Exchange 2010 includes some basic e-discovery features like multi-mailbox searching and role-based access controls. However, it has significant limitations including only searching Exchange mailboxes, limited search filters, inability to search public folders or encrypted messages. Third party software like Discovery Attender provides more robust e-discovery capabilities by searching a wider range of data sources and offering advanced search criteria and features. While Exchange 2010 is suitable for some light discovery needs, most organizations require a full-featured third party solution.
Every so often we have the opportunity at Sherpa to ease back, put our feet up, dream of sitting on a beach with our toes in the sand, sipping a nice drink of our choice and watching the world go by. Oh my, how relaxing and restorative that 60 seconds can be. OK, so now that the time of idleness has passed, we had to decide what product changes we could make. So there we are, sitting in a meeting when someone said, "Hey! It's been a whole week since we've added any functionality to Discovery Attender." Once we all realized that we truly have not added any new features in 168 hours (yes, I did do the math in my head), we decided it was time to get back to work!
So what can we add to Discovery Attender? Well, to be honest, that's not a hard question because we get a lot of feature requests from our customers (thank you!) to help improve our product. Check out the "What's New" document below to get a breakdown of all our newly added features!
Presentation on various ways to integrate e-mail with SharePoint Server 2007, including OOB, Exchange 2007 managed folders and 3rd party solutions. Also includes other considerations such as public folders.
FLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATAIJwest
Open Data is now collecting attention for innovative service creation, mainly in the area of
government, bioscience, and smart X project. However, to promote its application more for consumer
services, a search engine for Open Data to know what kind of data are there would be of help. This paper
presents a voice assistant which uses Open Data as its knowledge source. It is featured by improvement of
accuracy according to the user feedbacks, and acquisition of unregistered data by the user participation.
We also show an application to support for a field-work and confirm its effectiveness.
Presented by Marjorie Hlava, president of Access Innovations, Inc. on August 10, 2011. Part two of the Special Libraries Association's Leveraging Your Taxonomy series.
Every so often we have the opportunity at Sherpa to ease back, put our feet up, dream of sitting on a beach with our toes in the sand, sipping a nice drink of our choice and watching the world go by. Oh my, how relaxing and restorative that 60 seconds can be. OK, so now that the time of idleness has passed, we had to decide what product changes we could make. So there we are, sitting in a meeting when someone said, "Hey! It's been a whole week since we've added any functionality to Discovery Attender." Once we all realized that we truly have not added any new features in 168 hours (yes, I did do the math in my head), we decided it was time to get back to work!
So what can we add to Discovery Attender? Well, to be honest, that's not a hard question because we get a lot of feature requests from our customers (thank you!) to help improve our product. Check out the "What's New" document below to get a breakdown of all our newly added features!
Presentation on various ways to integrate e-mail with SharePoint Server 2007, including OOB, Exchange 2007 managed folders and 3rd party solutions. Also includes other considerations such as public folders.
FLOWER VOICE: VIRTUAL ASSISTANT FOR OPEN DATAIJwest
Open Data is now collecting attention for innovative service creation, mainly in the area of
government, bioscience, and smart X project. However, to promote its application more for consumer
services, a search engine for Open Data to know what kind of data are there would be of help. This paper
presents a voice assistant which uses Open Data as its knowledge source. It is featured by improvement of
accuracy according to the user feedbacks, and acquisition of unregistered data by the user participation.
We also show an application to support for a field-work and confirm its effectiveness.
Presented by Marjorie Hlava, president of Access Innovations, Inc. on August 10, 2011. Part two of the Special Libraries Association's Leveraging Your Taxonomy series.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Exchange Server Recovery Software is the best an ever Software in terms of Exchange Server Data Recovery. It convert corrupted, inaccessible EDB files into PST, MBOX, MSG, EML and PDF formats.
Apache Solr is the popular, blazing fast open source enterprise search platform; it uses
Lucene as its core search engine. Solr’s major features include powerful full-text search, hit
highlighting, faceted search, dynamic clustering, database integration, and complex queries.
Solr is highly scalable, providing distributed search and index replication, and it powers the
search and navigation features of many of the world's largest internet sites.
It is a collection of related web pages that may contain text, images, audio and video. It is the data communication protocol used to establish communication between client and server.
Apache Lucene is a high-performance, cross-platform, full-featured Information Retrieval library in open source, suitable for nearly every application that requires full-text search features.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Exchange Server Recovery Software is the best an ever Software in terms of Exchange Server Data Recovery. It convert corrupted, inaccessible EDB files into PST, MBOX, MSG, EML and PDF formats.
Apache Solr is the popular, blazing fast open source enterprise search platform; it uses
Lucene as its core search engine. Solr’s major features include powerful full-text search, hit
highlighting, faceted search, dynamic clustering, database integration, and complex queries.
Solr is highly scalable, providing distributed search and index replication, and it powers the
search and navigation features of many of the world's largest internet sites.
It is a collection of related web pages that may contain text, images, audio and video. It is the data communication protocol used to establish communication between client and server.
Apache Lucene is a high-performance, cross-platform, full-featured Information Retrieval library in open source, suitable for nearly every application that requires full-text search features.
For many years, libraries have been dreaming about a simple, easy, fast search solution that unifies all of the resources into a single repository. In the current model, the user is faced with the problem of dealing with multiple information silos and no-compelling starting place in implementing their search. Recently, the introduction of a “Web-scale discovery” layer, or Next-Generation Catalog, can provide this starting point for library patrons. This talk will discuss how these Next-Generation library discovery applications can go beyond the local library holdings and beyond federated search to offer a single Google like search service across all local and subscription resources.
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLaboraDK
CoLabora Unified Communication (UC) User Group Meeting - November 2015.
Topic About: Office 365 Compliance and Exchange Archiving
Speaker: Peter Schmidt (MVP - www.msdigest.net)
Web scale Discovery services are becoming the most sought after solution for Libraries to connect its patrons with the relevant information they seek. Many studies show that these services are getting wide acceptance from users as well as Library staff and making revolution in Library Information retrieval arena. Given such broad implications, selecting a new discovery service for libraries is an important undertaking. Library professionals should carefully evaluate options to meet their goal of finding the best potential match for their library. This Paper attempts to provide a comprehensive overview of Library Web Scale Discovery solutions by depicting various facets of Web Scale Discovery, how it differs from federated searching and highlights the important parameters to be considered for taking an informed and confident decision on selecting discovery service.
15 Reasons You Should Still Be Using SharePoint 2010Christian Buckley
A session initially presented at SPTechCon San Francisco 2014 that walks through some of the more compelling features in the SharePoint 2010 platform. The idea behind the session is to help SP2010 users understand what is available beyond basic functionality, helping them to get more business value out of what they already have in place today.
Get a practical, hands-on review of the new managed metadata services for managing taxonomies, folksonomies, tags, metadata and content types in SharePoint 2010.
Why Information Architecture is Vital for Office 365 Adoption and Governance ...J. Kevin Parker, CIP
Presentation as part of the AIIM Virtual Event in December 2018. Why is information architecture vital for Office 365 adoption and governance? I explore that in this presentation.
This presentation will provide an overview of information governance and the solutions available to companies of all shapes and sizes.
Information Governance: A specification of decision rights and an accountability framework to encourage desirable behavior in the evaluation, creation, storage, use, archival and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.
What are your pain points? Information is a corporate asset that needs to be managed and governed. By gaining control of data and considering eDiscovery concerns, you can better plan your corporate IG program.
Here are ways to get started: research options, talk to an expert, test solutions in your data environment.
To learn more, go to www.SherpaSoftware.com or call 1.800.255.5155
Denny Russell of Sherpa Software recently presented a one-hour lunch-and-learn at work, where he shared his experiences and showed how he manages all of his social connections, and not to mention, gather key information that helps drive his everyday life. From free gifts, to discount coupons, to product ideas and inspiration, Denny walked his coworkers through the steps of how to successfully use social media tools like Twitter, Facebook and LinkedIn for their own personal benefit. Using these slides, see what he used in his teachings on how to lurk for the purpose of finding useful information for work and life in general, and how to share that same information with others.
How to use IBM Connections to manage a product buildSherpa Software
Learn how to manage projects such as redesigns, product builds and more with this white paper on "How to use IBM Connections to manage a product build." One of Sherpa Software's resident IBM experts, Denny Russell, takes the reader through his process and helps them to understand how to "work smart and not hard" by using a social collaboration tool.
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
A recent survey, with 104 respondents, asked IT admins questions pertaining to their ESI (electronically stored information). Here's what they had to say!
The following is part four of an ongoing fictional story, based on a true-to-life situation. (If you would like to get caught up, parts one, two, and three are also available.) The names of companies and people are fictitious, but the situations they face are the same as those faced by many companies. Perhaps, as you read the events unfolding at Gensui Acme Imaging, you will see similarities to the challenges you face as well as ways to meet them.
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
The following is part two of a fictional story, based on a true-to-life situation. (Part one is available here.) The names of companies and people are fictitious, but the situations they face are the same as those faced by many companies. Perhaps, as you read the events unfolding at Gensui Imaging, you will see similarities to the challenges you face as well as ways to meet them.
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
Sherpa introduces its first short story! Grant Lindsay, Product Manager for Compliance Attender for Lotus Notes, takes us through a fictional scenario, where an employee of a major imaging company, leaks an upcoming merger. Based on real life situations, this story will explain how companies can stop email messages and capture them in a graveyard journal before any confidential information is released. Read the story to learn more!
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
You may be able to implement your policy with the tools you already have in house. Or, you may find that the email platform you are on is limited and you need to search for a third party vendor. This is where Sherpa Software's Attender Utilities suite comes to the rescue. Let us be your Sherpa to the top of the mountain of data that you are trying to conquer. Our uniquely designed products for Lotus Notes & Domino will help you get all this data under control and manage it in whatever way you see fit. No matter what you decide to manage, Domino Mail, Applications, IBM Sametime, Lotus Quickr or your file shares, there is a Sherpa product to help you implement and enforce your Compliance policies.
Is e-Discovery important to your organization? Sherpa recently surveyed hundreds of IT influencers to gain insight into to trending needs and concerns. See for yourself!
Download Free Trial - http://bit.ly/vrIxKv
Get a Quick Quote - http://bit.ly/tw8pi3
Contact Us Now - http://bit.ly/sz9x5r
Email Classification - Why Should it Matter to You?Sherpa Software
In this white paper, learn the basics of email classification, what it is, why it could assist your overall email management strategy and learn how to accomplish it.
Download Free Trial - http://bit.ly/vrIxKv
Get a Quick Quote - http://bit.ly/tw8pi3
Contact Us Now - http://bit.ly/sz9x5r
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
PHP Frameworks: I want to break free (IPC Berlin 2024)
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
1. August 2012
The Sherpa Approach: Features and Limitations of
Exchange 2010 E-Discovery
Since 2006, the topic of Electronic Discovery [e-Discovery] has been evolving and growing
rapidly, in popularity and importance. Today, litigation (especially involving businesses) is
no longer a question of if it will happen, but rather a question of when it will happen. As an
IT, legal or compliance professional, it is your job to make sure your company is ready by
having a plan and the right tools in place when that time comes. E-Discovery software is
something no company should be without. And since you only have a certain amount of
time once your organization has been asked to collect and present all relevant
Electronically Stored Information [ESI], being proactive is critical. Microsoft has come to
this realization and decided to include e-Discovery features in Exchange 2010 and recent
service pack updates.
The release of Exchange Server 2010 and subsequent service packs has many companies
exploring some of the new native e-Discovery features. Why are people so interested in
utilizing the e-Discovery features of Exchange? If an organization can rely solely on the
inherent e-Discovery features within Exchange 2010, then there is no need to spend money
on third party products. Unfortunately, for many organizations, the inherent features may
not be sufficient.
It is a Sherpa Software recommendation and best practice that our current and prospective
customers look into all the features available to them within Exchange and to determine
whether the e-Discovery features provided are sufficient. As with many first attempts,
major limitations to the functionality of Exchange 2010 exist, and therefore, should be
understood before deploying. Let’s take a closer look at Exchange 2010, its limitations and
how third party e-Discovery software may be a better fit for your organization.
A Closer Look at How exactly has Microsoft differentiated itself against older versions of Exchange?
Recently, Microsoft’s areas of improvement within Exchange 2010 include its Multi-Mailbox
Exchange 2010’s Searching feature and Role Based Access Control [RBAC].
e-Discovery
Features “Multi-Mailbox Search enables search of mailbox items, including email, attachments,
calendar appointments, tasks and contacts. Exchange also indexes a long list of
attachment types as well as Information Rights Management-protected content. Multi-
mailbox search can work simultaneously across primary mailboxes, Personal Archives and
recovered items with an easy-to-use, web-based console. To help streamline discovery
processes, search results may be previewed with keyword statistics—before emails
discovered through search are copied and moved to a specified mailbox, as defined by the
administrator, for further investigation. Rich filtering capabilities include sender, receiver,
message type, sent/receive date and cc/bcc, along with Advanced Query Syntax (AQS)
support. Role Based Access Control now allows administrators to grant users such as
records managers, compliance officers and litigators specific rights to perform multi-mailbox
searches and other role specific tasks.”
Another notable difference in Exchange 2010 is the interface for performing the searches,
called the Exchange Control Panel (ECP), which now gives non-technical users (such as
corporate legal teams or even outside counsel) the flexibility to conduct searches without
having vast technical knowledge.
1
Microsoft Exchange Server 2010 - “Faster Discovery”: 1|Page
Both types of policies can be combined on the same item or folder. For example, an email
http://www.microsoft.com/exchange/en-us/email-archiving-and-retention.aspx
can be tagged so that it is automatically moved to the Personal Archive in 15 days and
deleted within 45 days. Administrators can also use archive policies to control when
messages are automatically moved from a primary mailbox to the Personal Archive.1
2. Exchange 2010 searches using basic search criteria such as sender or recipient
addresses, date ranges, a set of mailboxes, data types (including IM conversations
recorded to the conversation history folder, calendar items, notes, and Journal entries),
attachment types, and attachment content. Users have the ability to combine these criteria
using the standard Boolean (i.e. AND, OR) operators. When creating a new search, users
will need to specify the target mailbox (a special mailbox called a “Discovery Mailbox”)
where results should be stored. The option to enable the deduplication of search results
also exists. Depending upon the reasons for performing an e-Discovery search,
deduplication can be a significant time savings, but it may not always be legally
permissible.
When creating a new search in Exchange 2010, consider where the search results go.
Because Exchange 2010 copies messages to a Discovery Mailbox, users are guaranteed
that the Discovery Mailbox will have a complete set of search results, which can then be
acted upon without touching the original source. If more than 1 Discovery Mailbox is
needed, then those mailboxes need to be created using Powershell (not the EMC). This
mailbox will be created with no access permissions and by using Powershell, it obviously
increases the complexity of the project; making it improbable that a non-technical user will
be able to accomplish the task at hand.
E-Discovery Again, although seemingly vast improvements have been made to Exchange 2010, there
are still issues and downsides to using the inherent e-Discovery features. The limitations
Limitations in (listed below) restrict its ability to be a fully featured e-Discovery solution for most
Exchange 2010 organizations. Some of the limitations we’ve seen with Exchange Search include:
Only Searches Exchange 2010 Servers: Mailboxes that exist on legacy Exchange
servers, as well as non-Exchange servers, cannot be searched. Additionally, PST
files, file servers, file shares, archives, SharePoint, etc…cannot be searched.
Default Search Filters Limited: Standard Microsoft Office formats can be indexed
by Exchange 2010, but there is limited support for other common formats such as
the popular PDF file format. By default, the content of PDF messages is
unsearchable.
No Public Folder Search: Organizations with a significant investment in public
folders will find that they cannot search across public folder data using the native
Exchange Search functionality.
Localization and Language Limitations: Emails written in multiple languages are not
indexed by Exchange Search. In addition, queries made in a specific language
must match the locale of the local computer doing the search.
Encrypted Messages Not Indexed: Messages encrypted with S/MIME encryption
are not indexed and are subsequently not searchable.
One major limitation that Microsoft is trying to turn into a positive is with the licensing of its
Multi-Mailbox Search. In Exchange 2010, Multi-Mailbox Search required Enterprise CAL’s
for every mailbox that users wished to perform such searches on. Starting October 1,
2012, Microsoft has announced that they are “making a change to Exchange 2010 licensing
so you’ll no longer require an Enterprise CAL for Multi-Mailbox Search.” This is a big
change from how they’ve licensed this in the past, virtually making these features
completely free for public consumption.
2|Page
3. So, for organizations with light to medium discovery requirements, the built-in capability
may be enough. But for organizations that must frequently perform discovery searches and
have more complex search criteria or would like to search items stored outside of
Exchange 2010 mailboxes, a third-party solution is much more appropriate.
If the drawbacks within Exchange 2010 have you exploring alternative e-Discovery
How Discovery products, Sherpa Software’s Discovery Attender is definitely a tool worth considering.
Attender Discovery Attender is a software product designed to automate the search and collection of
Compares to the electronically stored information (ESI) across a wide variety of platforms. This cost-effective
solution empowers in-house talent to perform legal discovery on PST files, Exchange mail
E-Discovery stores, file servers, file shares, archives and SharePoint, in a cost-effective, efficient and
Features in reproducible manner. Discovery Attender streamlines the process of locating, culling and
producing data for electronic discovery requests, compliance, internal investigations,
Exchange 2010 regulatory inquiries and more.
This application features a quick installation, intuitive search setup with a robust feature set
unmatched for the price. In addition, the flexibility of the criteria will help answer the most
challenging of requests. Searches can be customized by keywords (including wildcards,
Boolean, proximity, RegEx and more), addresses, dates, and sizes over many common file
formats. More specifically, Discovery Attender’s list of extensive search features (that
Exchange does not provide) includes:
Searching of over 60 common types of document attachments
A host of powerful search criteria including regular expressions and fuzzy search
terms
Search results saved in a variety of different formats (including PST files) to be
shared with third parties or imported into case management tools
Searches a wide variety of ESI, including network PST files, public folders,
archives, file shares and more
Once you’ve acquired your data, Discovery Attender gives you a number of options for
organizing, reporting, and exporting your data. The result options include: deduplication,
indexing, annotation, and MD-5 hashing. Export formats support copying items to PST files
and also to native formats (including .MSG files for email messages). Most importantly, for
every search, action, and export, Discovery Attender maintains a meticulous log detailing
who searched what, where, when, and how. Why is that important? Maintaining a log of
the chain of custody is very important to all legal cases because you need to ensure that
everything about how this information was collected is readily available to both litigation
teams. It’s also important to demonstrate that proper protocol was followed throughout.
Conclusion Approximately every three years, Microsoft releases an updated version of the Exchange
Server. It should be no surprise that in Exchange 2010 and subsequent service packs,
they have included improved e-Discovery features. Email and electronically stored
information is already one of the most important pieces to legal proceedings in this day and
age. If you don’t have the proper tools to collect, manage and search electronically stored
information, you could end up spending a lot more than you anticipated on discovery, and
could face sanctions and fines by the court. As an IT, legal, or compliance professional, it
is your job to make sure you have a plan and the right tools in place for when e-Discovery
3|Page
4. litigation goes from if to when.
While Exchange Server 2010 provides basic discovery capabilities, it is Sherpa Software’s
opinion that they may not be adequate for all organizations. We still encourage all of our
customers and prospective customers to make this determination for themselves, along
with their legal and IT departments. If in fact you come to the conclusion that you need a
more fully featured e-Discovery solution, please explore what Sherpa Software’s Discovery
Attender has to offer. To get more information on Sherpa Software’s e-Discovery solution,
or for more on our perspective, contact us at information@sherpasoftware.com.
About Sherpa For over 10 years Sherpa Software has provided IT Professionals with award-winning
Software information management software specifically designed to address email management,
archiving, e-discovery, PST management and compliance requirements for Lotus Notes
and Microsoft Exchange environments. Based in Pittsburgh, Pennsylvania, Sherpa’s
solutions are practical, reliable and affordable and have been installed at thousands of
organizations worldwide. Their products offer flexible architectures that streamline
administrative processes without requiring any additional hardware or add-on components.
Sherpa Software is an IBM Premier Business Partner and a Microsoft Certified Partner.
For more information about Sherpa Software, visit www.sherpasoftware.com.
456 Washington Avenue
Bridgeville, PA 15017
www.SherpaSoftware.com
1.800.255.5155
4|Page
5. About the Author Ned joined the Sherpa Software team in November 2010. As the Sales & Marketing
Associate, Ned is responsible for marketing, sales, channel and technical support
aspects. He oversees all day-to-day tasks concerning software support renewals for the
channel sales team while also acting as a liaison between the Channel and Marketing
Departments. With the marketing team, Ned’s main focus is content creation. Each
month, he writes numerous blog posts, company positioning pieces and his fan favorite
“Off the Topic” articles, which are sent to almost 30,000 newsletter subscribers. As for
Ned’s technical support responsibilities, you can find Ned chatting with and helping
customers via our “Live Chat” function. Overall, Ned accomplishes a wide range of
business-critical functions for the team at Sherpa Software.
Ned graduated from Duquesne University in 2010, where he received a Bachelor’s of Science in Business
Administration, specializing in Entrepreneurship and new business creation with a minor in Spanish.
Ned is an avid sports enthusiast. In his time at Duquesne, he was heavily involved with the Men’s Club Volleyball
Team, not only as an active team member and player but also as President and Captain. Ned still enjoys playing in
competitive volleyball tournaments during his summers, along with other activities like basketball, hockey, boxing,
and running. He also loves other languages, cultures and its people – particularly Spanish. Ned spent time in Spain
where he was immersed in the language and culture while also taking classes at the Universidad Pontificia de
Salamanca (Salamanca, Spain). He hopes to visit Spain again in the future.
5|Page