Presentation is loading. Please wait.

Presentation is loading. Please wait.

 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.

Similar presentations


Presentation on theme: " Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes."— Presentation transcript:

1

2

3  Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes

4

5 PRESERVE DISCOVER Personal Archive Archive in Outlook/OWA Integrated with mailbox Move and Delete Policies in Outlook/OWA Folder/Item Level Policy Edited/Deleted items preserved Single Item Restore Simplified search console Role-Based Access Control Move and Delete Policy Hold Policy Multi-Mailbox Search

6 A secondary mailbox that is configured by the administrator Appears alongside a user’s primary mailbox in Outlook or Outlook Web App PST files can be dragged and dropped to the Personal Archive Archive quota can be set separately from primary mailbox Personal Archive Primary Mailbox

7 Policies automatically delete e-mail after x days and/or move to archive Policy applied to all e-mail within a folder Policies automatically delete e-mail after x days and/or moved to archive Expiration date label Folder

8 Legal Hold Policy Preserve edited and deleted items Retention Hold suspends automated purge cycle Legal Hold suspends manual purge/edits by users Use multi-mailbox search to retrieve deleted/edited items indexed in recoverable items folder Automatically generated Legal Hold alert

9 Multi-Mailbox Search Easier, more powerful search Search multiple mail items across primary mailbox and archive Delegate access to search console to HR, compliance, legal manager sender receiver expiry policy message size, sent/receive date cc/bcc IRM protected items regular expressions Filtering Includes:

10 Protect Communications Protect access, control distribution IRM in OWA Protect voicemail IRM Search Transport Decryption Journal Decryption Outlook Protection Rules IRM Protection Moderation Dynamic Signatures Attachments Alerts for: external recipients, large attachments, audience and other factors Option to customize based on recipients IRM Support Transport Rules MailTips

11 Action Types: Transport Rules How they work Conditions Actions If the message... Is from a member of the group ‘Marketing Team' And is sent to recipients that are 'Outside the organization' Do the following... Append the message with the disclaimer 'Exchange 2010 rocks!’ Except if the message... Is received from ‘Alfred E Newman' User – detect mail between people, DGs Content – inspect message subject & body content Message Properties – inspect message headers and properties or type Routing – detect external/internal, email domains Block Encrypt Modify (recipients, content, properties) Review/Moderate Condition Types:

12 AttachmentsScans size, name AND content! (Office documents) Classifications(e.g. A/C Privileged); can also act on No Classifications Message TypesIRM protected, Auto-replies, calendaring, voice mail Supervision ListsAllows/Blocks based on listed recipients Management PropertiesIdentifies manager and applies policy User PropertiesScans for user attributes (such as department, country) Rights ProtectApplies IRM-protection to messages, attachments, voice mail ModerationEnable review and approval of e-mail before delivery Apply DisclaimerAutomatically adds user attributes + HTML …do the following…

13 Scan  Transport decryption enables AV/AS scanning of IRM-encrypted e-mail Search  IRM Search enables search in Outlook/OWA – and across multiple mailboxes  Journal decryption creates clear-text copy in journal report for search Support  Support for IRM in OWA  Eliminates the need for IE Rights Management Add-on  Cross-Browser support for Firefox and Safari  Apply IRM protection to voice mail (do not forward)  Create /consume RMS protected messages using Windows Mobile 6.x Exchange 2010 builds on this protection with the ability to:

14

15 IPC and Exchange 2010 The right tools for the right scenario Signatures/ Disclaimers MailTips Block/ Redirect Moderation Less restrictive More restrictive IRM protection HARD CONTROLS SOFT CONTROLS

16 Advanced Security Secure delivery, block spam and malware BLOCK SECURE Exchange 2010Forefront

17 Single Scanning Engine *AV-Test.org **West Coast Labs, 2009 Multiple Scanning Engines 38 times faster* Intelligent Engine Selection Automatic Engine Updates 99% spam detection**

18

19 Retention Sarbanes-Oxley (5 years) SEC 17-a4 (6 years) Retain financial records in Personal Archive; Apply specific Retention Polices to regulated items Journal to archive Employee Supervision NASD 3110 Send to Manager for approval MailTips for moderated recipients Privacy HIPAA – personal health data GLBA – personal financial data PIPEDA (Canada) SB 1386 (California) PCI (Worldwide) MailTips for external recipient Apply IRM protection Scan for credit card numbers and other PII Reject outbound mail with Message Classifications (e.g., attorney-client privilege) Signatures EUPD 2003/58/ECAppend signatures that include name, title, department, etc. Security GLBAForefront anti-phishing protection

20

21 Integrated archive for better PST management Easy-to-apply retention policies for better compliance Automated rules and alerts to reduce accidental data leakage Broader support for IRM to better control data access Integrated archiving, protection and security products and features Expanded transport rules for more efficient data protection policies Delegate compliance- related functions to non- IT compliance officers Single console for AV/AS management No third party archive, encryption or security products to manage = lower administrative costs

22


Download ppt " Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes."

Similar presentations


Ads by Google