Digital data protection has been important from the day the computer was invented. There are different laws, products, technologies, and methodologies to improve the data protection in infrastructures. AD RMS is Microsoft's solution, which can be used to control things users can do once they have access to confidential data.
In this chapter, you learned what AD RMS and its components are. Then, we moved on to understanding how AD RMS works and how it protects data. After that, we looked at different AD RMS deployment topologies and their characteristics. Last but not least, we worked on AD RMS installation, configuration, and testing.
This ends the third part of this book, and we are moving on to the last part. The fourth part of the book is to start with a chapter that is focused on Active Directory security best practices.