2 3 Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further.

Slides:



Advertisements
Similar presentations
Working with Outlook 2007 at CERN Outlook Main window Customize views Send s Organize s: Category, Follow-up flag, To-Do Bar Create signatures.
Advertisements

Barracuda Message Archiver
Enterprise Vault (EVault)
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
…your guide through terrain
MailMeter Over 2,000 installations worldwide Meet FRCP requirements SOX, GLBA, HIPAA, SEC, FINRA, BASEL II, FOI, etc. Avoid fines for failure to produce.
One retention policy for Exchange, SP, OneDrive, Lync and Public Folders Time based policy Delete policies at item or folder level for.
As Never Seen Before Ronen Gabbay Microsoft Exchange Regional Director U-BTech & Hi-Tech CTO.
Optimize for Software + Services Archiving Archiving Protect CommunicationsProtect Communications Advanced SecurityAdvanced Security Manage.
Agenda Symantec Enterprise Vault 1 Today’s Management Challenges 1 Why Management? 2 The Solution: Symantec Enterprise Vault 3 Benefits & Closing.
“I need to reduce hardware costs and operational overhead.” - IT Manager, Messaging Infrastructure “Our Sales teams need to connect with the right customers.
Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
Why Compliance Legal and Regulatory requirements Organizational governance requests Internal and external threats Today’s Challenges Duplicate solutions.
Exchange 2010 Overview Name Title Group. What You Tell Us Communication overload Globally distributed customers and partners High cost of communications.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
Agenda: Compliance Vision Archive Preserve (Hold) Delete (Messaging Records Management) Q&A.
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
Using Microsoft Outlook: Basics. Objectives Guided Tour of Outlook –Identification –Views Basics –Contacts –Folders –Web Access Q&A.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
EXL302-R. Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT.
Ilse Van Criekinge Technology Advisor Microsoft BeLux Session Code: UNC306.
Introduction to Exchange Server 2010 Omar El-Sherif Solutions Specialist – Unified Communications Microsoft Egypt.
Scott Schnoll Principal Technical Writer Microsoft Corporation Session Code: UNC201.
Version 2.0 for Office 365 Wave 15. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureAdministering.
Exchange 2010 Overview Micah Howard and Doug Whiteley Senior Network Engineers Reinsel Kuntz Lesher, LLP.
Exchange Server 2010 overview Nguyen An Que Microsoft Vietnam blogs.technet.com/quenguyen.
Clinton Ho Program Manager Microsoft Corporation SESSION CODE: SIA311.
Exchange 2010 Overview Name Title Group. “I need to deliver secure and compliant communications tools to support a highly distributed workforce.” - CIO/Technology.
management “A Gen-i Perspective” Paul McTaggart - ECM Practice Manager.
Microsoft Outlook Web Application (OWA)
Advanced User Guide to Outlook and all its features.
1 Secure Services. 2 Secure is a hosted application that provides users with enterprise-grade business features including calendaring, contacts.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Outlook Lesson 4 Managing Messages Microsoft Office 2010 Advanced Cable / Morrison 1.
By: Amber Shepard   Microsoft Outlook is an client and personal information manager (PIM) that's available as part of Microsoft's Office suite.
ARCHIVING S. WHAT IS ARCHIVING S Archiving is the act of preserving and making searchable all to/from an individual. archiving.
Record Management 2013 James Milne SharePoint MVP AIT007.
Module 9 Configuring Messaging Policy and Compliance.
Archive s By Cameron Harris. What is archiving s Archiving is the act of preserving and making searchable all to/from an individual.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of PST files stored outside of IT control.
Empower the User Outlook, Word, PowerPoint, SharePoint, Mobile Apps, etc. Exchange, SharePoint, Lync, AD, File Server, third parties, etc. Exchange/
Harvinder Bhela General Manager, Exchange Microsoft Corporation SESSION CODE: UNC201
CDFA Outlook 2003 Course Office Information Technology Services.
Module 9 Configuring Messaging Policy and Compliance.
Ankur Kothari Microsoft Corporation. In-Place Archive with secondary quota Access documents with SkyDrive Pro Site Mailboxes enable better collaboration.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Outlook 2003: Advanced Features Cooperative Conversations April 13, 2007.
Microsoft Office Illustrated Introductory, Second Edition Started with Outlook 2003 Getting.
Outlook 2013 & 2010 Lync Messanger. Outlook 2013 Ribbon Navigation Pane Message View Reading Pane Tabs Status Bar.
Module 7 Planning and Deploying Messaging Compliance.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Five Managing Addresses.
Understanding Microsoft Forefront Online Protection for Exchange Nathan Winters Microsoft Corporation EXL201.
Exchange Deployment Planning Services Exchange Server 2010 Overview.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Kamal Janardhan Lead Program Manager Exchange Product Group Microsoft Corporation SESSION CODE: UNC307 Archiving, Retention and Discovery in Exchange Server.
XP Exploring Outlook  Outlook is a powerful information manager  You can use Outlook to perform a wide range of communication and organizational tasks,
ANNELIES BULKENS UNIFIED COMMUNICATIONS PRODUCT MARKETING MANAGER ILSE VAN CRIEKINGE TECHNOLOGY ADVISOR CORE UNIFIED COMMUNICATIONS.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
Microsoft Exchange Server 2013 Security Mick Tomlinson– Technical Instructor New Horizons.
Secure Services Shared Hosted MS Exchange 2010.
Microsoft ® Outlook & Microsoft Exchange Delivering Value & Choice across PC, Phone, and Browser The Right Tool for the Job Delivering Value & Choice.
Microsoft Virtual Academy Dean Yamada | Senior Premier Field Engineer, Microsoft Stephen Hall | Cloud Solutions Specialist, District Computers.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
A Winning Combination !! and Good afternoon…
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Presentation transcript:

2

3

Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further performance/management issues Retention Compliance adds to volume challenges Regulations mandate specific retention periods for relevant (SOX = 5 years, SEC rules = 6 years, HIPAA = 5-6 years) Discovery Strict timelines on discovery of Cover all from all sources, including PSTs Retrieval costs can be HUGE (backup tapes, PSTs) Volume Storage Management 4

SharePoint Outlook PSTs Webmail Third Party Archive Backups Exchange Server 5

Poor User Experience Unfamiliar environment Inability to search and/or access archived content Clunky experience with Outlook/Outlook Web Access add-on Complex Administrative Experience Outlook add-on install/performance issues Separate search/management of primary and archive mailboxes Concerns over reliability of hosted archive vendors High Costs Separate archive infrastructure investment Additional archive management costs 6

Personal Archive Archive in Outlook/OWA Integrated with mailbox Move and Delete Policy Move and Delete Policies in OLK/OWA Folder/Item Level Policy Hold Policy Edited/Deleted items preserved Single Item Restore Multi-Mailbox Search Simplified search console Role-Based Access ControlPreservePreserve DiscoverDiscover Exchange Server 2010 introduces integrated archiving capabilities offering customers out-of-the-box tools to preserve and discover data, without changing the user or IT Pro experience 7

Personal Archive 8

User can view, read, navigate, flag and reply to archived e- mail same as live User gets conversation view scoped to archive (same as PSTs) Replies to archived messages saved in live sent items folder (same as PSTs) Folder hierarchy from primary mailbox maintained 9

Option to search archive only or both live and archived Advanced search options work across live and archived 10

Policy automatically deletes after x days Expiration date label Policies automatically move to archive after x days Policies applied to all within a folder 11

12 Set-Mailbox -SingleItemRecoveryEnabled $true -RetainDeletedItemsFor

13

14

15

“80% of all data leaks occur because of accidents — that is users, being unaware of data policies, as opposed to having malicious intent.” - Forrester,

Dynamic Signatures/ Disclaimers MailTips IRM ProtectionBlock/ Redirect SOFT CONTROLS HARD CONTROLS Moderation Less restrictive More restrictive 17

18

19

Information about the message and recipients shown before send For end users: Reduce delivery surprises s are addressed correctly the first time Help prevent embarrassing mistakes For the organization: Reduce help desk calls Reduce NDRs Reduce unnecessary pipeline traffic

21 MailTipDisplays:

ActionCmdlet (shown with default) Turn Mailtips On Set-OrganizationConfig –MailTipsAllEnabled $true Turn Mailbox-based MailTips On Set-OrganizationConfig –MailTipsMailboxSourcedTipsEnabled $true Display Group Information Set-OrganizationConfig –MailTipsGroupMetricsEnabled $true Display External Recipients Set-OrganizationConfig –MailTipsExternalRecipientsTipsEnabled $false Change Large Audience Threshold Set-OrganizationConfig –MailTipsLargeAudienceThreshold 25 Per user – In OWA, when you collapse MailTips, they stay hidden – Outlook users can disable individual MailTips

Arbitration Mailbox

If the message... Is from a member of the group ‘Marketing Team' And is sent to recipients that are 'Outside the organization' Do the following... Append the message with the disclaimer 'Exchange 2010 is coming! Can you handle the excitement?' Except if the message... Is received from ‘Alfred E Newman' Conditions Exceptions Actions

Pattern stringDescription \SThe \S pattern string matches any single character that is not a space. \sThe \s pattern string matches any single white-space character. \DThe \D pattern string matches any non-numeric digit. \dThe \d pattern string matches any single numeric digit. \wThe \w pattern string matches any single Unicode character categorized as a letter or decimal digit. |The pipe ( | ) character performs an OR function. * The wildcard ( * ) character matches zero or more instances of the previous character. For example, ab*c matches the following strings: ac, abc, abbbbc. ( ) Parentheses act as grouping delimiters. For example, a(bc)* matches the following strings: a, abc, abcbc, abcbcbc, and so on. \\ Two backslashes indicate that the character that follows the backslashes should be escaped. For example, if you want to match a string that contains \d, you would type \\d. ^ The caret ( ^ ) character indicates that the pattern string that follows the caret must exist at the start of the text string that is being matched. For example, matches and but not This character can also be used with the dollar ( $ ) character to specify an exact string to match. For example, matches only and does not match anything else, such as $ The dollar ( $ ) character indicates that the preceding pattern string must exist at the end of the text string that is being matched. For example, contoso.com$ matches and but does not match This character can also be used with the caret ( ^ ) character to specify an exact string to match. For example, matches only and does not match anything else, such as

IMPROVED!E2007E2010 Disclaimers/SignaturesText with limited formatting Add AD attributes + HTML AttachmentsSize, Name+ Content (Office documents) ClassificationsActs on classification Can also act on No Classifications NEW!E2010 Apply RMSApplies RMS encryption ModerationEnable manager to review Message TypesRMS-encrypted, Auto-replies, calendaring, voic , approval request Supervision ListsAllows/Blocks based on list of recipients Management Properties Automatically identifies manager and applies policy User PropertiesCreate granular policy sets per user attributes (e.g. department, country)

ScenariosExampleTransport Rules, Moderation, MailTips Ethical WallBlock brokers, analysts from communicating Block mail between specific people in a DG Block mail between people with specific AD attributes ModerationManager required to sign-off on mail to sensitive partner Send to Manager for approval MailTips for moderated recipients Employee SupervisionInappropriate Content Harassment Filter using keywords; regular expressions; type of content (OOF, voice mail, NDR, etc.) Information Leakage Protection HIPAA – personal health data GLBA – personal financial data EUPD (Europe) PIPEDA (Canada) SB 1386 (California) PCI MailTips for external recipient Apply RMS encryption Filter using keywords or regular expressions Reject outbound mail with Message Classifications (e.g. attorney-client privilege) SignaturesEUPD 2003/58/EC - European Union Data Protection Directive Append signatures that include name, title, department, etc.

32

Apply RMS policies automatically using Transport Rules Apply “Do Not Forward” or custom RMS templates RMS protection is also applied to Office 2003, 2007, and 2010 attachments RMS protection can be triggered based on sender, recipient, or content

IRM Search Conduct full-text search on IRM-protected messages in OWA and Outlook. Enables eDiscovery or protected messages in the Exchange Store. Transport Decryption Enables access to IRM-protected messages by Transport Agents to perform operations such as transport rules, content filtering, and anti-spam/anti-virus. Journal Report Decryption Journal Report Decryption Agent attaches clear-text copies of IRM- protected messages and attachments to journal mailbox

IRM protection automatically triggered based on sender/receiver attributes Supported attachments are also protected Windows Desktop Search will index headers and subject Authorized users can turn off protection Can be used to prevent service provider from accessing your

38