Business Reasons for AD RMS
What AD RMS Does
AD RMS Usage Scenarios
AD RMS Technology Overview
Explain the business reasons for using AD RMS.
Explain the features AD RMS provides.
Identify the advantages and limitations inherent in AD RMS.
Describe how AD RMS works with public key technology.
Describe how AD RMS works.
AD RMS Bootstrapping Process
AD RMS Publishing and Licensing Process
AD RMS Service Connection Point (SCP)
AD RMS Topology
AD RMS Prerequisites
Installing and Provisioning AD RMS
Identify the major components of AD RMS.
Describe the types of licenses used in the AD RMS process.
Describe the client-side software and applications required for AD RMS.
Identify the AD RMS server hardware and software requirements.
Install and provision an AD RMS server.
Configure the AD RMS service connection point.
Microsoft Office IRM
Rights Management Add-on for Internet Explorer and Rights-managed HTML
Office Viewers and AD RMS
Deploy the Windows RMS client software in legacy clients.
Identify the AD RMS components that are installed on client machines.
Explain how IRM works in Microsoft Office products.
Describe how the XPS format uses IRM, and how XPS can be used in conjunction with Microsoft Office applications.
Explain how the Rights Management add-on for Internet Explorer enables users to view restricted files.
Creating Rights Policy Templates
Protecting Content Using Templates
Consuming Content Protected by Templates
The Super Users Group
Identify template distribution features in AD RMS.
Describe the processes for protecting and consuming content protected by rights policy templates.
Define rights policy templates.
Assign users and groups to rights policy templates.
Specify expiration policies in rights policy templates.
Explain how to retire and back up rights policy templates.
– Microsoft Office SharePoint Server (MOSS) 2007
– Microsoft Exchange Server 2010
– AD RMS Bulk Protection Tool + FCI
Email Protection in Exchange Server 2007
New AD RMS Features in Exchange Server 2010
AD RMS Bulk Protection Tool and File Classification Infrastructure
Describe how MOSS works with AD RMS to protect documents stored in MOSS document libraries.
Identify MOSS functionality.
Describe MOSS’s logical and physical architecture.
Describe how IRM works with MOSS to provide information protection.
Exchange Server 2010
Explain the new features provided in Exchange 2010 around AD RMS.
AD RMS Bulk Protection Tool + FCI
Describe how AD RMS Bulk Protection Tool can be used.
Describe how FCI can be used.
Trusted User Domains
Trusted Publishing Domains
AD RMS and Active Directory Federation Services
Windows Live ID Trust
Describe Trusted User Domains and how they work.
Explain when Trusted Publishing Domains are used and how they work.
Describe the Active Directory Federation Service and how it works with AD RMS.
Describe Windows Live ID and how it works.
Detalii logistice si de pret
6-8 trainees 199 Euro without VAT / trainee (-20% off)
>=9 trainees 174 Euro without VAT / trainee (-30% off)
This two-day instructor-led course provides students with the knowledge to understand the role that Microsoft® Active Directory® Rights Management Services (AD RMS) plays in a wider infrastructure, and how it interacts with other Microsoft technologies.
This course is intended for experienced systems administrators who have working experience and background knowledge of Windows Server® 2008, and basic understanding of Active Directory, IIS, Microsoft® SQL Server®, and Microsoft® Exchange Server technologies. Basic knowledge of DNS, general networking, and PKI principles is also helpful.
After completing this course, students will be able to:
•Understand AD RMS architecture, and the role the product plays as part of a wider infrastructure.
•Understand the AD RMS interaction model with other Microsoft technologies.
•Understand how several other Microsoft technologies use AD RMS to protect documents and email messages.
•Understand how to use AD RMS on server applications such as Microsoft® Office SharePoint® Server and Microsoft Exchange Server.
•Create, manage, and distribute rights policy templates as an AD RMS administrator.
•Understand the different trust relationships that can extend AD RMS protection beyond your infrastructure.