Enable or Disable Transport Decryption

Applies to: Exchange Server 2013

Enabling transport decryption allows the Transport Rules agent on Microsoft Exchange Server 2013 Mailbox servers to access content in messages protected by Information Rights Management (IRM). As a result, other transport agents can access message content and possibly make changes to it. For example, the Transport Rules agent may need to inspect message content and apply transport rules (such as rules that apply a disclaimer to the message). To successfully decrypt IRM-protected messages, you must add the Federated Delivery mailbox to the super users group configured on your Active Directory Rights Management Services (AD RMS) server.

Important

Members of the super users group are granted an owner use license when they request a license from the AD RMS cluster. This allows them to decrypt all RMS-protected content created by that AD RMS cluster.

When enabling transport decryption, you can specify the following settings:

  • Mandatory: Rejects messages that can't be decrypted and returns a non-delivery report (NDR) to the sender.

  • Optional: Uses a best-effort approach to decryption. If possible, messages are decrypted, but they're delivered even if decryption fails. This is the default setting.

To learn more about transport decryption, see Transport decryption.

For additional management tasks related to IRM, see Information Rights Management procedures.

What do you need to know before you begin?

Tip

Having problems? Ask for help in the Exchange forums. Visit the forums at Exchange Server.

Use the Shell to enable transport decryption

This example enables transport decryption for the Exchange 2013 organization. Messages that can't be decrypted are rejected and an NDR is returned to the sender.

Set-IRMConfiguration -TransportDecryptionSetting Mandatory

For detailed syntax and parameter information, see Set-IRMConfiguration.

Use the Shell to disable transport decryption

This example disables transport decryption for the Exchange 2013 organization.

Set-IRMConfiguration -TransportDecryptionSetting Disabled

For detailed syntax and parameter information, see Set-IRMConfiguration.

How do I know this worked?

To verify that you have enabled or disabled transport decryption, use the Get-IRMConfiguration cmdlet and check the value of the JournalDecryptionEnabled property.

For an example of how to check the IRM configuration, see Examples in Get-IRMConfiguration.