Have a question about how the new message protection capabilities work? Check for an answer here. Also, look at Frequently asked questions about data protection in Azure Information Protection for answers to questions about the data protection service, Azure Rights Management, in Azure Information Protection.
Microsoft Purview Message Encryption combines email encryption and rights management capabilities. Rights management capabilities are powered by Azure Information Protection.
You can use Microsoft Purview Message Encryption under the following conditions:
To use Microsoft Purview Message Encryption, you need one of the following plans:
Yes! Microsoft recommends that you complete the steps to set up BYOK before you set up Microsoft Purview Message Encryption.
No. Microsoft Purview Message Encryption and the option to provide and control your own encryption keys, called BYOK, from Azure Information Protection weren't designed to respond to law enforcement subpoenas. OME, with BYOK for Azure Information Protection, was designed for compliance-focused organizations. Microsoft takes requests for customer data seriously. As a cloud service provider, we always advocate for the privacy of your data. In the event we get a subpoena, we always attempt to redirect the request directly to you to obtain the information. (Read Brad Smith's blog: Protecting customer data from government snooping). We periodically publish detailed information of the request we receive. For more information regarding non-Microsoft data requests, see Responding to government and law enforcement requests to access customer data on the Microsoft Trust Center. Also, see "Disclosure of Customer Data" in the Online Services Terms (OST).
Microsoft Purview Message Encryption is an evolution of the existing IRM and legacy OME solutions. The following table provides more details.
Comparison of legacy OME, IRM, and Microsoft Purview Message Encryption
Capability | Previous versions of OME | IRM | Microsoft Purview Message Encryption |
---|---|---|---|
Sending an encrypted email | Only through Exchange mail flow rules | End-user initiated from Outlook for Windows, Outlook for Mac, or Outlook on the web; or through Exchange mail flow rules | End-user initiated from Outlook for Windows, Outlook for Mac, or Outlook on the web; or through mail flow rules |
Rights management | - | Do Not Forward option and custom templates | Do Not Forward option, encrypt-only option, default and custom templates |
Supported recipient type | External recipients only | Internal recipients only | Internal and external recipients |
Experience for recipient | External recipients received an HTML message that they downloaded and opened in a browser or downloaded mobile app. | Internal recipients only received encrypted email in Outlook for Windows, Outlook for Mac, and Outlook on the web. | Internal and external recipients receive email in Outlook for Windows, Outlook for Mac, Outlook on the web, Outlook for Android, and Outlook for iOS, or through a web portal, regardless of whether they are in the same organization or in any organization. The encrypted message portal requires no separate download. |
Bring Your Own Key support | Not available | Not available | BYOK supported |
Office 365 Message Encryption (OME) was deprecated on July 1, 2023. It's being automatically replaced with Microsoft Purview Message Encryption. If you have an active sender mailbox, you can still view mail from OME.
No. If you're using Exchange Online with Active Directory Rights Management service (AD RMS), you can't enable these new capabilities right away. Instead, you need to migrate AD RMS to Azure Information Protection first.
On-premises users can send encrypted mail using Exchange Online mail flow rules. You need to route email through Exchange. For more information, see Part 2: Configure mail to flow from your email server to Microsoft 365.
You can create protected messages from Outlook 2016, Outlook 2013 for Windows and Mac, and from Outlook on the web. For more information on sending encrypted messages, see Send, view, and reply to encrypted messages in Outlook for PC.
Microsoft 365 users can read and respond from Outlook for Windows and Mac (2013 and 2016), Outlook on the web, and Outlook mobile (Android and iOS). You can also use the iOS native mail client if your organization allows it. If you aren't a Microsoft 365 user, you can read and reply to encrypted messages on the web through your web browser.
Microsoft 365 users can use Outlook for PC versions 2019 and Microsoft 365 to create mail protected with the encrypt-only policy. Messages that have the encrypt-only policy applied can be read directly in Outlook on the web, in Outlook for iOS and Android, and Outlook for PC versions 2019 and Microsoft 365.
Yes. The maximum message size you can send with Microsoft Purview Message Encryption, including attachments, is 25 MB. For more information, see Message limits.
Yes. In some cases that have connectors configured such as an Exchange Hybrid deployment, when you include recipients on the BCC line, the BCC recipients are removed before mail gets encrypted. Best practice is to move to an Exchange Online, or put all recipients in the To: or CC fields.
The encrypted message portal only supports mail. The portal doesn't support other message types such as calendar or voice mail.
You can attach any file type to a protected mail. Protection policies are applied only to a subset of the file formats mentioned in Supported file types. By default, Microsoft Purview Message Encryption encrypts the following Office files extensions:
Microsoft Purview Message Encryption doesn't support the 97-2003 versions of the following Office programs: Word (.doc), Excel (.xls), and PowerPoint (.ppt).
In addition, if enabled in Exchange Online, PDF encryption allows you to protect sensitive PDF documents attached to emails. When you send an email, the Office 365 service encrypts PDF file attachments for the newest versions of Outlook, including:
To enable encryption for PDF attachments, using a work or school account that has the Information Rights Management role at a minimum in your tenant, run the following command in Exchange Online PowerShell:
Set-IRMConfiguration -EnablePdfEncryption $true
Protection is inherited from mail to unencrypted attachments only. If a file format is supported, such as a Word, Excel, or PowerPoint file, the file is always protected, even after the recipient downloads the attachment.
For example, say an attachment is protected by Do Not Forward. The original recipient downloads the file, creates a message to a new recipient, and attaches the file. When the new recipient receives the file, they can't open it.
Not yet. SharePoint or OneDrive attachments aren't supported. You can encrypt a mail message, but not the cloud attachments.
When attachments are protected with a protected mail, you can preview documents directly using Outlook clients. Outlook supports preview of Office documents (docx, xlsx, pptx, doc, xls, ppt). Outlook on the web supports preview of Office documents (docx, xlsx, pptx) and PDF.
Outlook on the web supports revocation of protected mail. See How to revoke an encrypted message that you sent for details.
The encrypted message portal supports preview of any encrypted attachment copies added to the encrypted mail. The support file types include Word, Excel, PowerPoint, and PDF files.
Yes. Use mail flow rules in Exchange Online to automatically encrypt a message based on certain conditions. For example, you can create policies that are based on recipient ID, recipient domain, or on the content in the body or subject of the message. See Define mail flow rules to encrypt email messages in Office 365.
Admins can set up a mail flow rule to remove encryption for outgoing mail. You can only set up a rule to remove encryption for incoming mail that originates from your Exchange Online organization.
For an Exchange Online mailbox, admins must enable journal decryption and set up an Exchange Online journaling rule to generate a decrypted copy of the mail into the journaling mailbox. The journaling rule takes any mail or attachment that has encryption and send the original plus a decrypted copy into the journaling mailbox. You can only set up a journaling rule that can decrypt mail or attachments when the encrypted item originates from your organization.
To enable Exchange Online journaling:
Set-IRMConfiguration -JournalReportDecryptionEnabled $true
Yes! You can set up mail flow rules in Exchange Online or by using DLP in the Microsoft Purview compliance portal.
Yes, for mail sent from an Exchange Online mailbox in your organization! For information on customizing email messages and the encrypted message portal, see Add your organization's brand to your encrypted messages.
The encrypted message portal activity logs only capture events for external recipients by accessing the encrypted message portals. Any activities in email clients triggered by external recipients aren't recorded. For internal recipients, see the MailItemsAccessed mailbox-auditing action in Purview Audit (Premium) - Mail items accessed logs.
There's an Encryption report in the Microsoft Purview compliance portal. See View email security reports in the Microsoft Purview compliance portal.
Yes, most messages protected by Microsoft Purview Message Encryption are discoverable. Microsoft Purview Message Encryption protected mail that you receive from another Microsoft 365 organization that has custom branding applied through a mail flow rule is undiscoverable by your eDiscovery service. In other words, if the mail isn't accessible through the user's mailbox, but rather, surfaced only through a link to the encrypted message portal, the mail isn't searchable. See eDiscovery activities that support encrypted items for details.
When an email message matches an encryption mail flow rule, Exchange encrypts the message sending it.
Yes! You can open encrypted messages for a shared mailbox. When the mail is sent from the same organization, you can open the mail when you're signed in to a supported Outlook client. If the mail is sent from an external organization, you need to use Outlook on the web.
The following table lists the supported clients for shared mailboxes.
Platform | Read mail | View email attachments |
---|---|---|
Outlook on the web | Yes | Yes |
Outlook for Windows | Yes | Yes |
Outlook for Mac | Yes | Yes |
Outlook for Android | Yes | Yes |
Outlook for iOS | Yes | Yes |
Android and iOS use the Office mobile app to display encrypted attachments, and don't display attachments directly in Outlook mobile.
There are currently two known limitations:
To assign a user to a shared mailbox
Add-MailboxPermission -Identity support@contoso.onmicrosoft.com -User ayla@contoso.com -AccessRights FullAccess -AutoMapping $true
To assign a mail enabled security group to the shared mailbox
To use this method, you must encrypt mail with the Do Not Forward or Encrypt-only protection options. Only mail initiated by the shared mailbox or mail sent within an organization can be opened.
Add-MailboxPermission -Identity support@contoso.onmicrosoft.com -User frontdesk@contoso.com -AccessRights FullAccess
When delegates are given full access permission to a user's mailbox, delegated access of encrypted mail is supported in Outlook on the web, Outlook for Mac, Outlook for iOS, and Outlook for Android. Outlook for Windows doesn't support delegated access.
You can sign in to the encrypted message portal to retrieve mail as long as the sender's organization is active and the mail isn't configured to expire.
First, check the junk or spam folder in your email client. DKIM and DMARC settings for your organization might cause these emails to end up filtered as spam.
Next, check quarantine in the compliance portal. Often, messages containing a one-time pass code, especially the first ones your organization receives, end up in quarantine.