In this chapter, we discussed and configured the key technologies for the discovery of sensitive data in motion, transit, and at rest. You saw how important these tasks are, and the benefits and data control they provide in your environment. They give you the power to build efficient detection and data-leakage-prevention rules. We'll use this knowledge to build an Azure Information Protection solution in Chapter 15, Configuring Azure Information Protection Solutions. But first, we'll learn more about the Azure RMS keys, which you need to understand to follow the protection process and find the right tool to troubleshoot against errors.
In the next chapter, you'll learn how Azure RMS keys are used and which deployment models are available for different compliance requirements.