What's new in Exchange 2013?
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,918
On Slideshare
2,917
From Embeds
1
Number of Embeds
1

Actions

Shares
Downloads
338
Comments
0
Likes
1

Embeds 1

https://twitter.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Introduction & Welcome
  • Slide objectiveLet’s talk about some of the communication challenges.  StoriesMultitude of devices: 10 years ago, connected workers had a PC, possibly a bulky laptop, possibly a mobile phone (Motorola StarTAC, anyone?), and dial-up Internet. Today, we have smartphones, IP phones, slates, tablets, laptops, desktops, and netbooks, and people want access to email and business information from anywhere, on any device.  Information explosion: In the next decade, mankind’s data will increase 44 times, while the number of IT professionals will grow by only 1.4 times. At a certain point, worker productivity is hampered by too much information. Workers need smart ways to deal with information so that they can find what they need in the flood of data. In fact, in the next year alone, there will be more data generated than in all of mankind’s history, and it is all in your inbox.  Compliance necessities: Some of that information is intellectual property, some is business-critical data, some of it is personally identifiable information. Managing this is a challenging and complex task. Every year since 1995 has been deemed by some analyst or press figure the “Year of Compliance.” The reality is that many organizations put it off or do the minimum required by law or industry regulation. Organizations have to figure out how to take this incredible quantity of information moving at unprecedented velocity to more places and people than ever before—and keep it safe and secure.  Multigenerational workforce:In 2012, there will be one Baby Boomer for every working-age person in the developed world. The Millennial generation is the first generation that has grown up immersed in connected technology. In the 2016 U.S. presidential election, the voting majority will be Generation Y.  Organizations that want to recruit the best and brightest of this generation need to provide technology that helps them reach their goals—just as they are accustomed to from their consumer experiences. At the same time, the workforce is diverse. You need to have technology that enables people to get work done no matter what their comfort level. Things are moving at a fast pace. Many organizations feel overwhelmed when thinking about the future of messaging. the new Exchange will continue to help solve business needs and an innovative and smart manner. More data pointsInformation explosion:Wikipedia estimates that in 2010, humans will have 1.2 zettabytes (or 1.2 billion terabytes) of information (50 Libraries of Congress), and the rate at which we create information continues to accelerate.   Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours Canada: 2.6 hoursFrance: 2.3 hoursAustralia: 1.6 hoursGermany: 0.9 hoursNetherlands: 0.5 hours 55 percent of students surveyed by Youth Trends said they had a smartphone. One year earlier, just 26 percent did.  Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours
  • Devices:Fast and fluid experience with touch, pen, mouse & keyboardImmersive touch-optimized Windows 8 appsSupport for Mobile DevicesCloud:Office - on demand, roaming & up-to-dateNew cloud app development modelEnterprise-grade reliability and standardsSocial:Newsfeeds & microblogging, extend with YammerPervasive social capabilities across OfficeMultiparty HD video & Skype federationControl:DLP, data retention & unified eDiscoveryReimagined deployment model for Office appsCommon management experience across Office 365
  • Slide objectiveCommunicate that Humans think in terms of people, not contact cards; so should software. We’re working to provide a much more personal and connected experience. Talking pointsIntegrate with internal and external social networks. Communicate with the right people instantly. the new Exchange will make it much easier to find the right people and communicate with them in the most efficient way.People love the WP7 linking ability. When it goes server side, you get benefits across any device. Unified contacts – Outlook/OWA – cut down on duplicatecontacts.Contact card – Outlook – New contact card lays out information in a easy to read format along with easy access to communication means.Hover card – OWA – OWA now has the same Hovercard that users have and love in Outlook.Outlook Social connector – Outlook – view information from your email and other social networks about a person to get a full view of your communications with that person and what is important to them.
  • Slide objectiveThere is a ton of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
  • Slide objectiveThere is a wealth of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
  • A lots happened since the last MECLet’s take a little walk down memory laneEx2000Exchange 2000 along with IE5 marked a fundamental shift in developing web applicationIE5 could absorb XML out of the box but there was no way to really ask for it.This inspired the development of XMLHTTP.Experience is split - IE5 and above gets one experience - All other browsers get down level experienceEx2003First version of OWA that was co-designed with OLKMajor features addedSpell checkRulesThemesTasksForms Based AuthExchange 2007Ground up rewriteASP .Net 2.0/C#Runs on middle tierAwesome feature set!!
  • Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
  • Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
  • Exchange Online Protection Built on the very successful FOPE serviceCurrent SLAs100% protection against all known virusesCapture at least 98% of all inbound spam emailsFalse Positive commitment of less than 1 in 250,000 emailsEOP now integrated with office 365 for management and onboarding.Sender Reputation protection by send through a “high risk” pool to ensure protection of Organizations reputationMajor Improvements over FOPE:Integrated consoleSPAM improvementsComprehensive protectionMulti-engine antivirus Continuously evolving anti-spam protectionBuilt on Forefront Online Protection for Exchange (FOPE)Enterprise class reliabilityGeographically load-balanced datacentersQueuing capabilities to help ensure no mail is lostCommon administration consoleOffice 365 integrationDetailed reporting
  • Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".
  • Integrated archiving and data hold capabilitiesCentrally managed or used assigned retention policies
  • Situation: Leakage or loss of data through email is a growing risk and concern for many organizations today – because of regulations, breaches of trust or loss of business critical information. Exchange approach to the problem is to provide a range of soft and hard controls.Talking Points:Flexible solution:Customers have differing needs – solution needs to be flexibleWithin a given organization, different types of data, different parts of the company require different levels of enforcementProtect against loss without getting in users’ wayAttempts to implement policy can’t get in the way of business processes, or these will failExchange has been making investments in this area for the last few releasesTransport rules in Exchange 2007Transport rules + Rights protection in Exchange 2010MailTips in Exchange 2010 / Outlook 2010 (alert user before the email is sent) – “Bob Jones is outside of your organization”Actions are built in today already (as part of transport rules) – block, monitor, RMS protect, etcIn Exchange 2013 we build on this foundation and bring full DLP to the product
  • In the new Exchange, the DLP features will support major regulatory requirements out of the box, including PCI DSS.It will also be extensible, allowing admins to install specific templates offered by security partners. For example, a DLP template built by a partner for the German market would take action on email that includes German driver’s license numbers.Provide granular information about corporate policies at the right time, while not getting in the way of doing business Talking points Exchange gives you the control to manage compliance in order to meet your business and regulatory needs.The goal is to help you with accidental data loss. Detect sensitive data before it is sent with built-in templates that filter mail content for PCI DSS, GLBA, and other regulations. Import DLP policy templates from top security partners or build your own.Today, it is important to help users do the right thing in a complex world of compliance. Education for usersDLP is built upon transport rules (v3). While it was possible to do in Exchange Server 2010 or Exchange Online, now it is packaged, and with reporting/charts/classifications, and it is out of the box Stories When was the last time you saw the employee handbook with all of the regulations on what you were and weren’t supposed to do?. Most people aren’t malicious, but they aren’t educated.  More infoClassificationScanning will examine both message contents and attachmentsOut-of-the-box classification rules work to detect common types of sensitive data. Actions are built in today (in transport rules). We are adding deep analysis (content inspection)Policy engineWell-defined entities (e.g., CC#, SSN) Probabilistic techniques for fuzzy matches (e.g., SOX, medical terms) RSA partnershipDLP policy template: Logical grouping of classification rules, transport rules, and reporting to achieve an objectiveThere will be several templates in the box.PII, financial, healthcare (for the type of healthcare issues that HR would deal with. We are not building templates for hospitals, though we enable partners to do that through our extensibility story)U.S. and Europe Custom classification rulesFingerprinting for org. documents that share common characteristics (e.g., 1040 form) Custom regex and keyword matchesOffice document metadata ExtensibilityClassification rules: Open format for classification rule schemaISVs create new packages of classification rules, transport rules, and reporting for specific regulations ActionsBuilt on Exchange Transport Rules; has same actions availableSupports discovery phase of compliance: two clicks to start monitoring sensitive information IW ExperienceContextual education for information workers Detect sensitive data in email before it is sentText is customizable by admins from Exchange Admin Center
  • SituationWith the explosive growth of compliance requirements both inside and outside organizations, compliance has become everyone’s responsibility. Neither the IT department nor the legal and compliance departments can keep tabs on all of the information that is exchanged in the ordinary course of business. Organizations need tools that enable self-service and automated compliance wherever possible. Talking pointsThere is a solid partnership between the teams. We all work together now.Perform unified searches regardless of document type or location, across Exchange, SharePoint, Lync, and file shares.Search and view content by project, legal matter, or business context.Save money when there is a litigation need by producing results quickly and efficiently.Provide native safety for messaging content.This is an evolution of our compliance (v3) and search infrastructure (FAST)Data stays where it lives (In-Place) where it has the most relevance.
  • Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".

Transcript

  • 1. © Microsoft Corporation. All Rights Reserved.
  • 2. © Microsoft Corporation. All Rights Reserved.
  • 3. Michael VanHorenbeeckTechnology Consultant @ Xylos
  • 4. Did you already work with or install Exchange 2013 (in a lab)?
  • 5. 44X 1.4XMultitude of Information Compliance MultigenerationalDevices Explosion Necessity Workforce
  • 6. Client improvements
  • 7. Janet Schorr janets@litware.com Jim Ptaszynski jimp@fabrikam.com Josh BaileyFinding joshb@adventureworks.com Josh Bailey Joanna Yuan boshb@adventureworks.com joannay@southridgevideo.com Josh Bailey’s Personal Email joshbailey97@live.com Jiri Burianpeople jirib@contoso.com Joanna Yuan joannay@southridgevideo.com Jeffrey Zeng jeffreyz@wingtiptoys.com Jiri Burian jirib@contoso.com Joe Healyis easy joeh@cohowinery.com Jeffrey Zeng jeffreyz@wingtiptoys.com Juan-Carlos Rivas juancarlosr@proseware.com Joe Healy joeh@cohowinery.com Get more results for j Juan-Carlos Rivas Displaying top 8 results Copyright© Microsoft Corporation
  • 8. Work across Outlook and Outlook Web App The app detects triggers in the email andCopyright© Microsoft Corporation displays relevant information
  • 9. Copyright© Microsoft Corporation
  • 10. mail
  • 11. 1. Data is sourced locally 2. Activity is queued & replayed 3. Server updates are copied as they happen OWA Client Exchange Server 1 3 Offline Store 2Copyright© Microsoft Corporation
  • 12. What OWA Browser• 150-400 items per folder UI• Inbox, Drafts, recently used JSON• All Contacts• A year of calendar Offline Store +How Business Logic • Folders & Items• AppCache • Views In IE:• IndexedDB or WebSQL • Notifications %username% • Queued Actions Local SettingsWhere Microsoft Internet• Browser’s choice DB Abstraction Explorer Indexed DB• Per URL, browser, user, machine Internet.edb WebSQL IDB
  • 13. Demo
  • 14. Management
  • 15. Management interface Replaces the MMC-based Exchange Management Console Fully web-based (/ecp virtual directory) Designed to allow administrators to perform most common tasksCopyright© Microsoft Corporation
  • 16. Security & Compliance
  • 17. Management interfaceCopyright© Microsoft Corporation
  • 18. Sender notifications Admin notificationsCopyright© Microsoft Corporation
  • 19. Block email based on languageBlock email based on geography Copyright© Microsoft Corporation
  • 20. Policy details transparently displayed to end user Right click to assign policy to anCopyright© Microsoft Corporation item, folder or to all your email
  • 21. Copyright© Microsoft Corporation
  • 22. A PolicyTip notifies you of a policy violation while composing an emailCopyright© Microsoft Corporation
  • 23. Use proximity searches to understand context Fine tune complex queries Get instant statistics Query results across Exchange, Lync & SharePointLaser focused refiners to help find the data you need
  • 24. Demo
  • 25. Architecture
  • 26. L7 LB CA Ex Ex S HT MBX MBX Ex Ex • Separate HA solutions SAN for each role • Separate roles for ease • Introduced the DAG• Role differentiation of deployment and through manual management • Rich management configuration segmentation experience using RBAC• Backups and hardware • Support cheaper • Support for Hybrid solutions for “reliability” storage deployments 2000/2003 2007 2010
  • 27. Forefront Online Protection for Exchange Internal Network Phone system (PBX or VOIP) Edge Transport Hub Transport Routing and Routing and policy AV/AS External SMTP servers Mailbox Unified Messaging Stores mailbox and Voice mail and public folder items voice access Mobile phone Web Client Access browser Layer 7 LB Client connectivity Web services ADOutlook (remote user) Outlook (local user) Line of business application
  • 28. Exchange deployments can be complicated Load balancing is difficult and can require expensive solutions When dedicated server roles are deployed, hardware can go unutilized or under-utilized Too many namespaces requiredCopyright© Microsoft Corporation
  • 29. Architecture
  • 30. Use Building Blocks to facilitate deployments at all scales – from self- hosted, small organizations to Office 365 • Server role evolution • Network layer improvements • Versioning and inter-op principlesCopyright© Microsoft Corporation
  • 31. Hardware efficiency Deployment simplicity Cross-version inter-op Failure isolationCopyright© Microsoft Corporation
  • 32. Forefront Online Protection for Exchange Internal Network Exchange 2010 CAS MBX Edge (Array) (DAG) Transport Layer 4 load balancing External SMTP servers Mobile phone Web browserOutlook (remote Phone system user) (PBX or VOIP) Outlook (local user) LOB Application
  • 33. EWS protocol MRS proxy protocol SMTP MRSProtocols, EWS MRSProxy Transport Transport MRS MRSProxy EWSServer Agents RPC CA Assistants Custom WS Assistants RPC CA XSO MailItem Banned XSO MailItem E2010Business Logic CTS Other API CTS Other API Content Content Store index Store indexStorage ESE File ESE File system system Server1 (Vn) Server2 (Vn+1)
  • 34. Exchange 2010 Exchange 2013 Architecture Architecture L4 LB Hardware Load Balancer L7 LB AuthN, Proxy, Client Access Re-direct AuthN, Proxy, Re-direct Client Access Hub Transport, Protocols, API,Unified Messaging Biz-logic Protocols, Assista nts, API, Biz-logic Mailbox Mailbox Assistants, Store, CI Store, CI
  • 35. What about…
  • 36. No “real” way to achieve high- availability SMTP-based replication Multi-master modelCopyright© Microsoft Corporation
  • 37. Called “Public Folder Mailboxes”Reside within a mailbox databaseLeverage Database Availability Groupfor true high availabilitySingle-master model! Copyright© Microsoft Corporation
  • 38. WorkSmarter, Anywhere.