07 June, 2009

Active Directory Rights Management Server


ITBLOG7.BLOGSPOT.COM 1


ITBLOG7.BLOGSPOT.COM 2

Active Directory Rights Management Services (AD RMS) is an information protection technology that works with AD RMS-enabled applications to help safeguard digital information from unauthorised use within the orgsanization and within the Federated identities. Content owners can define who can open, modify, print, forward or take any other action with the information.

By using Active Directory Rights Management Services (AD RMS) and the AD RMS client, you can augment an organization's security strategy by protecting information through persistent usage policies, which remain with the information, no matter where it is moved. You can use AD RMS to help prevent sensitive information—such as financial reports, product specifications, customer data, and confidential e-mail messages—from intentionally or accidentally getting into the wrong hands.

An AD RMS system includes a Windows Server® 2008-based server running the Active Directory Rights Management Services (AD RMS) server role that handles certificates and licensing, a database server, and the AD RMS client. The latest version of the AD RMS client is included as part of the Windows Vista® operating system. The deployment of an AD RMS system provides the following benefits to an organization:

· Safeguard sensitive information. Applications such as word processors, e-mail clients, and line-of-business applications can be AD RMS-enabled to help safeguard sensitive information Users can define who can open, modify, print, forward, or take other actions with the information. Organizations can create custom usage policy templates such as "confidential - read only" that can be applied directly to the information.

· Persistent protection. AD RMS augments existing perimeter-based security solutions, such as firewalls and access control lists (ACLs), for better information protection by locking the usage rights within the document itself, controlling how information is used even after it has been opened by intended recipients.

· Flexible and customizable technology. Independent software vendors (ISVs) and developers can AD RMS-enable any application or enable other servers, such as content management systems or portal servers running on Windows or other operating systems, to work with AD RMS to help safeguard sensitive information. ISVs are enabled to integrate information protection into server-based solutions such as document and records management, e-mail gateways and archival systems, automated workflows, and content inspection.


ITBLOG7.BLOGSPOT.COM 3


ITBLOG7.BLOGSPOT.COM 4


ITBLOG7.BLOGSPOT.COM 5


ITBLOG7.BLOGSPOT.COM 6


ITBLOG7.BLOGSPOT.COM 7


ITBLOG7.BLOGSPOT.COM 8


ITBLOG7.BLOGSPOT.COM 9


ITBLOG7.BLOGSPOT.COM 10


ITBLOG7.BLOGSPOT.COM 11


ITBLOG7.BLOGSPOT.COM 12


ITBLOG7.BLOGSPOT.COM 13


ITBLOG7.BLOGSPOT.COM 14


ITBLOG7.BLOGSPOT.COM 15


ITBLOG7.BLOGSPOT.COM 16


ITBLOG7.BLOGSPOT.COM 17


ITBLOG7.BLOGSPOT.COM 18


Please let me know if this post was helpful.

No comments:

Post a Comment