2. Information Protection and Control (IPC)
Exchange Server 2010 helps prevent the unauthorized transmission of
sensitive information with tools that can automatically:
MONITOR e-mail for specific content, recipients and other attributes
CONTROL distribution with automated, granular alerts and polices
PROTECT access to data wherever it travels using rights management
PREVENT
• Violations of corporate policy and best practices
• Non-compliance with government and industry regulations
• Loss of intellectual property and proprietary information
• High-profile leaks of private information and customer records
• Damage to corporate brand image and reputation
3. A Wide Range of Granular Controls
• Apply the right level of control based on the sensitivity of the data
• Maximize control and minimize unnecessary user disruptions
Alert Append Protect Redirect
Allow delivery Allow delivery Allow delivery Block
but add a but add a but prevent delivery
warning. disclaimer. forwarding. and redirect.
LESS RESTRICTIVE MORE RESTRICTIVE
Classify Modify Review Block
Allow delivery Allow delivery Block delivery Do not
but apply but modify until deliver.
classification. message. reviewed.
5. Transport Rules
Easily enforce granular policies
If the message...
Is from a member of the group ‘Executives’
And is sent to recipients that are 'Outside the
organization' And contains the keyword ‘Merger’
Do the following...
Redirect message to: arleneh@contoso.com
Except if the message...
Is sent to ‘shanek@contoso.com
• Executed on the Hub Transport Server
• Structured like Inbox rules
• Apply to all messages sent inside and outside the organization
• Configured with simple GUI in Exchange Management Console
6. Transport Rules in Exchange 2010
Attachments Scans size, name AND content! (Office documents)
Classifications (e.g. A/C Privileged); can also act on No Classifications
Message Types IRM protected, Auto-replies, calendaring, voice mail
Supervision Lists Allows/Blocks based on listed recipients
Management Properties Identifies manager and applies policy
User Properties Scans for user attributes (such as department, country)
Moderation Enable review and approval of e-mail before delivery
Apply Disclaimer Add signatures (user attributes + HTML)
Protect Apply rights protection to messages, attachments, voice mail
7. Support for Rights Management
Extend system, user access
Protect automatically by policy
• Apply IRM protection to messages and attachments
• Turn off protection for non-sensitive messages
Maintain compliance and security processes
• Enable multi-mailbox search of IRM-protected messages
• Enable antivirus scanning and transport rules
• Attach decrypted copies to journal reports
Empower users
• Read and reply to protected messages in Outlook Web App
• Search IRM protected messages in Outlook and OWA
• Apply IRM protection to voicemail