SlideShare une entreprise Scribd logo
1  sur  28
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Fighting Secrecy Challenge -
Azure Rights Management
Riwut Libinuko
1
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Event Sponsors
2
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Participate with us and stand a chance to win prizes!
Survey:
http://j.mp/abcsg-2016
Tweet Tag:
#GlobalAzure #GABSG
3
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Agenda
• Why we need Rights Management?
• Different between traditional protection and rights management
• Managing Azure RMS
• Demo
4
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Connect with Me
http://blog.libinuko.com
@cakriwut
http://www.youtube.com/user/cakriwut/
Riwut Libinuko
Microsoft Office Server Service MVP, Master
degree in Computer System Engineering, with
more than 15 years in IT industry.
Active contributors to MSDN Forum, Code Sample
Gallery, Curah, Nuget, Codeplex and many more.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Introduction
6
“The Panama Papers are a leaked set of 11.5 million confidential documents that provide detailed
information about more than 214,000 offshore companies listed by the Panamanian corporate service
provider Mossack Fonseca,..”
(Source: Wikipedia, https://en.wikipedia.org/wiki/Panama_Papers)
The Ponemon study found “..the average consolidated total cost of a data breach is $3.8 million
representing a 23% increase since 2013. The study also reports that the cost incurred for each lost
or stolen record containing sensitive and confidential information increased six percent from a
consolidated average of $145 to $154.”
(Source: IBM, Ponemon , http://www-03.ibm.com/security/data-breach/)
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Introduction
7
1. 74% report loss of customers
2. 59% faced potential litigation
3. 33% faced potential fines
4. 32% declined in share value
(Source: http://www.scottandscottllp.com/main/business_impact_of_data_breach.aspx)
(Source: https://en.wikipedia.org/wiki/Data_breach#2015)
•In October 2015, the British telecommuncations provider TalkTalk suffered a data
breach when a group of 15-years old hackers stole information on its 4 million
customers. The stock price of the company fell substantially due to the issue –
around 12% – owing largely to the bad publicity surrounding the leak.[11]
•In July 2015, adult website Ashley Madison suffered a data breach when a hacker
group stole information on its 37 million users. The hackers threatened to reveal
user names and specifics if Ashley Madison and a fellow site, EstablishedMen.com,
did not shut down permanently.[12]
•In February 2015, Anthem suffered a data breach of nearly 80 million records,
including personal information such as names, Social Security numbers, dates of
birth, and other sensitive details.[13]
•In June 2015, The Office of Personnel Management of the U.S. government
suffered a data breach in which the records of 4 million current and former federal
employees of the United States were hacked and stolen.
Major incident in 2015
Business Impact
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Traditional Protection
8
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Unprotected document
Encrypt
010101010100
010101010100
010101010101
Encrypted document
Decrypt
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USDSecret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Controlled Access doc
Unprotected document
Access GrantedFile Permission
Unprotected Protected Unprotected
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Information Rights Management
• Information Protection technology
– Protection is persisted with the data, content can travel anywhere (desktops, file shares, USB keys,
cloud drives, network and devices)
• Combines encryption and usage restrictions
– Prevent accidental disclosure of sensitive data by applying usage polices (cannot forward, cannot
print, read-only)
• Simple to use
– Authors just select a policy option, consumers just open documents
– Administrators can configure policies to protect content automatically
– Securely share data with individuals within organization
Source: https://mva.microsoft.com/en-
US/training-courses/encryption-in-office-365-
8404
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Rights Management Protection
10
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Unprotected document
Protect
010101010100
010101010100
010101010101
Encrypted document
Policy
ContentKey&
Rights
Secret financial
information
Profit : 100 USD
Loss: 10 USD
Tax: 0 USD
Decrypt
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Activate Azure RMS
• Using Office 365 Admin center , if you
have O365 with RMS subscription
(E3,E4,ES,A3,A4,AS,G3,G4)
• Using Azure Classic Portal site
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Install RMS Sharing Apps
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Azure RMS Key (Default)
15
Source : https://technet.microsoft.com/en-
us/library/dn440580.aspx
By default, Microsoft will generate your tenant
key and manage it. In this case you don’t need
to do any configuration.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Azure RMS Key (BYOK)
16
Source : https://technet.microsoft.com/en-
us/library/dn440580.aspx
Azure RMS also support tenant’s
managed key by Thales HSM.
However BYOK is not compatible with
Exchange Online.
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect data with Rights Management
Source : https://mva.microsoft.com/en-
US/training-courses/azure-rights-
management-services-core-skills-10500
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect SharePoint Online
Activate IRM protection at SharePoint
Admin
Configure Document Library/List to
use the IRM proection
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect Exchange Online
• Use PowerShell
• Tell Exchange Online where to find the Azure
RMS key for your location - example:
• Set-IRMConfiguration -
RMSOnlineKeySharingLocation
"https://sp-
rms.na.aadrm.com/TenantManagement/S
ervicePartner.svc"
• Import the key
• Import-RMSTrustedPublishingDomain -
RMSOnline -name "RMS Online"
• Enable IRM functionality
• Set-IRMConfiguration -
InternalLicensingEnabled $true
• Detailed procedures at
https://technet.microsoft.com/en-
us/library/dn151475(v=exchg.150).aspx
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Protect File Share (OnPrem)
Automated RMS in File
Classification policies
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Manage RMS Template
25
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Complete Azure RMS Fabric
Integration
BYO Key
Sync
Azure RMS
Connector
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Resources
27
http://channel9.msdn.com/
Microsoft Azure
http://azure.microsoft.com
http://msdn.microsoft.com https://mva.microsoft.com
Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
Thank You
28

Contenu connexe

Tendances

Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityDavid J Rosenthal
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveDavid J Rosenthal
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterCraig Jahnke
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...Joris Faure
 
Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-usKjetil Lund-Paulsen
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through WebEric Inch
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansDavid J Rosenthal
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanDavid J Rosenthal
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Radhakrishnan Govindan
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Kjetil Lund-Paulsen
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...David J Rosenthal
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 

Tendances (20)

Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + SecurityGet Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
Get Ahead of Cyber Attacks with Microsoft Enterprise Mobility + Security
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
File Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDriveFile Security in Microsoft SharePoint and OneDrive
File Security in Microsoft SharePoint and OneDrive
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Intro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance CenterIntro to Office 365 Security & Compliance Center
Intro to Office 365 Security & Compliance Center
 
From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...From classification to protection of your data, secure your business with azu...
From classification to protection of your data, secure your business with azu...
 
Azure information protection_datasheet_en-us
Azure information protection_datasheet_en-usAzure information protection_datasheet_en-us
Azure information protection_datasheet_en-us
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
EMS Diagram Click Through Web
EMS Diagram Click Through WebEMS Diagram Click Through Web
EMS Diagram Click Through Web
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 PlansMicrosoft Security - New Capabilities In Microsoft 365 E5 Plans
Microsoft Security - New Capabilities In Microsoft 365 E5 Plans
 
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by AtidanEmpower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
Empower Enterprise Mobility- Maximize Mobile Control- Presented by Atidan
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 
Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security Get ahead of cybersecurity with MS Enterprise Mobility + Security
Get ahead of cybersecurity with MS Enterprise Mobility + Security
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
Windows 10 Enterprise E3 - Best in Class Security and Control - Presented by ...
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 

Similaire à Global Azure Bootcamp 216 - Azure Rights Management

Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Benedek Menesi
 
March 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know WebinarMarch 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know WebinarRobert Crane
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarRobert Crane
 
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeedAnts - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeedDinh Le Dat (Kevin D.)
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Vanguard Visions
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)DavidNicholls52
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultAlberto Diaz Martin
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideBenedek Menesi
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarRobert Crane
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
July 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarJuly 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarRobert Crane
 
Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18TechSoup
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Vanguard Visions
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365Joanne Klein
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainEdge Pereira
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarRobert Crane
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...aOS Community
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSAmazon Web Services
 

Similaire à Global Azure Bootcamp 216 - Azure Rights Management (20)

Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
Office365 from a hacker's perspective: Real life Threats, Tactics and Remedie...
 
March 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know WebinarMarch 2021 Microsoft 365 Need to Know Webinar
March 2021 Microsoft 365 Need to Know Webinar
 
December 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know WebinarDecember 2019 Microsoft 365 Need to Know Webinar
December 2019 Microsoft 365 Need to Know Webinar
 
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeedAnts - AARRR Growth Hacking and The single biggest reason why startups succeed
Ants - AARRR Growth Hacking and The single biggest reason why startups succeed
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14Top tips for protecting your business online (updated) Feb 14
Top tips for protecting your business online (updated) Feb 14
 
Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)Office 365 smb guidelines for pure bookkeeping (slideshare)
Office 365 smb guidelines for pure bookkeeping (slideshare)
 
Global Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key VaultGlobal Azure Bootcamp 2017 - Azure Key Vault
Global Azure Bootcamp 2017 - Azure Key Vault
 
Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
May 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know WebinarMay 2018 Office 365 Need to Know Webinar
May 2018 Office 365 Need to Know Webinar
 
May 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know WebinarMay 2020 Microsoft 365 Need to Know Webinar
May 2020 Microsoft 365 Need to Know Webinar
 
July 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know WebinarJuly 2018 Azure Need to Know Webinar
July 2018 Azure Need to Know Webinar
 
Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18Webinar: Is the Cloud Right for You 2016-10-18
Webinar: Is the Cloud Right for You 2016-10-18
 
Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13Top tips for protecting your business online Oct 13
Top tips for protecting your business online Oct 13
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
October 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know WebinarOctober 2022 CIAOPS Need to Know Webinar
October 2022 CIAOPS Need to Know Webinar
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWS
 

Plus de Riwut Libinuko

Prototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLabPrototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLabRiwut Libinuko
 
Azure DevOps Deployment Group
Azure DevOps Deployment GroupAzure DevOps Deployment Group
Azure DevOps Deployment GroupRiwut Libinuko
 
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On LabGlobal Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On LabRiwut Libinuko
 
Azure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CDAzure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CDRiwut Libinuko
 
GAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint appsGAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint appsRiwut Libinuko
 
O365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side RenderingO365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side RenderingRiwut Libinuko
 
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrexPesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrexRiwut Libinuko
 

Plus de Riwut Libinuko (8)

Prototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLabPrototyping Office AddIns using ScriptLab
Prototyping Office AddIns using ScriptLab
 
Azure DevOps Deployment Group
Azure DevOps Deployment GroupAzure DevOps Deployment Group
Azure DevOps Deployment Group
 
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On LabGlobal Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
Global Office 365 Developer Bootcamp 2018 - SPFx jQuery Hands On Lab
 
Azure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CDAzure automation for SharePoint SelfHosted CI/CD
Azure automation for SharePoint SelfHosted CI/CD
 
GAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint appsGAB2017 - Azure function to build serverless SharePoint apps
GAB2017 - Azure function to build serverless SharePoint apps
 
O365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side RenderingO365 Saturday - Deepdive SharePoint Client Side Rendering
O365 Saturday - Deepdive SharePoint Client Side Rendering
 
SSAS Azure RemoteApp
SSAS Azure RemoteAppSSAS Azure RemoteApp
SSAS Azure RemoteApp
 
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrexPesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
Pesan kegembiraan dan ajakan rekonsiliasi pasukan bodrex
 

Dernier

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Dernier (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

Global Azure Bootcamp 216 - Azure Rights Management

  • 1. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Fighting Secrecy Challenge - Azure Rights Management Riwut Libinuko 1
  • 2. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Event Sponsors 2
  • 3. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Participate with us and stand a chance to win prizes! Survey: http://j.mp/abcsg-2016 Tweet Tag: #GlobalAzure #GABSG 3
  • 4. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Agenda • Why we need Rights Management? • Different between traditional protection and rights management • Managing Azure RMS • Demo 4
  • 5. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Connect with Me http://blog.libinuko.com @cakriwut http://www.youtube.com/user/cakriwut/ Riwut Libinuko Microsoft Office Server Service MVP, Master degree in Computer System Engineering, with more than 15 years in IT industry. Active contributors to MSDN Forum, Code Sample Gallery, Curah, Nuget, Codeplex and many more.
  • 6. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Introduction 6 “The Panama Papers are a leaked set of 11.5 million confidential documents that provide detailed information about more than 214,000 offshore companies listed by the Panamanian corporate service provider Mossack Fonseca,..” (Source: Wikipedia, https://en.wikipedia.org/wiki/Panama_Papers) The Ponemon study found “..the average consolidated total cost of a data breach is $3.8 million representing a 23% increase since 2013. The study also reports that the cost incurred for each lost or stolen record containing sensitive and confidential information increased six percent from a consolidated average of $145 to $154.” (Source: IBM, Ponemon , http://www-03.ibm.com/security/data-breach/)
  • 7. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Introduction 7 1. 74% report loss of customers 2. 59% faced potential litigation 3. 33% faced potential fines 4. 32% declined in share value (Source: http://www.scottandscottllp.com/main/business_impact_of_data_breach.aspx) (Source: https://en.wikipedia.org/wiki/Data_breach#2015) •In October 2015, the British telecommuncations provider TalkTalk suffered a data breach when a group of 15-years old hackers stole information on its 4 million customers. The stock price of the company fell substantially due to the issue – around 12% – owing largely to the bad publicity surrounding the leak.[11] •In July 2015, adult website Ashley Madison suffered a data breach when a hacker group stole information on its 37 million users. The hackers threatened to reveal user names and specifics if Ashley Madison and a fellow site, EstablishedMen.com, did not shut down permanently.[12] •In February 2015, Anthem suffered a data breach of nearly 80 million records, including personal information such as names, Social Security numbers, dates of birth, and other sensitive details.[13] •In June 2015, The Office of Personnel Management of the U.S. government suffered a data breach in which the records of 4 million current and former federal employees of the United States were hacked and stolen. Major incident in 2015 Business Impact
  • 8. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Traditional Protection 8 Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Unprotected document Encrypt 010101010100 010101010100 010101010101 Encrypted document Decrypt Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USDSecret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Controlled Access doc Unprotected document Access GrantedFile Permission Unprotected Protected Unprotected
  • 9. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Information Rights Management • Information Protection technology – Protection is persisted with the data, content can travel anywhere (desktops, file shares, USB keys, cloud drives, network and devices) • Combines encryption and usage restrictions – Prevent accidental disclosure of sensitive data by applying usage polices (cannot forward, cannot print, read-only) • Simple to use – Authors just select a policy option, consumers just open documents – Administrators can configure policies to protect content automatically – Securely share data with individuals within organization Source: https://mva.microsoft.com/en- US/training-courses/encryption-in-office-365- 8404
  • 10. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Rights Management Protection 10 Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Unprotected document Protect 010101010100 010101010100 010101010101 Encrypted document Policy ContentKey& Rights Secret financial information Profit : 100 USD Loss: 10 USD Tax: 0 USD Decrypt
  • 11. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 12. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Activate Azure RMS • Using Office 365 Admin center , if you have O365 with RMS subscription (E3,E4,ES,A3,A4,AS,G3,G4) • Using Azure Classic Portal site
  • 13. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 14. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Install RMS Sharing Apps
  • 15. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Azure RMS Key (Default) 15 Source : https://technet.microsoft.com/en- us/library/dn440580.aspx By default, Microsoft will generate your tenant key and manage it. In this case you don’t need to do any configuration.
  • 16. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Azure RMS Key (BYOK) 16 Source : https://technet.microsoft.com/en- us/library/dn440580.aspx Azure RMS also support tenant’s managed key by Thales HSM. However BYOK is not compatible with Exchange Online.
  • 17. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect data with Rights Management Source : https://mva.microsoft.com/en- US/training-courses/azure-rights- management-services-core-skills-10500
  • 18. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 19. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect SharePoint Online Activate IRM protection at SharePoint Admin Configure Document Library/List to use the IRM proection
  • 20. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 21. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect Exchange Online • Use PowerShell • Tell Exchange Online where to find the Azure RMS key for your location - example: • Set-IRMConfiguration - RMSOnlineKeySharingLocation "https://sp- rms.na.aadrm.com/TenantManagement/S ervicePartner.svc" • Import the key • Import-RMSTrustedPublishingDomain - RMSOnline -name "RMS Online" • Enable IRM functionality • Set-IRMConfiguration - InternalLicensingEnabled $true • Detailed procedures at https://technet.microsoft.com/en- us/library/dn151475(v=exchg.150).aspx
  • 22. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 23. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Protect File Share (OnPrem) Automated RMS in File Classification policies
  • 24. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/
  • 25. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Manage RMS Template 25
  • 26. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Complete Azure RMS Fabric Integration BYO Key Sync Azure RMS Connector
  • 27. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Resources 27 http://channel9.msdn.com/ Microsoft Azure http://azure.microsoft.com http://msdn.microsoft.com https://mva.microsoft.com
  • 28. Tweet: #GlobalAzure | http://singapore.azurebootcamp.net/ Thank You 28