Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

AIP (Azure Information Protection) III: protecting Office files

2025-01-18 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

The first two articles introduced how to enable AIP and a simple application: protecting email. Today we introduce one of the most important features of AIP, protecting Office files!

1. When you start the Azure subscription protected by AIP, and check the current status, you can see 5 default policies, which can be enabled according to your needs.

2. Enable the self-definition feature to allow users to customize protection policies:

3. Before using this feature, you also need to make sure that Office is logged in normally. If not, please log in first!

4. After login, the display is as follows:

5. Install the AIP client on the client side, download the connection:: https://www.microsoft.com/en-us/download/details.aspx?id=53018, the installation method is very simple, run, next step, finish! If batch installation is done through SCCM or group policy for enterprise batch deployment, you can refer to the following article: https://blog.51cto.com/hubuxcg/2062689.

6. After the installation is completed, when you start the Office program for the first time, you will be prompted to log in to AIP, enter the O365 account password with enabled permissions to log in, and you will find another protection option on the Office application menu.

7. Click the small triangle below the protection, and you can see that several policies have been released, corresponding to those seen in the first step above.

8. Test the custom policy:

9, enter email address, note: AIP protection does not support personal email address, such as: MSN, Outlook, QQ, 163,etc., it must be a corporate email address, can be your own corporate email address, can also be an external email address.

10. Configure the policy and select authorized users or groups, which can be multiple. The semicolon can also be used in the middle of the email address to set a time limit, that is, the file is allowed to open within a limited date. After expiration, the file becomes invalid and cannot be opened.

11. After setting the permissions, you can send the mail by mail, USB disk and other means. If the other party is also an O365 user, you can directly open the file, and there will be a reminder at the top of the file: restricted access, expiration information. After opening the file, you will find that the forward and print buttons are gray and cannot be used! The same file cannot be screenshot. When you use the screenshot tool, you will find that the window automatically turns black.

12, select the text in the file and other contents, can not be copied, with shortcuts are also invalid!

13. The screenshot (screenshot tool) can no longer be used. If you use the QQ screenshot tool, the window automatically turns black.

14. If the other party does not use O365, when you open the file, you will be prompted to "change the user" and enter your email address.

15. Prompt Office to connect to the network to obtain authorization. After verification, you can see the contents of the file. Similarly, the protected file

16. The file creator can track and undo the file at any time

17. After tracking and revocation, enter the account number and password in the web page to view the number of times the file was opened, the last opening time, the rejected users and other information, or you can directly revoke the access rights.

18. You can further track the specific viewing times, time and other information.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report