Skip to main content

Azure Information Protection Target Requirements

Microsoft® Azure is a cloud-based computing platform that provides a range of services, such as file storage. Azure uses Azure Information Protection (AIP) labels, a Microsoft tool used to classify and protect stored files. Access Analyzer employs the File System Solution to execute Access Auditing (FSAA) and/or Sensitive Data Discovery Auditing scans in order to find AIP Protection labels and scan protected (i.e. encrypted) files for sensitive data.

This document provides information needed to properly configure access required by Access Analyzer to successfully scan for Azure Information Protection labels in a targeted environment.

NOTE: Access Analyzer does not scan for AIP Marking labels, only Protection labels.

Workflow for Scanning AIP Labels

Before the Access Analyzer File System solution can scan for Azure Information Protection (AIP) labels, certain prerequisites are required both in Access Analyzer and Azure environments.

  1. Rights Management Service Client Installation

  2. Create a Service Principal Account using PowerShell

  3. Enable the Account as an AIP Super User using PowerShell

  4. Add User to the AIP Role in Microsoft® Azure

  5. Azure Information Protection Target Requirements

  6. Enable settings in FSAA Data Collector in Access Analyzer.

    • See the FileSystemAccess Data Collector section in the File System Solution topic for additional information

Prerequisites

Ensure the following prerequisites are met before configuring AIP scanning:

  • Microsoft Entra ID Admin credentials

  • The PowerShell Install-Module command requires:

    • PowerShell 5.0 (Run as Administrator)
    • Windows Server 2016and later
  • Active Directory Rights Management Services Client 2.1 installed on the server where the FSAA applet or proxy is being run

Rights Management Service Client Installation

The Rights Management Service Client must be installed on the applet servers where FSAA is running. This may be the local Access Analyzer server, a Proxy server, or a File Server running in applet mode.

RECOMMENDED: Read the System Requirements and Install Instructions provided by Microsoft to complete the installation.

Create a Service Principal Account using PowerShell

Follow the steps to create a service principal account with a symmetric key to connect to AIP:

NOTE: All PowerShell commands should be run in order through PowerShell as an Admin.

Step 1 – Open up PowerShell (Administrator).

Step 2 – Install and import MsOnline module:

Install-Module MsOnline
Import-Module MsOnline

Step 3 – Connect to Azure with the Connect-MsolService command. Enter the Azure credentials in the Sign in to your account window that displays from Microsoft.

Step 4 – Once successfully connected to Azure, create a service principal with the following command:

New-MsolServicePrincipal

Enter the DisplayName of the new service principal name. (For example, AIP_EnterpriseAuditor)

Step 5 – Take note and save the Symmetric Key and AppPrincipalID to be used in later steps.

CAUTION: Do not lose the symmetric key. It is not retrievable again once the PowerShell window is closed.

The service principal account with the proper key has been created.

Enable the Account as an AIP Super User using PowerShell

Follow the steps to enable the Service Principal Account in AIP as a Super User:

NOTE: All PowerShell commands should be run in order through PowerShell as an Admin.

Step 1 – In PowerShell, install Microsoft Azure Active Directory Rights Manager (AIPService) module:

Install-Module AIPService
Import-Module AIPService

Step 2 – Connect to Azure using the Connect-AIPService command and supply Azure credentials in the Sign in to your account window that displays from Microsoft.

Step 3 – Add the service principal to the Azure AD Rights Management service super users, using the AppPrincipalID saved from the steps in the Create a Service Principal Account using PowerShell section:

Add-AipServiceSuperUser-ServicePrincipalID <AppPrincipalID>

Step 4 – Enable the DisplayName account using the following command:

Enable-AIPServiceSuperUserFeature

The Service Principal Account is now added to the Rights Management service as a Super User, and the Super User feature is enabled.

Add User to the AIP Role in Microsoft® Azure

In Microsoft Azure, add the Account to the Azure Information Protection Administrator Role.

Step 1 – Log into http://portal.azure.com with Azure credentials and select Microsoft Entra ID from the list of resources on the left-hand pane.

Step 2 – Navigate to Roles and Administrators. On the Administrative Roles page, select the Azure Information Protection Administrator role.

Step 3 – Use the Add Assignment button to display the Add assignments pane. Search for the name of the new service principal account (the DisplayName entered in PowerShell) and add it to the list of assignments.

The Service Principal Account is now successfully added to the Azure Information Protection Administrator role.

Access Analyzer Configurations

Before Access Analyzer can scan for AIP labels, two configurations must be done prior to the initial scan.

Azure Connection Profile

To collect tags for files protected with Azure Information Protection, an Azure connection profile must be configured in Access Analyzer before an FSAA scan runs. See the Global Settings topic for additional information on how to set up a connection profile at the global level.

Step 1 – In Access Analyzer, add a credential for an Azure Active Directory account type to the existing Connection Profile used for File System scanning. Supply the Client ID field with the AppPrincipalID and the Key field with the Symmetric key created upon creation of the new service principal.

Step 2 – At the job level, apply the connection profile that contains both the Microsoft Entra ID credential and credentials required for File System scanning under the Jobs > [Job] > Settings > Connection node.

Step 3 – Ensure that the job is configured correctly before running a scan. See the Configure FSAA Data Collector topic for additional information.

An Azure Connection Profile has now been successfully created for an FSAA scan.

Configure FSAA Data Collector

In Access Analyzer, configure the FSAA Data Collector wizard pages to scan files protected by Azure Information Protection. This can be done for both FSAA System Scans and SEEK System Scans. In the FSAA Data Collector Wizard, configure the following menus to scan for AIP protection labels:

For FSAA System Scans:

  • Scan Server Selection – Choose the server that scanning is executed on. Target the server that has the Rights Management Service Client 2.1 installed where the applet is running.

    • This may be a proxy server, file server (applet mode), or the local Access Analyzer console depending on scan configuration
  • Scan Settings – Select the Enable scanning of files protected by Azure Information Protection checkbox to add AIP files to the scan criteria

  • Azure Tenant Mapping page – Add the AppPrincipalID (App ID) and the Domain Name or Tenant ID

    Remember, the Azure Tenant Mapping page is only visible when the Enable scanning of files protected by Azure Information Protection checkbox is selected on the Scan Settings page.

  • Default Scoping Options

    • File Details tab – Include files protected by Azure Information Protection (AIP)
    • File Properties (Folder Summary) – Include AIP Protected Files
  • Scoping Options – if needed, scope to a specific subset of resources on a selected host

For SEEK System Scans:

  • Scan Server Selection – Choose the server that scanning is executed on. Target the server that has the Rights Management Service Client 2.1 installed where the applet is running.

    • This may be a proxy server, file server (applet mode), or the local Access Analyzer console depending on scan configuration
  • Scan Settings – Select the Enable scanning of files protected by Azure Information Protection checkbox to add AIP files to the scan criteria

  • Azure Tenant Mapping page – Add the AppPrincipalID (App ID) and the Domain Name or Tenant ID

    Remember, the Azure Tenant Mapping page is only visible when the Enable scanning of files protected by Azure Information Protection checkbox is selected on the Scan Settings page.

  • Scoping Options – if needed, scope to a specific subset of resources on a selected host

  • Sensitive Data Settings – Select Decrypt Files Protected by Azure Information Protection. This page only applies for SEEK scans.

See the FileSystemAccess Data Collector section in the File System Solution topic for additional information on these scoping options.