Lab 1 - Exercise 4 - Deploy Microsoft Purview Message Encryption
Joni Sherman, the Information Security Administrator for Contoso Ltd., has been tasked with ensuring secure communication between departments. To support this, she is configuring Microsoft Purview Message Encryption for Contoso, including modifying the default settings and creating a custom branding experience for the finance department.
Tasks:
- Verify Azure RMS functionality
- Modify default branding template
- Validate default branding behavior
- Create custom branding template
- Validate custom branding behavior
Task 1 – Verify Azure RMS functionality
In this task, you’ll verify the correct Azure RMS functionality of your tenant.
-
You should still be logged into Client 1 VM (SC-401-CL1) as the SC-401-CL1\admin account.
-
Open PowerShell by right-clicking the Start button in the taskbar and selecting Terminal (Admin).
-
Run the Install Module cmdlet in the terminal window to install the latest Exchange Online PowerShell module version:
Install-Module ExchangeOnlineManagement
-
Confirm the Untrusted repository security dialog with Y for Yes and press Enter. This process may take some time to complete.
-
Run the Connect-ExchangeOnline cmdlet to use the Exchange Online PowerShell module and connect to your tenant:
Connect-ExchangeOnline
-
When the Sign in window is displayed, sign in as
JoniS@WWLxZZZZZZ.onmicrosoft.com
(where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). You will use the password you reset Joni’s to in a previous lab. -
Run the Get-IRMConfiguration cmdlet to verify Azure RMS and IRM is activated in your tenant:
Get-IRMConfiguration | fl AzureRMSLicensingEnabled
The AzureRMSLicensingEnabled result should be True.
-
Run the Test-IRMConfiguration cmdlet to test Azure RMS functionality using Office 365 Message Encryption with Megan Bowen as both sender and recipient:
Test-IRMConfiguration -Sender MeganB@contoso.com -Recipient MeganB@contoso.com
Verify all tests are in the status PASS and no errors are shown.
-
Leave the PowerShell window open.
You have successfully installed the Exchange Online PowerShell module, connected to your tenant, and verified the correct functionality of Azure RMS.
Task 2 – Modify default branding template
There is a requirement in your organization to restrict trust for foreign identity providers, such as Google or Facebook. Because these social IDs are activated by default for accessing messages protected with message encryption, you need to deactivate the use of social IDs for all users in your organization.
-
You should still be logged into your Client 1 VM (SC-401-CL1) as the SC-401-CL1\admin account and there should still be an open PowerShell window with Exchange Online connected.
-
Run the Get-OMEConfiguration cmdlet to view the default configuration:
Get-OMEConfiguration -Identity "OME Configuration" | fl
Review the settings and confirm that the SocialIdSignIn property is set to True.
-
Run the Set-OMEConfiguration cmdlet to restrict the use of social IDs for accessing messages from your tenant protected with OME:
Set-OMEConfiguration -Identity "OME Configuration" -SocialIdSignIn:$false
-
Confirm the warning message for customizing the default template by entering Y for Yes then press Enter.
-
Run the Get-OMEConfiguration cmdlet to check the default configuration again and validate:
Get-OMEConfiguration -Identity "OME Configuration" | fl
Notice the result should show the SocialIdSignIn is set to False. Leave the PowerShell window and client open.
You’ve successfully disabled social identity providers, helping ensure that encrypted emails from Contoso can only be opened using Microsoft accounts or one-time passcodes—improving control over sensitive message access.
Task 3 – Validate default branding behavior
You must confirm that no social IDs dialog is displayed for external recipients when receiving a message protected with Office 365 Message Encryption from users of your tenant and they need to use the OTP at any time accessing the encrypted content.
[!alert] External email delivery might be blocked in some lab environments. This task might not complete as expected.
-
You should still be logged into your Client 1 VM (SC-401-CL1) as the SC-401-CL1\admin.
-
Open Microsoft Edge in an InPrivate window by right clicking Microsoft Edge from the task bar and selecting New InPrivate window.
-
Navigate to
https://outlook.office.com
and log into Outlook on the web asLynneR@WWLxZZZZZZ.onmicrosoft.com
(where ZZZZZZ is your unique tenant ID provided by your lab hosting provider). Lynne’s password was set in a previous exercise. -
On the Stay signed in? dialog box, select the checkbox for Don’t show this again then select No.
-
In Outlook on the web, select New mail.
-
In the To line enter your personal or other third-party email address that isn’t in the tenant domain. Enter
Secret Message
in the subject line andMy super-secret message.
in the body of the email. -
From the top pane, select Options then Encrypt to encrypt the message. Once you’ve successfully encrypted the message, you should see a notice that says “Encrypt: This message is encrypted. Recipients can’t remove encryption.”
-
Select Send to send the message. Leave the Outlook window open.
-
Sign into your personal email account in a new window and open the message from Lynne Robbins. If you sent this email to a Microsoft account (like @outlook.com) the encryption might be processed automatically, and you’ll see the message automatically. If you sent the email to another email service like (@gmail.com), you might have to perform the next steps to process the encryption and read the message.
[!Note] Note: You might need to check your junk or spam folder for the message from Lynne Robbins.
-
Select Read the message.
-
Because social IDs are disabled, you shouldn’t see an option to sign in with a third-party account.
-
Select Sign in with a One-time passcode to receive a limited time passcode.
-
Go to your personal email portal and open the message with subject Your one-time passcode to view the message.
-
Copy the passcode, paste it into the OME portal and select Continue.
-
Review the encrypted message.
You have successfully tested the modified default OME template with deactivated social IDs.
Task 4 – Create custom branding template
Protected messages sent by your organizations finance department require special branding, including customized introduction and body texts and a Disclaimer link in the footer. The finance messages shall also expire after seven days. In this task, you will create a new custom OME configuration and create a transport rule to apply the OME configuration to all mail sent from the finance department.
-
You should still be logged into your Client 1 VM (SC-401-CL1) as the SC-401-CL1\admin, and there should still be an open PowerShell window with Exchange Online connected.
-
Run the New-OMEConfiguration cmdlet to create a new configuration:
New-OMEConfiguration -Identity "Finance Department" -ExternalMailExpiryInDays 7
-
Confirm the warning message for customizing the template with Y for Yes and press Enter.
-
Run the Set-OMEConfiguration cmdlet with the IntroductionText parameter to change the introduction text:
Set-OMEConfiguration -Identity "Finance Department" -IntroductionText " from Contoso Ltd. finance department has sent you a secure message."
-
Confirm the warning message for customizing the template with Y for Yes and press Enter.
-
Run the Set-OMEConfiguration cmdlet with the EmailText parameter to update the body text of the encrypted email:
Set-OMEConfiguration -Identity "Finance Department" -EmailText "Encrypted message sent from Contoso Ltd. finance department. Handle the content responsibly."
-
Confirm the warning message for customizing the template with Y for Yes and press Enter.
-
Run the Set-OMEConfiguration cmdlet with the PrivacyStatementURL parameter to change the disclaimer URL to point to Contoso’s privacy statement site:
Set-OMEConfiguration -Identity "Finance Department" -PrivacyStatementURL "https://contoso.com/privacystatement.html"
-
Confirm the warning message for customizing the template with Y for Yes and press Enter.
-
Run the New-TransportRule cmdlet to create a mail flow rule, which applies the custom OME template to all messages sent from the finance team. This process might take a few seconds to complete.
New-TransportRule -Name "Encrypt all mails from Finance team" -FromScope InOrganization -FromMemberOf "Finance Team" -ApplyRightsProtectionCustomizationTemplate "Finance Department" -ApplyRightsProtectionTemplate Encrypt
-
Run the Get-OMEConfiguration cmdlet to verify changes.
Get-OMEConfiguration -Identity "Finance Department" | Format-List
-
Close the PowerShell window after reviewing the results
You’ve configured a transport rule that ensures emails from the finance department are encrypted and branded consistently, reinforcing Contoso’s messaging and security standards.
Task 5 – Validate custom branding behavior
To validate the new custom configuration, you need to use the account of Lynne Robbins again, who is a member of the finance team.
[!alert] External email restrictions might prevent this message from being received. Branding might not appear as expected.
-
Go back to Microsoft Edge with the InPrivate Outlook on the web window where you should still be logged in as Lynne Robbins.
-
Select New mail from the upper left side part of Outlook on the web.
-
In the To line enter your personal or other third-party email address that isn’t in the tenant domain. Enter
Finance Report
in the subject line and enterSecret finance information.
in the body of the email. -
Select Send to send the message, then close the InPrivate window where you’re logged in as Lynne.
-
Sign into your personal email account and open the message from Lynne Robbins.
-
You should see a message from Lynne Robbins that looks like the image below. Select Read the message.
-
In the customized configuration, both authentication options are available, indicating that social ID sign-in is enabled. Select Sign in with a One-time passcode to receive a limited time passcode.
-
Go to your personal email portal and open the message with subject Your one-time passcode to view the message.
-
Copy the passcode, paste it into the portal and select Continue.
-
Review the encrypted message with custom branding. Close the window with your email account open.
You have successfully tested the new customized template.