Linkedin Learning - Microsoft Azure Rights Management: Protecting Data (2018 EN)

Discussion in 'Business & Management' started by Kanka, Jul 16, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Linkedin Learning
    Author: Brian Culp
    Full Title: Microsoft Azure Rights Management: Protecting Data
    Year: 2018
    Language: English
    Genre: Educational: Network administration
    Skill Level: Intermediate
    Price: €20.65
    -
    Files: MP4 (+ Subtitles .VTT)
    Time: 01:16:04
    Video: AVC, 1280 x 720 (1.778) at 15.000 fps, 200 kbps
    Audio: AAC at 160 Kbps, 2 channels, 48.0 KHz



    Azure Rights Management offers data security in Office 365. This cloud-based service uses encryption, identity, and authorization policies to help protect user data. What's more, it works across multiple devices—phones, tablets, and PCs. This course provides an overview of Azure Rights Management, including the business scenarios in which it can be used. Then, through a series of demos, instructor Brian Culp shows how to plan for Azure Rights Management, activate the service, deploy templates in Office 365, and encrypt documents and email.


    Lessons:
    1. Introduction
    01. Welcome
    02. What you should know

    2. Plan for Office 365 Azure Rights Management
    03. Understand and activate Azure Rights Management
    04. Overview of Azure RMS prerequisites
    05. Activating the Rights Management service
    06. Examine the global policy
    07. Deploy the IRM client
    08. Use classification and labeling

    3. Implement Information Rights Management
    09. Protect emails using Azure RMS
    10. Create a sublabel for classification
    11. Prompt for document classification
    12. Use conditional labels
    13. Assign permissions to SharePoint libraries
    14. Protect documents using Office 365 permissions

    4. Secure Documents with Office 365 RMS
    15. Safely share documents
    16. Track a protected document
    17. Encrypt an entire email thread
    18. Secure external email
    19. Additional resources

    5.Conclusion
    20. Next steps


    -------------
     
    Last edited: Jul 16, 2019