First published on CloudBlogs on Nov 30, 2017
As of December 2017, all documentation updates are now posted on our Tech Community blog:
Our technical writer, Carol Bailey, is letting you know what’s new and hot in the docs for November.
Follow us on Twitter (Microsoft Mobility
) and join in our peer community at
Gagan (on behalf of the Information Protection team)
Documentation for Azure Information Protection
has been updated on the web and the latest content has a
(or later) date at the top of the article.
Many of the doc updates this month support the public preview of the Azure Information Protection scanner, which was
last month. On our Yammer site, we've seen many people put the scanner through its paces and report back very favorably. Some of the resulting feedback is now incorporated into the documentation and if you also have questions or comments, now is a great time to share those with us!
One of the other important doc updates this month is to the version history page for the Azure Information Protection client. This page has now been extended to include a support statement that GA versions are supported for a period of six months from the date of their release.
As always, we listen to your feedback and try to incorporate it whenever possible. If you have feedback about the documentation, or want to see what others are discussing, head over to our
What’s new in the documentation for Azure Information Protection, November 2017
Frequently asked questions for Azure Information Protection
- New entry:
What’s the difference between Windows Server FCI and the Azure Information Protection scanner?
Frequently asked questions about classification and labeling in Azure Information Protection
- Updated the following entry with details about the metadata, to help you configure your DLP rules:
How can DLP solutions and other applications integrate with Azure Information Protection?
Quick start tutorial: Configure and publish the Azure Information Protection policy
- This second step of the tutorial is updated for this month's change to the policy settings. If you very recently got a subscription for Azure Information Protection, to complete the tutorial you will have to change the default for the new policy setting that makes custom permissions available to users.
Migrating from AD RMS to Azure Information Protection
- Updated the descriptions in the
overview of the steps
to include which steps can be skipped if you migrate using a "big bang" approach rather than a phased migration. Also updated the post migration tasks, with the renamed
Step 11. Complete client migration tasks
to include disabling the scheduled task, "AD RMS Rights Policy Template Management (Automated)" for Office 2010.
How to configure the policy settings for Azure Information Protection
- Updated for the new policy settings in the Azure portal:
Deploying the Azure Information Protection scanner to automatically classify and protect files
Display the Information Protection bar in Office apps
Add the Do Not Forward button to the Outlook ribbon
Make the custom permissions option available to users
- Updated to clarify which files the scanner can inspect, when files are rescanned, and information about optimizing the performance of the scanner and the factors that can affect the performance. The prerequisites are also updated to include a Windows client operating system for testing purposes, and the new minimum version of SQL Server 2012 (previously, the minimum version was SQL Server 2012 R2).
Azure Information Protection client: Version release history and support policy
- Updated to include the support lifecycle statement that the general availability (GA) versions of the Azure Information Protection client are supported for a period of six months from the date of their release. The versions older than this time period are now removed from this page.
Admin Guide: Custom configurations for the Azure Information Protection client
- Updated for the new advanced client setting:
Label an Office document by using an existing custom property
. This page is also updated for the advanced client settings that can now be configured as policy settings in the Azure portal.
Admin Guide: Using PowerShell with the Azure Information Protection client
- Updated the
How to label files non-interactively for Azure Information Protection
section with a note to add the Azure AD account to scoped policies, if needed. At the end of the procedure, added a tip to grant permissions to the apps if running Set-AIPAuthentication is not successful.
User Guide: Classify a file or email by using Azure Information Protection
- New article for end users if you are currently in the classify-only phase of deployment. These instructions do not include any of the protection configuration steps and options, which is suitable for when you haven't yet activated protection so users cannot protect documents and emails.