Download presentation
Presentation is loading. Please wait.
Published byDarcy Short Modified over 9 years ago
2
2
3
3
4
Volume As data volume grows, Outlook performance can be impacted Mailbox quotas control volume but also encourage PST files PST files add to further performance/management issues Retention Compliance adds to volume challenges Regulations mandate specific retention periods for relevant e-mail (SOX = 5 years, SEC rules = 6 years, HIPAA = 5-6 years) Discovery Strict timelines on discovery of e-mail Cover all e-mail from all sources, including PSTs Retrieval costs can be HUGE (backup tapes, PSTs) Volume Storage Management 4
5
SharePoint Outlook PSTs Webmail Third Party Archive Backups Exchange Server 5
6
Poor User Experience Unfamiliar environment Inability to search and/or access archived content Clunky experience with Outlook/Outlook Web Access add-on Complex Administrative Experience Outlook add-on install/performance issues Separate search/management of primary and archive mailboxes Concerns over reliability of hosted archive vendors High Costs Separate archive infrastructure investment Additional archive management costs 6
7
Personal Archive Archive in Outlook/OWA Integrated with mailbox Move and Delete Policy Move and Delete Policies in OLK/OWA Folder/Item Level Policy Hold Policy Edited/Deleted items preserved Single Item Restore Multi-Mailbox Search Simplified search console Role-Based Access ControlPreservePreserve DiscoverDiscover Exchange Server 2010 introduces integrated e-mail archiving capabilities offering customers out-of-the-box tools to preserve and discover e-mail data, without changing the user or IT Pro experience 7
8
Personal Archive 8
9
User can view, read, navigate, flag and reply to archived e- mail same as live e-mail User gets conversation view scoped to archive (same as PSTs) Replies to archived messages saved in live e-mail sent items folder (same as PSTs) Folder hierarchy from primary mailbox maintained 9
10
Option to search archive only or both live and archived e-mail Advanced search options work across live and archived e-mail 10
11
Policy automatically deletes e-mail after x days Expiration date label Policies automatically move e-mail to archive after x days Policies applied to all e-mail within a folder 11
12
12 Set-Mailbox -SingleItemRecoveryEnabled $true -RetainDeletedItemsFor
13
13
14
14
15
15
16
“80% of all data leaks occur because of accidents — that is users, being unaware of data policies, as opposed to having malicious intent.” - Forrester, 2008 16
17
Dynamic Signatures/ Disclaimers MailTips IRM ProtectionBlock/ Redirect SOFT CONTROLS HARD CONTROLS Moderation Less restrictive More restrictive 17
18
18
19
19
20
Information about the message and recipients shown before send For end users: Reduce delivery surprises Emails are addressed correctly the first time Help prevent embarrassing email mistakes For the organization: Reduce help desk calls Reduce NDRs Reduce unnecessary pipeline traffic
21
21 MailTipDisplays:
22
ActionCmdlet (shown with default) Turn Mailtips On Set-OrganizationConfig –MailTipsAllEnabled $true Turn Mailbox-based MailTips On Set-OrganizationConfig –MailTipsMailboxSourcedTipsEnabled $true Display Group Information Set-OrganizationConfig –MailTipsGroupMetricsEnabled $true Display External Recipients Set-OrganizationConfig –MailTipsExternalRecipientsTipsEnabled $false Change Large Audience Threshold Set-OrganizationConfig –MailTipsLargeAudienceThreshold 25 Per user – In OWA, when you collapse MailTips, they stay hidden – Outlook users can disable individual MailTips
25
Arbitration Mailbox
28
If the message... Is from a member of the group ‘Marketing Team' And is sent to recipients that are 'Outside the organization' Do the following... Append the message with the disclaimer 'Exchange 2010 is coming! Can you handle the excitement?' Except if the message... Is received from ‘Alfred E Newman' Conditions Exceptions Actions
29
Pattern stringDescription \SThe \S pattern string matches any single character that is not a space. \sThe \s pattern string matches any single white-space character. \DThe \D pattern string matches any non-numeric digit. \dThe \d pattern string matches any single numeric digit. \wThe \w pattern string matches any single Unicode character categorized as a letter or decimal digit. |The pipe ( | ) character performs an OR function. * The wildcard ( * ) character matches zero or more instances of the previous character. For example, ab*c matches the following strings: ac, abc, abbbbc. ( ) Parentheses act as grouping delimiters. For example, a(bc)* matches the following strings: a, abc, abcbc, abcbcbc, and so on. \\ Two backslashes indicate that the character that follows the backslashes should be escaped. For example, if you want to match a string that contains \d, you would type \\d. ^ The caret ( ^ ) character indicates that the pattern string that follows the caret must exist at the start of the text string that is being matched. For example, ^fred@contoso matches fred@contoso.com and fred@contoso.co.uk but not alfred@contoso.com. This character can also be used with the dollar ( $ ) character to specify an exact string to match. For example, ^kim@contoso.com$ matches only kim@contoso.com and does not match anything else, such as kim@contoso.com.au. $ The dollar ( $ ) character indicates that the preceding pattern string must exist at the end of the text string that is being matched. For example, contoso.com$ matches adam@contoso.com and kim@research.contoso.com, but does not match kim@contoso.com.au. This character can also be used with the caret ( ^ ) character to specify an exact string to match. For example, ^kim@contoso.com$ matches only kim@contoso.com and does not match anything else, such as chris@sales.contoso.com.
30
IMPROVED!E2007E2010 Disclaimers/SignaturesText with limited formatting Add AD attributes + HTML AttachmentsSize, Name+ Content (Office documents) ClassificationsActs on classification Can also act on No Classifications NEW!E2010 Apply RMSApplies RMS encryption ModerationEnable manager to review Message TypesRMS-encrypted, Auto-replies, calendaring, voicemail, approval request Supervision ListsAllows/Blocks based on list of recipients Management Properties Automatically identifies manager and applies policy User PropertiesCreate granular policy sets per user attributes (e.g. department, country)
31
ScenariosExampleTransport Rules, Moderation, MailTips Ethical WallBlock brokers, analysts from communicating Block mail between specific people in a DG Block mail between people with specific AD attributes ModerationManager required to sign-off on mail to sensitive partner Send to Manager for approval MailTips for moderated recipients Employee SupervisionInappropriate Content Harassment Filter using keywords; regular expressions; type of content (OOF, voice mail, NDR, etc.) Information Leakage Protection HIPAA – personal health data GLBA – personal financial data EUPD (Europe) PIPEDA (Canada) SB 1386 (California) PCI MailTips for external recipient Apply RMS encryption Filter using keywords or regular expressions Reject outbound mail with Message Classifications (e.g. attorney-client privilege) SignaturesEUPD 2003/58/EC - European Union Data Protection Directive Append signatures that include name, title, department, etc.
32
32
34
Apply RMS policies automatically using Transport Rules Apply “Do Not Forward” or custom RMS templates RMS protection is also applied to Office 2003, 2007, and 2010 attachments RMS protection can be triggered based on sender, recipient, or content
35
IRM Search Conduct full-text search on IRM-protected messages in OWA and Outlook. Enables eDiscovery or protected messages in the Exchange Store. Transport Decryption Enables access to IRM-protected messages by Transport Agents to perform operations such as transport rules, content filtering, and anti-spam/anti-virus. Journal Report Decryption Journal Report Decryption Agent attaches clear-text copies of IRM- protected messages and attachments to journal mailbox
37
IRM protection automatically triggered based on sender/receiver attributes Supported attachments are also protected Windows Desktop Search will index headers and subject Authorized users can turn off protection Can be used to prevent e-mail service provider from accessing your e-mail
38
38
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.