AD Rights Management Services and the protection within


AD Rights Management Services and the protection within

IT professionals have spent the last several years watching security requirements for organisations become more and more complex. Information security used to be all about securing the perimeter of the network -- the so-called "hard and crunchy exterior" that came from a well-fortified firewall -- with little protection afforded to systems inside the network.

As threats such as Internet worms and viruses evolved, this model quickly became outdated. Security measures transitioned from simply securing the perimeter to shoring up the endpoint and network, adding host-based firewalls, and implementing

Continue Reading This Article

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor

intrusion detection and prevention technologies as an added layer of protection.

Security threats continue to evolve, however, and the protection of data has become an additional, growing concern. Consider the damage that could be caused to an organisation's reputation or intellectual property if a sensitive document was emailed outside of the company, or a document containing critical information was modified incorrectly, either accidentally or maliciously. Just as host-based firewalls were introduced to increase the security of an organisation beyond a perimeter firewall, we are now seeing new advances in data protection technologies as well.

One such solution is Microsoft Active Directory Rights Management Services (AD RMS). Implementing AD RMS allows you to configure persistent usage policies on your organisation's documents, which will remain embedded with the document regardless of where it is moved, copied, or otherwise stored.

Consider a situation in which the owner of a document moves it from one file share to another, where NTFS security on the document becomes less stringent than it should be. AD Rights Management Services can be used to create security settings that will persist with the document regardless of the server or file share it resides on, or even if it is emailed within or outside of an organisation. AD RMS also includes support for federated business partnerships through the use of Active Directory Federation Services (ADFS).

AD Rights Management Services relies on client software along with AD RMS-enabled browsers and applications -- not all applications are or can be used to create RMS-protected content. Some examples of RMS-enabled applications include Microsoft Word, Outlook, and PowerPoint 2007 or higher. Specifically, you need to have the Enterprise, Professional Plus, or Ultimate versions of Office 2007 in order to create rights-protected content.

As for the necessary client software, Windows 7 and Vista include the AD RMS client out of the box, while other operating systems can download the necessary client software from the Microsoft website. Additionally, AD RMS provides developer tools and a software development kit (SDK) to allow third-parties to create RMS add-ons for other software applications.

Looking for more information on AD RMS? Check out this overview on the basics of Rights Management Services in Windows.

Laura E. Hunter, the Principal for LHA Consulting, is a six-time recipient of the Microsoft MVP award in Windows Server System - Directory Services, and is a Microsoft Certified Masters in Windows Server 2008 Active Directory. She is also an active technical speaker, author and presenter focusing in the Active Directory, Federated Identity and Identity Management spaces.

This was first published in May 2010

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.