SlideShare une entreprise Scribd logo
1  sur  11
Work Smart by Microsoft IT
Securing Your Business
Information
Customization note:This document contains guidance and/or step-by-step instructions that
can be reused, customized, or deleted entirely if they do not apply to your organization’s
environment or installation scenarios. Any text marked by yellow highlighting indicates either
customization guidance or organization-specific variables. All of the highlighted text in this
document should either be deleted or replaced prior to distribution.
Whether you are exchanging emails, sharing documents, or having a phone conversation, it
is your responsibility to help protect your company’s confidential information from any
unauthorized disclosure.
In this Work Smart guide, you will learn how to use four Microsoft technologies that help
protectbusiness information. These technologies include Information Rights Management
(IRM), Secure/Multipurpose Mail Extensions (S/MIME), BitLocker Drive Encryption, and
Encrypted File System (EFS).
Note:For more information about how to classify business information and data according to
the potential impact of unintentional disclosure read the “Classifying and Protecting Your
Business Information” Work Smart guide at http://aka.ms/customerworksmart.
Topics in this guide include:
Using IRM to protect
information
Applying S/MIME to
email messages
Protecting data with
BitLocker
Protecting data with
EFS
For more information
2 | Securing Your Business Information
Using IRM to protect information
When a company has configured their systems to use Information Rights Management
(IRM), employees using Microsoft Office can apply permissions to messages or documents
by using options on the ribbon. The protection options that are available are based on
permission policies that are customized for an organization. Office 2013 also provides
several predefined groups of rights, such as Do Not Forward in Outlook 2013. More
information about IRM is available athttp://technet.microsoft.com/en-
us/library/cc179103.aspx.
Protecting documents on SharePoint Online
To learn more about applying IRM on SharePoint Online using RMS, see
http://office.microsoft.com/en-us/sharepoint-server-help/apply-information-rights-
management-to-a-list-or-library-HA010154148.aspx and the Work Smart Guide "Secure
Collaboration using SharePoint Online" at http://aka.ms/customerworksmart.
Using IRM to protect email messages
To restrict permissions on email messages and prevent recipients from forwarding, printing,
or copying sensitive data, do the following:
1. In Outlook 2013, on the Mail page, select the Home tab, and click New Email.
2. In the new message, click the Options ribbon tab, and clickPermissions.
Note: If you are not connected to your corporate network, you may first need to
clickConnect to Rights Management Servers to get templates. Once connected to the
server, a list of permissions displays.
3. Select the appropriate permission for the email message.
3 | Securing Your Business Information
Configuring a message to expire
1. In Outlook 2013, on the Mail Home tab, click New Email.
2. In the new message, click the Options ribbon tab.
3. In the More Options section, click Delay Delivery.
4. Select the Expires after check box and enter date and time.
5. Click Close.
Using IRM to protect emails in Outlook Web App
To restrict permissions on email messages and to prevent recipients from forwarding,
printing, or copying sensitive data, when using Exchange 2013, do the following:
1. In OWA, on the Outlook page, click new mail.
2. In the new message, click the ellipses (…).
3. In the drop-down list, select set permissions, and then select the appropriate
permission for the email message.
4 | Securing Your Business Information
Note:When users send an IRM-protected message from OWA, any files attached to the message
also receive the same IRM protection and are protected by using the same rights policy template
as the message. In Exchange 2013, IRM protection is applied to files associated with Microsoft
Office Word, Excel, and PowerPoint, as well as .xps files and email messages. IRM protection is
applied to an attachment only if it's not already IRM-protected.
Using IRM to protect a document
You also can protect Microsoft Office Word, Microsoft Office Excel, and Microsoft Office
PowerPoint files by applying IRM:
1. In Word 2013, click File, and on the Info page, click Protect Document.
2. SelectRestrict Access and click to select the appropriate restriction to apply.
Note: If you are not connected to yourcorporate network, you may first need to
clickConnect to Rights Management Servers to get templates. Once connected to the
server, a list of permissions displays.
Specifying who can access or change a document
1. In Word 2013, click File, and on the Info page, click Protect Document.
2. UnderRestrict Access click Restricted Access.
3. In the Permissions window, select the Restrict Permissions to this document check
box.
5 | Securing Your Business Information
4. Add users in the Read or Change boxes and click OK.
Configuring a file to expire
Use IRM to enforce an expiration date so that recipients cannot access the file after a
specific date:
1. In Word 2013, click File, and on the Info page, click Protect Document.
2. Under Restrict Access click Restricted Access.
3. In the Permissions window, select the Restrict Permissions to this document check
box.
4. In the Permissions window, click More Options.
5. Select the This document expires on: check box, enter an expiration date, and click
OK.
6. When the date has passed, the user will not be able to open the document.
6 | Securing Your Business Information
How to password protect a section in OneNote 2013
1. In OneNote, open the section you wish to protect and select the Review tab.
2. Under Password Protection, select Set Password.
3. In the Password Protection window, enter and confirm your new password and click
OK.
4. A pop-up window appears. Select whether to keep or delete existing backups of the
section that do not have the assigned password.
How to change or remove a password from a section in OneNote 2013
1. In OneNote, open the section that is password protected and select the Review tab.
2. Under Password Protection, select Change Password or Remove Password.
a. If changing the password, enter the old and new password and confirm the new
password. Then, click OK.
b. If removing the password, enter the password and click OK.
Applying S/MIME to email messages
Secure/Multipurpose Mail Extensions (S/MIME) enables you to encrypt and/or digitally sign
your email messages. Encrypting your messages converts regular text data with an
encrypted text so that only people who you specify can read it. Digitally signing an email
message helps ensure that no tampering occurs while your message and its attachments
are in transit.
Signing a message digitally with S/MIME
Signing a message digitally applies an authorized certificate to it that validates that the
message is from you and is unaltered. To sign a message digitally:
1. In Outlook 2013, in an open message, click the Options tab.
2. In the More Options group, click the arrow in the lower-right corner to expand options
box.
3. Under Security, click Security Settings.
7 | Securing Your Business Information
4. Select the Add digital signature to this message check box.
5. Select the following options, if applicable:
Select the Send this message as clear text signed check box to enable recipients
who do not have S/MIME security to read the message.
Select the Request S/MIME receipt for this message check box to verify that the
recipient validates the digital signature and receives the message unaltered, and for
you to receive an email notification about who opens the message and when it is
opened.
6. Click OK.
Notes:
For more information about S/MIME in Office 2010, seehttp://office.microsoft.com/en-
us/outlook-help/send-an-email-message-with-an-s-mime-receipt-request-
HP010356428.aspx.
For more information about S/MIME in Office 2013, seehttp://office.microsoft.com/en-
us/outlook-help/send-an-email-message-with-an-s-mime-receipt-request-
HA102748933.aspx.
Encrypting a message with S/MIME
Encrypting a message with S/MIME means that recipients cannot access it unless they have
a private key that matches the public key that you used for encryption. To encrypt a
message with S/MIME:
1. In Outlook 2013, in an open message, click the Options tab.
2. In the More Options group, click the arrow in the lower-right corner to expand options
box.
3. Under Security, click Security Settings.
8 | Securing Your Business Information
4. Select Encrypt message contents and attachments.
5. To change additional settings, such as selecting a specific certificate to use, click
Change Settings, make the changes, click OK twice, and then click Close.
Enabling recipients to access encrypted files
When you send an encrypted message, S/MIME uses the recipient’s certificate and public
key to encrypt the file. Therefore, you have to exchange certificates and keys before you
can send and access encrypted messages from a specific person.
If you plan to send an encrypted message to someone:
1. Send the person an email that you sign digitally by following the directions in the
previous section “Signing a Message Digitally with S/MIME”. Signing your message
digitally ensures that your public encryption key is included. This enables the person to
send you encrypted email.
2. Ask the person to send you a digitally signed email that includes their public encryption
key. This enables you to send them encrypted email.
3. Create an entry in your Outlook contacts for the person, which saves that person’s
encryption key. After that, Outlook uses this key every time that you send this person
an encrypted message. To create a contact entry:
4. Open a digitally signed email from the person, right-click the person’s name or email
address, and select Add to Outlook Contacts.
Important: If you want to exchange encrypted messages with an external party that does not
have a secure email certificate, refer them to Thawte at http://www.thawte.com/home.htmlor
VeriSign at http://www.verisign.com/index.html.
9 | Securing Your Business Information
Protecting data with BitLocker
BitLocker Drive Encryption is a data protection feature available inWindows Vista, Windows
7, and Windows 8.BitLocker encrypts the hard drives on your computer to provide
enhanced protection against data theft or exposure on computers and removable drives
that are lost, stolen, or decommissioned.More information about BitLocker is available at
http://technet.microsoft.com/en-us/library/hh831713.aspx.
BitLocker To Go provides drive encryption helps protect against unauthorized access on
your portable storage drives. This includes the encryption of USB flash drives, SD cards,
external hard disk drives, and other removable drives formatted by using the NTFS, FAT, or
exFAT file systems.
Note:For step-by-step guidance about how to enable BitLocker and BitLocker To Go in
Windows 8, download the “Work Smart: Protecting Data with Windows 8 BitLocker”guide
available at http://aka.ms/customerworksmart.
Protecting data with EFS
If your computer is not BitLocker compatible, you can use Encrypted File System (EFS)to
encrypt your files and folders by using a certificate. EFS requires that users with whom you
share information enter the appropriate decryption key before they can access the
encrypted content.
Although you can encrypt files individually, it is recommendedthat you designate a specific
folder to store your encrypted files, and to encrypt that folder. All files that are created in or
moved to the encrypted folder will automatically obtain the encrypted attribute.
How to encrypt a folder:
1. Right-click a folder you want to encrypt, and then click Properties.
2. On the General tab, click Advanced.
3. In the Advanced Attributes dialog box, click theEncrypt contents to help secure
datacheckbox and click OK.
10 | Securing Your Business Information
4. You will be returned to the General tab. Click Apply.
5. In the Confirm Attribute Changes dialog box, select Apply changes to this folder,
subfolders, and files and click OK.
Important Note:
Encryption of theMy Documents folder is not recommended.
If you move, copy, or save a file to an encrypted folder, the file becomes encrypted.
If you move, copy, or save an encrypted file to a location that is not on your computer, the
file becomes decrypted.
For more information
Information Rights Management (IRM)
http://technet.microsoft.com/en-us/library/cc179103.aspx
Introduction to IRM for email messages
http://office.microsoft.com/en-us/outlook-help/introduction-to-irm-for-
email-messages-HA102749366.aspx
Secure/Multipurpose Internet Mail Extensions (S/MIME)
http://technet.microsoft.com/en-us/library/jj891023.aspx
BitLocker
http://technet.microsoft.com/en-us/library/hh831713.aspx
Encrypted File System (EFS)
http://technet.microsoft.com/en-us/library/bb457116.aspx
Video: Getting Started with Encrypting File System in Windows 7
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-
the-encrypting-file-system-in-windows-7.aspx
11 | Securing Your Business Information
International Data Protection Standards
http://download.microsoft.com/download/B/8/2/B8282D75-433C-4B7E-
B0A0-FFA413E20060/international_privacy_standards.pdf
Work Smart by Microsoft IT
http://aka.ms/customerworksmart
Modern IT Experience featuring IT Showcase
http://microsoft.com/microsoft-IT
This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR
STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2014 Microsoft Corporation. All rights reserved.

Contenu connexe

En vedette

Biodiversidad y aventura
Biodiversidad y aventuraBiodiversidad y aventura
Biodiversidad y aventuraaledefranco
 
Expedia's Real Time Hotel Reviews - CDO Summit Sydney
Expedia's Real Time Hotel Reviews - CDO Summit SydneyExpedia's Real Time Hotel Reviews - CDO Summit Sydney
Expedia's Real Time Hotel Reviews - CDO Summit SydneyScott J Horn
 
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...en casa
 
111128 proposal blickwinkel ben jerry
111128 proposal blickwinkel ben jerry111128 proposal blickwinkel ben jerry
111128 proposal blickwinkel ben jerryReinout De Kraker
 
Arq. Walter Gropius - Omar Moreno Nuñez
Arq. Walter Gropius - Omar Moreno NuñezArq. Walter Gropius - Omar Moreno Nuñez
Arq. Walter Gropius - Omar Moreno NuñezFabiola Aranda
 
Dossier Beetripper
Dossier Beetripper Dossier Beetripper
Dossier Beetripper Beetripper
 
Presentación Cubiertas Autoportantes
Presentación Cubiertas AutoportantesPresentación Cubiertas Autoportantes
Presentación Cubiertas AutoportantesINCOPERFIL
 
Revista estratos
Revista estratos Revista estratos
Revista estratos Aaron Ortiz
 

En vedette (17)

Biodiversidad y aventura
Biodiversidad y aventuraBiodiversidad y aventura
Biodiversidad y aventura
 
Expedia's Real Time Hotel Reviews - CDO Summit Sydney
Expedia's Real Time Hotel Reviews - CDO Summit SydneyExpedia's Real Time Hotel Reviews - CDO Summit Sydney
Expedia's Real Time Hotel Reviews - CDO Summit Sydney
 
Elbachecito
ElbachecitoElbachecito
Elbachecito
 
21Nov2013_IBM-SevenTablets_MobileTechTalk
21Nov2013_IBM-SevenTablets_MobileTechTalk21Nov2013_IBM-SevenTablets_MobileTechTalk
21Nov2013_IBM-SevenTablets_MobileTechTalk
 
La Tepesa
La TepesaLa Tepesa
La Tepesa
 
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...
Estudio del efecto del momento circadiano en el aprendizaje y la memoria olfa...
 
111128 proposal blickwinkel ben jerry
111128 proposal blickwinkel ben jerry111128 proposal blickwinkel ben jerry
111128 proposal blickwinkel ben jerry
 
ETICA.
ETICA.ETICA.
ETICA.
 
Transformation is 24/7. How do global communications professionals deal with ...
Transformation is 24/7. How do global communications professionals deal with ...Transformation is 24/7. How do global communications professionals deal with ...
Transformation is 24/7. How do global communications professionals deal with ...
 
El tilo
El tiloEl tilo
El tilo
 
Arquitecturas pintadas copia
Arquitecturas pintadas   copiaArquitecturas pintadas   copia
Arquitecturas pintadas copia
 
Evans berman chapter_04
Evans berman chapter_04Evans berman chapter_04
Evans berman chapter_04
 
Arq. Walter Gropius - Omar Moreno Nuñez
Arq. Walter Gropius - Omar Moreno NuñezArq. Walter Gropius - Omar Moreno Nuñez
Arq. Walter Gropius - Omar Moreno Nuñez
 
Dossier Beetripper
Dossier Beetripper Dossier Beetripper
Dossier Beetripper
 
Presentación Cubiertas Autoportantes
Presentación Cubiertas AutoportantesPresentación Cubiertas Autoportantes
Presentación Cubiertas Autoportantes
 
Revista estratos
Revista estratos Revista estratos
Revista estratos
 
Powerpoint skill training
Powerpoint skill trainingPowerpoint skill training
Powerpoint skill training
 

Similaire à Securing Your Business Information - Template from Microsoft

NDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by emailNDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by emailEveryNDA
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure CommunicationsKavika Roy
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecuritySymantec
 
Protecting Documents
Protecting DocumentsProtecting Documents
Protecting DocumentsKaren Baker
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...ArethaSimons
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxchristinemaritza
 
Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanDavid J Rosenthal
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Temok IT Services
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxgreg1eden90113
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Sangeetha Rangarajan
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail MessagesD's Surti
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | SecloreSeclore
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016imen Tekaya Bouaziz
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyTentacle Cloud
 

Similaire à Securing Your Business Information - Template from Microsoft (20)

Nt1330 Unit 7
Nt1330 Unit 7Nt1330 Unit 7
Nt1330 Unit 7
 
NDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by emailNDA agreement to protect information disclosed by email
NDA agreement to protect information disclosed by email
 
Impact of Insecure Communications
Impact of Insecure CommunicationsImpact of Insecure Communications
Impact of Insecure Communications
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Balancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With SecurityBalancing Cloud-Based Email Benefits With Security
Balancing Cloud-Based Email Benefits With Security
 
Protecting Documents
Protecting DocumentsProtecting Documents
Protecting Documents
 
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
Data Loss Prevention and Compliance in Microsoft 365 Safeguarding Your Tenant...
 
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docxEmail Retention Policy1.0 PurposeThe Email Retention Polic.docx
Email Retention Policy1.0 PurposeThe Email Retention Polic.docx
 
Securing Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by AtidanSecuring Business-Information from Microsoft -Presented by Atidan
Securing Business-Information from Microsoft -Presented by Atidan
 
Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022Top 10 Secure Email Providers to Consider in 2022
Top 10 Secure Email Providers to Consider in 2022
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
An email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docxAn email policy for your employeesA clear email policy hel.docx
An email policy for your employeesA clear email policy hel.docx
 
Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008Unit4 NMA working with user accounts WINDOWS SERVER 2008
Unit4 NMA working with user accounts WINDOWS SERVER 2008
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
 
Email encryption plus | Seclore
Email encryption plus | SecloreEmail encryption plus | Seclore
Email encryption plus | Seclore
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016Internet 8th level imen tek bouaziz 2016
Internet 8th level imen tek bouaziz 2016
 
Best Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data EffectivelyBest Practices to Protect Customer Data Effectively
Best Practices to Protect Customer Data Effectively
 
Backstage view in_word_2010
Backstage view in_word_2010Backstage view in_word_2010
Backstage view in_word_2010
 

Plus de David J Rosenthal

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made SimpleDavid J Rosenthal
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021David J Rosenthal
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021David J Rosenthal
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from MicrosoftDavid J Rosenthal
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365David J Rosenthal
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftDavid J Rosenthal
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewDavid J Rosenthal
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldDavid J Rosenthal
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the EnterpriseDavid J Rosenthal
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantDavid J Rosenthal
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021David J Rosenthal
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureDavid J Rosenthal
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelDavid J Rosenthal
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active DirectoryDavid J Rosenthal
 

Plus de David J Rosenthal (20)

Microsoft Teams Phone - Calling Made Simple
Microsoft Teams Phone  - Calling Made SimpleMicrosoft Teams Phone  - Calling Made Simple
Microsoft Teams Phone - Calling Made Simple
 
Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021Whats New in Microsoft Teams Calling November 2021
Whats New in Microsoft Teams Calling November 2021
 
Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021Whats New in Microsoft Teams Hybrid Meetings November 2021
Whats New in Microsoft Teams Hybrid Meetings November 2021
 
Viva Connections from Microsoft
Viva Connections from MicrosoftViva Connections from Microsoft
Viva Connections from Microsoft
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Microsoft Viva Introduction
Microsoft Viva IntroductionMicrosoft Viva Introduction
Microsoft Viva Introduction
 
Microsoft Viva Learning
Microsoft Viva LearningMicrosoft Viva Learning
Microsoft Viva Learning
 
Microsoft Viva Topics
Microsoft Viva TopicsMicrosoft Viva Topics
Microsoft Viva Topics
 
A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365A Secure Journey to Cloud with Microsoft 365
A Secure Journey to Cloud with Microsoft 365
 
Azure Arc Overview from Microsoft
Azure Arc Overview from MicrosoftAzure Arc Overview from Microsoft
Azure Arc Overview from Microsoft
 
Microsoft Windows Server 2022 Overview
Microsoft Windows Server 2022 OverviewMicrosoft Windows Server 2022 Overview
Microsoft Windows Server 2022 Overview
 
Windows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid WorldWindows365 Hybrid Windows for a Hybrid World
Windows365 Hybrid Windows for a Hybrid World
 
Windows 11 for the Enterprise
Windows 11 for the EnterpriseWindows 11 for the Enterprise
Windows 11 for the Enterprise
 
Microsoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital AssistantMicrosoft Scheduler for M365 - Personal Digital Assistant
Microsoft Scheduler for M365 - Personal Digital Assistant
 
What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021What is New in Teams Meetings and Meeting Rooms July 2021
What is New in Teams Meetings and Meeting Rooms July 2021
 
Modernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft AzureModernize Java Apps on Microsoft Azure
Modernize Java Apps on Microsoft Azure
 
Microsoft Defender and Azure Sentinel
Microsoft Defender and Azure SentinelMicrosoft Defender and Azure Sentinel
Microsoft Defender and Azure Sentinel
 
Microsoft Azure Active Directory
Microsoft Azure Active DirectoryMicrosoft Azure Active Directory
Microsoft Azure Active Directory
 
Nintex Worflow Overview
Nintex Worflow OverviewNintex Worflow Overview
Nintex Worflow Overview
 
Microsoft Power BI Overview
Microsoft Power BI OverviewMicrosoft Power BI Overview
Microsoft Power BI Overview
 

Dernier

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Securing Your Business Information - Template from Microsoft

  • 1. Work Smart by Microsoft IT Securing Your Business Information Customization note:This document contains guidance and/or step-by-step instructions that can be reused, customized, or deleted entirely if they do not apply to your organization’s environment or installation scenarios. Any text marked by yellow highlighting indicates either customization guidance or organization-specific variables. All of the highlighted text in this document should either be deleted or replaced prior to distribution. Whether you are exchanging emails, sharing documents, or having a phone conversation, it is your responsibility to help protect your company’s confidential information from any unauthorized disclosure. In this Work Smart guide, you will learn how to use four Microsoft technologies that help protectbusiness information. These technologies include Information Rights Management (IRM), Secure/Multipurpose Mail Extensions (S/MIME), BitLocker Drive Encryption, and Encrypted File System (EFS). Note:For more information about how to classify business information and data according to the potential impact of unintentional disclosure read the “Classifying and Protecting Your Business Information” Work Smart guide at http://aka.ms/customerworksmart. Topics in this guide include: Using IRM to protect information Applying S/MIME to email messages Protecting data with BitLocker Protecting data with EFS For more information
  • 2. 2 | Securing Your Business Information Using IRM to protect information When a company has configured their systems to use Information Rights Management (IRM), employees using Microsoft Office can apply permissions to messages or documents by using options on the ribbon. The protection options that are available are based on permission policies that are customized for an organization. Office 2013 also provides several predefined groups of rights, such as Do Not Forward in Outlook 2013. More information about IRM is available athttp://technet.microsoft.com/en- us/library/cc179103.aspx. Protecting documents on SharePoint Online To learn more about applying IRM on SharePoint Online using RMS, see http://office.microsoft.com/en-us/sharepoint-server-help/apply-information-rights- management-to-a-list-or-library-HA010154148.aspx and the Work Smart Guide "Secure Collaboration using SharePoint Online" at http://aka.ms/customerworksmart. Using IRM to protect email messages To restrict permissions on email messages and prevent recipients from forwarding, printing, or copying sensitive data, do the following: 1. In Outlook 2013, on the Mail page, select the Home tab, and click New Email. 2. In the new message, click the Options ribbon tab, and clickPermissions. Note: If you are not connected to your corporate network, you may first need to clickConnect to Rights Management Servers to get templates. Once connected to the server, a list of permissions displays. 3. Select the appropriate permission for the email message.
  • 3. 3 | Securing Your Business Information Configuring a message to expire 1. In Outlook 2013, on the Mail Home tab, click New Email. 2. In the new message, click the Options ribbon tab. 3. In the More Options section, click Delay Delivery. 4. Select the Expires after check box and enter date and time. 5. Click Close. Using IRM to protect emails in Outlook Web App To restrict permissions on email messages and to prevent recipients from forwarding, printing, or copying sensitive data, when using Exchange 2013, do the following: 1. In OWA, on the Outlook page, click new mail. 2. In the new message, click the ellipses (…). 3. In the drop-down list, select set permissions, and then select the appropriate permission for the email message.
  • 4. 4 | Securing Your Business Information Note:When users send an IRM-protected message from OWA, any files attached to the message also receive the same IRM protection and are protected by using the same rights policy template as the message. In Exchange 2013, IRM protection is applied to files associated with Microsoft Office Word, Excel, and PowerPoint, as well as .xps files and email messages. IRM protection is applied to an attachment only if it's not already IRM-protected. Using IRM to protect a document You also can protect Microsoft Office Word, Microsoft Office Excel, and Microsoft Office PowerPoint files by applying IRM: 1. In Word 2013, click File, and on the Info page, click Protect Document. 2. SelectRestrict Access and click to select the appropriate restriction to apply. Note: If you are not connected to yourcorporate network, you may first need to clickConnect to Rights Management Servers to get templates. Once connected to the server, a list of permissions displays. Specifying who can access or change a document 1. In Word 2013, click File, and on the Info page, click Protect Document. 2. UnderRestrict Access click Restricted Access. 3. In the Permissions window, select the Restrict Permissions to this document check box.
  • 5. 5 | Securing Your Business Information 4. Add users in the Read or Change boxes and click OK. Configuring a file to expire Use IRM to enforce an expiration date so that recipients cannot access the file after a specific date: 1. In Word 2013, click File, and on the Info page, click Protect Document. 2. Under Restrict Access click Restricted Access. 3. In the Permissions window, select the Restrict Permissions to this document check box. 4. In the Permissions window, click More Options. 5. Select the This document expires on: check box, enter an expiration date, and click OK. 6. When the date has passed, the user will not be able to open the document.
  • 6. 6 | Securing Your Business Information How to password protect a section in OneNote 2013 1. In OneNote, open the section you wish to protect and select the Review tab. 2. Under Password Protection, select Set Password. 3. In the Password Protection window, enter and confirm your new password and click OK. 4. A pop-up window appears. Select whether to keep or delete existing backups of the section that do not have the assigned password. How to change or remove a password from a section in OneNote 2013 1. In OneNote, open the section that is password protected and select the Review tab. 2. Under Password Protection, select Change Password or Remove Password. a. If changing the password, enter the old and new password and confirm the new password. Then, click OK. b. If removing the password, enter the password and click OK. Applying S/MIME to email messages Secure/Multipurpose Mail Extensions (S/MIME) enables you to encrypt and/or digitally sign your email messages. Encrypting your messages converts regular text data with an encrypted text so that only people who you specify can read it. Digitally signing an email message helps ensure that no tampering occurs while your message and its attachments are in transit. Signing a message digitally with S/MIME Signing a message digitally applies an authorized certificate to it that validates that the message is from you and is unaltered. To sign a message digitally: 1. In Outlook 2013, in an open message, click the Options tab. 2. In the More Options group, click the arrow in the lower-right corner to expand options box. 3. Under Security, click Security Settings.
  • 7. 7 | Securing Your Business Information 4. Select the Add digital signature to this message check box. 5. Select the following options, if applicable: Select the Send this message as clear text signed check box to enable recipients who do not have S/MIME security to read the message. Select the Request S/MIME receipt for this message check box to verify that the recipient validates the digital signature and receives the message unaltered, and for you to receive an email notification about who opens the message and when it is opened. 6. Click OK. Notes: For more information about S/MIME in Office 2010, seehttp://office.microsoft.com/en- us/outlook-help/send-an-email-message-with-an-s-mime-receipt-request- HP010356428.aspx. For more information about S/MIME in Office 2013, seehttp://office.microsoft.com/en- us/outlook-help/send-an-email-message-with-an-s-mime-receipt-request- HA102748933.aspx. Encrypting a message with S/MIME Encrypting a message with S/MIME means that recipients cannot access it unless they have a private key that matches the public key that you used for encryption. To encrypt a message with S/MIME: 1. In Outlook 2013, in an open message, click the Options tab. 2. In the More Options group, click the arrow in the lower-right corner to expand options box. 3. Under Security, click Security Settings.
  • 8. 8 | Securing Your Business Information 4. Select Encrypt message contents and attachments. 5. To change additional settings, such as selecting a specific certificate to use, click Change Settings, make the changes, click OK twice, and then click Close. Enabling recipients to access encrypted files When you send an encrypted message, S/MIME uses the recipient’s certificate and public key to encrypt the file. Therefore, you have to exchange certificates and keys before you can send and access encrypted messages from a specific person. If you plan to send an encrypted message to someone: 1. Send the person an email that you sign digitally by following the directions in the previous section “Signing a Message Digitally with S/MIME”. Signing your message digitally ensures that your public encryption key is included. This enables the person to send you encrypted email. 2. Ask the person to send you a digitally signed email that includes their public encryption key. This enables you to send them encrypted email. 3. Create an entry in your Outlook contacts for the person, which saves that person’s encryption key. After that, Outlook uses this key every time that you send this person an encrypted message. To create a contact entry: 4. Open a digitally signed email from the person, right-click the person’s name or email address, and select Add to Outlook Contacts. Important: If you want to exchange encrypted messages with an external party that does not have a secure email certificate, refer them to Thawte at http://www.thawte.com/home.htmlor VeriSign at http://www.verisign.com/index.html.
  • 9. 9 | Securing Your Business Information Protecting data with BitLocker BitLocker Drive Encryption is a data protection feature available inWindows Vista, Windows 7, and Windows 8.BitLocker encrypts the hard drives on your computer to provide enhanced protection against data theft or exposure on computers and removable drives that are lost, stolen, or decommissioned.More information about BitLocker is available at http://technet.microsoft.com/en-us/library/hh831713.aspx. BitLocker To Go provides drive encryption helps protect against unauthorized access on your portable storage drives. This includes the encryption of USB flash drives, SD cards, external hard disk drives, and other removable drives formatted by using the NTFS, FAT, or exFAT file systems. Note:For step-by-step guidance about how to enable BitLocker and BitLocker To Go in Windows 8, download the “Work Smart: Protecting Data with Windows 8 BitLocker”guide available at http://aka.ms/customerworksmart. Protecting data with EFS If your computer is not BitLocker compatible, you can use Encrypted File System (EFS)to encrypt your files and folders by using a certificate. EFS requires that users with whom you share information enter the appropriate decryption key before they can access the encrypted content. Although you can encrypt files individually, it is recommendedthat you designate a specific folder to store your encrypted files, and to encrypt that folder. All files that are created in or moved to the encrypted folder will automatically obtain the encrypted attribute. How to encrypt a folder: 1. Right-click a folder you want to encrypt, and then click Properties. 2. On the General tab, click Advanced. 3. In the Advanced Attributes dialog box, click theEncrypt contents to help secure datacheckbox and click OK.
  • 10. 10 | Securing Your Business Information 4. You will be returned to the General tab. Click Apply. 5. In the Confirm Attribute Changes dialog box, select Apply changes to this folder, subfolders, and files and click OK. Important Note: Encryption of theMy Documents folder is not recommended. If you move, copy, or save a file to an encrypted folder, the file becomes encrypted. If you move, copy, or save an encrypted file to a location that is not on your computer, the file becomes decrypted. For more information Information Rights Management (IRM) http://technet.microsoft.com/en-us/library/cc179103.aspx Introduction to IRM for email messages http://office.microsoft.com/en-us/outlook-help/introduction-to-irm-for- email-messages-HA102749366.aspx Secure/Multipurpose Internet Mail Extensions (S/MIME) http://technet.microsoft.com/en-us/library/jj891023.aspx BitLocker http://technet.microsoft.com/en-us/library/hh831713.aspx Encrypted File System (EFS) http://technet.microsoft.com/en-us/library/bb457116.aspx Video: Getting Started with Encrypting File System in Windows 7 http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with- the-encrypting-file-system-in-windows-7.aspx
  • 11. 11 | Securing Your Business Information International Data Protection Standards http://download.microsoft.com/download/B/8/2/B8282D75-433C-4B7E- B0A0-FFA413E20060/international_privacy_standards.pdf Work Smart by Microsoft IT http://aka.ms/customerworksmart Modern IT Experience featuring IT Showcase http://microsoft.com/microsoft-IT This guide is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT. © 2014 Microsoft Corporation. All rights reserved.