Eventview van werkplek logt acties.
MS overweegt hiervoor een dashboard te maken
FIPS: The Federal Information Processing Standard (FIPS)
SHA: Secure Hash Algorithm 2
AES: Advanced Encryption Standard (AES)
- Allow HTTPS traffic on TCP 443 to api.informationprotection.azure.com.- Do not terminate the TLS client-to-service connection (for example, to do packet-level inspection). Doing so breaks the certificate pinning that RMS clients use with Microsoft-managed CAs to help secure their communication with Azure RMS.- If you use a web proxy that requires authentication, you must configure it to use integrated Windows authentication with the user's Active Directory logon credentials.
Toegang goed uitleggen!
https://docs.microsoft.com/en-us/azure/information-protection/secure-collaboration-documents#example-configuration-for-a-label-to-apply-protection-to-support-internal-and-external-collaboration
Azure AD (eigen, gesynced of via RMS account microsoft)
Federated social (Google, Yahoo, Microsoft)
Office account (heb je Office2016 click to run voor nodig)
Iedereen (werkt alleen met Office 365 message encryption) – werkt met one time passcode
Eventview van werkplek logt acties.
MS overweegt hiervoor een dashboard te maken
FIPS: The Federal Information Processing Standard (FIPS)
SHA: Secure Hash Algorithm 2
AES: Advanced Encryption Standard (AES)
- Allow HTTPS traffic on TCP 443 to api.informationprotection.azure.com.- Do not terminate the TLS client-to-service connection (for example, to do packet-level inspection). Doing so breaks the certificate pinning that RMS clients use with Microsoft-managed CAs to help secure their communication with Azure RMS.- If you use a web proxy that requires authentication, you must configure it to use integrated Windows authentication with the user's Active Directory logon credentials.
Eventview van werkplek logt acties.
MS overweegt hiervoor een dashboard te maken
FIPS: The Federal Information Processing Standard (FIPS)
SHA: Secure Hash Algorithm 2
AES: Advanced Encryption Standard (AES)
- Allow HTTPS traffic on TCP 443 to api.informationprotection.azure.com.- Do not terminate the TLS client-to-service connection (for example, to do packet-level inspection). Doing so breaks the certificate pinning that RMS clients use with Microsoft-managed CAs to help secure their communication with Azure RMS.- If you use a web proxy that requires authentication, you must configure it to use integrated Windows authentication with the user's Active Directory logon credentials.