Free Essay

Administering Active Directory Rights Management Services

In:

Submitted By robbycollazo2
Words 542
Pages 3
Administering Active Directory Rights Management Services

Administering Active Directory Rights Management Services Detail the administrative tasks used to ensure security of the AD RMS environment including administering and implementing trust policies, security policies, and the configuration and deployment of rights policy templates. Describe the risks as well as the advantages of implementation of this service. When it comes to AD RMS it’s all about data privacy. Having information available and ready to you or the user, whether if you’re at home or in the office with the door closed this is what networking is all about. Now when trying to protect that same information, but still keeping a sense of flow throughout the sharing of this data can become tricky. That’s where RMS comes in to play with RMS there are two forms of protection we get from this one is through encryption and the other is through policy and this is called “Persistent Protection”. With persistent protection it controls access through trusted identities, secures transmissions, and embeds digital usage policies. Pretty much if you don’t have credentials to open or view a document will just forget it. But if you are authorized to open and view the document then policies step into place allowing or not allowing you to do certain things with said document (cool huh)?
Now this policy and encryption (RMS) is very unique because it follows this said document where ever it goes. So to ensure security when the author wants to send a secure piece of data for the first time it will make a request to the RMS server to get a client licensor certificate this is what gives them permission to publish the data. From there, they define the usage rights and rules (policies) of this data then it creates what is called a “Publishing License” then it encrypts the data. Then the author sends the file, once it gets received on the recipients end they click on data to open it for the first time, the application calls out to the RMS server, and then the RMS server will authorize the recipient and issue what is called a “Use License” and with the use license it basically give them the right to decrypt the data and then expresses the policies placed upon the data for that user to allow or deny them rights to the data. So of course RMS allows a certain feel of security by only allowing certain recipients to receive the data but it can also be broken so you have policies set up so that when the user opens the RMS data they can’t copy, paste, print, and save or screenshot etc. but someone could easily just take a picture with their phone or just re type the data so there has to be a line of trust in people involved. RMS was created to just to slow down a determined thief or just make it such a hassle they just give up and decide it’s just not worth it.

References Shinder/ WindowsSecurity, D. (2003, September 23). How the Windows Rights Management Service can Enhance the Security of your Documents :: Windows 2003 Security :: Articles & Tutorials :: WindowSecurity.com. Retrieved June 4, 2013, from http://www.windowsecurity.com/articles-tutorials/windows_2003_security/Windows_Rights_Management_Service_Documents.html

Similar Documents

Premium Essay

Sharepoint Upgrade

...New Horizons Computer Learning Center of Cincinnati OFFICIAL MICROSOFT LEARNING PRODUCT 10174A Lab Instructions and Lab Answer Key: Configuring and Administering Microsoft® SharePoint® 2010 New Horizons Computer Learning Center of Cincinnati Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, email address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft® Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names...

Words: 74170 - Pages: 297

Premium Essay

Window Server 2008

...Individual Person are Business, for example a Business with many Cluster would most likely use Windows HPC Server 2008. 2. What are the new features or enhancements made to Windows Server 2008? How is Windows Server 2008 different from Windows 2003? • Technical, security, management and administrative features new to Windows Vista such as the rewritten networking stack (native IPv6, native wireless, speed and security improvements); improved image-based installation, deployment and recovery; improved diagnostics, monitoring, event logging and reporting tools; new security features such as Bit-Locker and ASLR; improved Windows Firewall with secure default configuration; .NET Framework 3.0 technologies, specifically Windows Communication Foundation, Microsoft Message Queuing and Windows Workflow Foundation; and the core kernel, memory and file system improvements. Processors and memory devices are modeled as Plug and Play devices, to allow hot-plugging of these devices. • 2008 has self-healing NTFS file system 2003 do not, In 2003 session creation was a serial operation but with 2008 its parallel.2008 has a better Clean service shutdown.In WS2K8, that 20-second countdown has been replaced with a service that will keep applications given the signal all the time they need to shut down, as long as they continually signal back that they're indeed shutting down. . 3. Why is 64-bit architecture an advantage? • On 64-bit hardware with x86-64 architecture (AMD64), most 32-bit...

Words: 1129 - Pages: 5

Premium Essay

Research Project

...Enterprise, Standard and Core. The Datacenter variation of Server 2008 is made to suit the needs of a larger corporation, with the ability for unlimited virtualization licensing rights. The Datacenter also has a feature to deploy business applications for productivity needs, while also providing solutions for mobile and branch workers. Datacenter was designed for companies with a large demand in productivity. Enterprise Server 2008 is a cost-effective option for a Windows 2008 server, while still providing great features and usability. With features like power saving, virtualization, and manageability it provides a great solution for mid size companies with mobile workers in need of access to company data. Standard Server 2008 is a great foundation for the start of a server implementation in a new business. It provides solid security to secure all your data and server information. This server gives great management features with an efficient configuration process creating an easy setup for the IT administrator. Windows Server Core 2008 is a basic command line server. This server has very little memory footprint and only provides base functionality with little upkeep. Windows Server 2008 is a major improvement from Server 2003. The security is a lot better overall from the ability to choose what services are applicable to your needs, thus reducing the number of pathways for an intruder to gain entry. Server 2008...

Words: 795 - Pages: 4

Premium Essay

Microsoft Network Operating System

...For this Research assignment part 1, I will be talking about 5 questions. The questions are “Why windows server 2008 comes in different versions? What is the significance of each version,” “What are the new features or enhancements made to windows server 2008? How is windows server 2008 different from windows server 2003,” “Why is 64-bit architecture an advantage?” “Explain the new features of windows server 2008, such as server core, virtualization, and power shell. What is the role of these features and how will they improve efficiency in administering windows?” and “What is a read only domain controller (RODC) and what are its advantages? What are the security and administrative issues addressed by a RODC? The reason why there are so many different versions is based on the demand of the company. It comes in different varieties to accommodate what the user needs for the business they are running. Big companies will go and pay the extra money for an operating system that will support many processors and hundreds or thousands of users. But for the small companies that does not have that extra money or do not need the extra feature for such small volumes they made a version just for them as well. By making different sets or versions they gain profits by both parties for what they need and do not need. The significance of each version has its features. For example Windows 2008 datacenter edition has a maximum number of cpu’s at 64 while version Windows 2008 enterprise edition...

Words: 1031 - Pages: 5

Premium Essay

Server 2 End of Lesson Answers

...Lesson 5 Active Directory Administration Key Terms access token Created when a user logs on, this value identifies the user and all of the user’s group memberships. Like a club membership card, it verifies a user’s permissions when the user attempts to access a local or network resource. Anonymous Logon Special identity that refers to users who have not supplied a username and password. authenticate To gain access to the network, prospective network users must identify themselves to a network using specific user accounts. authentication Process of confirming a user’s identity using a known value such as a password, pin number on a smart card, or the user’s fingerprint or handprint in the case of biometric authentication. authorization Process of confirming that an authenticated user has the correct permissions to access one or more network resources. batch file Files, typically configured with either a .bat extension or a .cmd extension, that can be used to automate many routine or repetitive tasks. built-in user accounts Accounts automatically created when Microsoft Windows Server 2008 is installed. By default, two built-in user accounts are created on a Windows Server 2008 computer: the Administrator account and the Guest account. Comma-Separated Value Directory Exchange (CSVDE) Command-line utility used to import or export Active Directory information from a comma-separated value (.csv) file. Comma-Separated...

Words: 6605 - Pages: 27

Premium Essay

It 221 Research 1

...levels of scalability, reliability, and availability to support large, mission-critical applications. With unlimited virtualization use rights and a hypervisor-based virtualization technology, Windows Server 2008 R2 Datacenter provides both flexibility and cost savings. Windows Server 2008 R2 Datacenter also supports the memory and processing needs of large-scale, business-critical workloads such as ERP, databases, server consolidations, and custom and line-of-business applications. Windows Server 2008 R2 Enterprise Edition provides you with high levels of system uptime and the scalability to support the growth of mission-critical applications. It also provides a cost-effective way to realize the benefits of virtualization. Providing uninterrupted business services to employees, vendors, and partners around the clock has become a critical business factor for global businesses. Remote employees and international customers and partners need to have continuous access to systems and data. A disruption in services can result in diminished productivity and lost opportunities. Windows Server 2008 R2 Standard is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers and streamline configuration and management tasks. Windows Server 2008 R2 Standard provides organizations with the ability to deliver rich web-based...

Words: 5150 - Pages: 21

Free Essay

Comparative Operating Systems

...computing is the norm and not a exception. The ability of a operating system to support networking has become crucial for its survival in the market. In today’s picture there is no operating system, which doesn’t support networking. This paper tries to give a review of various network operating systems or the networking support of a operating system, in relevance to the modern operating systems. The emphasis is on basic design and architecture, not their specifications or services. The paper considers various operating systems like Novell Netware, the sun NFS, the Styx, CIFS/SMB and Microsoft Windows 2000 server. Again the concentration is on modern and evolving operating systems like the Novell Netware and Microsoft’s Windows 2000. The objective of the paper is to study and compare various operating systems and to bring out the inherent advantages and disadvantages in using them. 1.0 INTRODUCTION Individual computers are connected together to form computer networks. The operating system, protocols and services which help us in interconnecting the computers are collectively called Network Operating systems. The webopedia.com defines Network Operating Systems as follows: An operating system that includes special functions for connecting computers and Devices into a local-area network (LAN). Some operating systems, such as UNIX and the Mac OS, have networking functions built in. The term network operating system, however, is generally reserved for software that enhances a...

Words: 12519 - Pages: 51

Premium Essay

Ms 70-640

...Microsoft 70-640 TS: Windows Server 2008 Active Directory, Configuring Version: 30.6 Microsoft 70-640 Exam Topic 1, Exam Set 1 QUESTION NO: 1 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. Only one Active-Directory integrated zone has been configured in the ABC.com domain. ABC.com has requested that you configure DNS zone to automatically remove DNS records that are outdated. What action should you consider? A. You should consider running the netsh /Reset DNS command from the Command prompt. B. You should consider enabling Scavenging in the DNS zone properties page. C. You should consider reducing the TTL of the SOA record in the DNS zone properties page. D. You should consider disabling updates in the DNS zone properties page. Answer: B Explanation: In the scenario you should enable scavenging through the zone properties because scavenging removes the outdated DNS records from the DNS zone automatically. You should additionally note that patience would be required when enabling scavenging as there are some safety valves built into scavenging which takes long to pop. Reference: http://www.gilham.org/Blog/Lists/Posts/Post.aspx?List=aab85845-88d2-4091-8088a6bbce0a4304&ID=211 QUESTION NO: 2 You work as the network administrator at ABC.com. The ABC.com network has a domain named ABC.com. All servers on the ABC.com network run Windows Server 2008. The ABC.com network...

Words: 34198 - Pages: 137

Premium Essay

It221 Research Project

...that Windows Server 2008 is the last 32-bit Windows server operating system. Windows Server 2008 is available in the editions listed below, similar to Windows Server 2003. • Windows Server 2008 Standard (IA-32 and x86-64) Windows Server 2008 Standard is one of Microsoft's entry level server offerings (alongside Windows Web Server 2008) and is one of the least expensive of the various editions available. Both 32-bit and 64-bit versions are available, and in terms of hardware Standard Edition supports up to 4GB of RAM and 4 processors. Windows Server 2008 is primarily targeted and small and mid-sized businesses (SMBs) and is ideal for providing domain, web, DNS, remote access, print, file and application services. Support for clustering, however, is notably absent from this edition. An upgrade path to Windows Server 2008 Standard is available from Windows 2000 Server and Windows Server 2003 Standard Edition. • Windows Server 2008 Enterprise (IA-32 and x86-64) Windows Server 2008 Enterprise Edition provides greater functionality and scalability than the Standard Edition. As with Standard Edition both 32-bit and 64-bit versions are available. Enhancements include...

Words: 3579 - Pages: 15

Premium Essay

It221 Research Paper 1

...and resources. Windows Server 2008 R2 Standard is the most robust Windows Server operating system to date. With built-in, enhanced Web and virtualization capabilities, it is designed to increase the reliability and flexibility of your server infrastructure while helping save time and reduce costs. Powerful tools give you greater control over your servers, and streamline configuration and management tasks. Plus, enhanced security features work to harden the operating system to help protect your data and network and provide a solid, highly dependable foundation for your business. Windows Server 2008 R2 Enterprise is an advanced server platform that provides more cost-effective and reliable support for mission-critical workloads. It offers innovative features for virtualization, power savings, and manageability and helps make it easier for mobile workers to access company resources. Windows Server 2008 R2 Datacenter delivers an enterprise-class platform for deploying business-critical applications and large-scale virtualization on small and large servers. Improve availability, enhance power management, and integrate solutions for...

Words: 869 - Pages: 4

Premium Essay

Introduction

...Jay’s Introduction Re-used: "This task was originally submitted as my introduction for all previous courses." Hello everyone! I am Jay Timothy Sexton and I am a true Southern Gentleman from the great state of Alabama. I currently reside in a small town named Pembroke, just west of Savannah, Georgia. Now some of you will read my town as Pembroke but it is pronounced Pembroke, Georgia. We just say, ”We are plum broke in Pembroke.” A little humor, very little. I am married, with four children, four grandsons, and three dogs, another great achievement in my life. I was raised through the era of Flower Power, Rock and Roll, Folk music, Segregation, Space Race, Three TV channels (ABC, NBC and CBS), Technicolor and Disco. I Joined the military right out of high school and I served our great country for twenty-four (26) years and nine (9) months. While I was in the military, I progressed from Private all the way to the rank of Sergeant Major, but when I retired from the military; I retired as a First Sergeant. I first served in the Air Force Reserve as an Explosive Ordinance Specialist, where I blew things up. Then I changed careers into the field of Environmental Systems which really, was an aircraft mechanic. I worked on all types of airplanes. The actual systems I worked on were electrical, radar, egress, boundary layer controls, pressurization, hydraulics, and heating and air conditioning systems of the aircraft. In 1980, I joined the Army where I served as an Abrams/Bradley tank...

Words: 697 - Pages: 3

Free Essay

Active Dir

...Active Directory Design Guide Thursday, 25 February 2010 Version 2.0.0.0 Baseline Prepared by Microsoft Prepared by Microsoft Copyright This document and/or software (“this Content”) has been created in partnership with the National Health Service (NHS) in England. Intellectual Property Rights to this Content are jointly owned by Microsoft and the NHS in England, although both Microsoft and the NHS are entitled to independently exercise their rights of ownership. Microsoft acknowledges the contribution of the NHS in England through their Common User Interface programme to this Content. Readers are referred to www.cui.nhs.uk for further information on the NHS CUI Programme. All trademarks are the property of their respective companies. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. © Microsoft Corporation 2010. All rights reserved. Disclaimer At the time of writing this document, Web sites are referenced using active hyperlinks to the correct Web page. Due to the dynamic nature of Web sites, in time, these links may become invalid. Microsoft is not responsible for the content of external Internet sites. Page ii Active Directory – Design Guide Prepared by Microsoft, Version 2.0.0.0 Last modified on 26 February 2010 Prepared by Microsoft TABLE OF CONTENTS 1 2 Executive Summary ..............................................................................................

Words: 43732 - Pages: 175

Premium Essay

Server 2008 for Dummies

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Premium Essay

Monicah

...Windows Server® 2008 FOR DUMmIES ‰ by Ed Tittel and Justin Korelc Windows Server® 2008 For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http:// www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission...

Words: 139691 - Pages: 559

Free Essay

Traffic Modeling

...STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN...

Words: 13683 - Pages: 55