Overview:
Information permission management (REM) allows an individual to specify the access permissions to digital information, such as documents, workbooks, and forms. This helps prevent unauthorized users from printing or forwarding sensitive information. Once you use the REM to restrict document permissions, you will be restricted from accessing and using documents wherever they are, because the document access permissions are stored in the document files.
The following situations are supported:
- Unauthorized use of restricted content, such as forwarding, copying, modifying, printing, and sending faxes, or cutting and pasting contents, is prohibited.
- This helps prevent restricted content from being copied in Microsoft Windows by using the print screen function.
- Restrict content sent anywhere.
- It helps the company to use and distribute content inside and outside the company according to control policies.
The following situations cannot be prevented:
- Contents are deleted, stolen, captured, and transmitted by malicious programs such as Trojan horses, keyboard recorders, and some types of spyware.
- The content is lost or damaged due to computer viruses.
- The restricted content is manually copied or re-entered from the screen of the authorized person.
- The restricted content is taken from the authorized person's screen.
- Restricted content is copied by a third-party screen capture program.
Download the RMS deployment document as follows:
Http://files.cnblogs.com/lygx/MicrosoftWindowsRightsManagementServices (rms%%%e9%83%a8%e7%bd%b2%e6%96%87%e6%a1%a3.pdf
Download the Windows RMS SP2 wizard in one step:
Installing Windows rights management services with Service Pack 2 step-by-step guide
One-step deployment of Windows rms with the moss 2007 wizard (English version) download link:
Deploying Windows rights management services with Microsoft Office Sharepoint Server 2007 step-by-step guide.pdf