Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation
Upcoming SlideShare
Loading in...5
×
 

Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation

on

  • 738 views

 

Statistics

Views

Total Views
738
Views on SlideShare
735
Embed Views
3

Actions

Likes
0
Downloads
18
Comments
1

1 Embed 3

http://www.slideshare.net 3

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • 1. To read more case studies on Microsoft Unified Communications Server click here:
    http://www.microsoft.com/everybodysbusiness/en/in/products/unified-communications.aspx

    2. To get more information on other products and services:
    http://www.microsoft.com/everybodysbusiness/en/in

    3. Contact us for any requirement or Feedback at msitpro@live.com
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation Presentation Transcript

  • Exchange Server 2010 Information Protection and Control Name Title Microsoft Corporation
  • Information Protection and Control (IPC) Exchange Server 2010 helps prevent the unauthorized transmission of sensitive information with tools that can automatically: MONITOR e-mail for specific content, recipients and other attributes CONTROL distribution with automated, granular alerts and polices PROTECT access to data wherever it travels using rights management PREVENT • Violations of corporate policy and best practices • Non-compliance with government and industry regulations • Loss of intellectual property and proprietary information • High-profile leaks of private information and customer records • Damage to corporate brand image and reputation
  • A Wide Range of Granular Controls • Apply the right level of control based on the sensitivity of the data • Maximize control and minimize unnecessary user disruptions Alert Append Protect Redirect Allow delivery Allow delivery Allow delivery Block but add a but add a but prevent delivery warning. disclaimer. forwarding. and redirect. LESS RESTRICTIVE MORE RESTRICTIVE Classify Modify Review Block Allow delivery Allow delivery Block delivery Do not but apply but modify until deliver. classification. message. reviewed.
  • MailTips Alert users about potential risks
  • Transport Rules Easily enforce granular policies If the message... Is from a member of the group ‘Executives’ And is sent to recipients that are 'Outside the organization' And contains the keyword ‘Merger’ Do the following... Redirect message to: arleneh@contoso.com Except if the message... Is sent to ‘shanek@contoso.com • Executed on the Hub Transport Server • Structured like Inbox rules • Apply to all messages sent inside and outside the organization • Configured with simple GUI in Exchange Management Console
  • Transport Rules in Exchange 2010 Attachments Scans size, name AND content! (Office documents) Classifications (e.g. A/C Privileged); can also act on No Classifications Message Types IRM protected, Auto-replies, calendaring, voice mail Supervision Lists Allows/Blocks based on listed recipients Management Properties Identifies manager and applies policy User Properties Scans for user attributes (such as department, country) Moderation Enable review and approval of e-mail before delivery Apply Disclaimer Add signatures (user attributes + HTML) Protect Apply rights protection to messages, attachments, voice mail
  • Support for Rights Management Extend system, user access Protect automatically by policy • Apply IRM protection to messages and attachments • Turn off protection for non-sensitive messages Maintain compliance and security processes • Enable multi-mailbox search of IRM-protected messages • Enable antivirus scanning and transport rules • Attach decrypted copies to journal reports Empower users • Read and reply to protected messages in Outlook Web App • Search IRM protected messages in Outlook and OWA • Apply IRM protection to voicemail
  • © 2009 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, Outlook, Windows Mobile, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.