rights management vs access control lists

Posted on 2011-10-05
Last Modified: 2012-05-12
Can anyone tell me (perfer comments to links) what rights management can do to protect sensitive data and files on corporate network shares/apps that stringent NTFS access control lists cant do?

Or perhaps why would a company deploy rights management as opposed to just getting their ACL's in order? Does rights management remove the need for file share ACL's? Or is it a different purpose?

Where would rights management be required? And how is it controlled?

Ps - is rights management free?
Question by:pma111
    LVL 57

    Accepted Solution

    AD RMS does not cost extra and it works in can work with ACLs but does not replace ACLs as a method to protect data

    It works with certain apps like exchange, sharepoint, office.

    I have to get going for a flight so I can't write more right now but start with these links


    LVL 3

    Author Comment

    Thanks Mike - if you get chance to add any more of your comments they are always most welcome.

    Prefer your comments to MS links - cheers.
    LVL 26

    Assisted Solution

    MS RMS comes bundled with the Windows 2008 and Windows 2008 R2 operating systems, but they do require a SQL back end (and MSDE will do in a pinch).

    RMS does things that typical ACLs don't, such as controlling the distribution of files and emails once they leave your control to the great unwashed masses on the internet.

    With ACLs for instance, you can prevent users from modifying files, but you can't prevent them from forwarding emails you've sent to them. RMS will allow you to do the latter.
    LVL 3

    Author Comment

    What benefits could it have in terms of SQL Server databases? Or is it more geared to sharepoint/exchange.
    LVL 26

    Expert Comment

    As far as a SQL server back end? Not much by my understanding. RMS deals most with what people can do with the information they're been given access to and not so much with the raw DB itself.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free Trending Threat Insights Every Day

    Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

    As a Mac user and former AppleCare AHA & Senior Advisor, I'm constantly bombarded with questions about Macs and if they need Antivirus. This short article is my response to those questions.
    This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
    This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    14 Experts available now in Live!

    Get 1:1 Help Now