Presentation is loading. Please wait.

Presentation is loading. Please wait.

2 3 Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further.

Similar presentations


Presentation on theme: "2 3 Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further."— Presentation transcript:

1

2 2

3 3

4 Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further performance/management issues Retention Compliance adds to volume challenges Regulations mandate specific retention periods for relevant e-mail (SOX = 5 years, SEC rules = 6 years, HIPAA = 5-6 years) Discovery Strict timelines on discovery of e-mail Cover all e-mail from all sources, including PSTs Retrieval costs can be HUGE (backup tapes, PSTs) Volume Storage Management 4

5 SharePoint Outlook PSTs Webmail Third Party Archive Backups Exchange Server 5

6 Poor User Experience Unfamiliar environment Inability to search and/or access archived content Clunky experience with Outlook/Outlook Web Access add-on Complex Administrative Experience Outlook add-on install/performance issues Separate search/management of primary and archive mailboxes Concerns over reliability of hosted archive vendors High Costs Separate archive infrastructure investment Additional archive management costs 6

7 Personal Archive Archive in Outlook/OWA Integrated with mailbox Move and Delete Policy Move and Delete Policies in OLK/OWA Folder/Item Level Policy Hold Policy Edited/Deleted items preserved Single Item Restore Multi-Mailbox Search Simplified search console Role-Based Access ControlPreservePreserve DiscoverDiscover Exchange Server 2010 introduces integrated e-mail archiving capabilities offering customers out-of-the-box tools to preserve and discover e-mail data, without changing the user or IT Pro experience 7

8 Personal Archive 8

9 User can view, read, navigate, flag and reply to archived e- mail same as live e-mail User gets conversation view scoped to archive (same as PSTs) Replies to archived messages saved in live e-mail sent items folder (same as PSTs) Folder hierarchy from primary mailbox maintained 9

10 Option to search archive only or both live and archived e-mail Advanced search options work across live and archived e-mail 10

11 Policy automatically deletes e-mail after x days Expiration date label Policies automatically move e-mail to archive after x days Policies applied to all e-mail within a folder 11

12 12 Set-Mailbox -SingleItemRecoveryEnabled $true -RetainDeletedItemsFor

13 13

14 14

15 15

16 “80% of all data leaks occur because of accidents — that is users, being unaware of data policies, as opposed to having malicious intent.” - Forrester, 2008 16

17 Dynamic Signatures/ Disclaimers MailTips IRM ProtectionBlock/ Redirect SOFT CONTROLS HARD CONTROLS Moderation Less restrictive More restrictive 17

18 18

19 19

20 Information about the message and recipients shown before send For end users: Reduce delivery surprises Emails are addressed correctly the first time Help prevent embarrassing email mistakes For the organization: Reduce help desk calls Reduce NDRs Reduce unnecessary pipeline traffic

21 21 MailTipDisplays:

22 ActionCmdlet (shown with default) Turn Mailtips On Set-OrganizationConfig –MailTipsAllEnabled $true Turn Mailbox-based MailTips On Set-OrganizationConfig –MailTipsMailboxSourcedTipsEnabled $true Display Group Information Set-OrganizationConfig –MailTipsGroupMetricsEnabled $true Display External Recipients Set-OrganizationConfig –MailTipsExternalRecipientsTipsEnabled $false Change Large Audience Threshold Set-OrganizationConfig –MailTipsLargeAudienceThreshold 25 Per user – In OWA, when you collapse MailTips, they stay hidden – Outlook users can disable individual MailTips

23

24

25 Arbitration Mailbox

26

27

28 If the message... Is from a member of the group ‘Marketing Team' And is sent to recipients that are 'Outside the organization' Do the following... Append the message with the disclaimer 'Exchange 2010 is coming! Can you handle the excitement?' Except if the message... Is received from ‘Alfred E Newman' Conditions Exceptions Actions

29 Pattern stringDescription \SThe \S pattern string matches any single character that is not a space. \sThe \s pattern string matches any single white-space character. \DThe \D pattern string matches any non-numeric digit. \dThe \d pattern string matches any single numeric digit. \wThe \w pattern string matches any single Unicode character categorized as a letter or decimal digit. |The pipe ( | ) character performs an OR function. * The wildcard ( * ) character matches zero or more instances of the previous character. For example, ab*c matches the following strings: ac, abc, abbbbc. ( ) Parentheses act as grouping delimiters. For example, a(bc)* matches the following strings: a, abc, abcbc, abcbcbc, and so on. \\ Two backslashes indicate that the character that follows the backslashes should be escaped. For example, if you want to match a string that contains \d, you would type \\d. ^ The caret ( ^ ) character indicates that the pattern string that follows the caret must exist at the start of the text string that is being matched. For example, ^fred@contoso matches fred@contoso.com and fred@contoso.co.uk but not alfred@contoso.com. This character can also be used with the dollar ( $ ) character to specify an exact string to match. For example, ^kim@contoso.com$ matches only kim@contoso.com and does not match anything else, such as kim@contoso.com.au. $ The dollar ( $ ) character indicates that the preceding pattern string must exist at the end of the text string that is being matched. For example, contoso.com$ matches adam@contoso.com and kim@research.contoso.com, but does not match kim@contoso.com.au. This character can also be used with the caret ( ^ ) character to specify an exact string to match. For example, ^kim@contoso.com$ matches only kim@contoso.com and does not match anything else, such as chris@sales.contoso.com.

30 IMPROVED!E2007E2010 Disclaimers/SignaturesText with limited formatting Add AD attributes + HTML AttachmentsSize, Name+ Content (Office documents) ClassificationsActs on classification Can also act on No Classifications NEW!E2010 Apply RMSApplies RMS encryption ModerationEnable manager to review Message TypesRMS-encrypted, Auto-replies, calendaring, voicemail, approval request Supervision ListsAllows/Blocks based on list of recipients Management Properties Automatically identifies manager and applies policy User PropertiesCreate granular policy sets per user attributes (e.g. department, country)

31 ScenariosExampleTransport Rules, Moderation, MailTips Ethical WallBlock brokers, analysts from communicating Block mail between specific people in a DG Block mail between people with specific AD attributes ModerationManager required to sign-off on mail to sensitive partner Send to Manager for approval MailTips for moderated recipients Employee SupervisionInappropriate Content Harassment Filter using keywords; regular expressions; type of content (OOF, voice mail, NDR, etc.) Information Leakage Protection HIPAA – personal health data GLBA – personal financial data EUPD (Europe) PIPEDA (Canada) SB 1386 (California) PCI MailTips for external recipient Apply RMS encryption Filter using keywords or regular expressions Reject outbound mail with Message Classifications (e.g. attorney-client privilege) SignaturesEUPD 2003/58/EC - European Union Data Protection Directive Append signatures that include name, title, department, etc.

32 32

33

34 Apply RMS policies automatically using Transport Rules Apply “Do Not Forward” or custom RMS templates RMS protection is also applied to Office 2003, 2007, and 2010 attachments RMS protection can be triggered based on sender, recipient, or content

35 IRM Search Conduct full-text search on IRM-protected messages in OWA and Outlook. Enables eDiscovery or protected messages in the Exchange Store. Transport Decryption Enables access to IRM-protected messages by Transport Agents to perform operations such as transport rules, content filtering, and anti-spam/anti-virus. Journal Report Decryption Journal Report Decryption Agent attaches clear-text copies of IRM- protected messages and attachments to journal mailbox

36

37 IRM protection automatically triggered based on sender/receiver attributes Supported attachments are also protected Windows Desktop Search will index headers and subject Authorized users can turn off protection Can be used to prevent e-mail service provider from accessing your e-mail

38 38

39


Download ppt "2 3 Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further."

Similar presentations


Ads by Google