What is Azure Rights Management?
Applies to: Azure Information Protection, Office 365
Azure Rights Management (Azure RMS) is the protection technology used by Azure Information Protection.
This cloud-based service uses encryption, identity, and authorization policies to help secure your files and email, and it works across multiple devices—phones, tablets, and PCs. Information can be protected both within your organization and outside your organization because that protection remains with the data, even when it leaves your organization’s boundaries.
As an example, employees might email a document to a partner company, or save a document to their cloud drive. The persistent protection that Azure RMS provides not only helps to secure your company data, but might also be legally mandated for compliance, legal discovery requirements, or simply good information management practices.
But very importantly, authorized people and services (such as search and indexing) can continue to read and inspect the data that Azure RMS protects, which is not easily accomplished with other information protection solutions that use peer-to-peer encryption. This ability is sometimes referred to as “reasoning over data” and is a crucial element in maintaining control of your organization’s data.
The following picture shows how Azure RMS works as a Rights Management solution for Office 365 as well as for on-premises servers and services. You'll also see that it supports the popular end user devices that run Windows, Mac OS, iOS, Android, and Windows Phone.
You can use Azure RMS protection with different cloud subscriptions, and it supports multiple features. For more information, see the Azure Information Protection marketing site.
To learn more about Azure RMS:
If you want to dive right in and try Azure RMS for yourself, use the Quick start tutorial for Azure Rights Management.
However, if you’re ready to start deploying Azure Information Protection for your organization, use the Azure Information Protection deployment roadmap for your deployment steps and links for how-to instructions.
For additional information and help, use the resources and links in Information and support for Azure Information Protection.