{"id":10852,"date":"2018-09-18T10:56:37","date_gmt":"2018-09-18T17:56:37","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=10852"},"modified":"2023-06-15T15:02:13","modified_gmt":"2023-06-15T22:02:13","slug":"protecting-files-in-the-cloud-with-azure-information-protection","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/protecting-files-in-the-cloud-with-azure-information-protection\/","title":{"rendered":"Protecting files in the cloud with Azure Information Protection"},"content":{"rendered":"
This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft.<\/p>\n<\/div>\n<\/div>\n
Microsoft migrated from Active Directory Rights Management Services to Azure Rights Management, the protection technology used by Azure Information Protection. Azure Information Protection uses encryption, identity, and authorization policies in Azure Rights Management to help secure files and email in the cloud. It enables protected sharing in Office 365 on a variety of platforms including Windows, Mac OS, iOS, and Android.<\/p>\n
We\u2019re a cloud-first organization, so most applications at Microsoft are in the cloud, including SharePoint, email and productivity applications, and personal file storage. To better protect data where it resides, Microsoft Digital has migrated from Active Directory Rights Management Services (AD RMS) to Azure Information Protection (AIP)\u2014which includes the protection capabilities formerly known as Azure RMS.<\/p>\n
Azure Information Protection, part of the\u00a0Enterprise Mobility + Security<\/a>\u00a0suite, is a cloud-based service that helps you discover, classify, label, and protect sensitive data both in the cloud and on-premises. Azure Information Protection uses encryption, identity, and authorization policies to help secure files and email across multiple devices, including phones, tablets, and PCs.<\/p>\n Azure Information Protection enables protected sharing in Microsoft Office and on a variety of platforms including Windows, Mac\u00a0OS, iOS, Android. It supports mobility for employees who take advantage of our bring-your-own-device (BYOD) policy. Azure Information Protection helps protect data both inside and outside the organization because sensitivity labels and protection stay with the data\u2014even when it leaves the corporate network boundaries.<\/p>\n Some of the benefits that we have realized include:<\/p>\n Migrating from AD RMS to Azure Information Protection paves the way for protecting sensitive data using additional capabilities.<\/p>\n We have used AD RMS since its release in 2002. Many of our business apps depended on AD RMS encryption and information protection, and everyone with a Microsoft email address could use AD RMS templates for email protection. We used it to:<\/p>\n When we started planning the move to Azure Information Protection, we needed to make sure that we offered a smooth transition with no downtime. We developed a strategy that would migrate users, templates, and applications in phases. Upon completion, we could then begin to use other capabilities in Azure Information Protection, including labeling and classification.<\/p>\n Azure Information Protection makes the data in a document unreadable to anyone other than authorized users and services. It uses unique keys and certificates to manage encryption and decryption, and to authorize and enforce restrictions. Data is encrypted at the application level, which includes a policy that defines authorized use for a document. When a protected document is used by a legitimate user or it is processed by an authorized service, the data in the document is decrypted and the rights that are defined in the policy are enforced.<\/p>\n For more information about Azure Information Protection and how it works, go\u00a0here<\/a>.<\/p>\n At Microsoft, we have an Active Directory infrastructure with multiple forests and domains, and most of our client devices run RMS-enabled versions of Office 2013, Office 2016, or Office 365 Pro Plus. Azure Information Protection receives authentication and authorization information from Active Directory Federation Services (AD FS), Active\u00a0Directory\u00a0Domain\u00a0Services, and Azure Active Directory (Azure AD).<\/p>\n We were able migrate to Azure Information Protection with no domain-level restructuring, architecture changes, or changes to existing services. Having multiple versions of Office did not affect our plans to migrate to Azure Information Protection, because the versions we run are compatible with both AD RMS and Azure Information Protection.<\/p>\n NOTE: If you need to send protected emails or documents to external users, learn more\u00a0here<\/a>.<\/p>\n To configure the service at Microsoft, we had to migrate templates, install the Microsoft RMS Connector, migrate applications, and then migrate users and partners.<\/p>\n We have several custom rights policy templates that we use to:<\/p>\n All our current templates within our configuration were migrated from AD RMS. We exported the templates from AD RMS to an XML file, and then uploaded that file to Azure Information Protection using a PowerShell cmdlet.<\/p>\n An Azure global administrator can create and manage templates in the Azure classic portal. To minimize risk, we have only one Azure global administrator for the service. In addition to creating and managing templates from the Azure portal, we have a small group of administrators who can also create and manage templates using PowerShell.<\/p>\n For more information about managing and creating templates, read\u00a0Configuring and managing templates in the Azure Information Protection policy<\/a>.<\/p>\n Microsoft RMS Connector is a small-footprint service that acts as a relay, allowing on-premises services to connect and consume Azure Information Protection. For fault tolerance and high availability, we\u00a0installed the RMS connector<\/a>\u00a0on six virtual machines\u2014the minimum requirement for the service is two.<\/p>\n Even though most people connect to online services, we use the RMS connector to support Microsoft Exchange and Microsoft SharePoint deployments that stay on-premises. For example, some employee mailboxes use Exchange Online and some use Exchange Server.<\/p>\n With the RMS connector installed, information protection now works seamlessly between our on-premises and cloud deployment configurations, as shown in Figure 1.<\/p>\n The Azure Information Protection global administrator authorized servers to use the RMS connector. We configured load balancing and high availability using Network Load Balancing on the Azure RMS virtual machine cluster.<\/p>\n One of the more challenging tasks that we faced during this migration was making sure all the existing apps that had dependency on AD RMS pointed to Azure Information Protection. Using Group Policy, we ran a\u00a0Microsoft Rights Management connector<\/a>\u00a0script, which we customized for our environment, on application servers. The script modified the registry to change the pointer to Azure Information Protection.<\/p>\n To track progress during the migration, we ran a different PowerShell script twice a month to parse IIS logs and check service and user accounts that were still using the AD RMS cluster. Once we identified which service accounts were still connecting for certificates and were accessing the licensing server, we worked with those app owners to make the changes that were necessary before the AD RMS service was shut down.<\/p>\n We created an internal website to communicate with app owners, which included a migration schedule, frequently asked questions about the service, and how to point their servers to Azure Information Protection. It helped reduce overall ambiguity about the migration and helped app owners understand what they needed to do.<\/p>\n We gradually added members from different domains until all client machines were moved. For domain-joined devices, we used Group Policy in the form of a user sign-in script. We added groups and people to the Azure Information Protection service and then pushed out a script to change configurations and update the pointers on client devices.<\/p>\n User migration went smoothly because we worked in phases and started with smaller pilot groups. The overall client deployment was partially managed by asking clients to install (at minimum) Windows 10 Anniversary Update, which would also install the Group Policy client script. Because the templates and applications were already moved, the environment looked the same to users. For non-domain-joined devices managed by Microsoft Intune, running Windows\u00a010 Anniversary Update or later, we deployed a package that included a migration script through Intune.<\/p>\n Microsoft shares protected information with partners, so we migrated partners to Azure Information Protection for protected sharing. Before migrating any partner companies, we needed all of them to create a Microsoft Online Services tenant and move their organization keys to the cloud.<\/p>\n Each of the partner companies that we share protected information with introduced configuration settings in their environment to redirect client applications to the right content protection infrastructure (on-premises or cloud) depending on the stage of the migration they were in. Partner migration involved the same steps, so our work consisted primarily of coordinating timing for the steps with the partner.<\/p>\n Azure Information Protection uses cryptographic controls, also called keys, to make sure that the security protection it offers is industry-standard. For each document or email that is protected by Azure Information Protection, Azure\u00a0Information Protection creates a single Advanced Encryption Standard (AES) key, and that key is embedded in the document. The unique AES key, the organization\u2019s tenant key, and the file\u2019s policies are managed by Azure Information Protection.<\/p>\n Azure Key Vault offers a centralized key management solution for many cloud-based and on-premises services that use encryption. Some of the\u00a0benefits of using Azure Key Vault<\/a>\u00a0for the Azure Information Protection tenant key include:<\/p>\n In the first phases of the migration, due to the limitations of integrating Exchange Online and Bring your own Key (BYOK), we chose to migrate our keys into the Key Management Service that was part of Azure Information Protection without using BYOK. Once the restrictions in Exchange Online for BYOK were lifted, as part of an upgrade to that platform, we migrated the keys to Azure Key Vault.<\/p>\n Although the RMS connector logs information, warning, and error messages to the event log, there isn\u2019t a management pack that monitors for these events. We use System Center Configuration Manager to monitor those logs. To see a list of the events and their descriptions, along with more information, read\u00a0Monitor the Azure RMS connector<\/a>.<\/p>\n We\u2019ve put a lot of effort into creating key performance indicators (KPIs) that measure template use. Those KPIs tell us what templates are used the most and which templates may be retired. This is particularly important to us as we are rolling out Azure Information Protection. With Azure Information Protection, we are changing the templates we want people to use and archiving older ones. It\u2019s a gradual process, but having usage metrics makes it easy to see if new templates are being used, or if we need to engage with users to better prepare them for a template change. For more information about using logs to analyze usage data, read\u00a0Logging and analyzing usage of the Azure Rights Management service<\/a>.<\/p>\n On our journey to Azure Information Protection, we learned some important lessons, including:<\/p>\n We have completed our migration at scale. During each minute of the workday at Microsoft, 2,500 to 3,000 licensed users access the system to create new content, access existing encrypted content, or decrypt shared content. Azure Information Protection allowed for a seamless encryption\/decryption service transition, and there was no discernable difference in the way the service works for users. For service managers, this service offers better logging and usage tracking than we had with AD\u00a0RMS. Since the migration, we are saving costs because we don\u2019t have a physical infrastructure to deploy, manage, update, or maintain\u2014all those activities are part of the Azure subscription. Maintaining this service requires 66 percent less admin resources than we needed for AD RMS.<\/p>\n Migrating to Azure Information Protection was the first step on our journey toward building a foundation for discovering, classifying, labeling, and protecting sensitive data at Microsoft using Azure Information Protection. For more information about starting your own migration, read\u00a0Migrating from AD RMS to Azure Information Protection<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":" This content has been archived, and while it was correct at time of publication, it may no longer be accurate or reflect the current situation at Microsoft. Microsoft migrated from Active Directory Rights Management Services to Azure Rights Management, the protection technology used by Azure Information Protection. Azure Information Protection uses encryption, identity, and authorization […]<\/p>\n","protected":false},"author":146,"featured_media":10882,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"_hide_featured_on_single":false,"_show_featured_caption_on_single":false,"footnotes":""},"categories":[1],"tags":[],"coauthors":[674],"class_list":["post-10852","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","m-blog-post"],"yoast_head":"\n\n
Planning the move to the cloud<\/h2>\n
\n
How Azure Information Protection protects data<\/h2>\n
Configuring Azure Information Protection<\/h2>\n
Migrating templates<\/h3>\n
\n
Creating and managing templates<\/h4>\n
Installing the RMS connector<\/h3>\n
Migrating applications<\/h3>\n
Migrating users<\/h3>\n
Migrating partners<\/h4>\n
Migrating to Azure Key Vault<\/h2>\n
\n
Auditing and reporting<\/h2>\n
Best practices<\/h2>\n
\n
Conclusion<\/h2>\n