Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Contents Exit focus mode. Is this page helpful? Please rate your experience Yes No. Any additional feedback? Note If you're using SharePoint Server , a server administrator must install protectors on all front-end Web servers for every file type that the people in your organization want to protect by using IRM. Submit and view feedback for This product This page.
View all page feedback. In this article. Allow people with at least the View Items permission to run embedded code or macros on a document. Select the Allow viewers to run script and screen reader to function on downloaded documents check box. If you select this option, users could run code to extract the contents of a document.
Select this option if you want to restrict access to content to a specified period of time. If you select this option, people's issuance licenses to access the content will expire after the specified number of days, and people will be required to return to the server to verify their credentials and download a new copy. Select the After download, document access rights will expire after these number of days check box, and then specify the number of days for which you want the document to be viewable.
Prevent people from uploading documents that do not support IRM to this list or library. If you select this option, people will not be able to upload any of the following file types: File types that do not have corresponding IRM protectors installed on all of the front-end web servers. File types that SharePoint Server cannot decrypt. File types that are IRM protected in another program. Select the Do not allow users to upload documents that do not support IRM check box.
Remove restricted permissions from this list or library on a specific date. Select the Stop restricting access to the library at check box, and then select the date that you want. Control the interval that credentials are cached for the program that is licensed to open the document. Select the Users must verify their credentials using this interval days check box, then enter the interval for caching credentials in number of days.
Allow group protection so that users can share with members of the same group. Protected View is a read-only mode in which most editing functions are disabled. Additionally, Protected View is enabled by default, and files that are located in potentially unsafe locations are opened in Protected View. For more information about Protected View, go to the following Microsoft website:.
What is Protected View. Skip to main content. This browser is no longer supported. Download Microsoft Edge More info. Save the workbook. After you assign permission levels, select OK. If the author chooses not to include an e-mail address, unauthorized users get an error message.
Set an expiration date for a file Open the file. Select OK twice. Use a different Windows user account to rights-manage files Open the document, worksheet, or presentation. Do one of the following: In the Select User dialog box, select the e-mail address for the account that you want to use, and then select OK. View content with restricted permission To view rights-managed content that you have permissions to by using Office, just open the workbook. Read Read Change Read, edit, copy, save changes Full Control Read, edit, copy, save changes, print, set expiration dates for content, grant permissions to users, access content programmatically Do any of the following: Set permission levels manually On the Review tab, under Protection , select Permissions , and then select Restricted Access.
Information Rights Management IRM helps do the following: Prevent an authorized recipient of restricted content from forwarding, copying, changing, printing, faxing, or pasting the content for unauthorized use Restrict content wherever it is sent Provide file expiration so that content in documents can no longer be viewed after a specified time Enforce corporate policies that govern the use and dissemination of content within the company IRM can't prevent restricted content from being: Erased, stolen, or captured and transmitted by malicious programs such as Trojan horses, keystroke loggers, and certain kinds of spyware Lost or corrupted because of the actions of computer viruses Hand-copied or retyped from a display on a recipient's screen Digitally photographed when displayed on a screen by a recipient Copied by using third-party screen-capture programs.
Need more help? Expand your skills. Get new features first. Was this information helpful? Yes No. Thank you! Any more feedback? The more you tell us the more we can help. Can you help us improve? Resolved my issue. Clear instructions. Easy to follow. No jargon. Pictures helped. Didn't match my screen. Incorrect instructions. Too technical. Not enough information. Not enough pictures.
Any additional feedback?
0コメント