Tag: Domain Controller

In Part 1 of our “Components of a PKI” blog series, we defined several PKI terms that are useful for understanding Certificate Authorities (CAs—also known as Certification Authorities) and CA [...]
Digital certificates (most commonly represented by the X.509 public key certificate standard) are signed data objects that associate a public key with an individual user, device, or entity. In this [...]
User attributes are important metadata that should be treated with care. Some organizations do not take user attributes seriously enough, which creates problems when the company tries to automate system [...]
Planning for a Microsoft Information Protection deployment can seem complicated at first; however, the recommendations in this article can help guide you in the right direction. An efficient design will [...]
There are a few key terms that are critical when understanding and deploying Microsoft Information Protection (MIP). For example, sensitivity labels give you a way to classify and protect data [...]
In Part 3 of this blog series, we discuss some other important considerations when taking this approach to automation. [...]