1 / 15

Windows Rights Management Security for Microsoft Documents and Emails Presented By Stephanie L. Moore, Ph.D. Patricia

Windows Rights Management Security for Microsoft Documents and Emails Presented By Stephanie L. Moore, Ph.D. Patricia Cantrell Center for the Enhancement of Teaching & Learning. Two ways to protect your data. Protect Individual Files Tool: Windows Rights Management

Audrey
Télécharger la présentation

Windows Rights Management Security for Microsoft Documents and Emails Presented By Stephanie L. Moore, Ph.D. Patricia

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Windows Rights Management Security for Microsoft Documents and Emails Presented By Stephanie L. Moore, Ph.D. Patricia Cantrell Center for the Enhancement of Teaching & Learning

  2. Two ways to protect your data • Protect Individual Files • Tool: Windows Rights Management • Encrypt data (like locking an entire section of your hard drive) • Tools: PGP or TrueCrypt

  3. Windows Rights Management Encryption

  4. The Difference

  5. Why/When WRM? • Sending sensitive information/data • Examples: • Sending information, data or ideas that should have a limited audience • Examples: • Sending content that should expire after a certain date • Examples:

  6. WRM - How Step 1: (UNC/enterprise solution) Turn on Windows Rights Management Already on your work machine as part of Windows Place call to Help Desk IT staff member will “turn it on” Little time, No cost Easy to use

  7. Document Permissions Icon Grayed out when not active Red circle with “dash” or “minus sign” WRM - How

  8. WRM - How staff.member@unco.edu staff.member2@unco.edu

  9. WRM - How

  10. WRM - How

  11. WRM – How - Email

  12. WRM – How - Email

  13. WRM – How - Email Permissions either all on or all off Overrides permissions set to attached documents SO … let’s look at handling attachments

  14. WRM – How – Email w/ Attachments • Do you want to protect what’s in the attachment, or what’s being communicated in the email? • Sensitive information in the email itself? – set permissions on the email • Sensitive information only in the attachment? – set permissions in Word, Excel or PowerPoint, attach to email, but do NOT secure email

  15. WRM – Let’s Practice! • Word, Excel or PowerPoint • Email – will have to practice on your machine

More Related