How to make reference to this User Guide You can first learn the basic concepts of IRM and what you need to prepare for using IRM:. The detailed explanation of the ways of protection, suggestion for usage and the files types supported can be found in the following sections. The Operation Guide illustrates step-by-step procedures on sending and reading protected email/file under different platforms, from which you can use the appropriate method to protect your email/file using IRM in accommodate with your needs.
- Rights Management Services (rms Client For Mac Pro
- Windows Rights Management Services Client
- Download Rights Management Client
Some examples are outlined to facilitate understanding. The following common usage scenarios illustrate how colleagues work together to use IRM to protect documents:. You can also refer to the list of Frequently Asked Questions under FAQ and IRM’s Limitations below:. 1. Introduction IRM (Information Rights Management) is a technology that allows individuals to set access permissions to files and email messages (including attachments). ITS adopted an IRM solution based on Microsoft Azure Information Protection (AIP, formerly known as Azure Rights Management Services).
This helps prevent sensitive information from being printed, forwarded, or copied by unauthorized people. After permission for a file or an email is restricted by using IRM, the access and usage restrictions are enforced even if the file/email reaches unintended recipients. IRM is currently available for use by staff for email communication. It enables the control of information to be accessed securely (through the use of encryption) by the right persons (through proper rights assignment). The following types of control can be applied by the senders:. Install 'AIP” (“Azure Information Protection” viewer developed by Microsoft) for accessing files with protection on Android and iOS devices. Install “RMS sharing application” (“Rights Management sharing application” developed by Microsoft) for accessing files with protection on Mac PCs.
The function on Track and Revoke files requires an add-on license to work. Such licenses are assigned to staff on Band G/H/I/J and Terms of Service I who joined the University before 1 June 2017. These licenses may be reclaimed for assignment to other colleagues if they have not been used over a period of time. If you wish to use these functions but have not been assigned with the said license, please send your HKU Portal UID to. Supported Platforms The table below illustrates the supported operating systems together with its corresponding supported email systems. If your attachment contains Microsoft Office file without any protection, protection configured to the email message will be applied to attachment(s) automatically. Send an email with protected attachment(s) Custom Permissions using AIP client.
Rights Management Services (rms Client For Mac Pro
Email body will not be protected. Supported types of files: - Text (.txt) and image (.jpg,.png,.bmp) files - Microsoft Office (Word, Excel, PowerPoint) files - Portable document format (.pdf) (no usage rights are enforced for non-supported types of files) Send a protected email with protected attachment(s) Custom Permissions using AIP client +. Supported types of files: - Text (.txt) and image (.jpg,.png,.bmp) files - Microsoft Office (Word, Excel, PowerPoint) files - Portable document format (.pdf) (no usage rights are enforced for non-supported types of files) Protect file on hard disk for owner access only Protect by applying the label 'Confidential' or 'Restricted' Original files will be replaced e.g.pdf.ppdf. Please click for more common usage scenarios. Types of Files Supported 7.1. Types of files supporting full IRM protection protected using AIP:. If you attach Outlook message files (.msg) to a 'Do Not Forward' email message (such as forwarding multiple Outlook messages within one message), the attached messages will not be protected.
Operation Guide The following sections illustrate step-by-step procedures on sending and reading protected email/file under different platforms, in which you can choose the different methods of protecting your email/file using IRM appropriate to your needs. NOTE: RMS Sharing Application for Windows is being replaced by AIP (Azure Information Protection). Staff who installed RMS Sharing Application earlier please uninstall the retiring version and install AIP instead. For the operation guide regarding RMS Sharing Application for Windows platform, please click. Sending and Reading a Protected Email (and attachments) using Policy Templates 8.1.1.
Windows Rights Management Services Client
Writing a protected email. 8.1.2. Opening a protected email. 8.2. Sending (by email) and Opening a Protected File using Share Protected and Protect in-place 8.2.3. Opening a protected file. 8.4.
Download Rights Management Client
Limitations.