SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Microsoft Exchange Products

                                  Mail Attender, Archive Attender, Discovery
                                  Attender & PST Backup Attender

                                  The Attender Utilities suite from Sherpa Software is the perfect solution for extending and
                                  expanding your administrative control of Exchange 2010. Microsoft has introduced a
                                  number of features designed to accommodate the Exchange 2010 larger inbox size, but
                                  when your business requires a more sophisticated approach to retention policies, content
                                  management or searching, Sherpa tools deliver!


                Sherpa Software Supplements Your Microsoft Exchange 2010 Deployment

               Exchange 2010 Features                                             Sherpa Software Features
                      Personal Archive                                                  Personal Archive
A specialized mailbox that is associated with a userʼs primary     Sherpa Tools provide a convenient way of managing content in
mailbox.                                                           the Exchange 2010 Personal Archive:


    •    Users can drag email from PST files into the Personal     •   Mail Attender may be used to identify PST files residing on
         Archive to make them easier to access online.                 desktop computers; then, can initiate rules to transfer mes-
    •    Email items from the primary mailbox can also be              sages from the desktop PST into the Personal Archive.
         moved to the Personal Archive automatically using             Similarly, network based PST data may also be imported
         Retention Polices, which reduces the mailbox size and         into the Personal Archive.
         improves application and network performance.             •   Mail Attender rules may be run on a scheduled basis to
                                                                       apply more complex retention policy criteria to either the
                                                                       mailbox or the Personal Archive.


                        Retention policies                                              Retention policies
You can apply retention settings to specific items, conversa-      Exchange 2010 retention policies offer a limited set of criteria
tions, or folders in an email mailbox.                             for managing your email content and must be developed using
                                                                   the Exchange management shell.
    •    The Exchange administrator configures policies, which
         are displayed in Outlook 2010 inside each email mes-      •   Archive Attender offers a wider set of policy selection cri-
         sage, along with a header that states the applied pol-        teria including message age, message date, message size
         icy and delete date.                                          or message subject.
    •    Two types of policies are available to users: delete      •   For more complex retention needs, Mail Attender condi-
         policies and archive policies. Both types of policies         tions may be used to trigger archiving. Mail Attender offers
         can be combined on the same item or folder.                   over 70 different types of conditional selection criteria.
    •    Administrators can also use archive policies to control   •   Archive Attender provides the ability to move archived
         when messages are automatically moved from a pri-             messages to a storage medium outside of the Exchange
         mary mailbox to the Personal Archive.                         data store.
                                                                   •   Archive Attender policies may be applied directly to the
                                                                       mailbox or Personal Archive by the administrator on a
                                                                       scheduled basis.




                                    FREE trial versions at www.sherpasoftware.com
Extend Your Microsoft Exchange 2010 Administration Capabilities with Mail Attender

               Exchange 2010 Features                                               Sherpa Software Features
                         Legal Hold                                                           Legal Hold
Exchange 2010 enables you to immediately preserve usersʼ            Exchange 2010 requires the use of a hold-in-place strategy
deleted and edited mailbox items (including email, appoint-         where items are ʻlockedʼ in the recipients mailbox until the le-
ments, and tasks) from both their primary mailboxes and Per-        gal hold has expired. Often times administrators would prefer
sonal Archives.                                                     to pursue a less obtrusive type of legal hold policy.


    •    Legal Hold can be set on individual mailboxes or           •   Archive Attender can be used as an integral part of your
         across the enterprise and can be set for a specific            retention strategy. By archiving mail from the Exchange
         time period (for example, you can place a mailbox on           journal mailbox and sequestering it in a designated archive
         hold for 90 days).                                             storage location, you can effectively build a central compli-
    •    Legal Hold also includes an option that automatically          ance repository that may be used for legal hold and search
         alerts users through Outlook 2010 that a hold has              purposes without impacting (or notifying) the end-user that
         been placed on their mailboxes.                                their messages are ʻon-holdʼ.
                      Single Item Restore                                                Single Item Restore
Exchange 2010, administrators can control how long deleted          •   Mail Attender offers administrators complete control over
and edited email is kept in the Recoverable Items folder.               the deletion process. Deletions may be scheduled from
                                                                        particular folders or constrained by any of the Mail Atten-
                                                                        der conditions.
                                                                    •   Mail Attender supports up to four different types of deletion
                                                                        including moving data to the Exchange dumpster.
                     Multi-Mailbox Search                                                Multi-Mailbox Search
Users can search a variety of mailbox items, including email,       The discovery search capability included in Exchange 2010 is
attachments, calendar appointments, tasks, and contacts, as         inherently limited. Sherpaʼs Discovery Attender offers a list of
well as Information Rights Management-protected content.            extensive search features that Exchange does not provide:


    •    Multi-mailbox search can work simultaneously across        •   Permits the searching of over 60 common types of docu-
         both primary mailboxes and Personal Archives with an           ment attachments without the need to install specific iFil-
         easy-to-use, Web-based console.                                ters as Exchange does.
    •    For legal discovery purposes, email located through        •   A host of powerful search criteria including regular expres-
         search can be copied and moved to a specified mail-            sions and fuzzy search terms.
         box, as defined by the administrator, for further inves-   •   The ability to save searches for later reuse or refine the
         tigation.                                                      results set for subsequent searching
    •    Rich filtering capabilities include sender, receiver,      •   Search results may be saved in a variety of different for-
         message type, sent/receive date, and cc/bcc, along             mats (including PST files) to be shared with third parties or
         with advanced regular expressions.                             imported into case management tools.
                                                                    •    In addition to multi-mailbox searching, include network
                                                                         PST files, public folders, archives or file shares in a search
                                                                         request.
             Role-based Access Control (RBAC)                                       Role-based Access Control (RBAC)
Exchange 2010, administrators can grant specific rights to us-      Discovery Attender provides records manager, compliance
ers, such as records managers, compliance officers, and litiga-     officers or litigators the ability to search a wide variety of source
tors perform multi-mailbox searches and other role-specific         material (including mailboxes, PST files and file shares) with a
tasks.                                                              single search query




                                                    www.sherpasoftware.com

Más contenido relacionado

Más de Sherpa Software

Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationSherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

Más de Sherpa Software (12)

Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Último

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfDaniel Santiago Silva Capera
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 

Último (20)

IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdfIaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
IaC & GitOps in a Nutshell - a FridayInANuthshell Episode.pdf
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 

Comparing Exchange 2010 Features to Sherpa Software Exchange Solutions

  • 1. Microsoft Exchange Products Mail Attender, Archive Attender, Discovery Attender & PST Backup Attender The Attender Utilities suite from Sherpa Software is the perfect solution for extending and expanding your administrative control of Exchange 2010. Microsoft has introduced a number of features designed to accommodate the Exchange 2010 larger inbox size, but when your business requires a more sophisticated approach to retention policies, content management or searching, Sherpa tools deliver! Sherpa Software Supplements Your Microsoft Exchange 2010 Deployment Exchange 2010 Features Sherpa Software Features Personal Archive Personal Archive A specialized mailbox that is associated with a userʼs primary Sherpa Tools provide a convenient way of managing content in mailbox. the Exchange 2010 Personal Archive: • Users can drag email from PST files into the Personal • Mail Attender may be used to identify PST files residing on Archive to make them easier to access online. desktop computers; then, can initiate rules to transfer mes- • Email items from the primary mailbox can also be sages from the desktop PST into the Personal Archive. moved to the Personal Archive automatically using Similarly, network based PST data may also be imported Retention Polices, which reduces the mailbox size and into the Personal Archive. improves application and network performance. • Mail Attender rules may be run on a scheduled basis to apply more complex retention policy criteria to either the mailbox or the Personal Archive. Retention policies Retention policies You can apply retention settings to specific items, conversa- Exchange 2010 retention policies offer a limited set of criteria tions, or folders in an email mailbox. for managing your email content and must be developed using the Exchange management shell. • The Exchange administrator configures policies, which are displayed in Outlook 2010 inside each email mes- • Archive Attender offers a wider set of policy selection cri- sage, along with a header that states the applied pol- teria including message age, message date, message size icy and delete date. or message subject. • Two types of policies are available to users: delete • For more complex retention needs, Mail Attender condi- policies and archive policies. Both types of policies tions may be used to trigger archiving. Mail Attender offers can be combined on the same item or folder. over 70 different types of conditional selection criteria. • Administrators can also use archive policies to control • Archive Attender provides the ability to move archived when messages are automatically moved from a pri- messages to a storage medium outside of the Exchange mary mailbox to the Personal Archive. data store. • Archive Attender policies may be applied directly to the mailbox or Personal Archive by the administrator on a scheduled basis. FREE trial versions at www.sherpasoftware.com
  • 2. Extend Your Microsoft Exchange 2010 Administration Capabilities with Mail Attender Exchange 2010 Features Sherpa Software Features Legal Hold Legal Hold Exchange 2010 enables you to immediately preserve usersʼ Exchange 2010 requires the use of a hold-in-place strategy deleted and edited mailbox items (including email, appoint- where items are ʻlockedʼ in the recipients mailbox until the le- ments, and tasks) from both their primary mailboxes and Per- gal hold has expired. Often times administrators would prefer sonal Archives. to pursue a less obtrusive type of legal hold policy. • Legal Hold can be set on individual mailboxes or • Archive Attender can be used as an integral part of your across the enterprise and can be set for a specific retention strategy. By archiving mail from the Exchange time period (for example, you can place a mailbox on journal mailbox and sequestering it in a designated archive hold for 90 days). storage location, you can effectively build a central compli- • Legal Hold also includes an option that automatically ance repository that may be used for legal hold and search alerts users through Outlook 2010 that a hold has purposes without impacting (or notifying) the end-user that been placed on their mailboxes. their messages are ʻon-holdʼ. Single Item Restore Single Item Restore Exchange 2010, administrators can control how long deleted • Mail Attender offers administrators complete control over and edited email is kept in the Recoverable Items folder. the deletion process. Deletions may be scheduled from particular folders or constrained by any of the Mail Atten- der conditions. • Mail Attender supports up to four different types of deletion including moving data to the Exchange dumpster. Multi-Mailbox Search Multi-Mailbox Search Users can search a variety of mailbox items, including email, The discovery search capability included in Exchange 2010 is attachments, calendar appointments, tasks, and contacts, as inherently limited. Sherpaʼs Discovery Attender offers a list of well as Information Rights Management-protected content. extensive search features that Exchange does not provide: • Multi-mailbox search can work simultaneously across • Permits the searching of over 60 common types of docu- both primary mailboxes and Personal Archives with an ment attachments without the need to install specific iFil- easy-to-use, Web-based console. ters as Exchange does. • For legal discovery purposes, email located through • A host of powerful search criteria including regular expres- search can be copied and moved to a specified mail- sions and fuzzy search terms. box, as defined by the administrator, for further inves- • The ability to save searches for later reuse or refine the tigation. results set for subsequent searching • Rich filtering capabilities include sender, receiver, • Search results may be saved in a variety of different for- message type, sent/receive date, and cc/bcc, along mats (including PST files) to be shared with third parties or with advanced regular expressions. imported into case management tools. • In addition to multi-mailbox searching, include network PST files, public folders, archives or file shares in a search request. Role-based Access Control (RBAC) Role-based Access Control (RBAC) Exchange 2010, administrators can grant specific rights to us- Discovery Attender provides records manager, compliance ers, such as records managers, compliance officers, and litiga- officers or litigators the ability to search a wide variety of source tors perform multi-mailbox searches and other role-specific material (including mailboxes, PST files and file shares) with a tasks. single search query www.sherpasoftware.com