What customers are telling us  Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.

Download Report

Transcript What customers are telling us  Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.

What customers are telling us
 Searching PST folders for legal discovery is costly
 Multiple regulations require complicated archiving processes
Addressing the challenges with Exchange 2010
Integrated archiving, retention and search
DISCOVER
PRESERVE
Personal
Archive
Archive in
Outlook/OWA
Integrated with
mailbox
Move and
Delete Policy
Hold Policy
Move and Delete
Policies in
Outlook/OWA
Edited/Deleted
items
preserved
Folder/Item
Level Policy
Single Item
Restore
Multi-Mailbox
Search
Simplified
search console
Role-Based
Access Control
Personal Archive
Primary Mailbox
For more efficient mailbox management
A secondary mailbox that is
configured by the administrator
Appears alongside a user’s primary mailbox
in Outlook or Outlook Web App
PST files can be dragged and
dropped to the Personal Archive
Archive quota can be set separately
from primary mailbox
At the folder or item level
Folder
Policy applied to all e-mail within a folder
Expiration date label
Policies automatically delete e-mail after
x days and/or moved to archive
Legal Hold Policy
Preserve edited and deleted items
Retention Hold suspends
automated purge cycle
Legal Hold suspends manual
purge/edits by users
Use multi-mailbox search
to retrieve deleted/edited
items indexed in recoverable
items folder
Automatically generated Legal Hold alert
Multi-Mailbox Search
Easier, more powerful search
Filtering Includes:
sender
Delegate access to search console
to HR, compliance, legal manager
receiver
expiry policy
message size,
sent/receive date
cc/bcc
IRM protected items
regular expressions
Search multiple mail items
across primary mailbox and
archive
Protect Communications
Protect access, control distribution
IRM Support
Transport Rules
IRM in OWA
IRM Protection
Protect voicemail
Moderation
IRM Search
Dynamic Signatures
Transport Decryption
Attachments
Journal Decryption
Outlook Protection Rules
MailTips
Alerts for: external
recipients, large
attachments, audience
and other factors
Option to customize
based on recipients
Transport Rules
How they work
Conditions
If the message...
Is from a member of the group ‘Marketing Team'
And is sent to recipients that are 'Outside the organization'
Actions
Do the following...
Append the message with the disclaimer 'Exchange 2010 rocks!’
Except if the message...
Is received from ‘Alfred E Newman'
Condition Types:
Action Types:
User – detect mail between people, DGs
Block
Content – inspect message subject & body content
Encrypt
Message Properties – inspect message
headers and properties or type
Modify (recipients, content, properties)
Routing – detect external/internal, email domains
Review/Moderate
Attachments
Scans size, name AND content! (Office documents)
Classifications
(e.g. A/C Privileged); can also act on No Classifications
Message Types
IRM protected, Auto-replies, calendaring, voice mail
Supervision Lists
Allows/Blocks based on listed recipients
Management Properties
Identifies manager and applies policy
User Properties
Scans for user attributes (such as department, country)
…do the following…
Rights Protect
Applies IRM-protection to messages, attachments, voice mail
Moderation
Enable review and approval of e-mail before delivery
Apply Disclaimer
Automatically adds user attributes + HTML
Exchange 2010 builds on this protection with the ability to:
Scan

Transport decryption enables AV/AS scanning of IRM-encrypted e-mail
Search


IRM Search enables search in Outlook/OWA – and across multiple mailboxes
Journal decryption creates clear-text copy in journal report for search
Support

Support for IRM in OWA




Eliminates the need for IE Rights Management Add-on
Cross-Browser support for Firefox and Safari
Apply IRM protection to voice mail (do not forward)
Create /consume RMS protected messages using Windows Mobile 6.x
IPC and Exchange 2010
The right tools for the right scenario
MailTips
SOFT
CONTROLS
Moderation
Less restrictive
Signatures/
Disclaimers
More restrictive
IRM
protection
Block/
Redirect
HARD
CONTROLS
Advanced Security
Secure delivery, block spam and malware
SECURE
Exchange 2010
BLOCK
Forefront
Single Scanning Engine
Multiple Scanning Engines
38 times faster*
Intelligent Engine Selection
Automatic Engine Updates
99% spam detection**
*AV-Test.org
**West Coast Labs, 2009
Retention
Sarbanes-Oxley (5 years)
SEC 17-a4 (6 years)
•
•
•
Retain financial records in Personal Archive;
Apply specific Retention Polices to regulated items
Journal to archive
Employee
Supervision
NASD 3110
•
•
Send to Manager for approval
MailTips for moderated recipients
Privacy
HIPAA – personal health data
GLBA – personal financial data
PIPEDA (Canada)
SB 1386 (California)
PCI (Worldwide)
•
•
•
•
MailTips for external recipient
Apply IRM protection
Scan for credit card numbers and other PII
Reject outbound mail with Message Classifications
(e.g., attorney-client privilege)
Signatures
EUPD 2003/58/EC
•
Append signatures that include name, title, department, etc.
Security
GLBA
•
Forefront anti-phishing protection
Integrated archive for
better PST management
Easy-to-apply retention
policies for better
compliance
Automated rules and
alerts to reduce
accidental data leakage
Broader support for
IRM to better control
data access
Integrated archiving,
protection and security
products and features
Expanded transport rules
for more efficient data
protection policies
Delegate compliancerelated functions to nonIT compliance officers
Single console for
AV/AS management
No third party archive,
encryption or security
products to manage =
lower administrative
costs