Lab 1 - Exercise 3 - Manage Microsoft Purview Message Encryption

To ensure secure communication within Contoso Ltd., you need to configure and test Microsoft Purview Message Encryption. This includes modifying the default template and creating a new branding template for the finance department.

Tasks:

  1. Verify Azure RMS functionality
  2. Modify default branding template
  3. Test default branding template
  4. Create custom branding template
  5. Test the custom branding template

Task 1 – Verify Azure RMS functionality

In this task, you'll verify the correct Azure RMS functionality of your tenant.

  1. You should still be logged into Client 1 VM (SC-400-CL1) as the SC-400-CL1\admin account.

  2. Open an elevated PowerShell window by right clicking the Windows button in the task bar, then select Terminal (Admin).

  3. Confirm the User Account Control window with Yes.

  4. Run the Install-Module cmdlet in the terminal window to install the latest Exchange Online PowerShell module version:

    Install-Module ExchangeOnlineManagement
    
  5. Confirm the NuGet provider security dialog with Y for Yes and press Enter. This process might take some time to complete.

  6. Confirm the Untrusted repository security dialog with Y for Yes and press Enter. This process may take some time to complete.

  7. Run the Set-ExecutionPolicy cmdlet to change your execution policy and press Enter

    Set-ExecutionPolicy -ExecutionPolicy RemoteSigned -Scope CurrentUser
    
  8. Close the PowerShell window.

  9. Open a regular PowerShell window, without elevation, right clicking the Windows button in the task bar, then select Terminal.

  10. Run the Connect-ExchangeOnline cmdlet to use the Exchange Online PowerShell module and connect to your tenant:

    Connect-ExchangeOnline
    
  11. When the Sign in window is displayed, sign in as JoniS@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). You will use the password you reset Joni's to in a previous lab.

  12. Run the Get-IRMConfiguration cmdlet to verify Azure RMS and IRM is activated in your tenant:

    Get-IRMConfiguration | fl AzureRMSLicensingEnabled
    

    The AzureRMSLicensingEnabled result should be True.

  13. Run the Test-IRMConfiguration cmdlet to test the Azure RMS templates used for Office 365 Message Encryption with user Megan Bowen:

    Test-IRMConfiguration -Sender MeganB@contoso.com -Recipient MeganB@contoso.com
    

    IRM validation script result.

    Verify all tests are in the status PASS and no errors are shown.

  14. Leave the PowerShell window open.

You have successfully installed the Exchange Online PowerShell module, connected to your tenant, and verified the correct functionality of Azure RMS.

Task 2 – Modify default branding template

There is a requirement in your organization to restrict trust for foreign identity providers, such as Google or Facebook. Because these social IDs are activated by default for accessing messages protected with message encryption, you need to deactivate the use of social IDs for all users in your organization.

  1. You should still be logged into your Client 1 VM (SC-400-CL1) as the SC-400-CL1\admin account and there should still be an open PowerShell window with Exchange Online connected.

  2. Run the Get-OMEConfiguration cmdlet to view the default configuration:

    Get-OMEConfiguration -Identity "OME Configuration" | fl
    

    Review the settings and confirm that the SocialIdSignIn is set to True.

    Screenshot showing the SocialIdSignIn value set to True.

  3. Run the Set-OMEConfiguration cmdlet to restrict the use of social IDs for accessing messages from your tenant protected with OME:

    Set-OMEConfiguration -Identity "OME Configuration" -SocialIdSignIn:$false
    
  4. Confirm the warning message for customizing the default template by entering Y for Yes then press Enter.

  5. Run the Get-OMEConfiguration cmdlet to check the default configuration again and validate:

    Get-OMEConfiguration -Identity "OME Configuration" | fl
    

    Screenshot showing the SocialIdSignIn value set to False.

    Notice the result should show the SocialIDSignIn is set to False. Leave the PowerShell window and client open.

You have successfully deactivated the usage of foreign identity providers, such as Google and Facebook in Office 365 Message Encryption.

Task 3 – Test default branding template

You must confirm that no social IDs dialog is displayed for external recipients when receiving a message protected with Office 365 Message Encryption from users of your tenant and they need to use the OTP at any time accessing the encrypted content.

  1. You should still be logged into your Client 1 VM (SC-400-CL1) as the SC-400-CL1\admin.

  2. Open Microsoft Edge in an InPrivate window by right clicking Microsoft Edge from the task bar and selecting New InPrivate window.

  3. Navigate to https://outlook.office.com and log into Outlook on the web as LynneR@WWLxZZZZZZ.onmicrosoft.com (where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). Lynne's password was set in a previous exercise.

  4. On the Stay signed in? dialog box, select the checkbox for Don't show this again then select No.

  5. In Outlook on the web, select New mail.

  6. In the To line enter your personal or other third-party email address that isn't in the tenant domain. Enter Secret Message in the subject line and My super-secret message. in the body of the email.

  7. From the top pane, select Options then Encrypt to encrypt the message. Once you've successfully encrypted the message, you should see a notice that says "Encrypt: This message is encrypted. Recipients can't remove encryption."

    Screenshot of Encryption settings

  8. Select Send to send the message. Leave the Outlook window open.

  9. Sign into your personal email account in a new window and open the message from Lynne Robbins. If you sent this email to a Microsoft account (like @outlook.com) the encryption might be processed automatically, and you'll see the message automatically. If you sent the email to another email service like (@gmail.com), you might have to perform the next steps to process the encryption and read the message.

    Note: You might need to check your junk or spam folder for the message from Lynne Robbins.

  10. Select Read the message.

  11. Without having social IDs activated, there is no button to authenticate with your non-Microsoft account.

  12. Select Sign in with a One-time passcode to receive a limited time passcode.

  13. Go to your personal email portal and open the message with subject Your one-time passcode to view the message.

  14. Copy the passcode, paste it into the OME portal and select Continue.

  15. Review the encrypted message.

You have successfully tested the modified default OME template with deactivated social IDs.

Task 4 – Create custom branding template

Protected messages sent by your organizations finance department require special branding, including customized introduction and body texts and a Disclaimer link in the footer. The finance messages shall also expire after seven days. In this task, you will create a new custom OME configuration and create a transport rule to apply the OME configuration to all mail sent from the finance department.

  1. You should still be logged into your Client 1 VM (SC-400-CL1) as the SC-400-CL1\admin, and there should still be an open PowerShell window with Exchange Online connected.

  2. Run the New-OMEConfiguration cmdlet to create a new configuration:

    New-OMEConfiguration -Identity "Finance Department" -ExternalMailExpiryInDays 7
    
  3. Confirm the warning message for customizing the template with Y for Yes and press Enter.

  4. Run the Set-OMEConfiguration cmdlet with the IntroductionText parameter to change the introduction text:

    Set-OMEConfiguration -Identity "Finance Department" -IntroductionText " from Contoso Ltd. finance department has sent you a secure message."
    
  5. Confirm the warning message for customizing the template with Y for Yes and press Enter.

  6. Run the Set-OMEConfiguration cmdlet with the EmailText parameter to change the body email text:

    Set-OMEConfiguration -Identity "Finance Department" -EmailText "Encrypted message sent from Contoso Ltd. finance department. Handle the content responsibly."
    
  7. Confirm the warning message for customizing the template with Y for Yes and press Enter.

  8. Run the Set-OMEConfiguration cmdlet with the PrivacyStatementURL parameter to change the disclaimer URL to point to Contoso's privacy statement site:

    Set-OMEConfiguration -Identity "Finance Department" -PrivacyStatementURL "https://contoso.com/privacystatement.html"
    
  9. Confirm the warning message for customizing the template with Y for Yes and press Enter.

  10. Run the TransportRule cmdlet to create a mail flow rule, which applies the custom OME template to all messages sent from the finance team. This process might take a few seconds to complete.

    New-TransportRule -Name "Encrypt all mails from Finance team" -FromScope InOrganization -FromMemberOf "Finance Team" -ApplyRightsProtectionCustomizationTemplate "Finance Department" -ApplyRightsProtectionTemplate Encrypt
    
  11. Run the Get-OMEConfiguration cmdlet to verify changes.

    Get-OMEConfiguration -Identity "Finance Department" | Format-List
    
  12. Close the PowerShell window after reviewing the results

You have successfully created a new transport rule that applies the custom branding template automatically, when a member of the finance department sends a message to external recipients.

Task 5 – Test the custom branding template

To validate the new custom configuration, you need to use the account of Lynne Robbins again, who is a member of the finance team.

  1. Go back to Microsoft Edge with the InPrivate Outlook on the web window where you should still be logged in as Lynne Robbins.

  2. Select New mail from the upper left side part of Outlook on the web.

  3. In the To line enter your personal or other third-party email address that isn't in the tenant domain. Enter Finance Report in the subject line and enter Secret finance information. in the body of the email.

  4. Select Send to send the message, then close the InPrivate window where you're logged in as Lynne.

  5. Sign into your personal email account and open the message from Lynne Robbins.

  6. You should see a message from Lynne Robbins that looks like the image below. Select Read the message.

    Sample encrypted email from Lynne Robbins.

  7. The customized configuration has social IDs activated, because both options are available. Select Sign in with a One-time passcode to receive a limited time passcode.

  8. Go to your personal email portal and open the message with subject Your one-time passcode to view the message.

  9. Copy the passcode, paste it into the portal and select Continue.

  10. Review the encrypted message with custom branding. Close the window with your email account open.

You have successfully tested the new customized template.