In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)06/03 Report--
The last article mentioned that if you activate AIP, this article introduces one of the simplest applications to protect email content.
1. First assign the AIP license to the user
2. Download AIP client program, install AIP client, download connection:
Https://www.microsoft.com/en-us/download/details.aspx?id=53018
3. For enterprise batch deployment, you can install it in batches through SCCM or group policy. Please refer to the following article:
Https://blog.51cto.com/hubuxcg/2062689
4. After the installation is completed, restart any Office program, and you will be prompted to log in to AIP:
5. Enter the O365 account password with enabled permissions to log in.
6. Open the Outlook configured with the O365 email account, create a new email, and you will find one more protection option on the mail menu.
7. In the email, click do not forward
8. Enter the content of the test email and send it.
9. When the recipient receives the message, a red forbidden symbol is displayed on the message:
10. If the recipient opens the AIP email for the first time, the system will automatically verify with the Azure backend. After confirming the recipient's identity, you can view the content of the email. After opening the email, you will find that the forward and print buttons of the email are grayed out and cannot be used!
11, also select the text in the message and other content, can not be copied, using shortcut keys is also invalid!
12. what is more amazing is that the screenshot (screenshot tool) can no longer be used. in the screenshot tool, the mail window automatically turns black, and the black part is as big as the mail window is.
13. You can't even see the contents of the email when the window is switched.
14. If attachments are added to the message, all files that support rights management will be automatically protected, such as Office files, which can not be copied, forwarded, printed, etc., although the recipients are allowed to modify, save, etc., the saved files are also protected by the same permissions! However, if non-Office files are not protected, such as TXT, they can also be copied, saved, printed, etc.
15. Open the received Excel attachment file and view the following permissions:
16. If the recipient is not an O365 user, the email received will look like this, prompting you to receive a protected email, and the user needs to click "read email".
17. Automatically connect to the O365 website to check the email. If the recipient is a Microsoft email address, you can choose to log in with this account. After entering the Microsoft account password, you can obtain authorization and view the email content. You can also choose to log in with an one-time password.
18. At this time, the email content you see cannot be forwarded or printed, and the email content cannot be selected to copy, but because it is in IE, you can take screenshots (screenshots), which is still different from Outlook!
19. If the recipient is a non-Microsoft email address, after clicking to view the email, there is only one option: log in with an one-time password:
20. After you click to log in with an one-time password, the system will automatically send the password to your email.
21. Enter the received password (valid for 15 minutes) to view the content of the email
Conclusion: while AIP protects email, it also brings some inconvenience, especially for non-Outlook users and recipients of non-Microsoft accounts.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.