Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Exchange Server 2010 : Implementing Compliance (part 1) - Configuring IRM

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
5/23/2011 11:15:43 AM

1. Configuring IRM

IRM provides persistent online and offline protection of email messages and attachments by applying the information protection technology AD RMS. IRM protection is configured by applying an AD RMS rights policy template. You can use policy templates to control permissions that recipients have on a message.

1.1. AD RMS Rights Policy Templates

Exchange 2010 ships with the Do Not Forward template. When this template is applied to a message, only the recipients addressed in the message can decrypt the message, and these recipients cannot forward the message to anyone else, copy content from the message, or print the message. You can create additional RMS templates on the AD RMS server in your organization (if installed) to meet your IRM protection requirements.

The following EMS command retrieves the list of active rights management services policy templates that are currently available to the Exchange Server 2010 server on which the command is run:

Get-RMSTemplate

1.2. Applying IRM Protection

IRM protection can be applied to messages manually by Outlook users. This process uses the IRM functionality in Outlook, but you can use Exchange to take actions (such as applying transport protection rules) that enforce your organization’s messaging policy. OWA users can protect messages they send and view IRM-protected messages they receive.

In Outlook 2010, you can create Outlook protection rules that automatically IRM-protect messages. Outlook 2010 applies IRM protection when a user is composing a message. You can create transport protection rules on Hub Transport servers.

1.3. Configuring IRM Features and Testing IRM Configuration

You can use the EMS but not the EMC to configure IRM features. The Set-IRMConfiguration cmdlet is used to enable or disable IRM for internal messages and to enable or disable transport decryption, journal report decryption, IRM for Exchange Search, and IRM in OWA.

The following command enables licensing and hence enables IRM features for messages sent to internal recipients (assuming that external licensing is currently disabled):

Set-IRMConfiguration -InternalLicensingEnabled $true

The following command enables licensing and hence enables IRM features for messages sent to external recipients if external licensing is currently disabled:

Set-IRMConfiguration -ExternalLicensingEnabled $true

Journal report decryption attaches a decrypted copy of an IRM-protected message to the journal report. The following command enables Journal report decryption if it is currently disabled:

Set-IRMConfiguration -JournalReportDecryptionEnabled $true

IRM features are enabled in OWA by default. The following command disables IRM features in OWA:

Set-IRMConfiguration -OWAEnabled $false

The following command enables IRM features in OWA if they have previously been disabled:

Set-IRMConfiguration -OWAEnabled $true

If transport decryption is mandatory, any message that cannot be decrypted is rejected, and a non-delivery report (NDR) is returned to the sender. The following command sets transport decryption to mandatory:

Set-IRMConfiguration -TransportDecryptionSetting mandatory

If transport decryption is disabled, no attempt is made to decrypt internal or external messages before delivery. The following command sets transport decryption to disabled:

Set-IRMConfiguration -TransportDecryptionSetting disabled

Setting transport decryption to optional provides a best effort approach to decryption. Messages are decrypted if possible but are delivered even if decryption fails. The following command sets transport decryption to optional:

Set-IRMConfiguration -TransportDecryptionSetting optional

If you want to view the current IRM configuration—either the default values before you configure it or the values after configuration—you enter the following command:
Get-IRMConfiguration | FL

The following command tests the IRM configuration for messages Kim Akers sends to Don Hall:

Test-IRMConfiguration -Sender [email protected] -Recipient [email protected]

1.4. Using Transport Protection Rules

These are transport rules that implement messaging policies by inspecting message content, encrypting sensitive email content, and using rights management to control access. Transport protection rules apply an AD RMS rights policy template to protect messages through IRM.

You can use either the New Transport Rule Wizard in the EMC or the New-TransportRule EMS cmdlet to create a transport protection rule. To use the EMS to create a transport protection rule, your first step is to discover what rights management templates are available. The following command generates a list of available templates (note that this command does not list the pre-installed Do Not Forward template):

Get-RMSTemplate | FL

You then use a command that creates a transport protection rule. For example, if you wanted to create a rule named Protect-Confidential that IRM-protects messages that contain the word “Confidential” in the Subject field using the Do Not Forward template, you would use the following command:

New-TransportRule -Name "Protect-Confidential" -SubjectContainsWords "Confidential"
-ApplyRightsProtectionTemplate "Do Not Forward"

1.5. Protecting Outlook and OWA Messages

Outlook protection rules help an organization protect against the risk of information leakage by automatically applying IRM protection to messages. In Outlook 2010, messages are IRM-protected before they leave the Outlook client. This protection is also applied to any attachments using supported file formats. When you create Outlook protection rules on an Exchange Server 2010 server, these rules are automatically distributed to Outlook 2010 by Exchange Web Services.

You can use the EMS but not the EMC to create an Outlook protection rule. For example, the following command creates the Outlook protection rule MyProject. This rule protects messages sent to the TechnicalAuthors distribution group with the AD RMS template Protect-Confidential:

New-OutlookProtectionRule -Name "MyProject" -SentTo "TechnicalAuthors"
-ApplyRightsProtectionTemplate "Protect-Confidential"

You can use the Get-OutlookProtectionRule EMS cmdlet to obtain the configuration of an existing Outlook protection rule and the Set-OutlookProtectionRule EMS cmdlet to change that configuration. You can also use the Remove-OutlookProtectionRule EMS cmdlet to remove an Outlook protection rule. For example, the following command removes the MyProject Outlook protection rule:

Remove-OutlookProtectionRule -Identity "MyProject"
1.6. Enabling or Disabling IRM in OWA

You can use commands based on the Set-IRMConfiguration EMS cmdlet to enable or disable IRM in OWA for your entire Exchange Server 2010 organization. You can also enable or disable IRM for an OWA virtual directory using the Set-OWAVirtualDirectory cmdlet and setting the IRMEnabled parameter to $true (the default) or $false. Alternatively, you can enable or disable IRM for an OWA mailbox policy using the Set-OWAMailboxPolicy cmdlet and setting the IRMEnabled parameter to $true (the default) or $false.

The following command enables IRM in OWA for an entire Exchange Server 2010 organization:

Set-IRMConfiguration -OWAEnabled $true

The following command disables IRM in OWA for the virtual directory MyVirtualDirectory on Client Access server VAN-EX2:

Set-OWAVirtualDirectory -Identity VAN-EX2\MyVirtualDirectory -IRMEnabled $false

Note:

Note that the Set-IRMConfiguration cmdlet supports the OWAEnabled parameter, whereas the Set-OWAVirtualDirectory and Set-OWAMailboxPolicy cmdlets support the IRMEnabled parameter.

Other -----------------
- Windows Server 2003 : Troubleshooting Name Resolution
- Windows Server 2003 : Planning DNS Security
- Windows Server 2003 : Implementing a NetBIOS Name Resolution Strategy
- BizTalk 2010 Recipes : Business Activity Monitoring - Deploying BAM Activities and Views
- BizTalk 2010 Recipes : Business Activity Monitoring - Creating BAM Activities and Views
- SharePoint 2010 Command Line Backup and Restore: Setting the Stage
- SharePoint 2010 Command Line Backup and Restore: Granular Backup and Restore via PowerShell
- SharePoint 2010 Command Line Backup and Restore: Reviewing Your Backup and Restore History
- Windows Server 2008 : Choosing Server Roles
- Windows Server 2008 : Overview of Site and Replication Topology
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server