Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single...
-
Upload
victoria-kennedy -
Category
Documents
-
view
216 -
download
3
Transcript of Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single...
![Page 1: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/1.jpg)
2
Slide # Slides Presentation
3-13 Exchange Planning Kickoff Exchange Planning Kickoff
14-24 Exchange Planning Summary Exchange Planning Summary
25-39 Exchange Online Protection Exchange Online Protection
40-53 EOP Requirements vs. Feature Mapping
EOP Requirements vs. Feature Mapping
54-66 EOP Kickoff Presentation EOP Kickoff Presentation
67-79 EOP Assessment of the Environment
EOP Assessment of the Environment
80-167 EOP Technical Review EOP Technical Review
168-191 EOP Deployment Planning EOP Deployment Planning
192-202 Exchange DLP Kickoff Presentation Exchange DLP Kickoff Presentation
203-216 DLP Understanding the Environment
DLP Understanding the Environment
217-225 DLP Requirements Gathering DLP Requirements Gathering
226-271 DLP Technical Review DLP Technical Review
272-280 DLP Req. vs. Feature Mapping DLP Reg. vs. Feature Mapping
281-283 DLP Deployment Scenarios DLP Deployment Scenarios
Table of Contents
![Page 2: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/2.jpg)
Exchange Deployment Planning
![Page 3: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/3.jpg)
4
Partner MUST customize prior to deliverySoftware Assurance Planning Services
4
Speaker: Add info here
Title of presentation:
Technical Kickoff Presentation
Length of presentation:
Add info here
Audience: Customer IT Pro
Sales Cycle Alignment:
Engagement
Desired Outcomes:
Kickoff Planning Services engagement Introductions Review agenda
Modular Outline: Add more info hereInstructional slide to Partner:
REMOVE BEFORE PRESENTING TO CUSTOMER
![Page 4: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/4.jpg)
Notes to Presenter: Slide to inform PS partner presenter on how to use and/or customize this deck. This deck contains slide notes on how to the slide. Remove the slide notes if you plan
on leaving this presentation with the customer. Modify the deck as necessary for your presentation
5
Internal Only – REMOVE BEFORE PRESENTING TO CUSTOMER
![Page 5: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/5.jpg)
Exchange Deployment Planning Engagement Kick Off
Software Assurance Planning Services
![Page 6: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/6.jpg)
Agenda
7
Introductions Project Team Engagement Overview / Agenda Q&A
![Page 7: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/7.jpg)
Team {Partner}
8
Name Role
{Partner} Account Team
<Insert name here> Account Executive
<Insert name here> Microsoft Exchange Technical Specialist
<Insert name here> Services Executive
{Partner} Services Team
<Insert name here> Engagement Manager
<Insert name here> Architect
<Insert name here> Consultant
<Insert name here> Technical Account Manager
Customer Sponsor
Customer IT Pros
Business Stakeholders Management
Customer Project Lead
Customer Project
Manager
{Partner} Sponsor
Engagement
Manager
Consultant
![Page 8: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/8.jpg)
Team {Customer}
9
Name Role / Focus area
{CUSTOMER} Core Team
<Insert name here>
Executive Sponsor
<Insert name here>
Project Manager
{CUSTOMER} Technical subject matter experts (SMEs)
<Insert name here>
Engagement Manager
<Insert name here>
Architect
<Insert name here>
Consultant
<Insert name here>
Technical Account Manager
Customer Sponsor
Customer IT Pros
Business Stakeholders Management
Customer Project Lead
Customer Project
Manager
{Partner} Sponsor
Engagement
Manager
Consultant
Name Role / Focus area
Product specific roles
<Insert name here>
Role 1
<Insert name here>
Role 2
<Insert name here>
Role 3
<Insert name here>
Role 4
![Page 9: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/9.jpg)
Participation expectations
Keep to the schedule
Be present
Interact
Ask when things don’t add up
What you get
10
Recommended practices
A plan to get started
Get your questions answered
What we expect
![Page 10: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/10.jpg)
Day 1 Agenda
Deployment Planning Services Agenda
11
Time Topic Description9:00 AM Intro/Kick-off A review of the workshop
and our goals.
9:30 AM Module – Describe Module
10:45 Break
11:00 AM Module – Describe Module
12:00 PM Lunch
1:00 PM Module – Describe Module
1:30 PM Lab/Demo – Describe Lab
2:30 Break
2:45 Lab/Demo – Describe Lab
3:15 PM Lab/Demo – Describe Lab
4:00 Review/Next Steps
![Page 11: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/11.jpg)
Q&A
12
![Page 12: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/12.jpg)
Thank you
13
![Page 13: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/13.jpg)
14
Partner MUST customize prior to deliverySoftware Assurance Planning Services
14
Speaker: Add info here
Title of presentation:
Planning Services Engagement Summary and Plan of Action
Length of presentation:
Add info here
Audience: Customer TDM and IT Pros
Sales Cycle Alignment:
Engagement wrap-up
Desired Outcomes:
Outline the outcomes of the engagement Plan next actions for client Deliver Proposals for ongoing consulting
Modular Outline: Add more info here Instructional slide to Partner: REMOVE BEFORE PRESENTING
TO CUSTOMER
![Page 14: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/14.jpg)
Notes to Presenter: Slide to inform PS partner presenter on how to use and/or customize this deck. This deck contains slide notes on how to use the slides. Remove the slide notes if you
plan on leaving this presentation with the customer. Modify the deck as necessary for your presentation
15
Internal Only – REMOVE BEFORE PRESENTING TO CUSTOMER
![Page 15: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/15.jpg)
Exchange Deployment Planning Engagement SummaryPresenter Name, TitleDate
Software Assurance Planning Services
![Page 16: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/16.jpg)
Agenda
17
Findings Recommendations Next Steps
![Page 17: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/17.jpg)
Discover
Where we are today
18
What did we do? What did we find? What’s next?
Plan DeployTest
Assessment Findings
Validate Design Pilot / Production Deployment
Architecture Design
![Page 18: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/18.jpg)
Findings• Problem and Solution Statement Recap• Notable Current State Items Found• Requirements• Assumptions• Constraints• Issues / Risks
What did we find?
19
![Page 19: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/19.jpg)
Recommendation 1 Recommendation 2 Recommendation 3…
What do we recommend?
20
![Page 20: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/20.jpg)
Partner – insert Solution Concept diagram here• Be prepared to discuss the architecture
Solution Concept Diagram
21
![Page 21: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/21.jpg)
Next step 1 Next step 2 Next step 3…
Next Steps
22
![Page 22: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/22.jpg)
Full Exchange 2013 Architecture Engagement
Proof of Concept Production Pilot Production Deployment
Migration: Connect to our Offerings
23
![Page 23: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/23.jpg)
Thank you
24
![Page 24: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/24.jpg)
Exchange Data loss Prevention & Exchange Online
Protection
![Page 25: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/25.jpg)
Requirements GatheringSpeaker NameTitleOrganization
Exchange Online Protection Deployment Planning and Pilot
![Page 26: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/26.jpg)
Copyright© Microsoft Corporation
• Introduction and context.
• Requirements Discussion.
• Documenting the Requirements.
• Next Steps.
Agenda
29
![Page 27: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/27.jpg)
Copyright© Microsoft Corporation
• Business and technical requirements will be gathered in this session.
• Later in the workshop, these requirements will be mapped against EOP features and settings.
• Final recommendations document will contain a summary of all the requirements gathered during this session.
Introduction and Context
30
![Page 28: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/28.jpg)
Business Requirements
31
# Requirement
BR01
BR02
BR03
BR04
![Page 29: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/29.jpg)
Mail Routing Requirements
32
# Requirement
MRR01
MRR02
MRR03
MRR04
![Page 30: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/30.jpg)
Policy/Compliance Requirements
33
# Requirement
PCR01
PCR02
PCR03
PCR04
![Page 31: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/31.jpg)
Anti-Spam Requirements
34
# Requirement
ASR01
ASR02
ASR03
ASR04
![Page 32: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/32.jpg)
Anti-Malware Requirements
35
# Requirement
AMR01
AMR02
AMR03
AMR04
![Page 33: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/33.jpg)
Reporting Requirements
36
# Requirement
RR01
RR02
RR03
RR04
![Page 34: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/34.jpg)
Administration Requirements
37
# Requirement
AR01
AR02
AR03
AR04
![Page 35: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/35.jpg)
Next Steps…
38
![Page 36: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/36.jpg)
![Page 37: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/37.jpg)
Requirements MappingSpeaker NameTitleOrganization
EOP Deployment Planning and Pilot
![Page 38: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/38.jpg)
Copyright© Microsoft Corporation
• Introduction and context.
• Requirements Vs. Feature/Settings Mapping.
• Next Steps.
Agenda
43
![Page 39: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/39.jpg)
Copyright© Microsoft Corporation
• Business and technical requirements discussed earlier will be reviewed in this session.
• All the requirements will be mapped against EOP features and settings.
• Summary of this discussion will be included in the final recommendation document
Introduction and Context
44
![Page 40: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/40.jpg)
Business Requirements
45
# Requirement Yes/No/Partial
EOP Feature/Setting
BR01
BR02
BR03
BR04
![Page 41: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/41.jpg)
Mail Routing Requirements
46
# Requirement Yes/No/Partial
EOP Feature/Setting
MRR01
MRR02
MRR03
MRR04
![Page 42: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/42.jpg)
Policy/Compliance Requirements
47
# Requirement Yes/No/Partial
EOP Feature/Setting
PCR01
PCR02
PCR03
PCR04
![Page 43: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/43.jpg)
Anti-Spam Requirements
48
# Requirement Yes/No/Partial
EOP Feature/Setting
ASR01
ASR02
ASR03
ASR04
![Page 44: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/44.jpg)
Anti-Malware Requirements
49
# Requirement Yes/No/Partial
EOP Feature/Setting
AMR01
AMR02
AMR03
AMR04
![Page 45: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/45.jpg)
Reporting Requirements
50
# Requirement Yes/No/Partial
EOP Feature/Setting
RR01
RR02
RR03
RR04
![Page 46: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/46.jpg)
Administration Requirements
51
# Requirement Yes/No/Partial
EOP Feature/Setting
AR01
AR02
AR03
AR04
![Page 47: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/47.jpg)
Next Steps…
52
![Page 48: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/48.jpg)
![Page 49: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/49.jpg)
Exchange Online Protection Engagement Kick OffSoftware Assurance Planning Services
![Page 50: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/50.jpg)
57
Agenda
Introductions Project Team Engagement Overview / Agenda Q&A
![Page 51: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/51.jpg)
Team {Partner}
58
Name Role
{Partner} Account Team
<Insert name here> Account Executive
<Insert name here> Microsoft Technical Specialist/Architect
<Insert name here> Services Executive
{Partner} Services Team
<Insert name here> Engagement Manager
<Insert name here> EOP Technical Consultant
{Partner} Sponsor Engagement Manager Consultant
![Page 52: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/52.jpg)
59
Team {Customer}Name Role / Focus area
{CUSTOMER} CoreTeam <Insert name here> Executive Sponsor
<Insert name here> Project Manager
{CUSTOMER} Technical subject matter experts (SMEs)
<Insert name here> IT Manager
<Insert name here> IT Pro
<Insert name here>
<Insert name here>
![Page 53: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/53.jpg)
60
Participation expectations
Keep to the schedule
Be present
Interact
Ask when things don’t add up
What you get
Recommended practices
End to end view
Limited production pilot
Get your questions answered
What we expect
![Page 54: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/54.jpg)
61
Deployment Planning and Limited Pilot3-Day Agenda
![Page 55: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/55.jpg)
62
Day 1 Agenda
Deployment Planning and Limited Pilot
Time Topic Description
9:00 AM Intro/Kick-off A review of the workshop and our goals.
9:15 AM Understanding the environmentUnderstand the solution environment and review the responses to the pre-engagement questionnaire.
10:00 AM Requirements gathering
11:00 AM Break
11:15 AM EOP technical overview Understand the core technical features of EOP
12:30 PM Lunch
1:15 PM EOP Technical overview (continued..)
3:00 Break
3:15 PM Deployment planning.Discuss the various deployment options and identify the one most suitable for the customer.
4:45 PM Solution alignment discussionEnsure that customer requirements are correctly mapped to various EOP features.
![Page 56: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/56.jpg)
63
Day 2 Agenda
Deployment Planning and Limited Pilot
Time Topic Description
9:00 AM Preparing findings and recommendations Deliverable to the customer
12:00 Noon DebriefDiscuss the findings and recommendations with the customer
12:30 PM Lunch
1:15 PM Limited production pilotDeploy EOP in production environment for a limited set of users.
5:30 PM Pilot status checkReview by customer and partner resources to check the status of the limited production pilot.
![Page 57: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/57.jpg)
64
Day 2 Agenda
Deployment Planning and Limited Pilot
Time Topic Description
9:00 AM Preparing findings and recommendations Deliverable to the customer
12:00 Noon DebriefDiscuss the findings and recommendations with the customer
12:30 PM Lunch
1:15 PM Limited production pilotDeploy EOP in production environment for a limited set of users.
5:30 PM Pilot status checkReview by customer and partner resources to check the status of the limited production pilot.
![Page 58: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/58.jpg)
65
Q&A
![Page 59: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/59.jpg)
66
Thank you
![Page 60: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/60.jpg)
Assessment of the EnvironmentSpeaker NameTitleOrganization
Exchange Online Protection Planning Services
![Page 61: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/61.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Messaging Environment.
• Current Secure Email Gateway Solution.
• Current Challenges.
Agenda
70
![Page 62: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/62.jpg)
Copyright© Microsoft Corporation
• This is an interactive session to understand the solution environment.
• During this session environmental factors affecting EOP deployment will be discussed.
• Customer can provide the required details either during the discussions or at the end of the session.
Introduction and Context
71
![Page 63: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/63.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Messaging Environment.
• Current Secure Email Gateway Solution.
• Current Challenges.
Agenda
72
![Page 64: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/64.jpg)
Copyright© Microsoft Corporation
Platform
• Exchange 2XXX• Lotus Domino XXX• Exchange Hybrid• Office 365
Architecture
• Mail flow• Network locations• Firewall rules• DirSync with Azure AD
Messaging Environment
73
![Page 65: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/65.jpg)
Copyright© Microsoft Corporation
Domains
• Number of authoritative domains
• List of authoritative domains
Usage
• Bulk mailing within the organization
• Recent incidents of spam
• Recent incidents of virus outbreak
Messaging Environment
74
![Page 66: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/66.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Messaging Environment.
• Current Secure Email Gateway Solution.
• Current Challenges.
Agenda
75
![Page 67: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/67.jpg)
Copyright© Microsoft Corporation
Platform
• Product/service used• Online components• On-premises components• Use of DKIM
Configuration
• Scanning of outbound and inbound flow
• Anti-virus rules• Anti-spam rules• Allow/block IP list• Safe user list• Handling of quarantined
messages
Current Secure Email Gateway Solution
76
![Page 68: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/68.jpg)
Copyright© Microsoft Corporation
Management
• Administration tools• Reporting• Notifications to
administrators and end users
• Managing quarantined messages
Add-Ons
• E-mail encryption• TLS domains• TLS users• Address rewrite• Content filtering
Current Secure Email Gateway Solution
77
![Page 69: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/69.jpg)
Copyright© Microsoft Corporation
Open Discussion
Current Challenges
78
![Page 70: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/70.jpg)
![Page 71: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/71.jpg)
Exchange Online Protection – Technical OverviewSpeaker NameTitleOrganization
![Page 72: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/72.jpg)
83 Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Tracing
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 73: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/73.jpg)
Copyright© Microsoft Corporation
Introduction
84
• Exchange Online Protection
• is a cloud based email filtering service.
• provides protection against spam and malware.
• includes features to safeguard messaging policy violations.
• Standalone Scenario: EOP can provide protection for any on-premises SMTP email solution.
• Exchange Online Scenario: By default Exchange Online (Office 365) mailboxes are protected by EOP.
• Hybrid Deployment Scenario: EOP can be configured to protect your messaging environment and control mail routing.
![Page 74: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/74.jpg)
85
Comprehensive protectionMulti-engine anti-malware protection Continuously evolving anti-spam protection
Introduction
Enterprise class reliabilityGeographically load-balanced datacenters
Queuing capabilities to help ensure no mail is lost
Live Phone Support
Streamlined administration consoleOffice 365 integration
Detailed reporting
![Page 75: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/75.jpg)
86
• EOP runs on a worldwide network of data centers that are designed to provide the best availability.
• EOP performs load balancing between data centers but only within a region.• In the Americas all email messages are routed through U.S. data
centers.
• In EMEA all messages are routed through EMEA data centers.
• In Asia-Pacific all messages are routed through APAC data centers (CY Q3 2014)
• For the GCC all messages are routed through U.S. data centers.
Geocentric Affinity
![Page 76: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/76.jpg)
87 Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Tracing
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 77: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/77.jpg)
Copyright© Microsoft Corporation
Sign up for the EOP Service• Try before you buy• EOP Subscription Plans
• Standalone• Built into Exchange Online• Exchange Enterprise CAL with
ServicesClick to insert photo.
88
![Page 78: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/78.jpg)
89 Copyright© Microsoft Corporation
Deployment Process - Overview
Verify prerequisite
s
Validate domains
Configure mail flow
Customize spam and
policy settings
Enable mail flow
Monitor and fine tune
![Page 79: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/79.jpg)
90 Copyright© Microsoft Corporation
Prerequisites
Username and password of Office 365 Global Admin
and Exchange Organization
Administrator.
Domain names to be protected by EOP.
Inbound and outbound public IP
addresses.
Open firewall port 25 to Exchange Online
Protection IP Addresses.
Modern web browser.
![Page 80: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/80.jpg)
Copyright© Microsoft Corporation
Domain Validation
• Email domains to be protected should be added in the Office 365 admin center.
• A TXT record is provided for entry into DNS to perform verification.
91
![Page 81: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/81.jpg)
Copyright© Microsoft Corporation
Configure Mail Flow - Standalone• Create an EOP outbound connector
to deliver mail on-premises.
• Create an EOP inbound connector to accept mail from on-premises.
![Page 82: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/82.jpg)
Copyright© Microsoft Corporation
Match subdomainsWhen the match subdomains feature is enabled for a domain, emails can be sent and received for subdomains on this domain
![Page 83: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/83.jpg)
Custom Mail Flow – Connector ScenariosScenario Description
Outbound Smart Hosting
Outbound mail is redirected to an on-premises server that applies additional processing before delivering mail to its final destination.
Regulated Partner with Forced TLS
Forced inbound and outbound transport layer security (TLS) is used to secure communication with a partner.
Conditional Mail Routing
A connector associated with a transport rule routes mail to a specific site.
Hybrid When configuring hybrid deployments manual steps are not recommended for creating connectors. The Office 365 team has created tools to automate the setup process and make it much easier.
![Page 84: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/84.jpg)
95 Copyright© Microsoft Corporation
Enable Mail Flow - Standalone
Change the MX record.
After 72 hours restrict on-premises firewall to accept port 25 traffic
only from EOP.
Create send connector with EOP as smart
host in the on-premises server for
Internet bound emails.
![Page 85: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/85.jpg)
96 Copyright© Microsoft Corporation
Monitor and Fine Tune
• Based on customers needs, is the service operating as expected?
• Make any adjustments to rules or settings as needed.
• Evaluate effectiveness of spam settings.
![Page 86: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/86.jpg)
DEMOConnector Configuration
97
![Page 87: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/87.jpg)
98 Copyright© Microsoft Corporation
Recipient in EOP
Users
• Users are the recipients within your EOP managed domains.
• Transport rules can be applied to users.
• Users can be assigned management roles.
• Users with management role group privileges can access the Exchange admin center (EAC).
Contacts
• Contacts represent recipients outside of the EOP managed domains who can be displayed in the address book.
• Contacts can be used when creating transport rules.
• Can be used with transport rules.
• They can’t sign in to the EAC.
![Page 88: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/88.jpg)
99 Copyright© Microsoft Corporation
Managing Recipients in EOP
Synchronized
• Recommended when company has existing user accounts in an on-premises Active Directory.
• Microsoft Azure AD Directory Sync tool is required.
• Recipients can be viewed as read only in EAC.
Manual
• Add and manage users in EAC• Created and managed directly
in Office 365 admin center. These recipients are not viewable in the EAC.
![Page 89: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/89.jpg)
Directory Synchronization
100
Automated user/group management• Ideal solution for
organizations with on-premises Active Directory.
• Easier creation of rules based on user addresses.
• Allows for use of security group membership for configuration and rules.
• Synchronize Outlook safe/blocked sender lists.
On-premises Exchange Online Protection
Microsoft Azure Directory Sync
![Page 90: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/90.jpg)
DEMOManaging Recipients
101
![Page 91: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/91.jpg)
Copyright© Microsoft Corporation
Admin Roles in EOP• Role based
administration model.
• A user can be added to multiple role groups.
• Each role group can perform specific tasks in EOP.
• Managed from the EAC.
Click to insert photo.
![Page 92: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/92.jpg)
Feature PermissionsEOP Feature Role Group Membership Required
Anti-malware Organization Management ,Hygiene Management
Anti-spam Organization Management ,Hygiene Management
Domains Organization Management ,View-Only Organization Management
Inbound and Outbound connectors
Organization Management
Message trace Organization Management , View-Only Organization Management
Organization configuration Organization Management
QuarantineOrganization Management , View-Only Organization Management , Hygiene Management
Users, Contacts, and Role Groups
Organization Management ,View-Only Organization Management ,Hygiene Management
View reports Organization Management , View-Only Organization Management
![Page 93: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/93.jpg)
DEMOManaging Admin Role Groups
104
![Page 94: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/94.jpg)
Copyright© Microsoft Corporation
Remote PowerShell can be used to manage• users and domains• permissions• anti-spam and quarantine
settings• anti-malware settings• transport rules• Connectors• message tracing• reports
105
![Page 95: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/95.jpg)
106
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Tracing
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 96: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/96.jpg)
107
Copyright© Microsoft Corporation
Auditing Reports
Purpose of Reports
• Help meet regulatory, compliance, and litigation requirements.
• Help troubleshoot configuration and security related issues.
Types of Reports
• The administrator role group report lets you view when a user is added to or removed from membership in an administrator role group.
• The administrator audit log records any action, based on an Exchange Management Shell cmdlet, performed by administrators or users who have been assigned administrative privileges.
![Page 97: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/97.jpg)
DEMOAuditing ReportsAdministrator Audit Log
108
![Page 98: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/98.jpg)
Copyright© Microsoft Corporation
Transport Rules
Regulatory requirements and company policies require applying of messaging restrictions, content filtering, disclaimers etc. on emails.
109
Transport rules are created.
Emails are inspected
by transport
rule agent.
If a message fits any of
the transport
rule condition
an action is taken.
![Page 99: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/99.jpg)
Copyright© Microsoft Corporation
Simple Policy Management
Transport rules consists of
Conditions Actions Exceptions
Conditions
Actions
Exceptions
![Page 100: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/100.jpg)
Copyright© Microsoft Corporation
Flexible rule conditions• Conditions can be formed
based on
Message size.
Attachment type.
Sender and recipient properties.
Contents of message subject, body or attachment.
![Page 101: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/101.jpg)
Copyright© Microsoft Corporation
Flexible rule actions• Actions are taken based on
rule conditions and exceptions.
Block or redirect
messages.
Modify messages.
Enforce TLS encryption.
Route messages through specific
connectors.
![Page 102: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/102.jpg)
Copyright© Microsoft Corporation
Transport Rule options• Rules can be configured to run
for a specific time period time
• Rules can be run in Test Mode
![Page 103: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/103.jpg)
DEMO• Manage transport rules.• Domain based safe sender and
blocked sender list using transport rules.
114
![Page 104: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/104.jpg)
115
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Trace
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 105: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/105.jpg)
Copyright© Microsoft Corporation
1. Connection filtering Blocks up to 80% of all spam based on IP block/allow lists.
2. Sender-Recipient Filtering
Blocks up to 15% of all spam based on internal lists and sender reputation.
3. Content FilteringBlocks up to 5% of all spam based on internal lists and heuristics.
Multi-layered anti-spam protection
![Page 106: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/106.jpg)
EOP Inbound Filtering
Email is routed to Microsoft DC based on MX record resolution
(Contoso-com.mail.protection.outlook.com)
IP-based edge blocks
Reputation blocks
Malware Scanning
Content FilteringSafe
Sender/Recipient
Policy Enforcement
Custom RulesContent scanning
and Heuristics
Bulk Mail Filtering
SPF & Sender ID Filter
Quarantine
International Spam
Additional ASF Options
Customer Feedback
False Positives and
False Negatives
Spam Analysts
Corporate Network
EOP Network
AV Engine 1
AV Engine 2
AV Engine 3
Regular Expression blocks
URL blocks
Connection & Sender-Recipient Filtering
![Page 107: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/107.jpg)
EOP Network
Outbound PoolOutbound Pool
EOP Outbound Filtering
High Risk Delivery Pool
High Score
Outbound Pool
Low ScoreSpam Protection
Content Scanning and Heuristics
Advanced Spam Management
Malware Scanning
Policy Enforcement
Custom Rules
Quarantine
Spam Analysts
Corporate Network
Bulk Delivery Pool
Bulk Mail
Internet
AV Engine 1
AV Engine 2
AV Engine 3
![Page 108: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/108.jpg)
119
Copyright© Microsoft Corporation
Spam Confidence Level(SCL)
When an email goes through the spam filtering
process it is assigned a score known as the Spam
Confidence Level (SCL) rating.
Based on the SCL rating, the EOP service takes
actions upon the messages.
![Page 109: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/109.jpg)
SCL Ratings and Default Actions
120
SCL Rating
Spam Confidence Interpretation Default Action
-1 Non-spam coming from a safe sender, safe recipient, or safe listed IP address (trusted partner)
Deliver the message to the recipients’ inbox.
0, 1 Non-spam because the message was scanned and determined to be clean
Deliver the message to the recipients’ inbox.
5, 6 Spam Deliver the message to the recipients’ Junk Email folder. This can be changed.
9 High confidence spam Deliver the message to the recipients’ Junk Email folder. This can be changed.
Note: In order to ensure that the Move message to Junk Email folder action will work with on-premises mailboxes, you must configure two Exchange Transport rules on your on-premises servers to detect spam headers added by EOP
![Page 110: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/110.jpg)
121
Copyright© Microsoft Corporation
• Creating the transport rules on-premises
Set-OrganizationConfig –SCLJunkThreshold 4
New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" - HeaderContainsWords "SFV:SPM" -SetSCL 6
New-TransportRule "NameForRule" -HeaderContainsMessageHeader "X-Forefront-Antispam-Report" - HeaderContainsWords "SFV:SKS" -SetSCL 6
• End users need to be educated about the use of the Junk Mail folder in Outlook.
Configure Downstream Spam Action
![Page 111: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/111.jpg)
Anti-Spam Policies
122
Connection Filtering
• Based on the reputation of an IP address or a range of IP addresses.
• This policy can be customized by adding IP addresses to Allow and Block lists.
• The “Enable safe list” option prevents missing email from certain well-known senders.
Content Filtering
• Filters inbound messages with inappropriate content.
• Can be customized to filter messages based on languages and countries of origin.
• Advanced spam filtering (ASF) options give administrators the ability to inspect various content attributes of a message.
![Page 112: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/112.jpg)
Anti-Spam Policies
123
Bulk Mails
• By default all Bulk Mails are marked as spam.
• To allow incoming bulk emails, add the SMTP MAIL FROM address to a safe sender list.
Outbound Filtering
• Always enabled and cannot be changed.
• Outbound mails identified as spam are routed via high-risk delivery pool.
• Spamming users are added to blocked list. Service request is required for removal.
• Email notifications can be sent when suspicious or blocked messages have been identified.
![Page 113: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/113.jpg)
Copyright© Microsoft Corporation
Safe/Blocked Senders List• From Outlook and OWA end
users can add specific users and domains to the list
• Messages from blocked senders are not deleted, they land either in Junk folder or quarantine.
• When Directory Sync is run on-premises lists are propagated to the service.
124
![Page 114: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/114.jpg)
Copyright© Microsoft Corporation
International Spam
Messages can be blocked based on regions and languages
125
![Page 115: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/115.jpg)
Copyright© Microsoft Corporation
Directory Based Edge Blocking (DBEB)• Reject messages for invalid
recipients at the service network perimeter.
• If the address is not present in Azure AD, EOP blocks the message before filtering occurs
• NDR is sent to the sender informing them that their message was not delivered
![Page 116: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/116.jpg)
Copyright© Microsoft Corporation
DomainKeys Identified Mail (DKIM)
• EOP will begin supporting inbound validation of DKIM
• DKIM support will start with IPv6, later IPv4 as well
• The results of a DKIM-Signature validation will be stamped in the Authentication-Results header
• Customers will be able to write Exchange Transport Rules (ETRs) on the results of a DKIM validation to filter or route messages as needed. For example:
Authentication-Results: contoso.com; dkim=pass (signature was verified) header.d=example.com;
• In a future release, we will also provide DKIM signing.
![Page 117: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/117.jpg)
DEMO• Connection filtering – customization• Content filtering – custom policy• Outbound filtering – editing default
policy.• Managing Safe Sender Lists for Bulk
Mailers
128
![Page 118: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/118.jpg)
Spam Quarantine
129
• By default content-filtered spam is sent to the recipient’s Junk Email folder. This can be changed to be sent to quarantine.
• Messages are kept in the quarantine for a maximum of 15 days. If required, this number can be lowered.
![Page 119: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/119.jpg)
Spam Quarantine• Advanced
search to locate quarantined messages.
• Available for administrators and end-users.
![Page 120: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/120.jpg)
Spam Quarantine
• False positives can be reported to Microsoft
![Page 121: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/121.jpg)
DEMO• Quarantine features for
administrators and end users.
132
![Page 122: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/122.jpg)
Copyright© Microsoft Corporation
End-User Spam NotificationsFrequency and language of the notifications can be configured.
Not available for messages matching transport rule conditions.
End-users can manage spam from notification emails.
133
![Page 123: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/123.jpg)
End-User Spam Notification• Users can take action on
quarantined mails from their Inbox
![Page 124: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/124.jpg)
Copyright© Microsoft Corporation
Junk Email Reporting Add-in for Outlook• One-click reporting that
enables users to select junk email and submit it to Microsoft for analysis.
• The ability to select and then submit multiple email messages with a single click.
• Selected email messages are moved to the Microsoft Outlook Junk Email folder.
• Multi-language support
![Page 125: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/125.jpg)
DEMO• Configuring end-user spam
notifications.
136
![Page 126: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/126.jpg)
137
Copyright© Microsoft Corporation
Anti-Malware Protection
Layered defense with multiple scan
engines
Real-time threat
response
Fast deployment
of anti-malware
definitions
![Page 127: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/127.jpg)
Copyright© Microsoft Corporation
Simple configuration
Delete messages.
Delete attachments.
Robust, customizable notifications.
Custom policies can be created to change the scope (user, group, or domain) and priority.
Sender notifications
Admin notifications
![Page 128: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/128.jpg)
DEMO• Configuring anti-malware policies
139
![Page 129: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/129.jpg)
140
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Tracing
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 130: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/130.jpg)
Copyright© Microsoft Corporation
Reports in the Office 365 admin center• Reports on mail, spam and malware
volume
• Reports on how custom rules affects mail traffic
141
![Page 131: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/131.jpg)
Copyright© Microsoft Corporation
Enhanced mail protection report• When you click a report linka
new window opens and displays an interactive chart with summary level information.
• Date range is up-to 90 days.• Detailed data of a specific
point in the graph is displayed in tabular format.
![Page 132: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/132.jpg)
Copyright© Microsoft Corporation
Extended detailed reportDetailed data for messages that are older than 7 days is available for download
![Page 133: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/133.jpg)
Copyright© Microsoft Corporation
Requesting Detailed ReportNotification address can be provided
![Page 134: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/134.jpg)
Copyright© Microsoft Corporation
View the report request queue• Pending or completed requests
can be viewed• Pending requests can be
cancelled• Completed requests can be
downloaded
![Page 135: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/135.jpg)
Copyright© Microsoft Corporation
Excel based reporting for detailed analysis• Plugin can be downloaded from
http://www.microsoft.com/en-us/download/details.aspx?id=30716
• Detailed information about mail traffic, spam, malware etc.
![Page 136: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/136.jpg)
Copyright© Microsoft Corporation
Excel based reporting for detailed analysis• Reports matching transport
rules are also available.
![Page 137: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/137.jpg)
DEMO• Mail Protection Reports Using the
Excel Reporting Workbook
148
![Page 138: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/138.jpg)
Message Tracing
• Follows email messages as they travel through EOP.
• Tracks delivery status and actions taken on specific messages.
• Visibility up to 90 days in the past.
• An efficient tool to troubleshoot issues related mail flow and policy changes without contacting Microsoft technical support.
149
![Page 139: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/139.jpg)
DEMO• Running a message trace.
150
![Page 140: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/140.jpg)
151
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Trace
• Best Practices for Configuring EOP
• Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 141: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/141.jpg)
Copyright© Microsoft Corporation
Best Practices
152
Synchronize Recipients using
DirSync.
Restrict on-premises server to accept emails only from EOP.
Add SPF record DNS.
Set up on-premises outbound
connector to send <50 messages.
Make use of anti-spam options.
Fine tune anti-malware options.
Create transport rules for custom rules required for business.
Use reporting tools for
troubleshooting.
![Page 142: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/142.jpg)
153
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Trace
• Best Practices for Configuring EOP
• Exchange Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 143: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/143.jpg)
• DLP policies are simple packages that contain sets of conditions, which are made up of transport rules, actions, and exceptions.
• Helps to identify, monitor, protect sensitive data through deep content analysis.
• Anti-spam, anti-malware and DLP controls integrated into the Exchange admin center and Office 365.
• DLP is a premium feature requiring Exchange Online Plan 2 subscription or Exchange Enterprise Client Access License (CAL)
Data Loss Prevention in Exchange
Easy to use
Monitor
Protect
Identify
![Page 144: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/144.jpg)
Copyright© Microsoft Corporation
DLP policy templates• Templates are an easy way to
get started with DLP.• Templates can be customized
to suit business needs.• Built-in templates available
based on common regulations
Note: You should enable your DLP policies in test mode before running them in your production environment.
![Page 145: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/145.jpg)
Copyright© Microsoft Corporation
Custom DLP Policies
• Custom policies are useful when the required conditions, rules, and actions are not covered in pre-existing DLP templates.
Note: You should enable your DLP policies in test mode before running them in your production environment.
Transport rule conditions
DLP specific action – Policy Tip
Exceptions
DLP specific condition
Transport rule actions
![Page 146: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/146.jpg)
Copyright© Microsoft Corporation
Configuring DLP1. Set up connectors for DLP
using Criteria Based Routing (CBR).
2. Identify DLP Policies for your organization.
3. Set up DLP Policy by either using
1. Built in templates2. Starting a new policy3. Importing a third
party/external policy
4. Edit/Configure classification rules and the enforced actions as required.
![Page 147: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/147.jpg)
158
Copyright© Microsoft Corporation
Agenda
• Introduction
• Getting Started - Basic Management Tasks
• Policy and Compliance Features
• Anti-spam and Anti-malware Protection
• Reporting and Message Trace
• Best Practices for Configuring EOP
• Data Loss Prevention
• Office 365 Message Encryption and S/MIME
![Page 148: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/148.jpg)
Copyright© Microsoft Corporation
Introducing Office 365 Message Encryption
Send EncryptedMail to Anyone!
Customize with Your Brand
SimplifiedAdministration
Easy-to-useUser Experience
![Page 149: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/149.jpg)
Scenario ContosoPharma wants to encrypt any message sent outside the organization, that contain health care information about patient.
Sanjay, a practitioner sends an email that contains the sensitive information to John, who is outside the ContosoPharma organization.
Photo
![Page 150: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/150.jpg)
Copyright© Microsoft Corporation
Rule
Scenario in Action
Receiver mailbox
Open Attachment
Read Message
Reply Message
![Page 151: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/151.jpg)
Copyright© Microsoft Corporation
Strong Integration with Exchange Transport rules
![Page 152: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/152.jpg)
Copyright© Microsoft Corporation
Customize mails with your company’s brand
![Page 153: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/153.jpg)
Copyright© Microsoft Corporation
PowerShell support
ETR to Apply Encryption Action New-transportrule EncryptRule <Condition for which to apply encryption> -ApplyOME $true
ETR to Remove OMENew-transportrule DecryptRule <Condition for which to remove encryption> -RemoveOME $true
To Set Email TextSet-OMEConfiguration -Identity default -EmailText "Encrypted message from ContosoPharma secure messaging system"
To Set Portal Text Set-OMEConfiguration -Identity default -PortalText "ContosoPharma secure e-mail portal"
To Set Logo ImageSet-OMEConfiguration -Identity default -Image (Get-Content "C:\Users\admin\Desktop\consoso.png” -Encoding byte)
To Set DisclaimerSet-OMEConfiguration -Identity default -DisclaimerText "This is ContosoPharma disclaimer statement..."
![Page 154: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/154.jpg)
Copyright© Microsoft Corporation
Plan Requires Price
Purchasing Office 365 Message Encryption
* On-premise customers need to route mails through Exchange Online** Microsoft Azure Rights Management is not available for Office 365 Small Business plans
Office 365 Message Encryption is included with Microsoft Azure Rights Management (MARM)
Office 365 E3, E4
Office 365 E1, K1
Office 365 Exchange Online Plan 2, Plan 1, Kiosk
Office 365 SharePoint Plan 2, Plan 1
Office 365 Midsize Business
Exchange on-premises
Microsoft Azure Rights Management
(MARM)
$2 PUPM
<Included <Included
![Page 155: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/155.jpg)
Copyright© Microsoft Corporation
S/MIME
Secure version of MIME
Secure/Multipurpose Internet Mail Extensions is a standard for public key encryption and signing of MIME data (an email message)
Allows the possibility of sending and/or receiving email encrypted
Only intended recipient can read
the message
Recipient knows that
the message came from the apparent
sender
Recipient knows that the message was not changed
on route
Secrecy Authentication Integrity
![Page 156: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/156.jpg)
![Page 157: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/157.jpg)
Exchange Online Protection – Deployment PlanningSpeaker NameTitleOrganization
![Page 158: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/158.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction and Context
• Setting up the EOP Service
• EOP Deployment Scenarios
• Migration Planning
171
![Page 159: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/159.jpg)
172
Copyright© Microsoft Corporation
Introduction and Context
• We have completed the following activities
• Assessment of current secure email gateway solution.
• Documented the secure email gateway requirements.
• Discussed the technical features of EOP.
• In this session we will discuss
• The deployment scenarios.
• The high level migration approach, if applicable.
![Page 160: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/160.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction and Context
• Setting up for the EOP Service
• EOP Deployment Scenarios
• Migration Planning
173
![Page 161: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/161.jpg)
Copyright© Microsoft Corporation
Sign up for the EOP Service• Try before you buy• EOP Subscription Plans
• Standalone• Part of Exchange Online• Exchange Enterprise CAL with
ServicesClick to insert photo.
174
![Page 162: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/162.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction and Context
• Setting up the EOP Service
• EOP Deployment Scenarios
• Migration Planning
175
![Page 163: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/163.jpg)
Copyright© Microsoft Corporation
Three Possible Scenarios
EOP Standalone Deployment
• Suitable for customer or Microsoft partner hosted messaging solutions
• Works with on-premises deployment of Exchange or any other SMTP based messaging solution.
EOP with Exchange Online
• Suitable when an organization hosts all it’s mailboxes in Exchange online (Office 365).
• Enabled by default for all mailboxes
EOP Hybrid Deployment
• Suitable when an organization distributes mailboxes between on-premises and online (Office 365) Exchange servers.
• Choice of routing mails through EOP or on-premises servers.
![Page 164: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/164.jpg)
Copyright© Microsoft Corporation
EOP Standalone with Inbound and Outbound Connectors• Creation of inbound and outbound
connectors required.
• Can be used in conjunction with other protection or compliance solutions.
![Page 165: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/165.jpg)
Copyright© Microsoft Corporation
Conditional Mail Routing• Suitable for global
organizations with datacentres across the globe.
• Separate connectors for each location.
![Page 166: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/166.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Inbound Routing Option 1• Route mail through the on-
premises organization for both on-premises and Exchange Online mailboxes.Click to insert photo.
![Page 167: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/167.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Inbound Routing Option 2Route mail through Exchange Online for both on-premises and Exchange Online organizations with centralized mail transport disabled (default configuration)
Click to insert photo.
![Page 168: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/168.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Inbound Routing Option 3Route mail through Exchange Online for both on-premises and Exchange Online organizations with centralized mail transport enabled.
![Page 169: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/169.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Outbound Routing for on-premises mailboxesMessages sent from on-premises recipients are always sent directly to Internet recipients using DNS.
![Page 170: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/170.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Outbound Routing for Online Mailboxes, Option 1Mail from Exchange Online senders routed directly to the Internet with centralized mail transport disabled (default configuration).
![Page 171: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/171.jpg)
Copyright© Microsoft Corporation
Hybrid Deployment – Outbound Routing for Online Mailboxes, Option 1Mail from Exchange Online senders routed through on-premises organization with centralized mail transport enabled.
![Page 172: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/172.jpg)
Copyright© Microsoft Corporation
EOP with Outbound Smart Hosting• Works with standalone and
hybrid scenarios.• The smart host is typically an
on-premises protection or compliance solution.
![Page 173: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/173.jpg)
Copyright© Microsoft Corporation
Regulated Partner with Forced TLS• Secure communication with
partners.• Works for on-premises and
online mailboxes.
![Page 174: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/174.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction and Context
• Setting up the EOP Service
• EOP Deployment Scenarios
• Migration Planning
187
![Page 175: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/175.jpg)
188
Copyright© Microsoft Corporation
Planning considerations for Migrating from Other Platforms
Set Expectations
• There is no on-premises version available for EOP.
• Customers may see a change in email patterns such as less false positives but more grey mail.
• Every product needs to be tuned to customers environment.
• Features may function differently.
Porting Configuration
• Irrespective of the source platform, the process for switching to EOP is similar.
• EOP with default settings meets most of the requirements.
• Good opportunity to trim old safe/block lists.
• Content filtering rules may not be needed.
![Page 176: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/176.jpg)
Copyright© Microsoft Corporation
Planning considerations for Migrating from Other PlatformsAllow and Block IP Lists• List of IP addresses
allowed/blocked to send emails may need to be copied over to EOP.
Accepted Domains• List of all domains that
you own need to be reconfigured in EOP.
Do you send bulk mails?• By default all bulk emails
are disabled.
Connector Settings• Smart host IP address.• Any conditional routing
requirements.• Partner domains requiring
TLS
Users and Groups• Directory Synchronization.• Manual creation.
Safe/Blocked Senders List• DirSync can preserve this
list.• PowerShell based
scripting can automate this task (requires Exchange Online).
189
![Page 177: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/177.jpg)
Copyright© Microsoft Corporation
Implementation Project Manager - EOP
• Available for free if the number of seats are > 1000
• Project planning• Up to 90 days of deployment assistance
• What do we do and when?
• Architecture • How to integrate EOP into my environment?
• What are the service best practices?
• How do I port my configuration from my previous solution?
190
![Page 178: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/178.jpg)
![Page 179: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/179.jpg)
Exchange DLP Deployment Planning and Pilot Engagement KickoffSoftware Assurance Planning Services
![Page 180: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/180.jpg)
195
Agenda
Introductions Project Team Engagement Overview / Agenda Q&A
![Page 181: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/181.jpg)
Team {Partner}
196
Name Role
{Partner} Account Team
<Insert name here> Account Executive
<Insert name here> Microsoft Technical Specialist/Architect
<Insert name here> Services Executive
{Partner} Services Team
<Insert name here> Engagement Manager
<Insert name here> Exchange DLP Technical Consultant
{Partner} Sponsor Engagement Manager Consultant
![Page 182: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/182.jpg)
197
Team {Customer}Name Role / Focus area
{CUSTOMER} CoreTeam <Insert name here> Executive Sponsor
<Insert name here> Project Manager
{CUSTOMER} Technical subject matter experts (SMEs)
<Insert name here> IT Manager
<Insert name here> IT Pro
<Insert name here>
<Insert name here>
![Page 183: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/183.jpg)
198
Participation expectations
Keep to the schedule
Be present
Interact
Ask when things don’t add up
What you get
Recommended practices
End to end view
Limited production pilot
Get your questions answered
What we expect
![Page 184: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/184.jpg)
199
Deployment Planning and Limited Production PilotAgenda
![Page 185: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/185.jpg)
200
Engagement AgendaTime Topic Description
9:00 AM Intro/Kick-off A overview of the workshop and pilot. Setting goals and expectations.
9:15 AM Understanding the environment Understand the solution environment and review the responses to the pre-engagement questionnaire.
9:45 AM Requirements gathering Understand the business, technical, operational, compliance, security and other requirements.
10:45 AM Exchange DLP Technical Overview Understand the core technical features of Exchange DLP.
12:45 PM Lunch
1:45 PM Solution alignment Ensure that customer requirements are correctly mapped to various DLP features and capabilities.
2:45 PM Deployment planning Discuss the various deployment strategies. Discussion on how to formulate various DLP policies, rules,policy tips, document fingerprints, reports etc.
3:45 PM Limited production pilot Deploying one DLP policy in production environment.
5:00 PM Debrief and conclusion Preparing Findings and Recommendations document and presenting the same to the customer team.
![Page 186: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/186.jpg)
201
Q&A
![Page 187: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/187.jpg)
202
Thank you
![Page 188: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/188.jpg)
Understanding the EnvironmentSpeaker NameTitleOrganization
Exchange DLP Deployment Planning and Pilot
![Page 189: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/189.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Review of Pre-Engagement Questionnaire.
• Understanding the Messaging Environment.
• Current DLP Solution.
• Current Challenges.
Agenda
206
![Page 190: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/190.jpg)
Copyright© Microsoft Corporation
• This is an interactive session to understand the solution environment.
• During this session environmental factors affecting Exchange DLP deployment will be discussed.
• Customer can provide the required details either during the discussions or at the end of the session.
Introduction and Context
207
![Page 191: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/191.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Review of Pre-Engagement Questionnaire.
• Understanding the Messaging Environment.
• Current DLP Solution.
• Current Challenges.
Agenda
208
![Page 192: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/192.jpg)
Copyright© Microsoft Corporation
Review of Pre-Engagement Questionnaire
209
![Page 193: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/193.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Review of Pre-Engagement Questionnaire.
• Understanding the Messaging Environment.
• Current DLP Solution.
• Current Challenges.
Agenda
210
![Page 194: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/194.jpg)
Copyright© Microsoft Corporation
Messaging Environment
Business environment Number of distinct organizations/business units served by the messaging
solution. Types of sensitive data transmitted over email. Relevant regulations and policies.
Server environment Exchange Server version. Architecture (On-premises, hybrid or online).
Client environment Outlook versions. Distribution of desktop, browser and mobile clients.
211
![Page 195: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/195.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Review of Pre-Engagement Questionnaire.
• Understanding the Messaging Environment.
• Current DLP Solution.
• Current Challenges.
Agenda
212
![Page 196: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/196.jpg)
Copyright© Microsoft Corporation
Existing DLP Solution (if any)
What are the business rules? What are the policies? What are the exceptions?
Do you need a 1 to 1 mapping with the new solution? How integration is done with Exchange? What are the administration tools? What are the reports in use? Are there any notifications configured?
213
![Page 197: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/197.jpg)
Copyright© Microsoft Corporation
• Introductions and context.
• Review of Pre-Engagement Questionnaire.
• Understanding the Messaging Environment.
• Current DLP Solution.
• Current Challenges.
Agenda
214
![Page 198: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/198.jpg)
Copyright© Microsoft Corporation
Open Discussion
Current Challenges
215
![Page 199: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/199.jpg)
![Page 200: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/200.jpg)
Requirements GatheringSpeaker NameTitleOrganization
Exchange DLP Deployment Planning and Pilot
![Page 201: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/201.jpg)
Copyright© Microsoft Corporation
• Introduction and context.
• Requirements Discussion.
• Documenting the Requirements.
• Next Steps.
Agenda
220
![Page 202: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/202.jpg)
Copyright© Microsoft Corporation
• Business, technical and operational requirements will be gathered in this session.
• Later in the workshop, these requirements will be mapped against Exchange DLP features and settings.
• Final recommendations document will contain a summary of all the requirements discussed in this session.
Introduction and Context
221
![Page 203: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/203.jpg)
Business Requirements
222
# Requirement
BR01
BR02
BR03
BR04
![Page 204: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/204.jpg)
Operational Requirements
223
# Requirement
OR01
OR02
OR03
OR04
![Page 205: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/205.jpg)
Technical Requirements
224
# Requirement
TR01
TR02
TR03
TR04
![Page 206: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/206.jpg)
![Page 207: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/207.jpg)
Exchange Data Loss Prevention – Technical OverviewSpeaker NameTitleOrganization
![Page 208: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/208.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction
• Establishing DLP Policies
• Document Fingerprinting
• Policy Tips
• Reporting
![Page 209: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/209.jpg)
What causes a breach?
System glitches
Malicious intent Oops!
39%
24%
37%
97% avoidable!
Online Trust Alliance: 2013 Data Protection and Breach Readiness Guide
![Page 210: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/210.jpg)
Exchange security and protection
Enforce policyProtect communications Simplify management
5
![Page 211: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/211.jpg)
Copyright© Microsoft Corporation
Flexible tools for policy enforcement that provide the right level of control Transport rules
Rights management
Data Loss Prevention
Policy enforcement
7
![Page 212: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/212.jpg)
• DLP policies are simple packages that contain sets of conditions, which are made up of transport rules, actions, and exceptions.
• Helps to identify, monitor, protect sensitive data through deep content analysis and document fingerprinting.
• Policy tips to proactively inform users about violations.
• Easy management using Exchange admin center and Exchange management shell.
Data Loss Prevention in Exchange
Easy to use
Monitor
Protect
Identify
![Page 213: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/213.jpg)
Exchange Online: DLP is a premium feature that requires an Exchange Online Plan 2 subscription. Purchase options include E3, E4, A3,A4, G3 and G4.
Exchange 2013: DLP is a premium feature that requires an Exchange Enterprise Client Access License (CAL).
Exchange Enterprise CAL with Services:
• Includes EOP as well
• DLP policies are applied in Exchange Online.
• Suitable for hybrid deployments.
Buying DLP
232
![Page 214: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/214.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction
• Establishing DLP Policies
• Document Fingerprinting
• Policy Tips
• Reporting
![Page 215: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/215.jpg)
Copyright© Microsoft Corporation
Exchange DLP Pre-requisites
Obtain the appropriate license
for Exchange.
Have at least one sender mailbox.
![Page 216: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/216.jpg)
Copyright© Microsoft Corporation
Caution!
You should enable your DLP policies in test mode before running them in production
environment.
During such tests, it is recommended that you configure sample user
mailboxes and send test messages that invoke your
test policies in order to confirm the results.
Use of DLP policies does not ensure compliance with any
regulation.
After testing is complete, make the necessary
configuration changes in Exchange so the
transmission of information complies with your
organization's policies.
![Page 217: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/217.jpg)
When you activate a transport rule or DLP policy, the Exchange transport rules agent compares all messages that your users send with the rule sets that you create.
How DLP Rules Get Applied
Get content
• Spencer Badillo
• Visa: 4111 1111 1111 1111
• Expires: 2/2012
Regular Expression Analysis
• 4111 1111 1111 1111 -> a 16-digit number is detected
Functional Analysis
• 4111 1111 1111 1111 -> matches checksum
• 1234 1234 1234 1234 -> doesn’t match
Corroborative Evidence
• Keyword Visa is near the number.
• A regular expression for a date (2/2012) is near the number.
Verdict
• There is a regular expression that matches a checksum.
• Additional evidence increases confidence
Example: Checking credit card information in messages
![Page 218: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/218.jpg)
Copyright© Microsoft Corporation
Methods of Establishing DLP Policies
Apply an out of the box
template.
Create a custom policy from
scratch.
Import a policy file created outside of Exchange.
![Page 219: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/219.jpg)
Copyright© Microsoft Corporation
Sensitive Information Types in DLP
Sensitive information types are used in DLP policy rules to detect violations and take appropriate actions.
Microsoft provides an inventory of sensitive information types within Exchange in 3 categories
• PII (E.g. driver license and passport numbers)
• Finance (E.g. bank and credit card numbers)
• Health information (E.g. Social security and health numbers)
The list can be extended by authoring XML files and then importing into Exchange.
![Page 220: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/220.jpg)
Copyright© Microsoft Corporation
Sensitive Information TypesThey are used as conditions in rules inside DLP policies.
![Page 221: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/221.jpg)
Copyright© Microsoft Corporation
DLP Policy Templates The policy templates are models from which you can select or build
your own specific rules to create a policy that meets your needs for data loss prevention.
A policy template includes a range of conditions, rules, and actions that you can choose from in order to create and save an actual DLP policy that will help you inspect messages.
You can use DLP policy templates as a starting point for building DLP policies that help you meet your specific regulatory and business policy needs.
You can modify the templates to meet the specific needs of your organization.
![Page 222: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/222.jpg)
Copyright© Microsoft Corporation
DLP Templates
Exchange has built-in templates covering domains such as financial, PII and health care data.
![Page 223: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/223.jpg)
Copyright© Microsoft Corporation
DLP Rules
DLP templates (policies as well) may contain multiple rules.
![Page 224: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/224.jpg)
Copyright© Microsoft Corporation
Custom DLP Templates
Although Microsoft has provided policy templates and sensitive information types within Exchange for you to get started, your unique business needs can require a customization.
For this reason, Microsoft provides a way for you to create and import your own DLP policy templates or your own sensitive information definitions within classification rule packages..
You can develop DLP policy templates as XML files independent of Microsoft Exchange and then import them using the EAC or the EMS.
![Page 225: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/225.jpg)
Copyright© Microsoft Corporation
Managing DLP Policies
You can add, view, change or remove DLP policies in Microsoft Exchange using EAC or EMS.
You need to be a member of Compliance Management management role group to carry out DLP related tasks.
A policy can be in one of the three modes
Enforce Test DLP policy with Policy Tips
Test DLP policy without Policy Tips
Note: An individual rule within a DLP policy can have its own mode settings. When the mode of a policy is different than the mode of a rule within that policy, the rule setting has priority and will be evaluated according to its mode.
![Page 226: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/226.jpg)
Copyright© Microsoft Corporation
DLP in Exchange admin center Manage existing and new
policies from EAC
View reports
Manage policy tips and document fingerprinting
![Page 227: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/227.jpg)
Copyright© Microsoft Corporation
DLP policy rulesBuilt on transport rules
Supports discovery phase of compliance
Take action to enforce policy
Hold, block, audit & provide notification for email that contains sensitive business data
Transport rule conditions
DLP specific action – Policy Tip
Exceptions
DLP specific condition
Transport rule actions
![Page 228: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/228.jpg)
Copyright© Microsoft Corporation
Managing DLP using PowerShell Connect to Exchange Remote
PowerShell to run these cmdlets
![Page 229: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/229.jpg)
Demo
Create DLP policy from a template Create a custom DLP policy
without any existing rule.
![Page 230: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/230.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction
• Establishing DLP Policies
• Document Fingerprinting
• Policy Tips
• Reporting
![Page 231: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/231.jpg)
Copyright© Microsoft Corporation
Document Fingerprinting
Useful when organizations have a practice of using certain forms to transmit sensitive information.
This is achieved by converting a standard form into a sensitive information type (fingerprint), which can be used to define transport rules and DLP policies.
This process works with any text-based forms used in your organization. After you upload an empty form to be converted to a document
fingerprint and set up a corresponding policy, the DLP agent will detect any documents in outbound mail that match that fingerprint.
![Page 232: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/232.jpg)
Copyright© Microsoft Corporation
Fingerprint creation and matching The DLP agent identifies the
unique word pattern in the document, creates a document fingerprint (Unicode XML file containing a unique hash value representing the original text)
The fingerprint is saved as a data classification in Active Directory.
The fingerprint then becomes a sensitive information type that you can associate with a DLP policy.
![Page 233: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/233.jpg)
Copyright© Microsoft Corporation
Create a document fingerprint EAC allows you to create document
fingerprint in 3 simple steps.
![Page 234: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/234.jpg)
Copyright© Microsoft Corporation
Creating a DLP policy rule using document fingerprint The document fingerprints that
you create appear as sensitive information types while creating rules in a DLP policy.
![Page 235: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/235.jpg)
Demo
Creating document fingerprint. Creating a DLP policy with
document fingerprint.
![Page 236: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/236.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction
• Establishing DLP Policies
• Document Fingerprinting
• Policy Tips
• Reporting
![Page 237: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/237.jpg)
Copyright© Microsoft Corporation
Policy Tips Real time and proactive awareness
about organizational policies on sensitive information
Scans attachments, subject line and body text.
Works with Outlook 2013, OWA and OWA for devices.
Works even when disconnected.
Admin can customize the notifications.
Click to insert photo.
![Page 238: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/238.jpg)
Copyright© Microsoft Corporation
Policy Tips in OWA for devices
![Page 239: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/239.jpg)
Copyright© Microsoft Corporation
Policy Tip in a DLP Rule Policy Tip is implemented as
an action item in a DLP policy rule.
Options include Notify only. Block message. Block unless false positive
override. Block unless silent
override. Block unless explicit
override.
![Page 240: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/240.jpg)
Copyright© Microsoft Corporation
Customizing Policy Tip Message Possible customizations
Notify the sender
Allow the sender to override
Block the message
Link to compliance URL
![Page 241: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/241.jpg)
Demo
Create a notify-only Policy Tip. Create a block-message Policy Tip. Create a block-unless-override
Policy Tip. Create a custom Policy Tip
notification.
![Page 242: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/242.jpg)
Copyright© Microsoft Corporation
Agenda
• Introduction
• Establishing DLP Policies
• Document Fingerprinting
• Policy Tips
• Reporting
![Page 243: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/243.jpg)
Copyright© Microsoft Corporation
DLP Reporting
Reports help you identify, investigate, and resolve DLP policy violations. Reports are generated using the data stored in message tracking logs
(aka delivery reports). Three types of reports are available
Incident reports: Detailed report available in email format about specific incidents violating DLP policy rules.
Summary reports: Available as reports, charts and tables in the admin portal and helps you understand the overall statistics of DLP detections.
Excel based report: An Excel plugin downloadable from the admin portal helps you slice and analyze DLP policy detections data.
![Page 244: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/244.jpg)
Copyright© Microsoft Corporation
Configuring incident reports. Configured through the transport rule
action Generate Incident Report
An incident management mailbox can be configured to receive all such reports.
Pick the message properties to be included in the report.
![Page 245: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/245.jpg)
Copyright© Microsoft Corporation
Reading the incident report details
Katie, [email protected] < [email protected] >
Audit dataClassificationRule details
![Page 246: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/246.jpg)
Copyright© Microsoft Corporation
DLP Summary Reports Available at O365 admin
center
266
Available from the DLP Policy editor
Available from the DLP Policy rules editor
![Page 247: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/247.jpg)
Copyright© Microsoft Corporation
DLP Summary Reports The built-in filters allow custom
view of the data. Click to insert photo.
267
![Page 248: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/248.jpg)
Copyright© Microsoft Corporation
Office 365 Excel Plugin for Exchange Online Reporting Detailed analysis is possible
through various filtering options in Excel.
The Excel plugin is available for download in Office 365 admin center.
![Page 249: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/249.jpg)
Demo
DLP reports in Office 365 admin center.
Using EAC to view DLP reports. Excel based reports
![Page 250: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/250.jpg)
Resources
Exchange 2013 DLP introductionhttp://blogs.technet.com/b/exchange/archive/2012/09/28/introducing-data-loss-prevention-in-the-new-exchange.aspxhttp://technet.microsoft.com/en-us/library/jj150527.aspx
DLP policy templateshttp://technet.microsoft.com/en-us/library/jj657730
Managing DLP policieshttp://technet.microsoft.com/en-us/library/jj673559
OOB DLP policy templateshttp://technet.microsoft.com/en-us/library/jj150530
Policy tips in Exchange 2013http://technet.microsoft.com/en-us/library/jj150512
Supported file types http://technet.microsoft.com/en-us/library/jj674307
MessageStats Quick Guide http://mbidemo.quest.com/Insights/#page/home
![Page 251: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/251.jpg)
© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
![Page 252: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/252.jpg)
Requirements MappingSpeaker NameTitleOrganization
Exchange DLP Deployment Planning and Pilot.
![Page 253: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/253.jpg)
Copyright© Microsoft Corporation
• Introduction.
• Requirements Vs. Feature Mapping.
• Next Steps.
Agenda
275
![Page 254: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/254.jpg)
Copyright© Microsoft Corporation
• Business, operational and technical requirements discussed earlier will be reviewed in this session.
• Discussion on how requirements can be met using Exchange DLP.
• Summary of this discussion will be included in the Findings and Recommendation document
Introduction
276
![Page 255: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/255.jpg)
Business Requirements
277
# Requirement Yes/No/Partial
Exchange DLP Feature/Setting
BR01
BR02
BR03
BR04
![Page 256: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/256.jpg)
Operational Requirements
278
# Requirement Yes/No/Partial
Exchange DLP Feature/Setting
OR01
OR02
OR03
OR04
![Page 257: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/257.jpg)
Technical Requirements
279
# Requirement Yes/No/Partial
Exchange DLP Feature/Setting
TR01
TR02
TR03
TR04
![Page 258: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/258.jpg)
![Page 259: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/259.jpg)
Exchange DLP – Deployment Scenarios.Speaker NameTitleOrganization
![Page 260: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/260.jpg)
Copyright© Microsoft Corporation
Deployment Scenarios
Exchange and DLP Online
Requires Plan 2 subscription.
No installation required.
Exchange and DLP On-Premises
Requires Exchange Enterprise CAL.
Requires Exchange Server 2013 or later*
Exchange On-Premises and DLP Online
Required Exchange Enterprise CAL with services.
Suitable for prior version of Exchange server.
Exchange Hybrid and DLP Online
Exchange Enterprise CAL with services required.
DLP works in the cloud.
282
![Page 261: Notes to Presenter: This slide deck was designed to consolidate the relevant content into a single location Use the Sections to find and present the.](https://reader037.fdocuments.in/reader037/viewer/2022110214/5697bf8d1a28abf838c8c2c4/html5/thumbnails/261.jpg)