Working through this chapter enabled you to start to optimize your Information Protection solutions inside your organization or with your customers. We provided a starting lab environment to test all the required functionality and processes of AIP. With the key PowerShell cmdlets, you should be up and running, and ready to start your configuration tasks. Furthermore, with the overview of typical configuration tasks, we provided you a few examples of the experiences we learned during our many projects.
In the last chapter of the book, we will work through an AIP-enabled example application to give you more insights into the AIP technology.