Go to the table of contents Go to the previous page Go to the next page View or print as PDF
General System Settings > Services > Configuring Microsoft RMS
Configuring Microsoft RMS
Administrator Help | Forcepoint DLP | Version 8.4.x
Use the Microsoft RMS tab of the Settings > General > Services page to configure Forcepoint DLP to decrypt and analyze Microsoft Office files that were encrypted by Azure RMS or Active Directory (AD) RMS on Windows endpoints. This includes files found on Windows endpoints (discovery) or sent via any endpoint channel.
Office files that are protected by Microsoft RMS include Word, Excel, PowerPoint and other Office documents created in Office 2007 or later, such as those ending in docx and pptx.
The system uses logged-in user credentials to access the Microsoft RMS server. In case of errors, the transaction is permitted without analysis and the error is recorded in a log file.
By default, this setting is disabled.
To enable RMS decryption, select Enable RMS decryption, then click OK.
The RMS file detection feature has the following prerequisites:
1.
2.
3.
4.
5.
6.
*
*
By default, these policies are set to monitor. If they are enabled, false positive incidents for RMS communication appear in the Security Manager.
To view RMS-related incidents in the Data Security module of the Security Manager, navigate to the Main > Reporting > DLP > Incidents - Last 3 days page. The Forensics tab shows when the detected breach was an RMS-protected file.
To determine whether RMS decryption and analysis is active or inactive, check the Main > Status > Endpoint Status page.

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
General System Settings > Services > Configuring Microsoft RMS
Copyright 2017 Forcepoint. All rights reserved.