Protect information from unauthorized access—internal and external
Azure Information Protection (AIP) can be purchased to be fully integrated with Office 365. With Information Protection, you can encrypt emails and messages, prohibit the forwarding of confidential information, set restriction and provide permissions. It helps you classify, label, and protect confidential documents and emails persistently. Administrators can define rules and policies to detect sensitive information, for example, rules can be set to classify documents that contain credit card information so that the user can control how the documents are used.
Labels will be applied to the documents and emails according to the rules set by the administrator or the user manually. The labels can include visual markings such as a header, footer, or watermark.
Example 1:
The following email message has been classified as "General". The label has added a footer of "Sensitivity: General" to the email message. This footer is a visual indicator for all recipients that it's intended for general business data that should not be sent outside the organization. The label is embedded in the email headers so that email services can inspect this value and could create an audit entry or prevent it from being sent outside the organization.
Labels will be applied to the documents and emails according to the rules set by the administrator or the user manually. The labels can include visual markings such as a header, footer, or watermark.
Example 1:
The following email message has been classified as "General". The label has added a footer of "Sensitivity: General" to the email message. This footer is a visual indicator for all recipients that it's intended for general business data that should not be sent outside the organization. The label is embedded in the email headers so that email services can inspect this value and could create an audit entry or prevent it from being sent outside the organization.
The technology behind
Azure Rights Management (Azure RMS) is the protection technology used behind. It applies encryption, identity, and authorization policies. The protection stays with the documents and emails, independently of the location—inside or outside your organization, networks, file servers, and applications.
Example 2:
You created a sales forecast spreadsheet and it should be only accessible by your team in the organisation, restricted to read-only, and prevented from being printed. With Information Protection, you can do that but also configure emails similarly, preventing the spreadsheet from being forwarded or even limiting the use of the "Reply All" option.
A user simply do so by applying labels to the documents and emails.
Example 2:
You created a sales forecast spreadsheet and it should be only accessible by your team in the organisation, restricted to read-only, and prevented from being printed. With Information Protection, you can do that but also configure emails similarly, preventing the spreadsheet from being forwarded or even limiting the use of the "Reply All" option.
A user simply do so by applying labels to the documents and emails.
It also supports the protection of multiple files at once, users can right-click files or a folder from Windows File Explorer.
After selecting Classify and protect, they can then select a label similar to how they use the Information Protection bar in their Office desktop apps. They can also customise own permissions if required.