Home
%3CLINGO-SUB%20id%3D%22lingo-sub-270216%22%20slang%3D%22en-US%22%3EAzure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-270216%22%20slang%3D%22en-US%22%3E%3CH1%20id%3D%22azure-information-process-and-ediscovery-processes%22%20id%3D%22toc-hId-1847561261%22%20id%3D%22toc-hId-1900409506%22%20id%3D%22toc-hId-1900409506%22%20id%3D%22toc-hId-1900409506%22%20id%3D%22toc-hId-1900409506%22%20id%3D%22toc-hId-1900409506%22%3ESummary%3C%2FH1%3E%0A%3CP%3EA%20common%20question%20from%20Azure%20Information%20Protection%20administrators%20revolves%20around%20how%20they%20can%20decrypt%20protected%20messages%20and%20documents%20as%20part%20of%20eDiscovery%20processes.%20The%20purpose%20of%20this%20article%20is%20to%20describe%20common%2C%20supported%20approaches%20to%20performing%20eDiscovery%20across%20mailboxes%20and%20PST%20files.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1097622710%22%20id%3D%22toc-hId--1044774465%22%20id%3D%22toc-hId--1044774465%22%20id%3D%22toc-hId--1044774465%22%20id%3D%22toc-hId--1044774465%22%20id%3D%22toc-hId--1044774465%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22discovery-first-approach%22%20id%3D%22toc-hId-645187625%22%20id%3D%22toc-hId-698035870%22%20id%3D%22toc-hId-698035870%22%20id%3D%22toc-hId-698035870%22%20id%3D%22toc-hId-698035870%22%20id%3D%22toc-hId-698035870%22%3EDiscovery%20First%20Approach%3C%2FH3%3E%0A%3CP%3ENo%20matter%20what%20service%20or%20software%20your%20organization%20uses%20for%20eDiscovery%2C%20it's%20important%20to%20perform%20a%20first-pass%20discovery%20on%20the%20mailbox%20or%20PST%20file.%20In%20general%2C%20that%20pattern%20looks%20like%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EExport%20mailbox%20to%20PST%20file%20(not%20necessary%20with%20Office%20365%20eDiscovery).%3C%2FLI%3E%0A%3CLI%3EUse%20eDiscovery%20tool%20to%20perform%20discovery%20on%20contents.%3C%2FLI%3E%0A%3CLI%3EGenerate%20PST%20of%20in-scope%20items.%3C%2FLI%3E%0A%3CLI%3EUse%20decryption%20tool%20to%20provide%20decrypted%20output%20of%20PST.%3C%2FLI%3E%0A%3CLI%3EComplete%20import%20by%20adding%20decrypted%20output%20to%20eDiscovery%20tool.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EIdeally%2C%20the%20eDiscovery%20process%20occurs%20prior%20to%20export%2C%20but%20in%20many%20organizations%20that's%20not%20the%20case.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CBLOCKQUOTE%3E%0A%3CP%3ENote%3A%20Office%20365%20Security%20and%20Compliance%20Center%20eDiscovery%20performs%20discovery%20prior%20to%20export.%20See%20below%20for%20additional%20details.%3C%2FP%3E%0A%3C%2FBLOCKQUOTE%3E%0A%3CH3%20id%3D%22toc-hId--1906969336%22%20id%3D%22toc-hId--1854121091%22%20id%3D%22toc-hId--1854121091%22%20id%3D%22toc-hId--1854121091%22%20id%3D%22toc-hId--1854121091%22%20id%3D%22toc-hId--1854121091%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22office-365-ediscovery%22%20id%3D%22toc-hId--164159001%22%20id%3D%22toc-hId--111310756%22%20id%3D%22toc-hId--111310756%22%20id%3D%22toc-hId--111310756%22%20id%3D%22toc-hId--111310756%22%20id%3D%22toc-hId--111310756%22%3EOffice%20365%20eDiscovery%3C%2FH3%3E%0A%3CP%3EeDiscovery%20in%20Office%20365%20Security%20and%20Compliance%20Center%20is%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Fsecuritycompliance%2Fexport-search-results%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ecapable%20of%20searching%20for%20encrypted%20items%3C%2FA%3E%20%3CSTRONG%3Eprior%20to%20export.%3C%2FSTRONG%3E%20This%20has%20a%20few%20benefits.%20First%2C%20the%20output%20PST%20file%2C%20while%20still%20requiring%20decryption%2C%20will%20be%20much%20smaller%20than%20the%20raw%20mailbox%20dump.%20%3CSTRONG%3EMailboxes%20where%20eDiscovery%20is%20performed%20as%20the%20first%20step%20will%20see%20their%20size%20decreased%20by%20up%20to%2096%25.%3C%2FSTRONG%3E%20Office%20365%20Security%20and%20Compliance%20Center%20will%20be%20able%20to%20reason%20over%20protected%20content%20stored%20in%20Exchange%20online%20and%20export%20all%20discovered%20items%2C%20included%20the%20encrypted%20messages%2C%20to%20a%20PST%20file.%20Optionally%2C%20it%20can%20decrypt%20the%20encrypted%20mail%20on%20export.%20It%20should%20be%20noted%20that%20these%20decrypted%20mail%20items%20will%20be%20stored%20as%20individual%20files%20rather%20than%20bundled%20as%20a%20PST%20and%20today%20cannot%20decrypt%20protected%20attachments.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EOffice%20365%20eDiscovery%20can%20generate%20three%20types%20of%20PST%20output%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EExport%20only%20indexed%20items%3C%2FLI%3E%0A%3CLI%3EExport%20indexed%20and%20partially%20indexed%20items%3C%2FLI%3E%0A%3CLI%3EExport%20only%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Foffice365%2Fsecuritycompliance%2Fpartially-indexed-items-in-content-search%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Epartially%20indexed%3C%2FA%3E%20items%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EMessages%20and%20attachments%20protected%20with%20Azure%20Information%20Protection%2C%20as%20long%20as%20they%20originated%20in%20the%20tenant%20where%20eDiscovery%20is%20performed%2C%20will%20be%20indexed%20and%20included%20with%20the%20indexed%20export.%20Items%20that%20couldn't%20be%20decrypted%20due%20to%20originating%20from%20an%20external%20tenant%20will%20be%20included%20in%20the%20partially%20indexed%20output.%20Once%20the%20export%20of%20choice%20is%20complete%2C%20the%20PST%20can%20be%20processed%20by%20the%20decryption%20cmdlet%2C%20which%20will%20result%20in%20a%20PST%20that%20contains%20no%20encrypted%20content.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1578651334%22%20id%3D%22toc-hId-1631499579%22%20id%3D%22toc-hId-1631499579%22%20id%3D%22toc-hId-1631499579%22%20id%3D%22toc-hId-1631499579%22%20id%3D%22toc-hId-1631499579%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22third-party-ediscovery%22%20id%3D%22toc-hId--973505627%22%20id%3D%22toc-hId--920657382%22%20id%3D%22toc-hId--920657382%22%20id%3D%22toc-hId--920657382%22%20id%3D%22toc-hId--920657382%22%20id%3D%22toc-hId--920657382%22%3EThird-Party%20eDiscovery%3C%2FH3%3E%0A%3CP%3EAn%20alternative%20to%20the%20process%20above%20involves%20exporting%20the%20entire%20mailbox%20to%20a%20PST%20file%2C%20then%20running%20eDiscovery%20processes%20against%20that%20PST%20file.%20The%20common%20pitfall%20that%20causes%20delays%20in%20the%20discovery%20process%20is%20that%20administrators%20will%20attempt%20to%20decrypt%20the%20contents%20of%20the%20entire%20PST%20%3CEM%3Eprior%20to%20performing%20eDiscovery%3C%2FEM%3E.%20%3CSTRONG%3EThe%20Azure%20Information%20Protection%20PowerShell%20module%20supports%20PSTs%20up%20to%205GB%20in%20size%3C%2FSTRONG%3E.%20For%20this%20reason%2C%20it's%20important%20to%20trim%20down%20the%20data%20set%20prior%20to%20processing.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ERather%20than%20decrypting%20massive%20PST%20files%20that%20may%20take%20many%20hours%2C%20or%20days%2C%20to%20decrypt%2C%20when%20in%20reality%20less%20than%2010%25%20of%20the%20contents%20were%20encrypted%2C%20the%20following%20process%20is%20recommended%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3EExport%20PST%20from%20Exchange%20Online%20or%20Exchange%20Server%2C%20or%20from%20workstation%20where%20user%20had%20stored%20mail.%3C%2FLI%3E%0A%3CLI%3EImport%20PST%20in%20to%20preferred%20third-party%20eDiscovery%20tool.%3C%2FLI%3E%0A%3CLI%3EeDiscovery%20tool%20will%20likely%20error%20on%20all%20encrypted%20contents.%20Generate%20a%20PST%20of%20all%20encrypted%20items.%3C%2FLI%3E%0A%3CLI%3EUse%20PowerShell%20module%20to%20decrypt%20this%20much%20PST%20file%20that%20contains%20all%20encrypted%20items.%3C%2FLI%3E%0A%3CLI%3EImport%202nd%20output%20PST%20in%20to%20discovery%20tool.%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%3EWhile%20this%20results%20in%20extra%20round%20trips%2C%20it%20greatly%20reduces%20the%20time%20to%20resolution%20as%20only%20a%20single%20full-pass%20is%20required%20by%20the%20eDiscovery%20software%20rather%20than%20a%20full%20pass%20by%20the%20decryption%20cmdlet%2C%20then%20another%20pass%20by%20the%20eDiscovery%20tool.%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-769304708%22%20id%3D%22toc-hId-822152953%22%20id%3D%22toc-hId-822152953%22%20id%3D%22toc-hId-822152953%22%20id%3D%22toc-hId-822152953%22%20id%3D%22toc-hId-822152953%22%3E%26nbsp%3B%3C%2FH3%3E%0A%3CH3%20id%3D%22third-party-integration%22%20id%3D%22toc-hId--1782852253%22%20id%3D%22toc-hId--1730004008%22%20id%3D%22toc-hId--1730004008%22%20id%3D%22toc-hId--1730004008%22%20id%3D%22toc-hId--1730004008%22%20id%3D%22toc-hId--1730004008%22%3EThird-Party%20Integration%3C%2FH3%3E%0A%3CP%3EIf%20the%20above%20options%20aren't%20ideal%20for%20your%20organization%2C%20the%20best%20path%20forward%20will%20be%20to%20ask%20your%20eDiscovery%20vendor%20or%20partner%20to%20integrate%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fmipsdk%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Information%20Protection%20SDK%3C%2FA%3E%20into%20their%20application%20or%20service.%20The%20MIP%20SDK%20will%20allow%20them%20to%20decrypt%20the%20messages%20and%20documents%20as%20they're%20found%2C%20and%20to%20include%20the%20result%20in%20their%20index%20and%20discovery%20output.%20This%20does%20require%20that%20the%20organization%20has%20an%20account%20in%20your%20tenant%20with%20sufficient%20privileges%2C%20most%20likely%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fpowershell%2Fmodule%2Faadrm%2Fadd-aadrmsuperuser%3Fview%3Dazureipps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3Esuper%20user%3C%2FA%3E.%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-156471587%22%20id%3D%22toc-hId-209319832%22%20id%3D%22toc-hId-209319832%22%20id%3D%22toc-hId-209319832%22%20id%3D%22toc-hId-209319832%22%20id%3D%22toc-hId-209319832%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22conclusion%22%20id%3D%22toc-hId--1510408809%22%20id%3D%22toc-hId--1457560564%22%20id%3D%22toc-hId--1457560564%22%20id%3D%22toc-hId--1457560564%22%20id%3D%22toc-hId--1457560564%22%20id%3D%22toc-hId--1457560564%22%3EConclusion%3C%2FH2%3E%0A%3CP%3ETrimming%20down%20the%20set%20of%20data%20that%20must%20be%20decrypted%20by%20first%20or%20third%20party%20tools%20%3CSTRONG%3Eprior%20to%20performing%20decryption%3C%2FSTRONG%3E%20reduces%20the%20time%20and%20complexity%20required%20to%20deliver%20eDiscovery%20results%20to%20interested%20parties.%20The%20steps%20outlined%20above%20are%20the%20common%20approaches%20we%20see%20customers%20taking%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EAdditional%20Information%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CP%3EVisit%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fitshowcase%2FArticle%2FContent%2F843%2FOffice-365-meets-evolving-eDiscovery-challenges-in-a-cloudfirst-world%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20meets%20evolving%20eDiscovery%20challenges%20in%20a%20cloud-first%20world%3C%2FA%3E%20to%20read%20more%20on%20how%20Microsoft%20legal%20handles%20eDiscovery.%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F65718%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CSPAN%3ETHR1040%20-%20Intelligent%20tenant%20search%20capability%20in%20Microsoft%20365%3A%20Reduce%20time%2C%20risk%20and%20costs%20for%20legal%20eDiscovery%20and%20beyond%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fmyignite.techcommunity.microsoft.com%2Fsessions%2F65698%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%20noopener%20noreferrer%22%3EBRK3224%20-%20Microsoft%20365%20Search%20Solutions%3A%20Legal%20eDiscovery%20and%20beyond%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ELeave%20a%20comment%20with%20any%20thoughts%20or%20feedback!%20We'd%20love%20to%20get%20more%20information%20to%20learn%20about%20how%20your%20organization%20is%20tackling%20this%20issue%20today.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E-Tom%20Moser%2C%20Sr.%20Program%20Manager%2C%20Azure%20Information%20Protection%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-270216%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EA%20common%20question%20from%20Azure%20Information%20Protection%20administrators%20revolves%20around%20how%20they%20can%20decrypt%20protected%20messages%20and%20documents%20as%20part%20of%20eDiscovery%20processes.%20The%20purpose%20of%20this%20article%20is%20to%20describe%20common%2C%20supported%20approaches%20to%20performing%20eDiscovery%20across%20mailboxes%20and%20PST%20files.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-270216%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Information%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-301130%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-301130%22%20slang%3D%22en-US%22%3EThank%20you!%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-301095%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-301095%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F49%22%20target%3D%22_blank%22%3E%40Amy%20Dolzine%3C%2FA%3E%26nbsp%3Bit%20should%20work%20on%20any%20metadata%20tag%20as%20none%20of%20those%20are%20encrypted%2C%20just%20the%20file%20contents.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-301094%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-301094%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F187969%22%20target%3D%22_blank%22%3E%40Laura%20Curran%3C%2FA%3E%26nbsp%3Bin%20the%20tests%20that%20I%20ran%20you%20can%20find%20an%20AIP%20encrypted%20document%20if%20you%20know%20the%20file%20name%20or%20another%20metadata%20field.%26nbsp%3B%20As%20an%20example%2C%20I%20encrypted%20a%20document%20that%20contained%20a%20specific%20word%20and%20could%20not%20find%20it%20anywhere%20(Search%2C%20Delve%2C%20eDiscovery).%20However%2C%20if%20I%20searched%20for%20the%20filename%20I%20was%20able%20to%20find%20it%20and%20export%20it%20which%20removed%20the%20encryption.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-301056%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-301056%22%20slang%3D%22en-US%22%3E%3CP%3ECurious%20if%20you%20or%20anyone%20on%20this%20thread%20can%20answer%20this%3A%20In%26nbsp%3BAzure%20Information%20Protection%2C%20if%20you%20use%20labels%20with%20protection%20(encryption)%20you%20can%20only%20search%20for%20filenames%20and%20metadata%20in%20SP.%20I%20am%20wondering%20what%20is%20the%20specific%20metadata%20in%20SP%20that%20we%20can%20search%20on%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-295488%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-295488%22%20slang%3D%22en-US%22%3E%3CP%3EFollowing%20up%20on%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F14149%22%20target%3D%22_blank%22%3E%40David%20Broussard%3C%2FA%3E%26nbsp%3Bquestion%20-%20Are%20we%20able%20to%20discover%20documents%20that%20are%20AIP%20encrypted%20within%20OneDrive%20or%20SharePoint%20using%20the%20eDiscovery%20search%3F%20Specifically%2C%20when%20using%20keyword%20searches%20for%20the%20contents%20of%20the%20document%3F%20Additionally%2C%20we%20also%20have%20the%20same%20questions%20as%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F81794%22%20target%3D%22_blank%22%3E%40Mike%20Oliveira%3C%2FA%3E.%3C%2FP%3E%3CP%3EThanks!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-279151%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-279151%22%20slang%3D%22en-US%22%3E%3CP%3EThank%20you%20for%20the%20article%2C%20it%20helped%20us%20in%20our%20implementation%20understand%20this%26nbsp%3Bcontent%20was%20discoverable%20and%20retrievable.%26nbsp%3B%20Do%20you%20know%20if%20there%20are%20any%20plans%20to%20allow%20general%20searching%20within%20the%20content%20of%20a%20SharePoint%20Online%2FOneDrive%20for%20Business%20document%20if%20you%20are%20a%20permitted%20member%20to%20view%3F%26nbsp%3B%20We%20have%20tested%20general%20searching%20of%20the%20encrypted%20content%20and%20it%20does%20not%20find%20it%20within%20SharePoint's%20search%20engine%20for%20permitted%20members.%26nbsp%3B%20In%20addition%20any%20plans%20to%20allow%20it%20to%20display%20in%20the%20Online%20versions%20of%20Office%20(Word%2C%20Excel%2C%20etc...)%20since%20the%20user%20is%20authenticated%20into%20those%20programs%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-275892%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-275892%22%20slang%3D%22en-US%22%3E%3CP%3EYes%2C%20this%20was%20a%20document%20stored%20in%20OneDrive.%20I%20haven't%20specifically%20tested%20SharePoint%20but%20I%20suspect%20it%20would%20work%20the%20same%20way.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-275841%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-275841%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F14149%22%20target%3D%22_blank%22%3E%40David%20Broussard%3C%2FA%3E!%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIn%20your%20test%2C%20are%20you%20using%20SharePoint%20or%20OneDrive%3F%20I%20suppose%20that%20this%20is%20a%20point%20of%20clarification%20I%20should%20make.%20I%20was%20referring%20specifically%20to%20email%20discovery%2C%20which%2C%20in%20my%20testing%2C%20does%20discover%20protected%20attachments.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-274669%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-274669%22%20slang%3D%22en-US%22%3E%3CP%3EMy%20experience%20with%20this%20is%20a%20bit%20different.%20Yes%2C%20eDiscovery%20can%20find%2C%20decrypt%2C%20and%20export%20RMS%20encrypted%20files...but%20only%20if%20you%20found%20them%20via%20a%20metadata%20search.%20If%20the%20document%20is%20encrypted%20and%20you%20look%20for%20content%20or%20keywords%20that%20are%20only%20in%20the%20document%20it%20doesn't%20appear%20to%20find%20that%20document.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EExample%3A%20I%20created%20a%20document%20with%20a%20single%20word%20in%20it%20%22whataboutism%22%20and%20called%20it%20document.docx.%20Waited%20for%20a%20crawl%20and%20then%20found%20it%20and%20was%20able%20to%20eDiscover%20it%20as%20well.%20Then%20I%20encrypted%20it%20via%20AIP%20and%20waited%20for%20a%20crawl.%20I%20could%20not%20find%20the%20document%20in%20search%20or%20eDiscovery.%26nbsp%3B%20I%20could%20find%20it%20if%20I%20searched%20for%20the%20document%20name%2C%20but%20not%20by%20the%20word%20in%20the%20document.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-467924%22%20slang%3D%22en-US%22%3ERe%3A%20Azure%20Information%20Protection%20and%20eDiscovery%20Processes%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-467924%22%20slang%3D%22en-US%22%3E%3CP%3EHello%20%40TomMoser%2C%20great%20content%2C%20I%20have%20specific%20question%3A%20%3CA%20href%3D%22https%3A%2F%2Fstackoverflow.com%2Fquestions%2F55732310%2Fazure-information-protection-how-to-decrypt-emls-coming-from-ews-api%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fstackoverflow.com%2Fquestions%2F55732310%2Fazure-information-protection-how-to-decrypt-emls-coming-from-ews-api%3C%2FA%3E%3C%2FP%3E%3CP%3EFor%20visibility%20I%20am%20pasting%20content%20here%20as%20well%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EGiven%3A%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E--We%20use%20EWS%20API%20to%20download%20email%20messages%20from%20Office%20365%20(Exchange%20Online)%3C%2FP%3E%3CP%3E--When%20emails%20are%20encrypted%20using%20AIP%2C%20body%20comes%20in%20encrypted%3C%2FP%3E%3CP%3E--Admin%20user%20is%20super-user%20-%20this%20user's%20creds%20are%20used%20to%20make%20requests%20against%20EWS%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EAsk%3A%3C%2FSTRONG%3E%3C%2FP%3E%3CP%3E--In%20order%20to%20decrypt%2C%20it%20seems%20that%20we%20need%20to%20use%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Finformation-protection%2Fdevelop%2Fconcept-handler-protection-cpp%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Finformation-protection%2Fdevelop%2Fconcept-handler-protection-cpp%3C%2FA%3E.%20Is%20this%20the%20correct%20API%20to%20use%3F%20enter%20image%20description%20here%3C%2FP%3E%3CP%3E--If%20so%2C%20above%20API%20is%20in%20C%2B%2B.%20Is%20there%20anything%20available%20in%20C%23%3F%20--Simple%20samples%20of%20how%20to%20decrypt%20a%20message%20would%20be%20appreciated%3F%3C%2FP%3E%3CP%3E--Final%20question%2C%20is%20there%20a%20way%20to%20avoid%20decryption%20all%20together%20by%20setting%20some%20higher-level%20permission%20on%20the%20user%20that%20we%20use%20for%20EWS%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

Summary

A common question from Azure Information Protection administrators revolves around how they can decrypt protected messages and documents as part of eDiscovery processes. The purpose of this article is to describe common, supported approaches to performing eDiscovery across mailboxes and PST files.

 

Discovery First Approach

No matter what service or software your organization uses for eDiscovery, it's important to perform a first-pass discovery on the mailbox or PST file. In general, that pattern looks like:

  • Export mailbox to PST file (not necessary with Office 365 eDiscovery).
  • Use eDiscovery tool to perform discovery on contents.
  • Generate PST of in-scope items.
  • Use decryption tool to provide decrypted output of PST.
  • Complete import by adding decrypted output to eDiscovery tool.

Ideally, the eDiscovery process occurs prior to export, but in many organizations that's not the case.

 

Note: Office 365 Security and Compliance Center eDiscovery performs discovery prior to export. See below for additional details.

 

Office 365 eDiscovery

eDiscovery in Office 365 Security and Compliance Center is capable of searching for encrypted items prior to export. This has a few benefits. First, the output PST file, while still requiring decryption, will be much smaller than the raw mailbox dump. Mailboxes where eDiscovery is performed as the first step will see their size decreased by up to 96%. Office 365 Security and Compliance Center will be able to reason over protected content stored in Exchange online and export all discovered items, included the encrypted messages, to a PST file. Optionally, it can decrypt the encrypted mail on export. It should be noted that these decrypted mail items will be stored as individual files rather than bundled as a PST and today cannot decrypt protected attachments.

 

Office 365 eDiscovery can generate three types of PST output:

 

  1. Export only indexed items
  2. Export indexed and partially indexed items
  3. Export only partially indexed items

Messages and attachments protected with Azure Information Protection, as long as they originated in the tenant where eDiscovery is performed, will be indexed and included with the indexed export. Items that couldn't be decrypted due to originating from an external tenant will be included in the partially indexed output. Once the export of choice is complete, the PST can be processed by the decryption cmdlet, which will result in a PST that contains no encrypted content.

 

Third-Party eDiscovery

An alternative to the process above involves exporting the entire mailbox to a PST file, then running eDiscovery processes against that PST file. The common pitfall that causes delays in the discovery process is that administrators will attempt to decrypt the contents of the entire PST prior to performing eDiscovery. The Azure Information Protection PowerShell module supports PSTs up to 5GB in size. For this reason, it's important to trim down the data set prior to processing.

 

Rather than decrypting massive PST files that may take many hours, or days, to decrypt, when in reality less than 10% of the contents were encrypted, the following process is recommended:

 

  1. Export PST from Exchange Online or Exchange Server, or from workstation where user had stored mail.
  2. Import PST in to preferred third-party eDiscovery tool.
  3. eDiscovery tool will likely error on all encrypted contents. Generate a PST of all encrypted items.
  4. Use PowerShell module to decrypt this much PST file that contains all encrypted items.
  5. Import 2nd output PST in to discovery tool.

While this results in extra round trips, it greatly reduces the time to resolution as only a single full-pass is required by the eDiscovery software rather than a full pass by the decryption cmdlet, then another pass by the eDiscovery tool.

 

Third-Party Integration

If the above options aren't ideal for your organization, the best path forward will be to ask your eDiscovery vendor or partner to integrate the Microsoft Information Protection SDK into their application or service. The MIP SDK will allow them to decrypt the messages and documents as they're found, and to include the result in their index and discovery output. This does require that the organization has an account in your tenant with sufficient privileges, most likely super user.

 

Conclusion

Trimming down the set of data that must be decrypted by first or third party tools prior to performing decryption reduces the time and complexity required to deliver eDiscovery results to interested parties. The steps outlined above are the common approaches we see customers taking today.

 

Additional Information

Visit Office 365 meets evolving eDiscovery challenges in a cloud-first world to read more on how Microsoft legal handles eDiscovery.

THR1040 - Intelligent tenant search capability in Microsoft 365: Reduce time, risk and costs for leg...

BRK3224 - Microsoft 365 Search Solutions: Legal eDiscovery and beyond

 

 

Leave a comment with any thoughts or feedback! We'd love to get more information to learn about how your organization is tackling this issue today.

 

-Tom Moser, Sr. Program Manager, Azure Information Protection

10 Comments
Contributor

My experience with this is a bit different. Yes, eDiscovery can find, decrypt, and export RMS encrypted files...but only if you found them via a metadata search. If the document is encrypted and you look for content or keywords that are only in the document it doesn't appear to find that document.

 

Example: I created a document with a single word in it "whataboutism" and called it document.docx. Waited for a crawl and then found it and was able to eDiscover it as well. Then I encrypted it via AIP and waited for a crawl. I could not find the document in search or eDiscovery.  I could find it if I searched for the document name, but not by the word in the document. 

Microsoft

Hi @David Broussard

 

In your test, are you using SharePoint or OneDrive? I suppose that this is a point of clarification I should make. I was referring specifically to email discovery, which, in my testing, does discover protected attachments. 

 

 

 

 

Contributor

Yes, this was a document stored in OneDrive. I haven't specifically tested SharePoint but I suspect it would work the same way. 

Regular Visitor

Thank you for the article, it helped us in our implementation understand this content was discoverable and retrievable.  Do you know if there are any plans to allow general searching within the content of a SharePoint Online/OneDrive for Business document if you are a permitted member to view?  We have tested general searching of the encrypted content and it does not find it within SharePoint's search engine for permitted members.  In addition any plans to allow it to display in the Online versions of Office (Word, Excel, etc...) since the user is authenticated into those programs?

Senior Member

Following up on @David Broussard question - Are we able to discover documents that are AIP encrypted within OneDrive or SharePoint using the eDiscovery search? Specifically, when using keyword searches for the contents of the document? Additionally, we also have the same questions as @Mike Oliveira.

Thanks!

Curious if you or anyone on this thread can answer this: In Azure Information Protection, if you use labels with protection (encryption) you can only search for filenames and metadata in SP. I am wondering what is the specific metadata in SP that we can search on?

Contributor

@Laura Curran in the tests that I ran you can find an AIP encrypted document if you know the file name or another metadata field.  As an example, I encrypted a document that contained a specific word and could not find it anywhere (Search, Delve, eDiscovery). However, if I searched for the filename I was able to find it and export it which removed the encryption.

Contributor

@Amy Dolzine it should work on any metadata tag as none of those are encrypted, just the file contents. 

Thank you!
Occasional Visitor

Hello @TomMoser, great content, I have specific question: https://stackoverflow.com/questions/55732310/azure-information-protection-how-to-decrypt-emls-coming...

For visibility I am pasting content here as well:

 

Given:

--We use EWS API to download email messages from Office 365 (Exchange Online)

--When emails are encrypted using AIP, body comes in encrypted

--Admin user is super-user - this user's creds are used to make requests against EWS

 

Ask:

--In order to decrypt, it seems that we need to use https://docs.microsoft.com/en-us/information-protection/develop/concept-handler-protection-cpp. Is this the correct API to use? enter image description here

--If so, above API is in C++. Is there anything available in C#? --Simple samples of how to decrypt a message would be appreciated?

--Final question, is there a way to avoid decryption all together by setting some higher-level permission on the user that we use for EWS?