Windows Rights Management Security for Microsoft Documents and Emails Presented By Stephanie L. Moore, Ph.D. Patricia Cantrell Center for the Enhancement.

Slides:



Advertisements
Similar presentations
Slide 1 of 7 Permission Overrides The purpose of the Permission Assignment pages is to allow staff members with appropriate security to post overrides.
Advertisements

Services Course Evaluation. 2 How to complete the Evaluation The Evaluation consists of 10 multiple choice questions to test.
1 CA202 Spreadsheet Application Collaborating with Colleagues Lecture # 16 Dammam Community College.
Network Login Username Login not case sensitive, but password is Password changes Keeps history of last 3 passwords Must be alpha-numeric & or use upper/lowercase.
Perimeter Church Perimeter Network Introduction 2005.
1 of 6 Parts of Your Notebook Below is a graphic overview of the different parts of a OneNote 2007 notebook. Microsoft ® OneNote ® 2007 notebooks are digital.
1 of 4 Note When you first use desktop faxing, you will be prompted to sign up for a fax service. Click OK to open your Web browser, and then follow the.
Fullerton Joint Union High School District 9 th Annual Parent Leaders Welcome Back Meeting August 22, 2014 Google Apps for Education Information 1.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
1 Computer Security: Protect your PC and Protect Yourself.
Get up to speed Send and receive attachments and pictures Sending and receiving attached files in Outlook 2007 is just as easy as it’s always been—and.
Lesson 10 Operating System Customization
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Services Course Live Groups Participant Guide.
Syncing OneNote Notebooks to SkyDrive STEP 1: In OneNote open one of your notebooks. Go to FILE – SHARE - WEB. STEP 2: If you have a Windows Live account,
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
April, 2008 Microsoft Rights Management Service (RMS) Review.
UNDERSTANDING YOUR COMPUTER
BY: Group B Jessica T. George Maria L. Moya Rekeisha A. Scott Stephanie N. Williams.
JMU Outlook, Messenger, and Skydrive An easier way to upload and store files to share.
ETP Reloaded e-Commission Technological Platform Upgrade to Microsoft Office 2003 DIGIT Adapted to DG SCIC.
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
Connecting Businesses and Staff Tools for the Virtual Office  Microsoft Groove Office Collaboration Software  Skype VOIP Telephone  Transferring Files.
In addition to Word, Excel, PowerPoint, and Access, Microsoft Office® 2013 includes additional applications, including Outlook, OneNote, and Office Web.
Training PowerPoint.  Just plug into the USB port on your computer. You will find USB ports on the front or back of your computer.  If you have a laptop.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
INTRODUCTION TO OFFICE 365 How To Share and Organize All In One Secure Place Panagiota “Penny” Damianeas Assessment & Testing Specialist.
Collaborate on Documents Microsoft Word Introduction Word 2010 makes it easy for groups of people to edit one document. You can easily edit documents.
1. Chapter 25 Protecting and Preparing Documents.
Send An with an Attachment in Microsoft Outlook Use Skype to Talk with Others Communicate with Windows Live Messenger on Mobile Create a Signature.
*Note: If you would like to view the transcript of the audio, click Notes in the upper right section of the screen. Main Window The Training Interface.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
UNDERSTANDING YOUR COMPUTER
Excel Electronic Membership Directions, Examples and Operational Hints. Created by: Jim Armbruster.
Getting Started with SharePoint 2010 Gareth Johns IT Skills Development Advisor.
What’s New in Office 2007 By: Kathleen MacKinnel.
ONE® Pages Training Presentation North York General Hospital.
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
 Desktop computer at work  Laptop computer for work  Computer at home  The Dilemma: having access to your  Documents  Events  Notes  To Do List.
Prerequisite Office 2013 has OneDrive already installed, no action required If still on Office 2010, you will need OneDrive installed on your machine.
Microsoft ® Outlook 2000 Integrating Outlook with Office Applications.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Microsoft Office 2010 Basics
Understand Encryption LESSON 2.5_A Security Fundamentals.
© 2006 Verizon. All Rights Reserved. PTE /14/06 Verizon Customized Net Conference Powered by WebEx Meeting Center Basic Tutorial.
Writing an message Finish off your slide on recommendations of how to write an .
DSS Tips and Tricks A Must-Read for DSS Beginners Rev. Apr 2008.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
PGP Desktop (Client only) By: Courtney Wirtz & Vincent Verner.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Day 11 Review. Where would I click to send an ?
What is GroupWise? A tool for communication in our organization A system to send and receive A way to increase productivity A method to get documents.
Challenges of study skills
Introducing, Installing, and Upgrading Windows 7
Hidden Treasures of Office 365
Bell Work: Go to Chrome Click the ‘Home’ button (the little house)
ASHRAE Authoring Portal
Digital signatures and document or encryption
ASHRAE Authoring Portal
Things To Avoid: 1-Never your password to anyone.
Outlook work for you 5 ways to make Sign off in style
ONE® Pages Training Presentation
An Installation Guide of PGP on Windows 2000
Student Discount on Microsoft Office 2010 Products!
Outlook work for you 5 ways to make Sign off in style
DIGITAL ENCRYPTION INSTRUCTIONS FOR MICROSOFT OUTLOOK 2007
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Azure Information Protection
Network Locations in Windows 7
Presentation transcript:

Windows Rights Management Security for Microsoft Documents and s Presented By Stephanie L. Moore, Ph.D. Patricia Cantrell Center for the Enhancement of Teaching & Learning

Protect Individual Files –Tool: Windows Rights Management Encrypt data (like locking an entire section of your hard drive) –Tools: PGP or TrueCrypt Two ways to protect your data

Windows Rights ManagementEncryption

The Difference Windows Rights Management Encryption Can only use for Excel, PowerPoint, Word and Outlook s More like setting “permissions” on who can view, and what they can do Intended to limit who can access Can encrypt ANY file More like locking a file – only a person with a key can open the file Intended to keep everyone out but you

Why/When WRM? Sending sensitive information/data –Examples: Sending information, data or ideas that should have a limited audience –Examples: Sending content that should expire after a certain date –Examples:

Step 1:(UNC/enterprise solution) Turn on Windows Rights Management Already on your work machine as part of Windows Place call to Help Desk IT staff member will “turn it on” Little time, No cost Easy to use WRM - How

Document Permissions Icon Grayed out when not active Red circle with “dash” or “minus sign”

WRM - How

WRM – How -

Permissions either all on or all off Overrides permissions set to attached documents SO … let’s look at handling attachments

WRM – How – w/ Attachments Do you want to protect what’s in the attachment, or what’s being communicated in the ? –Sensitive information in the itself? – set permissions on the –Sensitive information only in the attachment? – set permissions in Word, Excel or PowerPoint, attach to , but do NOT secure

WRM – Let’s Practice! Word, Excel or PowerPoint – will have to practice on your machine