SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
Collaborer en sécurité dans
Office 365 avec RMS
Soumaya Toumi & Guillaume Meyer : ERYEM
Hi. I’m Guillaume Meyer
Founding Partner @ ERYEM
Office Server & Services MVP
gmeyer@eryem.com / @guillaumemeyer
Hi. I’m Soumaya Toumi
Office 365 Consultant @ ERYEM
Office 365, SharePoint, Yammer…
stoumi@eryem.com / @toumisefora
ERYEM est spécialisé dans l’accompagnement, la conception et le développement de solutions innovantes
autour des technologies Microsoft Office 365 et Azure.
Migration d’applications vers Azure
Développement d’applications métiers
Solutions mobiles et chatbots
Migrations vers Office 365
Accompagnement du changement
Applications métiers et mobilité
www.eryem.com
Agenda
Au menu :
Comment activer RMS ?
Comment configurer RMS ?
Intégration avec Office
Intégration avec SharePoint
Intégration avec Exchange
La sécurité dans
Office 365
Office 365
Une suite collaborative globale
Any device, any browser,
anywhere
Les briques de sécurité Office 365
RMS
Rights Management Services
DLP
Data Loss Prevention
Security Score
Recommandation d’un plan de sécurisation
Cloud App Security
Monitoring des apps cloud et sécurisation
ATP
Exchange Advanced Threat Protection (ATP)
MDM
Mobile Device Management
Customer Lockbox
Confidentialité des données
Firewalls,Proxy,Antivirus…
C’est quoi RMS
???
Objectifs de RMS
Protéger les données des services et
applications Office 365 :
• Emails
• Documents
• Contenus confidentiels
Partager des données en sécurité, dans, et en
dehors de l’organisation
Définir des droits et politiques de sécurité sur
les contenus publiés ou partagés, en interne
comme en externe.
RMS
Comment ça marche…
Comment l’activer ?
Et par PowerShell
1-
2-
3- Enter your Office 365 Global administrator
credentials.
4-
5-
Import-Module aadrm
Connect-aadrmservice –Verbose
Enable-aadrm
Disconnect-aadrmservice
Comment attribuer les droits ?
To add a role-based administrator for Rights Management, at the prompt, type the
following command and press Enter, where user@domainname is the email
address of a user or a group:
Alternatively, you can specify the group name as follows:
To view a list of role-based administrators for Rights Management, at the prompt
type the following command and press Enter:
Add-AadrmRoleBasedAdministrator –EmailAddress “user@domainname”
Add-AadrmRoleBasedAdministrator –SecurityGroupDisplayName “Sales Dept”
Get-AadrmRoleBasedAdministrator
RMS
Intégration Office
Protecting Office Content with RMS
There are two methods for providing content protection using Rights Management
in Office:
• Templates: These contain predefined rights that can be applied to provide IRM
protection for content.
The following templates are provided in Microsoft Office 2013:
• Company Confidential: This template allows users to read and modify the content, but does
not allow them to print or copy the document content.
• Company Confidential Read Only: This template allows users to only read the content, but
does not allow them to edit, print, or copy the document content.
• User defined rights: These settings enable you to configure more granular
control of content access.
Users can apply their own usage rights and specify which users and groups
they apply to.
Démo
Démo
En synthèse
Office support for Rights Management
• Office Pro Plus 2013 and Office 2010 – supported
• Office 2007 – not supported
Office Professional Plus 2013 Client Configuration
• Install Office and login with Office 365 credentials
Office 2010 Client Configuration
• Install Office
• Install RMS sharing application
• Login with Office 365 credentials
Protecting Office Content with Rights Management
• Templates
• User defined rights
RMS
Intégration Exchange
RMS Integration with Exchange Online
Users will often send email messages which contain sensitive data, such
as legal documents, employee and payroll information, sales reports, and
confidential product details.
Accidentally leaking sensitive information such as this can have very
serious ramifications for your company.
To help mitigate this risk, Exchange Online provides IRM capabilities to
protect these sensitive email messages and their attachments.
Enable IRM Services with Exchange Online
1. Activate Rights Management
2. Connect to Exchange Online Using Remote
PowerShell
a) Enter your Office 365 Global administrator credentials.
b) Ouvrir une session Exchange Online
Set-ExecutionPolicy RemoteSigned
$UserCredential = Get-Credential
$Session = New-PSSession –ConfigurationName Microsoft.Exchange –
ConnectionUri "https://ps.outlook.com/powershell" -Credential $UserCredential -
Authentication Basic -AllowRedirection
Import-PSSession $Session
Enable IRM Services with Exchange Online
3. Configure the RMS Online Key Sharing Location
Set-IRMConfiguration –RMSOnlineKeySharingLocation
“https://sp-
rms.eu.aadrm.com/TenantManagement/ServicePartner.svc”
Location RMS key sharing location
North America https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc
European Union https://sp-rms.eu.aadrm.com/TenantManagement/ServicePartner.svc
Asia https://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc
South America https://sp-rms.sa.aadrm.com/TenantManagement/ServicePartner.svc
Office 365 for Government
(Government Community Cloud)
https://sp-rms.govus.aadrm.com/TenantManagement/ServicePartner.svc
(1)
Enable IRM Services with Exchange Online
4. Import the Trusted Publishing Domain from RMS Online
5. Enable IRM in Exchange Online
6. Test the IRM Configuration :
a) To test IRM Configuration for Exchange Online:
b) This test checks connectivity from Exchange Online to RMS Online service, obtains your
organization’s Trusted Publishing Domain, and verifies that it is valid:
Import-RMSTrustedPublishingDomain -RMSOnline –name “RMS
Online”
Set-IRMConfiguration -InternalLicensingEnabled $True
Test-IRMConfiguration -RMSOnline
Test-IRMConfiguration –Sender user@domainname
Apply IRM to Emails in Outlook Web App
After you configure and enable IRM for use with Exchange Online, your users can start to apply
IRM policies to their email messages in Outlook and Outlook Web App.
When a user uses IRM to protect an email message, any IRM-supported attachments are also
protected.
When a user sends an email message in Outlook Web App, they will see a new option on the …
menu, called set permissions. This new menu item provides the following IRM templates that
users can select from:
• No Restrictions: As the name suggests, this has no IRM restrictions associated with it.
• Do Not Forward: This allows a recipient to read the message, but they cannot forward it, print it,
or copy content from it.
• Company name – Confidential: This specifies that the message content is proprietary
information and is intended for internal consumption only. The content may be modified but it
cannot be copied or printed.
• Company name – Confidential View Only: This is the same as above except that the content
is readonly and therefore cannot be modified either.
Démo : Restriction Ne pas transférer
Démo : Restriction Ne pas transférer
En interne
Démo : Restriction Ne pas transférer
En externe
Démo : Restriction Affichage Confidentiel
Démo : Restriction Affichage Confidentiel
En interne
Démo : Restriction Affichage Confidentiel
A l’externe
En synthèse
Enable IRM Services in Exchange Online
1. Enable Rights Management in Office 365
2. Connect to Exchange Online with Remote PowerShell
3. Configure RMS Online Key Sharing Location
4. Import TPD from RMS Online
5. Enable IRM in Exchange Online
6. Test IRM configuration
Apply IRM to emails in OWA
Administrator-defined IRM in Exchange Online
• Transport protection rules (Outlook and OWA)
• Outlook protection rules (Outlook)
RMS
Intégration SharePoint Online
Activation du service dans SharePoint
Démo IRM dans SharePoint
Démo IRM dans SharePoint
Thank you for your attention!
This presentation will be available on the
SharePoint Days web site after the
event.
Merci de votre attention !
Cette présentation sera disponible sur le site internet
de SharePoint Days, après l’événement.
SVP évaluez ma session!
Complétez le sondage et courez la chance
de gagner un cadeau lors du tirage de clôture
Please rate this session!
Fill out the survey and get a chance to win a Gift

Weitere ähnliche Inhalte

Ähnlich wie Collaborez en sécurité dans #Office365 avec #RMS

How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
Randall Spence
 

Ähnlich wie Collaborez en sécurité dans #Office365 avec #RMS (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
ODTUG Learn from Home S E R I E S-Automating Security Management in PBCS!
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Data security and compliancy in Office 365
Data security and compliancy in Office 365Data security and compliancy in Office 365
Data security and compliancy in Office 365
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
What's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management ServicesWhat's New in Microsoft Rights Management Services
What's New in Microsoft Rights Management Services
 
SPSLondon - How to secure your data in Office 365
SPSLondon - How to secure your data in Office 365SPSLondon - How to secure your data in Office 365
SPSLondon - How to secure your data in Office 365
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 
Tech Module 4 - Microsoft Teams admin and gov.pptx
Tech Module 4 - Microsoft Teams admin and gov.pptxTech Module 4 - Microsoft Teams admin and gov.pptx
Tech Module 4 - Microsoft Teams admin and gov.pptx
 
MSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information ProtectionMSFT Cloud Architecture Information Protection
MSFT Cloud Architecture Information Protection
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
47218_MVA_03.pptx
47218_MVA_03.pptx47218_MVA_03.pptx
47218_MVA_03.pptx
 
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
Primend praktiline pilveseminar - Dokumendihalduse ja kommunikatsiooni viimin...
 
MMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterpriseMMS 2015: Secure your data and apps with the enterprise
MMS 2015: Secure your data and apps with the enterprise
 
Teamwork.com Security Overvew
Teamwork.com Security OvervewTeamwork.com Security Overvew
Teamwork.com Security Overvew
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
MMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure itMMS 2015: What is ems and how to configure it
MMS 2015: What is ems and how to configure it
 
Keeping it Simple with Permission Sets
Keeping it Simple with Permission SetsKeeping it Simple with Permission Sets
Keeping it Simple with Permission Sets
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Collaborez en sécurité dans #Office365 avec #RMS

  • 1. Collaborer en sécurité dans Office 365 avec RMS Soumaya Toumi & Guillaume Meyer : ERYEM
  • 2. Hi. I’m Guillaume Meyer Founding Partner @ ERYEM Office Server & Services MVP gmeyer@eryem.com / @guillaumemeyer Hi. I’m Soumaya Toumi Office 365 Consultant @ ERYEM Office 365, SharePoint, Yammer… stoumi@eryem.com / @toumisefora
  • 3. ERYEM est spécialisé dans l’accompagnement, la conception et le développement de solutions innovantes autour des technologies Microsoft Office 365 et Azure. Migration d’applications vers Azure Développement d’applications métiers Solutions mobiles et chatbots Migrations vers Office 365 Accompagnement du changement Applications métiers et mobilité www.eryem.com
  • 4. Agenda Au menu : Comment activer RMS ? Comment configurer RMS ? Intégration avec Office Intégration avec SharePoint Intégration avec Exchange
  • 6. Office 365 Une suite collaborative globale Any device, any browser, anywhere
  • 7. Les briques de sécurité Office 365 RMS Rights Management Services DLP Data Loss Prevention Security Score Recommandation d’un plan de sécurisation Cloud App Security Monitoring des apps cloud et sécurisation ATP Exchange Advanced Threat Protection (ATP) MDM Mobile Device Management Customer Lockbox Confidentialité des données Firewalls,Proxy,Antivirus…
  • 9. Objectifs de RMS Protéger les données des services et applications Office 365 : • Emails • Documents • Contenus confidentiels Partager des données en sécurité, dans, et en dehors de l’organisation Définir des droits et politiques de sécurité sur les contenus publiés ou partagés, en interne comme en externe.
  • 12. Et par PowerShell 1- 2- 3- Enter your Office 365 Global administrator credentials. 4- 5- Import-Module aadrm Connect-aadrmservice –Verbose Enable-aadrm Disconnect-aadrmservice
  • 13. Comment attribuer les droits ? To add a role-based administrator for Rights Management, at the prompt, type the following command and press Enter, where user@domainname is the email address of a user or a group: Alternatively, you can specify the group name as follows: To view a list of role-based administrators for Rights Management, at the prompt type the following command and press Enter: Add-AadrmRoleBasedAdministrator –EmailAddress “user@domainname” Add-AadrmRoleBasedAdministrator –SecurityGroupDisplayName “Sales Dept” Get-AadrmRoleBasedAdministrator
  • 15. Protecting Office Content with RMS There are two methods for providing content protection using Rights Management in Office: • Templates: These contain predefined rights that can be applied to provide IRM protection for content. The following templates are provided in Microsoft Office 2013: • Company Confidential: This template allows users to read and modify the content, but does not allow them to print or copy the document content. • Company Confidential Read Only: This template allows users to only read the content, but does not allow them to edit, print, or copy the document content. • User defined rights: These settings enable you to configure more granular control of content access. Users can apply their own usage rights and specify which users and groups they apply to.
  • 16. Démo
  • 17. Démo
  • 18. En synthèse Office support for Rights Management • Office Pro Plus 2013 and Office 2010 – supported • Office 2007 – not supported Office Professional Plus 2013 Client Configuration • Install Office and login with Office 365 credentials Office 2010 Client Configuration • Install Office • Install RMS sharing application • Login with Office 365 credentials Protecting Office Content with Rights Management • Templates • User defined rights
  • 20. RMS Integration with Exchange Online Users will often send email messages which contain sensitive data, such as legal documents, employee and payroll information, sales reports, and confidential product details. Accidentally leaking sensitive information such as this can have very serious ramifications for your company. To help mitigate this risk, Exchange Online provides IRM capabilities to protect these sensitive email messages and their attachments.
  • 21. Enable IRM Services with Exchange Online 1. Activate Rights Management 2. Connect to Exchange Online Using Remote PowerShell a) Enter your Office 365 Global administrator credentials. b) Ouvrir une session Exchange Online Set-ExecutionPolicy RemoteSigned $UserCredential = Get-Credential $Session = New-PSSession –ConfigurationName Microsoft.Exchange – ConnectionUri "https://ps.outlook.com/powershell" -Credential $UserCredential - Authentication Basic -AllowRedirection Import-PSSession $Session
  • 22. Enable IRM Services with Exchange Online 3. Configure the RMS Online Key Sharing Location Set-IRMConfiguration –RMSOnlineKeySharingLocation “https://sp- rms.eu.aadrm.com/TenantManagement/ServicePartner.svc” Location RMS key sharing location North America https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc European Union https://sp-rms.eu.aadrm.com/TenantManagement/ServicePartner.svc Asia https://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc South America https://sp-rms.sa.aadrm.com/TenantManagement/ServicePartner.svc Office 365 for Government (Government Community Cloud) https://sp-rms.govus.aadrm.com/TenantManagement/ServicePartner.svc (1)
  • 23. Enable IRM Services with Exchange Online 4. Import the Trusted Publishing Domain from RMS Online 5. Enable IRM in Exchange Online 6. Test the IRM Configuration : a) To test IRM Configuration for Exchange Online: b) This test checks connectivity from Exchange Online to RMS Online service, obtains your organization’s Trusted Publishing Domain, and verifies that it is valid: Import-RMSTrustedPublishingDomain -RMSOnline –name “RMS Online” Set-IRMConfiguration -InternalLicensingEnabled $True Test-IRMConfiguration -RMSOnline Test-IRMConfiguration –Sender user@domainname
  • 24. Apply IRM to Emails in Outlook Web App After you configure and enable IRM for use with Exchange Online, your users can start to apply IRM policies to their email messages in Outlook and Outlook Web App. When a user uses IRM to protect an email message, any IRM-supported attachments are also protected. When a user sends an email message in Outlook Web App, they will see a new option on the … menu, called set permissions. This new menu item provides the following IRM templates that users can select from: • No Restrictions: As the name suggests, this has no IRM restrictions associated with it. • Do Not Forward: This allows a recipient to read the message, but they cannot forward it, print it, or copy content from it. • Company name – Confidential: This specifies that the message content is proprietary information and is intended for internal consumption only. The content may be modified but it cannot be copied or printed. • Company name – Confidential View Only: This is the same as above except that the content is readonly and therefore cannot be modified either.
  • 25. Démo : Restriction Ne pas transférer
  • 26. Démo : Restriction Ne pas transférer En interne
  • 27. Démo : Restriction Ne pas transférer En externe
  • 28. Démo : Restriction Affichage Confidentiel
  • 29. Démo : Restriction Affichage Confidentiel En interne
  • 30. Démo : Restriction Affichage Confidentiel A l’externe
  • 31. En synthèse Enable IRM Services in Exchange Online 1. Enable Rights Management in Office 365 2. Connect to Exchange Online with Remote PowerShell 3. Configure RMS Online Key Sharing Location 4. Import TPD from RMS Online 5. Enable IRM in Exchange Online 6. Test IRM configuration Apply IRM to emails in OWA Administrator-defined IRM in Exchange Online • Transport protection rules (Outlook and OWA) • Outlook protection rules (Outlook)
  • 33. Activation du service dans SharePoint
  • 34. Démo IRM dans SharePoint
  • 35. Démo IRM dans SharePoint
  • 36. Thank you for your attention! This presentation will be available on the SharePoint Days web site after the event. Merci de votre attention ! Cette présentation sera disponible sur le site internet de SharePoint Days, après l’événement.
  • 37. SVP évaluez ma session! Complétez le sondage et courez la chance de gagner un cadeau lors du tirage de clôture Please rate this session! Fill out the survey and get a chance to win a Gift