Portal Walkthrough: Control 1.16 - Information Rights Management (IRM)
Last Updated: January 2026 Portal: Microsoft Purview, SharePoint Admin Center Estimated Time: 2-4 hours
Prerequisites
- Purview Info Protection Admin role
- SharePoint Admin role
- Azure RMS activated for tenant
Step-by-Step Configuration
Step 1: Activate Azure Rights Management
- Open Microsoft 365 Admin Center
- Navigate to Settings > Org settings > Services
- Select Microsoft Azure Information Protection
- Verify status shows "Protection is activated"
- If not activated, click Activate
Step 2: Create IRM-Enabled Sensitivity Labels
- Open Microsoft Purview
- Navigate to Information protection > Labels
- Create new label:
- Name:
FSI-Confidential-IRM - Description: Confidential content with IRM protection
- Configure encryption:
- Enable Encryption
- Select Assign permissions now
- Add permissions for agent service accounts (Viewer)
- Configure content marking:
- Header: "CONFIDENTIAL - FSI Internal Use"
- Watermark: Enable with user identity
- Publish label via label policy
Step 3: Enable IRM on SharePoint Libraries
- Open SharePoint Admin Center
- Navigate to the site containing agent knowledge sources
- Go to Site settings > Site permissions
- For each document library:
- Open Library settings > Information Rights Management
- Enable "Restrict permissions on this library on download"
- Configure settings:
- Allow viewers to print: [Based on zone]
- Allow viewers to run scripts: No
- Set content expiration: [Based on zone]
Step 4: Configure Agent Service Account Access
- In the sensitivity label permissions:
- Add agent service account with "Viewer" permissions
- This allows agent to read content but not bypass IRM
Step 5: Configure Document Tracking
- In Purview > Information protection > Track usage
- Enable document tracking for IRM-protected content
- Configure alerts for:
- Access from unusual locations
- Multiple failed access attempts
- Revocation events
Configuration by Governance Level
| Setting | Baseline (Zone 1) | Recommended (Zone 2) | Regulated (Zone 3) |
|---|---|---|---|
| IRM Required | Optional | Required | Mandatory |
| Print/Copy | Allowed | Blocked | Blocked |
| Content Expiration | None | 180 days | 90 days |
| Offline Access | 30 days | 14 days | 7 days |
| Watermark | Optional | Header only | Full watermark |
| Screen Capture Block | No | No | Yes |
FSI Example Configuration
IRM Configuration: Client Advisory Documents
Sensitivity Label: FSI-Client-Confidential
Encryption: Enabled
Permissions:
- Compliance Team: Co-Owner
- Advisory Team: Co-Author
- Agent Service Account: Viewer
Content Marking:
Header: "CLIENT CONFIDENTIAL - [Client Name]"
Footer: "Do not distribute without authorization"
Watermark: Dynamic (viewer email)
Protection Settings:
Print: Blocked
Copy: Blocked
Forward: Blocked
Expiration: 90 days
Offline: 7 days
SharePoint Library: /sites/ClientAdvisory/Documents
IRM: Enabled
Download Restriction: Apply label on download
Offline Viewing: 7 days maximum
Validation
After completing these steps, verify:
- Azure RMS shows "Protection is activated"
- Sensitivity labels with IRM are published
- SharePoint library IRM is enabled
- Agent can read IRM content but not bypass restrictions
- Document tracking captures access events
Back to Control 1.16 | PowerShell Setup | Verification Testing | Troubleshooting