Requirements to use Information Protection (AIP, MIP, RMS) in your organization
![Image](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9v-HkLNklnBck99pj12JH4i1qkuR9_otJEcGk_mMuhR4oodKVfNDcBPckfh_znAIZfjB6LX4S4HBRvcMap3WkkZyhyxaWxNUFIhVWS4zFEPgGPvmDOIApl44Ibz65uuibrsMsSx372gZx/s640/office-4249391_1280.jpg)
Sometimes, when you work with something over time, and then want to explain some of the functionality to others, it is easy to jump some steps. I have gotten some feedback from readers that has made me realize that there are a few things that should be added to many of my posts.