Presentation is loading. Please wait.

Presentation is loading. Please wait.

Prepare for the ADS What to bring with you to a presentation, and what to find out beforehand Understand general company size, number of offices and office.

Similar presentations


Presentation on theme: "Prepare for the ADS What to bring with you to a presentation, and what to find out beforehand Understand general company size, number of offices and office."— Presentation transcript:

1 Prepare for the ADS What to bring with you to a presentation, and what to find out beforehand Understand general company size, number of offices and office locations, and the industry that the business operates Determine which regulations the customer’s operations are subject to. Do not assume that all companies in a vertical market are subject to the same regulations (or same subsections). Make note of the different jurisdictions the customer’s operations take place in; they may have wildly different requirements that will affect technical deployment choices. Determine if the customer already has a compliance and governance solution in place. Focus on how UC features are designed to allow better integration with third-party solutions and is not intended as a complete solution. Find out what other types of content they may need to keep track of for compliance, as that helps identify whether the current solution will need to be upgraded or replaced.

2 NameTitleMicrosoft Archiving & Compliance Architecture Design Session

3 Solution Overview Technology Overview Point out technologies for relevant capabilities Discuss technologies Architecture Discussion Discuss Architecture Decision Points POC Planning Develop scope and specifications for POC VPC-based demo View the capabilities in action Show various possibilities Vision scope input from solution briefing Solution Briefing Summary

4 Architecture Design Session Vision scope input from solution briefing Solution Briefing Summary

5 Managing high volume of Data Managing high volume of Data Message Discovery & Timely Retrieval of data Message Discovery & Timely Retrieval of data Business email data out of control of IT Business email data out of control of IT Compliance is more costly and hard to manage Compliance is more costly and hard to manage Regulatory Mandates Regulatory Mandates Priority Challenges Presenter: Complete this section prior to the presentation. Confirm and verify that you’re still tracking with the customer’s priority challenges, drivers and technical requirements discussed in Solution Briefing. Centralizing email data for easy and anywhere access Centralizing email data for easy and anywhere access Establish pervasive log and audit trails for e-mail Establish pervasive log and audit trails for e-mail Lower the cost of auditing and compliance Lower the cost of auditing and compliance Priority Drivers Summary of Pains and Drivers Technical Requirements Message archiving, retention, and discovery Message archiving, retention, and discovery Data Retention support for ongoing compliance, litigation, or personnel matters Data Retention support for ongoing compliance, litigation, or personnel matters Storage Management balance mailbox size demands with available storage resources Storage Management balance mailbox size demands with available storage resources Multi-level policy enforcement for VoIP, Web conferencing, IM, e-mail, and voicemail Multi-level policy enforcement for VoIP, Web conferencing, IM, e-mail, and voicemail

6 Architecture Design Session Solution Overview VPC-based demo View the capabilities in action Show various possibilities Vision scope input from solution briefing Solution Briefing Summary

7 Authentication Administration Storage Compliance Authentication Administration Storage Compliance Audio Conferencing E-mail and Calendaring E-mail and Calendaring Web Conferencing Web Conferencing Telephony Video Conferencing Video Conferencing Voice Mail Instant Messaging (IM) Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Authentication Administration Storage Telephony and Voice Mail Telephony and Voice Mail Instant Messaging E-mail and Calendaring Unified Conferencing: Audio, Video, Web On-Premises or in the Cloud Communications Today

8 Streamline Communications Amplify Protection and Control Provide a Unified and Extensible Platform Across DevicesPC, Mobile, Web Increase Efficiency and Flexibility Maximize IT Resources with S+S Authentication Administration Storage Compliance Authentication Administration Storage Compliance Unified Identity, Presence, and Inbox On-Premises or in the Cloud Microsoft Unified Communications Increased productivity through communications convergence

9 ScenariosScenarios ProductsProducts On Premise Hosted by Microsoft DeliveryDelivery IM and Presence Unified Messaging E-Mail and Calendaring VoIP Mobility Hosted by Microsoft or by Partners Hosted by Partners Microsoft UC Products and Services Conferencing

10 UC Journey Through Infrastructure Optimization identify where you are identify where you want to be Basic e-mail, file shares, mostly phone based communication Standard platform for secure e-mail and IM Ad hoc teaming around functions & projects based on IT standards Increasing unification of communication channels Fully managed collaboration platform and pervasive access Seamless collaboration across the firewall Federation of communication information and policy IT is a strategic asset IT is a business enabler IT is an Efficient cost center IT is a cost center

11 Identifying Target Maturity Level IM & Presence Voice Conferencing Messaging Work with your customer to agree on where they are and where they want to be. This portion of the presentation will fail if it is not interactive. Use the highlight boxes to show each stage (where they are, where they want to be) Legacy TDM PBX, traditional phones Limited voice mail and call routing Highly available hybrid telephony infrastructure Online & offline access to voice mail Managed call routing Encrypted voice infrastructure with unified inbox accessible from PCs, phones, & web browsers Managed storage Presence-based call routing Integrated voice platform for IM/presence; conferencing with LOB applications Auto-remediation, proactive monitoring of call quality Federated identity and presence-based call routing Rich mailbox & calendaring Secure, remote, online & offline access Basic AV/AS/AP protection and disaster recovery Solution supports encryption Business continuity with AS/AP and multi-layer AV protection Support advanced policy- driven message controls Provisioning for user inboxes Basic email with no remote access and with limited security Minimal or decentralized IT support User inboxes are fully managed by IT Seamless business continuity with multiple AV/AS protection Advanced policy control to mobile devices & applications Integration with LOB applications Federation of calendar Public IM/online presence, ad-hoc use for daily business Secure access from inside & outside the firewall Supports peer-to-peer voice & video communications Presence enabled email client Secure IM/online presence accessible from a variety of devices and integrated into enterprise productivity & collaboration platform Persistence group chat Supports federation and integration with LOB applications Sporadic use of audio & web conferencing Limited video conferencing capabilities Integrated & secure conferencing platform Supports high-quality audio & video Remotely accessible collaboration features Secure web conferencing accessible from remote locations and devices IT-managed video conferencing with limited remote access Contextual unified conferencing solution tightly integrated with collaboration infrastructure and LOB applications

12 Archiving & Compliance

13 Org Archive Keeps all E-mail Allows Org Control Optimized for Search World Today: Email Repositories Exchange (MBs) Org Archive (PBs) Personal Archive (TBs) Outlook PSTs (GBs) Backup Tape/Disk Backups Item Level Backups Backups uncommon and difficult Manual unsupported backups Replication Common Backups Less Common Replication Only Size Require Replication End User Access PSTs Circumvents Quota Highly Portable Mailbox Highly Available Rich Client Access Personal Archive Circumvent Quota Allows Org Control Replicated Backups

14 Why Archive E-mail? Storage Management Balance mailbox size demands with available storage resources Reduce the proliferation of.PST files stored outside of IT control Improve overall application and network performance Data Retention Meet industry and regulatory e-mail data retention requirements Support ongoing compliance, litigation, or personnel matters Preserve valuable intellectual property and corporate assets Discovery Respond to strict timelines for legal discovery orders Reduce costs involved in searching for and retrieving e-mail data Report on e-mail communications as part of auditing procedures

15 Multiple Mandates…. Sarbanes-Oxley Act 21 CFR Part 11 USA Patriot Act Bill 198 European Union Markets in Financial Instruments Directive Basel II HIPAA Gramm-Leach-Bliley Act The European Union Data Protection Data Protection Act. SEC Rule 17a -4 NASD Rule 3010 Universal Market Integrity Rules Companies Act Federal eDiscovery Rules Bank Secrecy Act Financial risk management related to credit, capital allocation, market, insurance Business best practices Quality assurance /standards Hiring policy and processes Health and Safety IT governance Service level agreements Internal Governance, Risk and Compliance (GRC) External

16 Challenges to Archiving Email

17 Unified Communications Archiving & Compliance Overview Three categories of capabilities Message archiving and retention AuditingDiscovery Journaling and archival are different Journaling is a mechanism for recording all communication, to be used in retention, discovery, and archival Archiving stores, indexes, and retrieves messaging data Exchange Hosted Services Archiving service provides an extensive range of archiving and discovery capabilities Smaller organizations may choose to use an Exchange Server as an archive but it is not explicitly supported.

18 UC In-Place Archiving & Compliance Provide a richer feature set incorporating customer feedback and take archive and discovery to the cloud Archive on a separate DB Archive in the cloud Outlook 2007 Support PST Import into Archive Admin Delegation EWS Support Search Preview De-duplication Search and Destroy Annotations Cross Premise Search CmdLet Auditing Non-Owner Auditing Managed through EMC EWS Support for Archive Support for Tasks, Calendar and Voicemail Move/Delete Policy Automatically move content from the Primary to Archive dumpster Managed through ECP Hold Policy Audit Policy Mailbox audit Manage through ECP, cmdlets Report and exports results

19 Architecture Design Session Solution Overview Technology Overview Point out technologies for relevant capabilities Discuss technologies VPC-based demo View the capabilities in action Show various possibilities Vision scope input from solution briefing Solution Briefing Summary

20 Keep Email Delete Email Keep Email Archives Backups for Compliance Transport Journaling Selectively Retain Message Retention Management Mailbox Journaling Delete Email Mailbox Quotas Keep It or Delete It Org Profile Litigation Risk Small Medium Orgs Relatively tight budgets Archive optional Org Profile SOX, JSOX, CSOX, LSF, L262, etc. Financials/Govt. agencies Large Orgs Large Budgets Archive optional High Discovery Cost

21 In-Place Archiving… Archive on a separate DB Archive in the cloud Outlook 2007 Support PST Import into Archive Admin Delegation EWS Support Managed through EMC EWS Support for Archive Support for Tasks, Calendar and Voicemail Move/Delete Policy Search Preview De-duplication Search and Destroy Annotations Cross Premise Search cmdLet Auditing Non-Owner Auditing Automatically move content from the Primary to Archive dumpster Managed through ECP Hold Policy Audit Policy Mailbox audit Manage through ECP, cmdlets Report and exports results Provide a richer feature set incorporating customer feedback and take archive and discovery to the cloud

22 Familiar Personal Archive A specialized Exchange mailbox configured and associated with the user’s primary mailbox Delivers your users a familiar experience by seamlessly surfacing in both Outlook and Outlook Web App Your users can use the same skills and methods they already use today to interact with archive email: “Drag and Drop” email to folders Create folders and categorize Conduct searches and filter results Reply to messages and set flags Separate quotas may be set for archive and primary mailboxes Archive Primary Mailbox

23 Seamless User Experience Primary mailbox folder hierarchy maintained Conversation view scoped to archived email Read, reply, and navigate archived email same as live email

24 One User Search Experience Same search steps with option to search across archived email

25 Streamlined Administration Use your existing Exchange admin skills and tools to manage and deploy the personal archive Enable the archive on an existing mailbox Set separate quota for archive mailbox Add an archive when creating a new mailbox

26 Support for Tiered Storage

27 Archive and the User Delegation Support for delegating primary and archive mailbox.

28 PST Import and Export Native support for PST export and import from Exchange Same job scheduling semantics as mailbox moves Ability to import directly into the archive

29 Archive and the Cloud On-Premises Cloud On-Premises

30 Archive in the cloud

31

32 Web-Based Multi-Mailbox Search Rich search criteria and targeting options Delegate capability to specialist users Results stored in specialized discovery mailbox Empower compliance officers to conduct multi- mailbox searches with ease

33 Simplified e-Discovery Results Mailbox searches include results from primary and archive mailboxes, as well as recoverable items Attachments included with search results One query searches all possible locations Use built-in search and filtering to conduct additional investigation

34 Improved Workflow Search preview provides info on estimated number of results with keyword statistics before copying result set to designated discovery mailbox De-duplication of search results copies only one instance of a message Searchable annotation offers tagging of reviewed items

35 On-Premises & Cloud Discovery Search Tools

36 In-Place Compliance… Archive on a separate DB Archive in the cloud Outlook 2007 Support PST Import into Archive Admin Delegation EWS Support Personal Archive Managed through EMC EWS Support for Archive Support for Tasks, Calendar and Voicemail Move/Delete Policy Search Preview De-duplication Search and Destroy Annotations Cross Premise Search Cmdlet Auditing Non-Owner Auditing Automatically move content from the Primary to Archive dumpster Managed through ECP Hold Policy Multi-Mailbox Search Audit Policy Mailbox audit Manage through ECP, cmdlets Report and exports results Provide a richer feature set incorporating customer feedback and take archive and discovery to the cloud

37 Retention Management Set policies that allow you to define, deploy, and automate the expiry and archiving of email Automatically move content to personal archive Time-based criteria (such as email older than 2 years) Preserves primary mailbox folder hierarchy Automatically move content to personal archive Time-based criteria (such as email older than 2 years) Preserves primary mailbox folder hierarchy Automatically delete content Time-based criteria (such as email older than 2 years) Retention policies travel with archived messages Automatically delete content Time-based criteria (such as email older than 2 years) Retention policies travel with archived messages Automatically move message to archive after ‘x’ months, then delete from archive after ‘y’ months More specific policies override generic defaults Automatically move message to archive after ‘x’ months, then delete from archive after ‘y’ months More specific policies override generic defaults Archive Policy Retention Policy Combined Policies

38 Granular Yet Flexible Policies Apply Retention and Archive policies to individual messages Retention policy and expiry details Allow your users to select policies for items or folders in Outlook and Outlook Web App Policies assigned to all email within a folder

39 Simplified Configuration Create and manage Retention Policies in the Exchange Management Console

40 Optional Retention Tags Additional policies for special projects, or roles (e.g., HR) Archive Policy Delete Policy

41 Preserve: Move Primary Mailbox Message delivered (Policy applied) Deleted Items Inbox …… Messages moved 2 years after receipt Archive Mailbox Admin Created Default Move Policy of 2 years Deleted Items Inbox …… Admin Move Policies Only

42 Primary Mailbox Deleted Items Inbox …… Messages moved 2 years after receipt Archive Mailbox Admin created Default Move Policy of 2 years Optional Move Policy of 5 years User applied User Policy of 5 years applied to Project X folder (can also be applied to item only) Deleted Items Inbox …… Message moved to Project X folder Project X Message moved 5 years after receipt Project X Preserve: Move Admin + User Move Policies

43 Primary Mailbox Message delivered (Policy applied) Deleted Items Inbox …… Messages moved 2 years after receipt Archive Mailbox Admin Created Default Move Policy of 2 years, Delete Policy of 10 years Deleted Items Inbox …… Messages deleted 10 years after receipt Preserve: Delete Admin Move and Delete Policies Only

44 Primary Mailbox Deleted Items Inbox Messages moved 2 years after receipt Archive Mailbox Admin created Default Move Policy of 2 years, Delete Policy of 10 years Optional Move Policy of 5 years, Delete Policy of Never User applied Optional Policy of 5 years applied to Project X folder Optional Policy of Never applied to Item “Contract” Deleted Items Inbox Message moved to Project X folder Project X Messages moved 5 years after receipt Project X Messages deleted 10 years after receipt RE:Contract Message Never Deleted Preserve: Move and Delete Admin + User Move and Delete Policies

45 Preserve: Retention Hold Administrator override to pause all message retention policy actions when employee on vacation

46 Overview Hold Policy captures all edits/deletes irrespective of user or admin access Users can receive notification they are on hold; eliminates manual process Scenarios Litigation hold: capture all e-mail indefinitely for pending lawsuit or internal investigation Single item recovery: ensure that e-mail remains available for X days for retrieval without restore from backup Preserve: Hold Policy

47 Set legal hold to capture all changes indefinitely Captured email data found in multi- mailbox search results Optionally set an “on hold” alert message for users with Outlook 2010 Provides separate settings to enable single item restore Capture any edits or deletions to email items made by the user under hold Preserve: Legal Hold

48 Enable auditing and reporting capabilities to our previous feature set. Managed Folders: Logging for creation of folders, moving messages to a folder, deletion or mailbox journaling of items Export-Mailbox search logging included in log capabilities PowerShell logging for who/what cmdlets are run Transport Journaling Configuration logging provides audit trails for compliance Statistical reports identify non-compliant users Preserve: Audit

49

50 Audit: Audit Configuration Configured per tenant organization Logged to tenant arbitration mailbox Results can be searched/exported using Audit: Audit Mailbox Configure per mailbox Logged to special Audit folder in user mailbox Results can be searched/exported Preserve: Audit

51 Journaling Default per-database journaling with Standard CAL (same as Exchange 2003) Per-user, per-DL, and org-wide journaling with Enterprise CAL (new in Exchange 2010) Journal by policy with journal rules using wizard Journal to any valid SMTP address: Exchange mailbox Exchange Hosted Archive Third-party archival products

52 Journaling Features Includes clear text copies of protected messages and attachments in journal mailbox Enables virus scanning, content filtering, and content-based rules on IRM-protected messages Includes clear text copies of protected messages and attachments in journal mailbox Enables virus scanning, content filtering, and content-based rules on IRM-protected messages Journal Decryption Journal to individual mailboxes or SMTP address Detailed reports per To/CC/BCC/Alt-Recipient and distribution group expansion Journal to individual mailboxes or SMTP address Detailed reports per To/CC/BCC/Alt-Recipient and distribution group expansion Transport Journaling Exchange 2010 creates one report per message Helps reduce hosted archive storage costs Exchange 2010 creates one report per message Helps reduce hosted archive storage costs Journal Report De-duplication

53 Journaling Example-Journal Report Detailed recipient addressing! BccDL-expansion Forwarded mailboxes

54 Lync Server 2010 Unified Communication Compliance & Governance

55 Why Log and Archive IM? Federal Rules of Civil Procedure (FRCP) require production of electronic stored evidence (ESI) in federal court cases. eDiscovery Privacy Archiving guards against data leakage through federated and public channels Regulatory Required: NASD 3010, SEC Rule 17a-4 requires Recommended: Sarbanes-Oxley

56 Logging and Archiving IM archiving The archiving server role provides a way to archive The archiving server role provides a way to archive IM communications sent through Lync Server Archive the IM messages from conversations of all users Just the IM messages for conversations involving only the users you specify Archive all peer-to-peer content including IM sent in the Group Chat client Archive IM messages from all multiparty conferences Conference Content, including uploaded content and event related content Can mark IM Archiving as critical and blocks IM, and conferences if Archiving fails Group Chat archiving The Group chat server has inbuilt Compliance Service that archives all chat room content

57 Logging and Archiving Call Detail Reports (CDRs) The Monitoring Server role capture usage information related to VoIP calls IM messages A/V conversations Meetings, File Transfers, Application Sharing, Application Sharing, and Remote Assistance and Remote Assistance CDR data is captured for both peer-to-peer and multiparty conferences Compliance solutions Provided by partners: Facetime, Akonix, Symantec

58 What is New in Archiving and Monitoring Tight coupling of web conference content archiving and IM archiving Event based content activity log Honor per user archiving settings when logging group IM and web conferences Tool to create and export searchable session transcripts 58

59 Web Conferencing Archive 59

60 Policy Settings for Compliance 60 Global archiving policy By default, Lync Server 2010 creates a global archiving policy when you deploy Archiving Server. Site archiving policy You can enable or disable archiving support for specific sites User archiving policy You can enable or disable archiving support for specific users by assigning the policies to users that are defined in Users.

61 Recording Capabilities (Client Side) 61 Note : You need to enable recording from Lync control panel or Lync Power shell

62 Archive Storage Capacity Planning 62 Database size is dependent on call volume and call report retention settings Database size is dependent on call volume and call report retention settings Database grows 49 KB per user, per day Database grows 49 KB per user, per day Estimate database size with this formula: Estimate database size with this formula: DB size = (DB growth per user per day)*( # of users)*(# of days) For example 60 days of data in the CDR database for 50,000 users would be 31.5*50000*60 for a total of 90 GB.

63 Archiving Server 63 Call Detail Report Improved diagnostics for all modalities “Expected” Failure vs. “Unexpected” Failure Registration Diagnostics IP phone service data Capture data from analogue devices

64 CDR Reporting 64 Reports – call detail report samples

65 Architecture Design Session Solution Overview Technology Overview Point out technologies for relevant capabilities Discuss technologies Architecture Discussion Discuss Architecture Decision Points VPC-based demo View the capabilities in action Show various possibilities Vision scope input from solution briefing Solution Briefing Summary

66 Message Classification Determine message categories that will require special handling; define appropriate notifications Identify transport rules and MRM policies that will help enable automatic enforcement Archiving and Retention Determine the archival and retention requirement of organization Determine the affect of long-term retention on storage design Define any interaction with your archival and backup processes Journaling Determine whether your planned archival and compliance solutions require journaling Define the needed scope and granularity to determine client licensing Search, Discovery, and Audit Consider what expectations you and your users have for searches Determine common search scenarios; map them to search abilities Key Deployment Scenarios

67 Enterprise Network Edge Transport Client Access Hub Transport Mailbox Unified Messaging Sample Architecture Exchange Server 2010 Compliance and Governance Archival, Retention, Journaling Internet

68 Sample Architecture Lync Server Archiving and Compliance PIC XMPP MSN AOL Yahoo Remote Users Remote Users Federated Businesses Federated Businesses Edge Services Front End (incl. Mediation) Back End ExUM UC Endpoints Archiving Monitoring AD DNS ` Media GW / SBA On-premise or online UC Pool Direct SIP AV Conf. 68 Perimeter Network Group Chat

69 Architecture Decision Points Determining how long to archive communications data and when to delete it Archiving and Retention Interfacing with external archival and compliance solutions Journaling Attaching classifications to messaging data Messaging Records Management Allowing searches of messaging data for discovery and auditing Search, Discovery, and Audit Instant messaging and Call Data Records Office Communications Server

70 Architecture Decision Points Archiving and Retention How long does messaging data need to be retained? What types of data need to be retained? Are there multiple retention requirements? Will data be moved to an archival system? What controls are needed to prevent premature deletion? What are the archiving habits of user? Do they use PSTs heavily? How will database design be impacted by message archival and retention policies? What are the backup and recovery requirements? Can MRM help manage message retention? How much bandwidth will be needed to support an onsite or offsite archival solution?

71 Architecture Decision Points Journaling Journaling is required for interaction with most retention and compliance solutions, hosted or on-premise. What types of messaging data need to be captured? What journaling scope is required? Where are the journal reports stored? What level of access control is required? What level of transport protection is required? How much bandwidth will be needed to support an onsite or offsite archival solution? What are the current and future storage needs?

72 Architecture Decision Points Messaging Records Management What folders need to be managed? What retention policies are required? What content types will be managed? Can managed folders act as archival points? What requirements can classifications help address? How can classifications be used by Transport Rules? How can message classifications be used by MRM to store messages for retention and archival? How will classifications be enabled and distributed to clients? Training users to classify messages What are the reporting requirements?

73 Architecture Decision Points Search and Indexing Consider the performance impact of search on mailbox and archive servers. Who is permitted to conduct searches, and under what conditions? What common search criteria will be needed? Will search data need to be exported? Will you use dedicated search workstations? How do you validate search queries? Searching the live database and searching the archive can vary widely depending on the archiving solution

74 Architecture Decision Points Lync Server What policy and governance requirements will Lync Server need to adhere to, and what will their effect be ? How much data (including CDRs and conference recordings) will need to be archived? How will the data storage volume affect database design, backup, and recovery ? Consider the performance impact of archiving on the Lync Servers Plan bandwidth required for archive servers based on network distance to other Lync Servers

75 Architecture Design Session Solution Overview Technology Overview Point out technologies for relevant capabilities Discuss technologies Architecture Discussion Discuss Architecture Decision Points POC Planning Develop scope and specifications for POC VPC-based demo View the capabilities in action Show various possibilities Vision scope input from solution briefing Solution Briefing Summary

76 POC Planning Sponsor Name Project Timing Goals and Objectives ScopeMilestones Risks & Dependencies

77 Next Steps Proof of Concept Assemble resources from the business side and from the IT group Understand business processes that are being addressed Gain knowledge about technology infrastructure Verify the technology roadmap Review the POC scope and assumptions Proof of Concept Architecture Design Session Solution Briefing Solution Development

78 © 2007 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.

79 Appendix Slides…

80 Messaging and the Regulatory Environment Primary Focus IntentRegulation Information retention Established by the SEC, establishes retention policies for brokers, dealers, and Exchange members. Per SEC 17a-4 regulations, broker-dealers as well as many multiline financial firms need the capacity to capture, index, archive, search, and retrieve their email and instant message (IM) communications. SEC 17A-4 Controlled access Relates to the privacy of patients' health information. The act is intended to protect medical records and other health information held or disclosed by health-related organizations. Heath Insurance Portability and Accountability Act (HIPAA) Addresses the public's increasing concern regarding the protection and use of their private information. Mandates that financial institutions take steps to ensure the security and confidentiality of their customers' personal information. Gramm-Leach Bliley Act Mandates public disclosure of computer-security breaches in which confidential information of any California resident may have been compromised. Confidential information includes social security numbers, California driver's license numbers, account numbers, and credit or debit card numbers. It became effective on July 1, 2003. California SB 1386 Information and process integrity Impacts financial reporting processes, with long-term effects on corporate governance and the regulation of auditors. Sarbanes-Oxley Act of 2002 Created in response to recent growth in international financial markets. It intended to encourage banks to manage their capital appropriately and to improve their risk-control processes. It is a set of international risk-based capital guidelines due to take effect in 2006. Basel II Established the criteria under which electronic records (including email) and signatures will be considered equivalent to paper records and handwritten signatures in manufacturing processes regulated by the FDA. 21 CFR Rule 11 Developed in response to the September 11, 2001, terrorist attacks. The act requires financial services and insurance companies to implement antiterrorism and anti-money- laundering regulations, including capabilities to identify customers and flag suspicious transactions. USA PATRIOT Act Source: IDC, 2004

81 Potential Barriers to Archiving A Poor User Experience Unfamiliar experience for your users Separate tools for searching and accessing archived email Loss of full fidelity of Exchange user productivity features Complex Administrative Experience Difficulty deploying add-ins and impact to Outlook ® performance Different methods for conducting multi-mailbox searches Complexity managing high availability and access to the archive High Costs and Overhead Separate archive infrastructure investment Additional archive management overhead User training and education costs

82 On-Premises Vs. Cloud Management Symmetry of Management Tools and Experience

83 Preserve: On-Premises Vs. Cloud Archive Archive Provisioning sourced from on-premises whenever possible Archive property management against current primary MBX location (on-premises or cloud) Applies in hybrid cases as well: E.g. some mailboxes with archive in the cloud and some with mailbox + archive in the cloud.

84 Preserve: On-Premises Vs. Cloud Archive Management

85 Preserve: Archive Management in ECP Fully cloud based Enable/Disable Archive

86 Preserve: Archive in the cloud

87 Preserve: Mechanics of Archive in Cloud Microsoft Online/BPOS Topology AD FS

88 PST Import into Archive Assign “Mailbox Import Export” RBAC Role (restart shell) Initiate Import to Archive Wait to complete....

89 Goals and Assumptions Performs distributed search across end user mailboxes located on multiple servers. Search is throttled and parallelized Results are copied to discovery mailbox after search Admins by default do not have access to search all mailboxes, specific RBAC Discovery Role is required Partners: Enable web services access to the multi- mailbox search for partners to build discovery solutions. Discover: Multi-Mailbox Search

90 OutlookOWA User selects 5 Years from set of Policies “Example - Set Explicit Move Policy on a Folder” Message Retention Archive and Retention policies

91 User selects 5 Years from set of Policies OutlookOWA “Example - Set Explicit Move Policy on an Item” Message Retention Archive and Retention policies

92 User selects 5 Years from set of Policies User selects 5 Years from set of Move Policies Outlook OWA Outlook OWA “Example - Set Move Policy on a Folder With Delete Policy” User selects 5 Years from set of Policies User selects 10 Years from set of Delete Policies Message Retention Archive and Retention policies

93 User selects 5 Years from set of Move Policies User selects 5 Years from set of Policies User selects 5 Years from set of Move Policies OutlookOWA “Example - Set Move Policy on an Item With Delete Policy” User selects 10 Years from set of Move Policies Message Retention Archive and Retention policies

94 Preserve: Legal Hold Overview

95 Preserve: 2010 Hold Message Flow Hold Period of 10 years Primary Mailbox Dumpster 2.0 Recoverable Items Deleted Items Inbox …… (1) Message delivered (2) Message Edited/Deleted (3) Message Permanently Deleted (4) Message “purged” by user Edits Purges (5) Message removed from system after Hold Period (10 years)

96 Preserve: Hold Policy Move and Delete policies are for end users and while Hold Policy is for Admins Hold is respected whether the message is deleted by the user by Admin or User applied delete policies Admin may configure Retention policy to delete emails to the Deleted Items, Dumpster 2.0 or permanently. With Archive on a separate Database, content will be moved from primary dumpster to archive dumpster.

97 Preserve: Hold Management & the Cloud

98 Lync Archiving Settings

99


Download ppt "Prepare for the ADS What to bring with you to a presentation, and what to find out beforehand Understand general company size, number of offices and office."

Similar presentations


Ads by Google