Office 365 Message Encryption Setup

Office 365 Encryption with Azure Information Protection

As I mentioned in an earlier post, email encryption is a sticky thing. In a perfect world, everyone would have Opportunistic TLS enabled and all mail traffic would be automatically encrypted with STARTTLS encryption, which is a fantastic method of ensuring security of messages “in transit”. But some messages need to be encrypted “at rest” due to security policies or regulations. Unfortunately, researchers have recently discovered some key vulnerabilities in the S/MIME and OpenPGP. These encryption systems have been the most common ways of ensuring message encryption for messages while they are sitting in storage. The EFAIL vulnerabilities allow HTTP formatted messages to be exposed in cleartext by attacking a few weaknesses. Enter Office 365 Message Encryption (OME)

Luckily, Office 365 subscribers can improve the confidentiality of their email by implementing a feature that is already available to all E3 and higher subscriptions or by purchasing licenses for Azure Information Protection and assigning them to users that plan to send messages with confidential information in them. The following is a short How-To on enabling the Office 365 Message Encryption (OME) system and setting up rules to encrypt messages.

The Steps

To enable and configure Office 365 Message Encryption for secure message delivery, the following steps are necessary:

  1. Subscribe to Azure Information Protection
  2. Activate OME
  3. Create Rules to Encrypt Messages

Details are below.

1. Subscribe to Azure Information Protection

The Azure Information Protection suite is an add-on subscription for Office 365 that will allow end users to perform a number of very useful functions with their email. It also integrates with SharePoint and OneDrive to act as a Data Loss Prevention tool. With AIP, users can flag messages or files so that they cannot be copied, forwarded, deleted, or a range of other common actions. For email, all messages that have specific classification flags or that meet specific requirements are encrypted and packaged into a locked HTML file that is sent to the recipient as an attachment. When the recipient receives the message, they have to register with Azure to be assigned a key to open the email. The key is tied to their email address and once registered the user can then open the HTML attachment and any future attachments without having to log in to anything.

Again, if you have E3 or higher subscriptions assigned to your users, they don’t need to also have AIP as well. However, each user that will be sending messages with confidential information in them will need either an AIP license or an E3/E5 license to do so. To subscribe to AIP, perform these steps:

  1. Open the Admin portal for Office 365
  2. Go to the Subscriptions list
  3. Click on “Add a Subscription” in the upper right corner
  4. Scroll down to find the Azure Information Protection
  5. Click the Buy Now option and follow the prompts or select the “Start Free Trial” option to get 25 licenses for 30 days to try it out before purchasing
  6. Wait about an hour for the service to be provisioned on your O365 tenant

Once provisioned, you can then move on to the next step in the process.

2. Activate Office 365 Message Encryption

This part has changed very recently. Prior to early 2018, Activating Office 365 Message Encryption took a lot of Powershell work and waiting for it to function properly. MS changed the method for activating OME to streamline the process and make it easier to work with. Here’s what you have to do:

  1. Open the Settings option in the Admin Portal
  2. Select Services & Add-ins
  3. Find Azure Information Protection in the list of services and click on it
  4. Click the link that says, “Manage Microsoft Azure Information Protection settings” to open a new window
  5. Select the Activate button under “Rights Management is not activated”
  6. Choose Activate in the Window that pops up

Once this is done, you will be able to use AIP’s Client application to tag messages for right’s management in Outlook. There will also be new buttons and options in Outlook Web App that will allow you to encrypt messages. However, the simplest method for encrypting messages is to use an Exchange Online Transport Rule to automatically encrypt messages.

3. Create Transport Rules to Encrypt Messages

Once OME is activated, you can encrypt messages using the built in Rights Management tools, but it’s much easier to use specific criteria encrypt automatically. Follow these steps:

  1. Open the Exchange Online Admin Portal
  2. Go to Mail Flow
  3. Select Rules
  4. Click on the + and select “Add a New Rule”
  5. In the window that appears, click “More Options” to switch to the advanced rule system
  6. The rule can be anything from Encrypting messages flagged as Confidential to tagging the subject line. My personal preference is to use subject/body tags. Make your rule look like the below image to use this technique:

    Office 365 Message Encryption Transport Rule
    This image shows the Office 365 Message Encryption rule to encrypt when an email contains in the subject line or body.

When set up properly, the end user will receive a message telling them that they have received a secure message. The email will have an HTML file attached that they can open up. Once users register they can read email without any other steps required and it will be protected from outside view.

 

 

3 thoughts on “Office 365 Message Encryption Setup”

  1. Hi,
    We have E3 licences so I didn’t need to go through step 1. I simply activated OME via the O365 admin portal and installed the AIP’s client application but when I try to encrypt an email (by clicking on “connect to RMS server…” I always get this error message :
    Your machine isn’t set up for Information Rights Management (IRM). To set up IRM, sign in to Office, open an existing protectected message or ocument, or contact your help desk.
    Anything else I could check ?
    Thanks in advance,

Leave a Reply