Blog Post

Microsoft Security Community Blog
4 MIN READ

Azure Information Protection Documentation Update for August 2017

Azure Information Protection Team's avatar
Sep 08, 2018
First published on CloudBlogs on Aug 31, 2017
Hi everybody Our technical writer, Carol Bailey, is letting you know what’s new and hot in the docs for August. Reminders: Follow us on Twitter ( http://twitter.com/danplastina ) and join in our peer community at http://www.yammer.com/AskIPTeam . Dan (on behalf of the Information Protection team) The https://docs.microsoft.com/en-us/information-protection/ has been updated on the web and the latest content has an August 2017 (or later) date at the top of the article. Updates this month support the recent https://blogs.technet.microsoft.com/enterprisemobility/2017/08/30/azure-information-protection-status-update-august-2017/ , and information about the current preview version of the Azure Information Protection client. With the changes to activation, the default policy and default templates, and setting permissions for protection, the https://docs.microsoft.com/en-us/information-protection/get-started/infoprotect-quick-start-tutorial has been updated to reflect these changes. Let us know how you get on with the updated instructions! We always listen to your feedback, which is why the documentation updates also include corrections and clarifications for existing features. We value customer feedback and try to incorporate it whenever possible.  If you have feedback about the documentation, you can contact us by emailing mailto:askipteam@microsoft.com?subject=Documentation%20feedback .

What's new in the documentation for Azure Information Protection, August 2017

Documentation articles that have significant technical changes since the last update (July 2017): https://docs.microsoft.com/en-us/information-protection/get-started/infoprotect-quick-start-tutorial - This tutorial has been updated to use the Azure portal for activation, and creates a new sub-label that you configure for permissions. Previous versions of the tutorial edited an existing sub-label and linked one of the default templates to configure the protection settings. https://docs.microsoft.com/en-us/information-protection/understand-explore/how-does-it-work - Updated the cryptographic controls section, to clarify that Azure Information Protection supports key lengths of 1024 bits and 2048 bits. https://docs.microsoft.com/en-us/information-protection/plan-design/migrate-from-ad-rms-to-azure-rms - Updated guidance if you are currently running in cryptographic mode 1. The final step is also updated for rekeying if you have a Microsoft-managed key. https://docs.microsoft.com/en-us/information-protection/deploy-use/activate-service - Updated to remove the instructions for activating by using the Azure classic portal now that the option to do this in the Azure portal is no longer in preview. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-default - Updated the current default policy with the information that starting August 30, label names and descriptions now include translated versions. For the Recipients Only sub-labels, the previous Do Not Forward protection option is automatically replaced with the user defined permissions for Do Not Forward in Outlook. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-protection - Updated for the new (preview) option for user defined permissions, and the Edit Template button. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-adrms-restrictions - Updated the https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-adrms-restrictions#additional-limitations-when-using-hyok section to clarify the Do Not Forward entry, and added a new limitation for user defined permissions when this new preview option is configured for Word, Excel, PowerPoint, and File Explorer. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-markings - Updated to clarify when visual markers get applied for the current GA version of the client, and the current preview client. Also updated with the information that visual markers support one language only, and that the current preview client supports multiple lines of text for visual markers. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-classification - Updated for the new preview options for information types and regular expressions. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-templates - Updated with the information that you can now edit the default templates, and information about when you can select the new Edit Template button. https://docs.microsoft.com/en-us/information-protection/deploy-use/configure-policy-languages - Updated to include templates. https://docs.microsoft.com/en-us/information-protection/deploy-use/install-configure-rms-connector - Updated to include information about the installation log. https://docs.microsoft.com/en-us/information-protection/deploy-use/operations-microsoft-managed-tenant-key - Updated the https://docs.microsoft.com/en-us/information-protection/deploy-use/operations-microsoft-managed-tenant-key#rekey-your-tenant-key section to replace the previous instructions now that you can use PowerShell to rekey your tenant key and no longer have to contact Support for this key management operation. https://docs.microsoft.com/en-us/information-protection/rms-client/client-admin-guide - Updated the .msi prerequisites for Office 2013 and added a new prerequisite for Office 2016. Also added a link to the client languages that Office supports. https://docs.microsoft.com/en-us/information-protection/rms-client/client-classify-protect - Updated the instructions for setting custom permissions when you use the current preview client and browse for users and groups. This option uses the Select Users or Groups dialog box for your on-premises Active Directory. To use this option, your computer must be connected to the internal network, your computer must be joined to the domain, and you must have an on-premises Active Directory. https://docs.microsoft.com/en-us/powershell/module/azureinformationprotection/unprotect-rmsfile - This cmdlet from the AzureInformationProtection module (and the equivalent from the RMSProtection module) is updated to correct the information about the -LogFile parameter.
Published Sep 08, 2018
Version 1.0
No CommentsBe the first to comment