, the AIP client enables users to classify and protect additional file types, or multiple files at once, using the right-click menu from Windows File Explorer. For example:
The Classify and protect menu option works similarly to the Information Protection bar in Office applications, enabling users to select a label or set custom permissions.
Tip Power users or administrators might find that PowerShell commands are more efficient for managing and setting classification and protection for multiple files. Relevant PowerShell commands are included with the client, and can also be installed separately.
Users and administrators can use document tracking sites to monitor protected documents, watch who accesses them, and when. If they suspect misuse, they can also revoke access to these documents. For example:
Additional integration for email
Using AIP with Exchange Online provides the additional benefit of sending protected emails to any user, with the assurance that they can read it on any device.
For example, you may need to send sensitive information to personal email addresses that use a Gmail, Hotmail, or Microsoft account, or to users who don't have an account in Office 365 or Azure AD. These emails should be encrypted at rest and in transit, and be read only by the original recipients.
This scenario requires Office 365 Message Encryption capabilities. If the recipients cannot open the protected email in their native email client, they can use a one-time passcode to read the sensitive information in a browser.
For example, a Gmail user might see the following prompt in an email message they receive:
For the user sending the email, the actions required are the same as for sending a protected email to a user in their own organization. For example, select the Do Not Forward button that the AIP client can add to the Outlook ribbon.
Alternately, Do Not Forward functionality can be integrated into a label that users can select to apply both classification and protection to that email. For example, in the unified labeling client:
Administrators can also automatically provide protection for users by configuring mail flow rules that apply rights protection.
Any Office documents attached to these emails are automatically protected as well.
Scanning for existing content to classify and protect
Ideally, you'll be labeling documents and emails as they're created. However, you likely have many existing documents, stored either on-premises or in the cloud, and want to classify and protect these documents as well.
Use one of the following methods to classify and protect existing content: