
Recipients using other email clients and email service providers also have an improved experience.

In addition, recipients who receive a protected email message sent to a Microsoft 365 account in Outlook 2016 or Outlook on the web, don't have to take any other action to view the message. Unlike the previous version of OME, the new capabilities provide a unified sender experience whether you're sending mail inside your organization or to recipients outside of Microsoft 365. For example, you can create a rule that requires the encryption of all messages addressed to a specific recipient, or that contains specific words in the subject line, and also specify that recipients can't copy or print the contents of the message.
SINGE DEFINE FULL
For a full list of supported attachment types, see "File types covered by IRM policies when they are attached to messages" in Introduction to IRM for email messages.Īs an administrator, you can also define mail flow rules to apply this protection. Users can then encrypt email messages and various attachments by using these options. You can encrypt messages by using rights management templates, the Do Not Forward option, and the encrypt-only option. This service includes encryption, identity, and authorization policies to help secure your email. Office 365 Message Encryption is an online service that's built on Microsoft Azure Rights Management (Azure RMS) which is part of Azure Information Protection. The rest of this article applies to the new OME capabilities.

Email message encryption helps ensure that only intended recipients can view message content. Office 365 Message Encryption works with, Yahoo!, Gmail, and other email services. With Office 365 Message Encryption, your organization can send and receive encrypted email messages between people inside and outside your organization. As a result, mailboxes can become repositories for large amounts of potentially sensitive information and information leakage can become a serious threat to your organization. People often use email to exchange sensitive information, such as financial data, legal contracts, confidential product information, sales reports and projections, patient health information, or customer and employee information.
