Presentation is loading. Please wait.

Presentation is loading. Please wait.

Exchange security and protection

Similar presentations


Presentation on theme: "Exchange security and protection"— Presentation transcript:

1 Exchange security and protection
Microsoft Exchange 6/18/2018 Exchange security and protection Speaker name Title Microsoft corporation © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Information explosion
Microsoft Exchange 6/18/2018 Information explosion 44X Information Explosion: In the next decade, mankind’s data will increase 44x, while the number if IT professionals will grow by only 1.4.x. In fact, next year alone there will be more generated than in all of mankind’s history. At a certain point, worker productivity is hampered by too much information. Organizations need smart ways to manage that information and keep the organization’s data safe. 1.4X © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

3 Microsoft Exchange 6/18/2018 Security challenges Rapidly evolving external threats Potential loss of sensitive data Keeping safe without impacting users External threats evolving rapidly More than 90% of is spam Spammers are continuously developing new techniques Growing use of malicious URLs within spam to transmit viruses, rootkits & bots Potential loss of sensitive data Data loss carries legal, financial risks HIPAA, PCI and other regulations demand increased data privacy Keep safe without impacting users User want to do the right thing, but don’t always know how Managing disparate messaging and security systems adds cost and complexity Complying with government and industry regulations is mandatory © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 Exchange security and protection
Protect communications Enforce policy Simplify management In Exchange 2013, we’ve made a number of investments to help you respond to these challenges: Protect Communications Basic level of built-in anti-malware, Anti-malware and enhanced spam filtering in the cloud to protect your environment from threats Enforce Policy Data loss prevention (DLP) controls that detect sensitive data in before it is sent and automatically block, hold or protect Simplify Management Unified administration of anti-spam, anti-malware, and data loss prevention within Exchange

5 “SaaS secure Web and gateways frequently provide efficiency and cost advantages, and a growing number of offerings are delivering an improved level of security that exceeds what most organizations can achieve with on- premises software or appliances.” Gartner Report - Moving and Web Security to the Cloud Author: Peter Firstbrook Published: 6 April 2011

6 740 million messages Forefront Online Protection for Exchange – March 2012 Current scale ….Handles 740M messages per day total (including SPAM) per day, and SPAM capture per day is around 500M

7 Exchange Online Protection (EOP)
Comprehensive protection Multi-engine antivirus Continuously evolving anti-spam protection Built on Forefront Online Protection for Exchange (FOPE) Enterprise class reliability Geographically load-balanced datacenters Queuing capabilities to help ensure no mail is lost Exchange Online Protection Built on the very successful FOPE service Current SLAs 100% protection against all known viruses Capture at least 98% of all inbound spam s False Positive commitment of less than 1 in 250,000 s EOP now integrated with office 365 for management and onboarding. Sender Reputation protection by send through a “high risk” pool to ensure protection of Organizations reputation Major Improvements over FOPE: Integrated console SPAM improvements Common administration console Office 365 integration Detailed reporting

8 Effective spam blocking
Microsoft Exchange 6/18/2018 Effective spam blocking Block external threats quickly Advanced fingerprinting technologies that identify and stop new spam and phishing vectors in real time. Enable more control Mark all bulk messages as spam Block unwanted based on language or geographic origin Block based on language Blocking SPAM Top ranked filtering service gets better with faster more proactive ways of catching and eliminating spam New fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it) For example; when we find a bad IP that is sending spam We’ll do more than just block the mail from We’ll start collecting all of the from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it. International SPAM Support Ability to select geo-regions/countries for blocking Ability to filter on languages (86 languages supported) Geo-regions enforcement happens in Connection Filtering Layer Language enforcement happens at the Content Filtering layer Bulk Mail marked as SPAM The admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM. Bacn (pronounced like bacon), is that has been subscribed to and is therefore not unsolicited (like spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as " you want but not right now.“ Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3] The name bacn is meant to convey the idea that such is "better than spam, but not as good as a personal ". Block based on geography © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 Control anti-spam filtering
6/18/2018 Control anti-spam filtering Connection filtering Static IP allow/block list Opt-in to Microsoft-maintained reputable sender list Content spam categories Blatant spam High confidence spam Content Filtering Actions Delete Quarantine Add X-Header Modify Subject Redirect New: Opt-in to Microsoft-maintained reputable sender list. This is a list which is maintained by MS, and we know there are some senders which always send good mail. The rate of false positives is much lower when using these types of numbers. Current SLAs: 98% SPAM catch rate, but we are better than that. 1:250,000 False Positive Rate, and we are better than that too. High Confidence SPAM has a higher probability of false positive, so you can make different decisions. E.g. if you are very cautious you may want to make high confidence SPAM available for end users to retrieve. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

10 On-premises anti-malware protection
Basic level built-in to Exchange Server 2013 Simple configuration and monitoring Same anti-virus engine as System Center Endpoint Protection Scans through the transport service Hide for online presentations Enabled by default, but can easily be turned off. Customers can use 3rd party/premium products

11 Microsoft Exchange 6/18/2018 Simple configuration Block attachments Robust, customizable notifications Hide for online presentations Sender notifications Admin notifications © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

12 Exchange security and protection
Microsoft Exchange 6/18/2018 Exchange security and protection Exchange Online Protection Stop viruses and malware Exchange Online Protection works to block spam and viruses before entering network Basic level of anti-malware built into Exchange Server Protect Sensitive Data Scan Exchange transport for sensitive content with Data Loss Prevention feature in the cloud on on-premises Granular control on using RMS Exchange Server On Prem version Top Catch Rate for Anti-virus and Anti-Spam both in the cloud and on-premises Cloud gateway blocks spam and viruses before entering network Exchange servers have basic level of built-in virus scanning for internal mail Recommended guidance for Exchange Server Security: Use EOP + Exchange Server 2013 built-in AV features. New Data Loss Protection (DLP) features – Available on- premises or in the cloud (Hybrid Mail Flow) Rights Management Services now also available Online © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

13 Exchange security and protection
Microsoft Exchange 6/18/2018 Exchange security and protection Unified Management Anti-Spam Stop viruses and malware Exchange Online Protection provides multi- engine protection Protect sensitive data Scan exchange transport for sensitive content with Data Loss Prevention features Granular control on using RMS Anti-Malware Online version is well protected for Exchange Online Protection New Data Loss Protection (DLP) features Rights Management Services Available Online Policy © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

14 Microsoft Exchange 6/18/2018 “Large Retailer Leaks Payment Information via … ” “Accidental with attachment exposed hundreds of individuals’ names and Social Security Numbers..” No organization wants to see these types of headlines. Examples: “College staff member accidentally s attachment containing personal information of 15,794 graduates” “Insurance Organization; accidental with attachment exposed over 700 individuals’ names and Social Security Numbers” © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

15 Microsoft Exchange 6/18/2018 “Faced with never-ending and expanding regulatory and industry mandates, organizations invest tremendous amounts of energy on audit, compliance, controls, and (in some cases) risk management. At the same time, they seek to free staff resources from mundane tasks such as evidence gathering and simple reporting.” Examples: PCI-DSS: Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards. GLBA: The Gramm-Leach-Bliley Act (GLB Act or GLBA), also known as the Financial Modernization Act of 1999, is a federal law enacted in the United States to control the ways that financial institutions deal with the private information of individuals. This is a global problem. How many organizations know how much they are at risk? Gartner Report - IT Governance, Risk, and Compliance Management Solutions Author: Trent Henry Published: 28 December 2011 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

16 Microsoft Exchange 6/18/2018 Policy enforcement Flexible tools for policy enforcement that provide the right level of control Transport rules Data Loss Prevention Rights Management Leakage or loss of data through is a growing risk and concern for many organizations today – because of regulations, breaches of trust or loss of business critical information. Exchange approach to the problem is to provide a range of soft and hard controls. Flexible solution: Customers have differing needs – solution needs to be flexible Within a given organization, different types of data, different parts of the company require different levels of enforcement Protect against loss without getting in users’ way Attempts to implement policy can’t get in the way of business processes, or these will fail Exchange has been making investments in this area for the last few releases Transport rules in Exchange 2007 Transport rules + Rights protection in Exchange 2010 MailTips in Exchange 2010 / Outlook 2010 (alert user before the is sent) – “Bob Jones is outside of your organization” Actions are built in today already (as part of transport rules) – block, monitor, RMS protect, etc In Exchange 2013 we build on this foundation and bring full DLP to the product © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

17 Transport rules Conditions Actions Exceptions
Example: If the message... Is from a member of the group ‘Executives’ And is sent to recipients that are 'Outside the organization' And contains the keyword ‘Merger’ Do the following... Redirect message to: Except if the message... Is sent to Slide objective Explain how transport rules are configured. Talking Points Transport rules are configured just like Outlook rules using a simple GUI to apply conditions, actions and exceptions: Conditions identify specific criteria such as sender, receiver and keywords within a message. Actions are applied to messages that match these conditions. Exceptions identify messages to which a transport rule action shouldn't be applied, even if the message matches a transport rule condition. Over 50 conditions and actions can be selected to create a rule Executed on the Mailbox Server Structured like Inbox rules Apply to all messages sent inside and outside the organization Configured with simple GUI in Exchange Admin Center New features for Transport Rules in Exchange 2013 Activate/Deactivate this rule on the following date Choose a mode for this rule: Test rule with notifications enabled Test rule with notifications disabled New predicates to filter by total message size Attachment extension keyword matching Sender IP address New actions: Criteria based routing Forced TLS routing Halt processing of remaining rules on a message. (“Stop processing rules”.)

18 Data Loss Prevention in Exchange
Identify Monitor Helps to identify monitor protect sensitive data through deep content analysis. Protect Easy to use

19 Microsoft Exchange 6/18/2018 User Education Empower users to manage their compliance Contextual policy education Doesn’t disrupt user workflow Can work even when disconnected Admin customizable text and actions Integration with Outlook is a competitive differentiator. Doesn’t get in the way of how user’s work – helps them to manage their own compliance. Contextual education for information workers Detect sensitive data in before it is sent Text is customizable by admins, from Exchange Admin Center Uses a new feature in Outlook 2013 called “PolicyTips” to help educate users at the time they are sending sensitive information. Sensitive information can be found in the message body or in attachments. Most users want to do the right thing, but they don’t know how to comply with regulations. PolicyTips give them a “just in time” opportunity to understand their compliance obligations, shows them what was found, gives them an opportunity to report a “false positive” and a link to get more help. The learn more link is configurable so it can point to an internal compliance website. All messages are also configurable. Outlook downloads the policies every 24 hours so this even works when the client is not connected. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

20 DLP policy templates Built-in templates based on common regulations Import DLP policy templates from security partners Build your own Classification Scanning will examine both message contents and attachments Actions are built in today (in transport rules). What we is adding deep analysis (content inspection) DLP Policy template: Logical grouping of classification rules, transport rules, and reporting to achieve an objective (PCI, HIPAA) There are several templates in the box PII, Financial – not everything - we enable partners to do that through our extensibility story) US and Europe Extensibility Classification rules - Open format for classification rule schema ISVs create new packages of classification rules, transport rules, and reporting for specific regulations

21 DLP policy templates DLP policy templates
Microsoft Exchange 6/18/2018 DLP policy templates DLP policy templates XML Name Policies Conditions Content to monitor User action Mail flow actions Defines the policy objectives to help meet regulatory requirements for identified content Contains data type definitions to help identify sensitive content contains DLP Policy templates are an XML blob which contains details including: Name Description Market Category Conditions and Classification Rules The XML blob can be encrypted to protect the IP in the policy template. Classification rules Credit cards EU debit cards © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

22 Sensitive content detection
Microsoft Exchange 6/18/2018 Sensitive content detection Predefined rules targeted at sensitive data types Advanced content detection Combination of regular expressions, dictionaries, and internal functions (e.g. validate checksum on credit card numbers) Extensibility for customer and ISV defined data types Out of the box classification rules work to detect common types of sensitive data – covers multiple entity and geographies. Policy engine Well defined entities (ex: CC#, SSN) Probabilistic techniques for fuzzy matches (ex: SOX, medical terms) Custom classification rules Fingerprinting for org documents that share common characteristics (ex: form) Custom regex and keyword matches Office document meta-data © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

23 DLP policy rules Conditions Built on transport rules Supports discovery phase of compliance Take action to enforce policy Hold, block, audit & provide notification for that contains sensitive business data Actions Can read the screen! Actions Built on Exchange Transport Rules; has same actions available Supports discovery phase of compliance – 2 clicks to start monitoring sensitive information Exceptions

24 Apply granular usage restrictions
Helps to protect your sensitive information no matter where it is sent Usage rights locked within the document Helps protect online and offline, inside and outside of the firewall One of the most useful things to do once DLP has identified sensitive info are to apply rights protection RMS Exchange integrates with AD RMS to provide Deep granularity of access and usage restrictions Do not forward (don’t want audience to spread, even within the company) Company confidential (don’t want people outside the company to read it) Even if forwarded to people outside the company, they can’t read it – persistent protection of the and its attachments RMS is great for these “Cone of silence” scenarios Great news for O365 customers - RMS Online will be offered in the next release of Office All the benefits of IRM without the deployment hassle. TLS Compliant encryption Enables customer to instruct Exchange to choose encryption option with least impact to recipients (e.g., prefer TLS, fall back to EHE)

25 Exchange 2013 DLP Features Education experience in Outlook 2013
Microsoft Exchange 6/18/2018 Exchange 2013 DLP Features Education experience in Outlook 2013 Available in Exchange Server and Office 365 Out of the box DLP policy templates Predefined sensitive content types Support for 3rd party defined DLP policy templates DLP administration in Exchange Admin Center Rich reporting Education experience in Outlook 2013 Available in Exchange Server and Office 365 Out of the box DLP policy templates that help comply with regulations Predefined sensitive content types to help detect PII, financial data, etc. Support for 3rd party defined DLP policy templates DLP administration in Exchange Admin Center Rich reporting © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

26 Common management console
Microsoft Exchange 6/18/2018 Common management console Anti-spam, anti-malware and DLP controls integrated into the Exchange Admin Center and Office 365. Comment from Tap customer: "I am looking forward to turning off our Barracuda device and switching to EOP. I like the simple interface design being shown“ Unified Management: Mail, anti-spam, anti-malware, and data loss prevention controls in one console Single Set Of Filtering Rules - Integration of FOPE policies & transport rules Programmability through PowerShell Role Based Access Control Domain Management Message Tracing Quarantine Management © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 Granular reporting options
Provides a clear view on spam filtering, malware attacks and DLP enforcement They will not be available for Beta2. But we will release them for EO7 which is RTW end of July. Excel worksheet (last 2 weeks data) will be available for customers to do their own analysis.

28 Exchange DLP Reporting and Auditing
Comprehensive view of DLP policy performance Downloadable excel workbook Drill into specific departures from policy to gain business insights

29 Exchange security and protection
Protect communications Basic level of built-in anti-malware and enhanced spam filtering to help protect your environment from threats Enforce policy Data loss prevention (DLP) controls that can detect sensitive data in before it is sent and automatically block, hold or notify the sender Simplify management Unified administration of anti-spam, anti-malware and data loss prevention within Exchange

30 6/18/2018 © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION. © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

31 All statements in this report attributable to Gartner represent Microsoft interpretation of data, research opinion or viewpoints published as part of a syndicated subscription service by Gartner, Inc., and have not been reviewed by Gartner. Each Gartner publication speaks as of its original publication date (and not as of the date of this presentation). The opinions expressed in Gartner publications are not representations of fact, and are subject to change without notice.


Download ppt "Exchange security and protection"

Similar presentations


Ads by Google