?
Solved

What is WindowsRightsManagementServiceSP2?

Posted on 2011-03-02
3
Medium Priority
?
461 Views
Last Modified: 2013-12-04
I found this executable on one of our students home drives.  I need to explain to the principal why this program could be suspicious/dangerous so that he can take appropriate action.  Can anyone tell me why a 11th grade student would want to have this executable?  It's compatible with all of our infrastructure.  We are currently using LightSpeed Security Suite for our anti-virus/malware protection and for our internet filter.

Thanks.
0
Comment
Question by:mbcasey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 10

Expert Comment

by:abbright
ID: 35022033
From http://www.microsoft.com/windowsserver2003/technologies/rightsmgmt/default.mspx: Microsoft Windows Rights Management Services (RMS) for Windows Server 2003 is information protection technology that works with RMS-enabled applications to help safeguard digital information from unauthorized use.

0
 
LVL 6

Accepted Solution

by:
bluemeln earned 2000 total points
ID: 35022287
Windows Rights Management on Windows Server 2003 (now called Active Directory Rights Management on Windows Server 2008) is a system used to develop policies how and for whom to restrict files. Policies for protecting files are configured on the server and then enforced through the client software. Since WRM is based on a client-server model, the client software by itself is not useful. If you had Windows Rights Management on your network, it would actually help increase security, but to my understanding, the user could not use it in order to restrict access to files.

We use a third-party solution similar to WRM. We define access rules on a policy server. When users try to open a document, the equivalent of the WRM client on their machine contacts the policy server to see what the rules for the file are and also to make sure they are legitimate users. If the policy on the file is one to which the user does not have access, the user cannot open the document at all. If the user is permitted access, the document will open.

Without a server, the client is really useless.
0
 

Author Closing Comment

by:mbcasey
ID: 35023174
Thank you for putting it into simple words for me to pass onto our administrators.  I knew the jist of the program but I couldn't put it into the correct format.  Thanks!!!
0

Featured Post

Ransomware Attacks Keeping You Up at Night?

Will your organization be ransomware's next victim?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with our Ransomware Prevention Kit!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Transparency shows that a company is the kind of business that it wants people to think it is.
As companies replace their old PBX phone systems with Unified IP Communications, many are finding out that legacy applications such as fax do not work well with VoIP. Fortunately, Cloud Faxing provides a cost-effective alternative that works over an…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question