Documente Academic
Documente Profesional
Documente Cultură
Exchange Online
Compliance
Management
Presenter name
Presenter role
This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided
to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in
such packages is strictly prohibited.
The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or
implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond
to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the
accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product,
domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
For more information, see Use of Microsoft Copyrighted Content at
http://www.microsoft.com/about/legal/permissions/
Microsoft, Internet Explorer, Outlook, SkyDrive, Windows Vista, Zune, Xbox 360, DirectX, Windows Server and
Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. All other trademarks are property of their respective owners.
Overview
Auditing
Journal Rules
Objective
In-Place
eDiscovery and
Hold
In-Place
eDiscovery
Exchange
Search
Discovery
Management
Role Group
and
Management
Roles
Discovery
Mailboxes
Interoperatio
n with
SharePoint
Server 2013
10
Using InPlace
eDiscovery
Search can be performed via the Graphical User Interface (GUI) or Shell
o EAC is easier for non-technical users such as Human Resource (HR)
or compliance officers.
In Hybrid deployments
o Use on-premises EAC
o Use on-premises discovery mailbox to copy results
Creating an
In-Place
eDiscovery
search
12
Creating In-Place
eDiscovery
Searches Via
PowerShell
Consideratio
ns When
Using InPlace
eDiscovery
Attachments
Unsearchable items
Safe list
Estimate,
Preview and
Copy
Search
Results
17
Logging
Basic Logging
Enabled by default for all In-Place eDiscovery searches
Includes information about the search and who performed it
Information appears in the body of the email message sent to
the mailbox where the search results are stored, under the
folder created to store search results
Full logging
Includes information about all messages returned by the
search
Information provided in a CSV file attached to the email
message that contains basic logging
Enabled via checkbox when copying search results or via
LogLevel parameter in PowerShell
18
Search and
Destroy
In-Place
eDiscovery
and Hold
20
In-Place Hold
21
In-Place
Hold
22
In-Place
Hold
Limitations
23
In-Place
Hold
Scenarios
What to hold
Scenarios:
24
Placing a
Mailbox on
In-Place
Hold
26
In-Place
Hold and
Mailbox
Quotas
27
In-Place
Hold and
Litigation
Hold
28
Placing a
Mailbox on
In-Place
Hold Via
PowerShell
29
Auditing
30
Auditing
Reports
Reports:
31
Run and
Export
Auditing
Reports
32
Configure
Audit
Logging
Viewing
Audited
Data
Data Loss
Prevention
35
Data Loss
Prevention
Policies
DLP policies:
o Transport rules, actions and exceptions
o Policies can be created, but not activated to allow testing
o Deep content analysis through keyword and expression
evaluation
o Built-in policy templates
o Policy Tips for Outlook and OWA users
36
Establish
Policies to
Protect
Sensitive
Data
37
Sensitive
Information
Types in
DLP Policies
38
Policy Tips
Similar to MailTips
Informs email senders about possible compliance issues when
composing email messages that violates a DLP policy
39
Document
Fingerprintin
g
40
DLP
Fingerprint
Workflow
Fingerprint generation
Fingerprint comparison
41
Fingerprint
Workflow
42
Creating a
document
fingerprint
Using PowerShell
Open PowerShell
Enter the following commands:
Supported
File Types
File Types
Same as Transport rules (DOCX, PPTX, XLSX, others)
See: Supported file types for transport rule scanning
44
Retention Tags
and Retention
Policies
45
Messaging
Records
Manageme
nt Strategy
46
Retention
Tags
47
Types of
Retention
Tags
Retention
Tags in
Outlook and
OWA
50
Retention
Age Limit
and
Retention
Actions
51
How
Retention
Age is
Calculated
52
Retention
Policies
One DPT for voice mail messages with the Delete and
Allow Recovery or Permanently Delete actions.
53
Journaling
54
Journaling
in
Exchange
Online
55
Journal
Rules
56
Creating
Journal
Rules in
EAC
57
Creating
Journal Rule
in
PowerShell
58
Lab: Compliance
Management
59
Module
Review
60
Module
Review
(Answers)
61
Module
Summary
62
Contact
John Doe
Job title goes here
(800) 123-4567
www.microsoft.com/microsoftservices
2013
2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks
in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of
this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR
STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION