How to install the Azure Information Protection unified labeling client for users
Published Date : 08 Feb 2018
Last Updated : 04 Oct 2024
Content Ref: TEC6097467
Operating System
(none)
Part No
(none)
Summary
Explains how to install the Azure Information Protection unified labeling client for users.
Symptoms
Description
This article explains how to install the Azure Information Protection unified labeling client for users.
Requirements
Note: The procedure in this article is relevant if you have purchased or implemented the Microsoft® Purview Data Compliance Configuration Service from RM (22Z-168 - INS MS Purview Data Compliance Config.(Remote) Service).
Ensure your clients are Windows 10 or above.
Ensure your clients have Office Professional Plus 2016 or above installed.
If you have a web proxy that requires authentication, configure it to use integrated Windows authentication with the user's Active Directory logon credentials.
Allow HTTPS traffic on TCP port 443 to *.informationprotection.azure.com and informationprotection.hosting.portal.azure.net.
If you have a firewall or similar intervening network device that is configured to allow specific connections, configure it to allow access to the endpoints listed in the Azure Rights Management (RMS) section of the Microsoft 365 article.
For more detailed information on the requirements for Microsoft Purview Information Protection, please refer to the Microsoft article.
Procedure
The Azure Information Protection unified labeling client can be installed using an executable (AzInfoProtection_UL.exe) or an MSI (AzInfoProtection_UL.msi). Download your preferred installation file from here.
Click here to review additional prerequisites that may be required prior to installing the Azure Information Protection unified labeling client.
Refer to the relevant link below for instructions on how to install using your preferred installation method. Important: We strongly recommend that the Azure Information Protection unified labeling client is installed only on the computers used by the staff accounts that need to use the protection features.
If you are using a CC4 network and wish to import and create a package for Azure Information Protection unified labeling client, please refer to DWN3152898 in the Other Useful Articles section below (DWN3152898 will only be visible to logged in network support contract holders).
The MSI can also be used with other central deployment mechanisms like SCCM, Group Policy.
Reboot the computers after installation is completed.
Checks
Sign in to your Microsoft 365 tenancy as a global administrator user.
From Admin Center, click Groups.
Select the Azure Rights Management Group and add a staff user account as a member.
Sign out of your Microsoft 365 tenancy.
Log on to the computer as the staff user you selected in step 3 above.
Open a Microsoft Office application (Word, Excel or PowerPoint).
Click File, Account and confirm you are signed in as the staff user in step 3 above.
Click Info, Protect Document, Restrict Access, 'Connect to Rights Management Servers and get templates'.
Return to the document.
Confirm that the user sees an information bar prompting to sign in to the Azure Information Protection service, as shown in the image below.
Click the 'Sign in' button and enter the staff user's Microsoft 365 user credentials. Note: If your Microsoft 365 domain is federated to RM Unify the user may get re-directed to the RM Unify page to complete the sign in.
In the Office application, confirm the information bar displays Sensitivity as 'Not set' and the seven custom labels are visible, e.g., Confidential - Staff, Sensitive - HR, etc. as shown in the image below. Note: If you cannot see the custom labels, your app window may not be large enough to accommodate them. In that case, click the Edit icon next to 'Not set' (the pencil icon) to open a new window to display the labels.
Confirm a 'This is a confidential internal document' header has been added to the document and no error appears.
On the same computer, open Microsoft Outlook and create a new email.
Confirm you can see the same seven custom labels as you did in Word.
Click the custom 'Highly Confidential - All Staff' label and send the email to a recipient account external to Microsoft 365, e.g., a Gmail or Yahoo account.
Confirm the external recipient receives the email with the message, as shown in the image below: '<user> has sent you a protected message'.