M2827 – Deploying Microsoft Windows Rights Management Services
Enquire/Book this course
Trained over 60000 delegates
Course delivered by industry expert instructors
Highly competitive pricing
Course Description
Prerequisites: Before attending this course, students must have:
- A good understanding of Windows Server 2000 and/or 2003 and Active Directory.
- A general knowledge of Public Key Infrastructure (PKI) concepts and SQL Server 2000 is also helpful.
Delivery Method: Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
- Explain the RMS architecture and infrastructure
- Explain RMS and its relationship to desktop applications
- Install RMS on Windows Server 2003
- Understand RMS configuration such as trust policies and rights policies
- Interoperate with other organizations' RMS deployments
- Understand the integration of RM-enabled applications such as MS Office 2003
- Understand the management of a RMS deployment
- Rights Management Overview
- Public Key Technology Overview
- Describe business reasons for using RMS.
- Explain what RMS does to protect enterprise data.
- Describe usage scenarios that can benefit from an RMS implementation.
- Describe the components and technology that supports an RMS implementation.
- Describe how RMS utilizes a public key technology to protect information.
- Introduction to RMS
- RMS Components
- Lab A: Verifying Active Directory
- Client Side Components
- RMS Architecture and Active Directory
- Describe how RMS works including how the publishing and use licenses are used in a RMS environment.
- Describe the RMS Infrastructure components.
- Describe the RMS client-side components.
- Describe how Active Directory contributes to the RMS infrastructure.
- Installing RMS Server
- Lab A: Creating the RMS Service Account
- Provisioning RMS Server
- Provisioning Configuration Overview
- Configuring Offline Enrollment
- Configuring the RMS Service Connection Point
- Best Practices: Server Installation
- Lab B: Installing and Provisioning RMS
- Describe the hardware and software requirements in order to install RMS Server.
- Describe the steps required to successfully install RMS Server.
- Define and describe the RMS Server provisioning process.
- Explain the various configuration options available for provisioning an RMS Server.
- Install and provision RMS.
- RM Client Components
- Machine Activation
- User Certification
- Lab A: Installing the RMS Client
- Integrating Microsoft Office 2003 and IRM
- Rights Management Add-on for Internet Explorer
- Best Practices: RM Client Deployment
- Lab B: RMS Application Deployment
- Understand the components that make up the RM client.
- Explain the process of machine activation.
- Explain the process of user certification in an RMS environment.
- Describe the features of Microsoft Office 2003 that relate to IRM.
- Describe the Rights Management Add-on for Internet Explorer.
- Install the RMS client
- Manage and deploy RMS-enabled applications using Group Policy.
- Content Protection Requirements
- Publishing RMS-Protected Content
- Consuming RMS-Protected Content
- Offline Protection
- Lab A: Creating and Consuming by Using Word 2003
- LAB B: Creating and Consuming by Using Outlook 2003
- LAB C: Consuming Content by Using the Rights Management Add-On for Internet Explorer
- LAB D: Using Active Directory Security Groups
- Describe the requirements related to protecting content using RMS.
- Describe the process of publishing RMS content.
- Describe the process of consuming RMS content.
- Describe how RMS content can be protected off-line.
- Create and consume RMS-protected content using Microsoft Word.
- Create and consume RMS-protected email using Microsoft Outlook.
- Create and consume RMS-protected content using Microsoft Excel.
- Implement RMS using Active Directory Security Groups.
- Overview of Rights Policy Templates
- Creating Rights Policy Templates
- Distributing Rights Policy Templates
- Working with Rights Policy Templates
- Best Practices
- Lab A: Creating and Using Rights Policy Template
- LAB B: Modifying Existing Templates
- LAB C: Assigning Different Rights to Different Users
- Describe how Rights Policy Templates are used in the RMS environment.
- Explain how to define a Rights Policy Template.
- Explain how to distribute a Rights Policy Template.
- Describe some of the management tasks related to Rights Policy Templates.
- Create and distribute Rights Policy Templates.
- Assign rights to different users using Rights Policy Templates.
- Modify existing templates.
- Overview of Managing Trust
- Trusted User Domains
- LAB A: Defining Trusted User Domains
- Configuring Exclusion Policies
- Revocation Overview
- The Super Users Group
- LAB B: Excluding Users and Applications
- LAB C: Configuring the Super Users Group
- Describe trust policies related to trusted user domains and trusted publishing domains.
- Describe exclusion policies related to lockbox version, Windows version, RAC exclusion, and application exclusion.
- Explain how revocation works.
- Describe the Super Users group and how it related to RMS.
- Define trusted user domains.
- Exclude user and applications.
- Utilize the Super Users group.
- Adding Servers to the RMS Infrastructure
- Subordinate Licensing Servers
- Managing Clusters
- RMS Logging
- RMS Disaster Recovery
- Calculate the number of required RMS servers.
- Describe how to add servers to an existing RMS root cluster.
- Describe how to add Subordinate Licensing Servers.
- Describe how to Replace, Decommission, Unprovision, and Uninstall RMS servers.
- Explain the RMS Logging function.
- Describe procedures used in RMS disaster recovery.
- Troubleshooting RMS
- RMS Administration Toolkit
- LAB A: Using RMS Toolkit Applications
- Describe troubleshooting procedures related to various RMS functions such as Domain Name System (DNS) issues, Service Connection Point (SCP) issues, Provisioning, Internet access, client certification, and consuming content.
- Describe the various tools available in the RMS Administration Toolkit.
- Integrating an Extranet with RMS
- RMS and Firewall Options
- Describe the various extranet scenarios that can use RMS.
- Describe the need for access to the licensing pipeline from the extranet scenario.
- Describe the process related to RMS Service Discovery for Extranet clients.
- Describe how RMS can be implemented in a perimeter network and Intranet scenario.
- Describe how ISA Server can be used to provide RMS services to extranet clients.