June 2017
Beginner to intermediate
742 pages
18h 29m
English
Digital data protection has been important from the day the computer was invented. There are different laws, products, technologies, and methodologies to improve the data protection in infrastructures. AD RMS is Microsoft's solution, which can be used to control things users can do once they have access to confidential data.
In this chapter, you learned what AD RMS and its components are. Then, we moved on to understanding how AD RMS works and how it protects data. After that, we looked at different AD RMS deployment topologies and their characteristics. Last but not least, we worked on AD RMS installation, configuration, and testing.
This ends the third part of this book, and we are moving on to the last part. The fourth part of ...