August 2019
Intermediate to advanced
786 pages
20h 22m
English
By now, we know the components of the AD RMS and their responsibilities. In this section, we are going to learn in detail how all these components work together in order to protect corporate data.
Before we start the data protection process, we need a healthy AD RMS cluster, AD RMS clients (author and recipient), and a reliable connection between these components. Once these prerequisites are fulfilled, the data protection process will go through three main stages: protecting the author's content, publishing the protected content, and accessing the protected content on the part of the recipient.
Let's assume Peter is trying to protect a document using AD RMS. He is going to send it to Adam, but he does not want him to ...