What customers are telling us Searching PST folders for legal discovery is costly Multiple regulations require complicated archiving processes.
Download ReportTranscript What customers are telling us Searching PST folders for legal discovery is costly Multiple regulations require complicated archiving processes.
What customers are telling us Searching PST folders for legal discovery is costly Multiple regulations require complicated archiving processes Addressing the challenges with Exchange 2010 Integrated archiving, retention and search DISCOVER PRESERVE Personal Archive Archive in Outlook/OWA Integrated with mailbox Move and Delete Policy Hold Policy Move and Delete Policies in Outlook/OWA Edited/Deleted items preserved Folder/Item Level Policy Single Item Restore Multi-Mailbox Search Simplified search console Role-Based Access Control Personal Archive Primary Mailbox For more efficient mailbox management A secondary mailbox that is configured by the administrator Appears alongside a user’s primary mailbox in Outlook or Outlook Web App PST files can be dragged and dropped to the Personal Archive Archive quota can be set separately from primary mailbox At the folder or item level Folder Policy applied to all e-mail within a folder Expiration date label Policies automatically delete e-mail after x days and/or moved to archive Legal Hold Policy Preserve edited and deleted items Retention Hold suspends automated purge cycle Legal Hold suspends manual purge/edits by users Use multi-mailbox search to retrieve deleted/edited items indexed in recoverable items folder Automatically generated Legal Hold alert Multi-Mailbox Search Easier, more powerful search Filtering Includes: sender Delegate access to search console to HR, compliance, legal manager receiver expiry policy message size, sent/receive date cc/bcc IRM protected items regular expressions Search multiple mail items across primary mailbox and archive Protect Communications Protect access, control distribution IRM Support Transport Rules IRM in OWA IRM Protection Protect voicemail Moderation IRM Search Dynamic Signatures Transport Decryption Attachments Journal Decryption Outlook Protection Rules MailTips Alerts for: external recipients, large attachments, audience and other factors Option to customize based on recipients Transport Rules How they work Conditions If the message... Is from a member of the group ‘Marketing Team' And is sent to recipients that are 'Outside the organization' Actions Do the following... Append the message with the disclaimer 'Exchange 2010 rocks!’ Except if the message... Is received from ‘Alfred E Newman' Condition Types: Action Types: User – detect mail between people, DGs Block Content – inspect message subject & body content Encrypt Message Properties – inspect message headers and properties or type Modify (recipients, content, properties) Routing – detect external/internal, email domains Review/Moderate Attachments Scans size, name AND content! (Office documents) Classifications (e.g. A/C Privileged); can also act on No Classifications Message Types IRM protected, Auto-replies, calendaring, voice mail Supervision Lists Allows/Blocks based on listed recipients Management Properties Identifies manager and applies policy User Properties Scans for user attributes (such as department, country) …do the following… Rights Protect Applies IRM-protection to messages, attachments, voice mail Moderation Enable review and approval of e-mail before delivery Apply Disclaimer Automatically adds user attributes + HTML Exchange 2010 builds on this protection with the ability to: Scan Transport decryption enables AV/AS scanning of IRM-encrypted e-mail Search IRM Search enables search in Outlook/OWA – and across multiple mailboxes Journal decryption creates clear-text copy in journal report for search Support Support for IRM in OWA Eliminates the need for IE Rights Management Add-on Cross-Browser support for Firefox and Safari Apply IRM protection to voice mail (do not forward) Create /consume RMS protected messages using Windows Mobile 6.x IPC and Exchange 2010 The right tools for the right scenario MailTips SOFT CONTROLS Moderation Less restrictive Signatures/ Disclaimers More restrictive IRM protection Block/ Redirect HARD CONTROLS Advanced Security Secure delivery, block spam and malware SECURE Exchange 2010 BLOCK Forefront Single Scanning Engine Multiple Scanning Engines 38 times faster* Intelligent Engine Selection Automatic Engine Updates 99% spam detection** *AV-Test.org **West Coast Labs, 2009 Retention Sarbanes-Oxley (5 years) SEC 17-a4 (6 years) • • • Retain financial records in Personal Archive; Apply specific Retention Polices to regulated items Journal to archive Employee Supervision NASD 3110 • • Send to Manager for approval MailTips for moderated recipients Privacy HIPAA – personal health data GLBA – personal financial data PIPEDA (Canada) SB 1386 (California) PCI (Worldwide) • • • • MailTips for external recipient Apply IRM protection Scan for credit card numbers and other PII Reject outbound mail with Message Classifications (e.g., attorney-client privilege) Signatures EUPD 2003/58/EC • Append signatures that include name, title, department, etc. Security GLBA • Forefront anti-phishing protection Integrated archive for better PST management Easy-to-apply retention policies for better compliance Automated rules and alerts to reduce accidental data leakage Broader support for IRM to better control data access Integrated archiving, protection and security products and features Expanded transport rules for more efficient data protection policies Delegate compliancerelated functions to nonIT compliance officers Single console for AV/AS management No third party archive, encryption or security products to manage = lower administrative costs