Exchange Server 2010
Information Protection and Control

Name
Title
Microsoft Corporation
Information Protection and Control (IPC)
 Exchange Server 2010 helps prevent the unauthorized transmission of
 sensitive i...
A Wide Range of Granular Controls
•   Apply the right level of control based on the sensitivity of the data
•   Maximize c...
MailTips
Alert users about potential risks
Transport Rules
Easily enforce granular policies

                 If the message...
                 Is from a member of ...
Transport Rules in Exchange 2010


       Attachments              Scans size, name AND content! (Office documents)

     ...
Support for Rights Management
Extend system, user access

         Protect automatically by policy
         •   Apply IRM ...
© 2009 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, Outlook, Windows Mobile, and other produc...
Upcoming SlideShare
Loading in …5
×

Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation

512 views

Published on

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • 1. To read more case studies on Microsoft Unified Communications Server click here:
    http://www.microsoft.com/everybodysbusiness/en/in/products/unified-communications.aspx

    2. To get more information on other products and services:
    http://www.microsoft.com/everybodysbusiness/en/in

    3. Contact us for any requirement or Feedback at msitpro@live.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
512
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
22
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Microsoft India – Unified Communications Exchange Server 2010 Information Protection and Control Presentation

  1. 1. Exchange Server 2010 Information Protection and Control Name Title Microsoft Corporation
  2. 2. Information Protection and Control (IPC) Exchange Server 2010 helps prevent the unauthorized transmission of sensitive information with tools that can automatically: MONITOR e-mail for specific content, recipients and other attributes CONTROL distribution with automated, granular alerts and polices PROTECT access to data wherever it travels using rights management PREVENT • Violations of corporate policy and best practices • Non-compliance with government and industry regulations • Loss of intellectual property and proprietary information • High-profile leaks of private information and customer records • Damage to corporate brand image and reputation
  3. 3. A Wide Range of Granular Controls • Apply the right level of control based on the sensitivity of the data • Maximize control and minimize unnecessary user disruptions Alert Append Protect Redirect Allow delivery Allow delivery Allow delivery Block but add a but add a but prevent delivery warning. disclaimer. forwarding. and redirect. LESS RESTRICTIVE MORE RESTRICTIVE Classify Modify Review Block Allow delivery Allow delivery Block delivery Do not but apply but modify until deliver. classification. message. reviewed.
  4. 4. MailTips Alert users about potential risks
  5. 5. Transport Rules Easily enforce granular policies If the message... Is from a member of the group ‘Executives’ And is sent to recipients that are 'Outside the organization' And contains the keyword ‘Merger’ Do the following... Redirect message to: arleneh@contoso.com Except if the message... Is sent to ‘shanek@contoso.com • Executed on the Hub Transport Server • Structured like Inbox rules • Apply to all messages sent inside and outside the organization • Configured with simple GUI in Exchange Management Console
  6. 6. Transport Rules in Exchange 2010 Attachments Scans size, name AND content! (Office documents) Classifications (e.g. A/C Privileged); can also act on No Classifications Message Types IRM protected, Auto-replies, calendaring, voice mail Supervision Lists Allows/Blocks based on listed recipients Management Properties Identifies manager and applies policy User Properties Scans for user attributes (such as department, country) Moderation Enable review and approval of e-mail before delivery Apply Disclaimer Add signatures (user attributes + HTML) Protect Apply rights protection to messages, attachments, voice mail
  7. 7. Support for Rights Management Extend system, user access Protect automatically by policy • Apply IRM protection to messages and attachments • Turn off protection for non-sensitive messages Maintain compliance and security processes • Enable multi-mailbox search of IRM-protected messages • Enable antivirus scanning and transport rules • Attach decrypted copies to journal reports Empower users • Read and reply to protected messages in Outlook Web App • Search IRM protected messages in Outlook and OWA • Apply IRM protection to voicemail
  8. 8. © 2009 Microsoft Corporation. All rights reserved. Microsoft, Internet Explorer, Outlook, Windows Mobile, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

×