1 / 36

Exchange Deployment Planning Services

Exchange 2010 Overview Goals. The Exchange 2010 Overview module has the following goals:Overview of Exchange 2010Business Value of Exchange 2010. Ideal audience for this workshopMessaging SMENetworking SMESecurity SME. Exchange 2010 Overview Audience. Exchange 2010 Overview. After this module

kedem
Télécharger la présentation

Exchange Deployment Planning Services

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Exchange Deployment Planning Services Key Message The goal of this presentation is to provide the audience with a basic overview of Exchange 2010 Server, with SP1 updateKey Message The goal of this presentation is to provide the audience with a basic overview of Exchange 2010 Server, with SP1 update

    2. Exchange 2010 Overview Goals Slide Objective: To explain the overall goals of the Exchange 2010 planning module. Instructor Notes: This module will cover basic planning and role placement for Exchange 2010 Server. Answer questions and keep the dialogue open but be aware of the topics that will be covered later and try not to go deep into them at this time. Slide Objective: To explain the overall goals of the Exchange 2010 planning module. Instructor Notes: This module will cover basic planning and role placement for Exchange 2010 Server. Answer questions and keep the dialogue open but be aware of the topics that will be covered later and try not to go deep into them at this time.

    3. Exchange 2010 Overview Audience Slide Objective: To show the ideal audience for this module. Instructor Notes: This is the recommended audience for the module. Do not be overly concerned if the group does not match the ideal audience. During your time onsite you can have conversations with different resources to get questions answered. Slide Objective: To show the ideal audience for this module. Instructor Notes: This is the recommended audience for the module. Do not be overly concerned if the group does not match the ideal audience. During your time onsite you can have conversations with different resources to get questions answered.

    4. Exchange 2010 Overview Slide Objective: To summarize the desired end result of the module. Instructor Notes: This module is planning/design focused. The end of the module provides the opportunity to work with the team to whiteboard high level designs for their organization. Emphasize that the “actual” production design would be a task of the migration effort. Designs discussed here are high level logical INITIAL designs. They are intended to aid with planning discussions, reveal tasks or roadblocks, and serve as an educational exercise. Designs are not at a level necessary for deployment or budgeting and will require much more detailed work when the actual project effort is realized. Answer questions and keep the dialogue open but be aware of the topics that will be covered later. Slide Objective: To summarize the desired end result of the module. Instructor Notes: This module is planning/design focused. The end of the module provides the opportunity to work with the team to whiteboard high level designs for their organization. Emphasize that the “actual” production design would be a task of the migration effort. Designs discussed here are high level logical INITIAL designs. They are intended to aid with planning discussions, reveal tasks or roadblocks, and serve as an educational exercise. Designs are not at a level necessary for deployment or budgeting and will require much more detailed work when the actual project effort is realized. Answer questions and keep the dialogue open but be aware of the topics that will be covered later.

    5. Strategic Business Challenges Situation Customers are facing a range of strategic business challenges in their effort to compete in this new world of work Slide objective Set context and understand of the key customer pain points we are seeking to help address with our investments in Exchange 2010 Talking points It should come as no surprise that companies of any size are faced with a number of strategic business challenges as these organizations seek to compete in this new world of work. This includes transforming IT into a strategic and competitive asset by driving down the costs and operational overhead of your critical infrastructure investments. Giving your people the ability to connect and access the information they want, whenever they need it, wherever they are. All while managing the industry regulations that place scrutiny on how you control and manage the access your highly distributed workforce has to this information. Situation Customers are facing a range of strategic business challenges in their effort to compete in this new world of work Slide objective Set context and understand of the key customer pain points we are seeking to help address with our investments in Exchange 2010 Talking points It should come as no surprise that companies of any size are faced with a number of strategic business challenges as these organizations seek to compete in this new world of work. This includes transforming IT into a strategic and competitive asset by driving down the costs and operational overhead of your critical infrastructure investments. Giving your people the ability to connect and access the information they want, whenever they need it, wherever they are. All while managing the industry regulations that place scrutiny on how you control and manage the access your highly distributed workforce has to this information.

    6. Exchange Server 2010 Slide Objective: Instructor Notes: Slide Objective: Instructor Notes:

    7. Flexible and Reliable Situation: E-mail is business-critical and continuous availability is a must. Additionally, businesses need the flexibility to deploy e-mail in ways that meet specific and ever-changing needs. Slide Objective: Show how Exchange 2010 meets customer needs for flexible, reliable messaging solution. Talking Points: Flexible and Reliable Flexibility to tailor your deployment based on your unique needs and easily keep e-mail continuously available for your users. Core Exchange platform innovations include a new unified approach to high availability and disaster recovery. Through such features as Database Availability Groups and online mailbox moves, you can more easily and confidently implement mailbox. resiliency with database-level replication, maintenance, and failover, all within familiar Exchange management tools. With online mailbox moves, users can remain connected and productive during mailbox moves between Exchange servers. Role based security model allows you to delegate common or specialized tasks to users without giving them full admin rights. For example, users can create and maintain their own e-mail distribution groups without having to call the helpdesk. ~90% reduction in disk IO overhead compared to Exchange 2003 enables more storage hardware options, from traditional storage area networks (SANs) to desktop-class direct attached storage, enabling you to select the storage solution that offers you the best return on investment and cost savings. Situation: E-mail is business-critical and continuous availability is a must. Additionally, businesses need the flexibility to deploy e-mail in ways that meet specific and ever-changing needs. Slide Objective: Show how Exchange 2010 meets customer needs for flexible, reliable messaging solution. Talking Points: Flexible and Reliable Flexibility to tailor your deployment based on your unique needs and easily keep e-mail continuously available for your users. Core Exchange platform innovations include a new unified approach to high availability and disaster recovery. Through such features as Database Availability Groups and online mailbox moves, you can more easily and confidently implement mailbox. resiliency with database-level replication, maintenance, and failover, all within familiar Exchange management tools. With online mailbox moves, users can remain connected and productive during mailbox moves between Exchange servers. Role based security model allows you to delegate common or specialized tasks to users without giving them full admin rights. For example, users can create and maintain their own e-mail distribution groups without having to call the helpdesk. ~90% reduction in disk IO overhead compared to Exchange 2003 enables more storage hardware options, from traditional storage area networks (SANs) to desktop-class direct attached storage, enabling you to select the storage solution that offers you the best return on investment and cost savings.

    8. Mailbox Resiliency Evolution of Continuous Replication technology Reduce backup frequency through up to 16 replicas of each database Can be deployed on a range of storage options Situation: As the importance of e-mail communications in today’s workplace continues to grow, companies count on their IT staff to prevent e-mail outages and data loss. Traditionally, customers have been required to deploy expensive shared-storage clustering and purchase 3rd party data replication products to provide full redundancy of Exchange Server services and data. Exchange Server 2007 introduced a built-in data replication technology called Continuous Replication, which significantly reduced the cost of deploying a highly available Exchange infrastructure. Running a highly available Exchange infrastructure still requires a great deal of time and expertise, because integration between Exchange Server and Windows Clustering is not seamless. Companies want an easier way to replicate their e-mail data to a remote location, in order protect their Exchange environment against site-level disasters.   Slide Objective: Position the new HA model as the evolution of previous HA methods, with significantly less cost and complexity.   Talking Points: Exchange 2010 uses the same Continuous Replication technology found in Exchange Server 2007, combining on-site data replication (CCR) and off-site data replication (SCR) into a single framework called a “Database Availability Group.” Exchange Server Database Availability Groups handle all aspects of clustering internally. There is no need to manage failover clustering separately in Windows Server. Administrators can add replicated database copies incrementally (up to 16 total), and Exchange switches between these copies automatically as needed to maintain availability. Mailbox servers involved in clustering can host other Exchange roles (Client Access, Hub Transport, etc), so full redundancy of Exchange services and data can be achieved with just two servers. Legacy Exchange clustering (Single copy clustering, which was the only clustering option in Exchange 2000 Server and Exchange Server 2003) is being retired in favor of Exchange Server 2007-style clustering. 3rd party replication products will still be supported. The new high availability architecture provides simplified recovery from a variety of failures (disk-level, server-level, and datacenter-level), and can be deployed on a variety of storage types (as described in the previous slide).Situation: As the importance of e-mail communications in today’s workplace continues to grow, companies count on their IT staff to prevent e-mail outages and data loss. Traditionally, customers have been required to deploy expensive shared-storage clustering and purchase 3rd party data replication products to provide full redundancy of Exchange Server services and data. Exchange Server 2007 introduced a built-in data replication technology called Continuous Replication, which significantly reduced the cost of deploying a highly available Exchange infrastructure. Running a highly available Exchange infrastructure still requires a great deal of time and expertise, because integration between Exchange Server and Windows Clustering is not seamless. Companies want an easier way to replicate their e-mail data to a remote location, in order protect their Exchange environment against site-level disasters.   Slide Objective: Position the new HA model as the evolution of previous HA methods, with significantly less cost and complexity.   Talking Points: Exchange 2010 uses the same Continuous Replication technology found in Exchange Server 2007, combining on-site data replication (CCR) and off-site data replication (SCR) into a single framework called a “Database Availability Group.” Exchange Server Database Availability Groups handle all aspects of clustering internally. There is no need to manage failover clustering separately in Windows Server. Administrators can add replicated database copies incrementally (up to 16 total), and Exchange switches between these copies automatically as needed to maintain availability. Mailbox servers involved in clustering can host other Exchange roles (Client Access, Hub Transport, etc), so full redundancy of Exchange services and data can be achieved with just two servers. Legacy Exchange clustering (Single copy clustering, which was the only clustering option in Exchange 2000 Server and Exchange Server 2003) is being retired in favor of Exchange Server 2007-style clustering. 3rd party replication products will still be supported. The new high availability architecture provides simplified recovery from a variety of failures (disk-level, server-level, and datacenter-level), and can be deployed on a variety of storage types (as described in the previous slide).

    9. Mailbox Resiliency 9 Situation: Administrators commonly move mailboxes between servers and databases as part of maintenance activities or when migrating between Exchange versions. Currently, when an administrator moves a mailbox, this takes the user offline for the duration of the move, leaving them no access to e-mail. As mailbox sizes have grown, mailboxes take longer to move, so administrators have been forced to perform mailbox moves at night and on weekends to minimize disruptions for end users.   Slide Objective: Describe how administrators can use the new online move mailbox process to perform Exchange maintenance and migrations without sacrificing their evenings and weekends.   Talking Points: In Exchange 2010, mailbox moves can be done in online mode: users can send, receive, and read mail while the contents of their mailboxes are moved to a new location. Maintenance activities can now be performed during the day, rather than a nighttime or weekend maintenance window. Migration to Exchange 2010 (whether Exchange 2010 is deployed on-premise or online) can be accomplished faster and with less end user disruption.  Situation: Administrators commonly move mailboxes between servers and databases as part of maintenance activities or when migrating between Exchange versions. Currently, when an administrator moves a mailbox, this takes the user offline for the duration of the move, leaving them no access to e-mail. As mailbox sizes have grown, mailboxes take longer to move, so administrators have been forced to perform mailbox moves at night and on weekends to minimize disruptions for end users.   Slide Objective: Describe how administrators can use the new online move mailbox process to perform Exchange maintenance and migrations without sacrificing their evenings and weekends.   Talking Points: In Exchange 2010, mailbox moves can be done in online mode: users can send, receive, and read mail while the contents of their mailboxes are moved to a new location. Maintenance activities can now be performed during the day, rather than a nighttime or weekend maintenance window. Migration to Exchange 2010 (whether Exchange 2010 is deployed on-premise or online) can be accomplished faster and with less end user disruption.  

    10. Simplify Administration Situation: Delegated administration has greatly improved with each release of Exchange Server, but Exchange 2007 still required modification of ACL’s to create specialized administrative roles (i.e. Compliance Officer role). In Exchange 2003, managing permissions required customization of ACL’s (about 560 ACE’s in total). A whole whitepaper dedicated to ACL modification. In Exchange 2007, property sets made it easier, but doing split permissions was still complicated and required ACL modification. A lengthy E2k7 whitepaper was written how to do this for Unified Messaging. Permissions were focused on AD objects, and didn’t map 1:1 with tasks.   Slide Objective: Exchange 2010 RBAC capabilities allow Exchange administrators to easily create specialized administrative roles. This delegated administration.   Talking Points: RBAC simplifies the administrators’ ability to create specialized roles with specialized actions. For example: Creating a helpdesk administrator role who only has the ability to create new mailboxes or change mailbox quota or message size limits Creating a specialized Telephony Specialist role, whose permissions are limited to managing UM dial plans Creating a specialized compliance officer role, whose permissions are limited to performing cross-mailbox searches for legal discovery Creating a human resources role, whose permissions are limited to only able to update employee contact information Creating a branch office administrator role, whose only permissions are to modify details for mailboxes within the specific branch (Organizational Unit or OU) Roles-Based Access Control is simple to manage. Administrators will use the Exchange Management Shell to: Create Roles to define/grant the set of operations for a specific user (i.e. ability to create a new mailbox, or set mailbox quota limit). Define Scope of where the operations can be run (i.e. a specific organizational unit, like North America OU or Finance Dept). Assign the roles and scope to a set of users (i.e. Unified Messaging Admin, Helpdesk Admin, Compliance Officer, etc…). What required an entire whitepaper (in Exchange Server 2007) to create a specialized Unified Messaging role, can now be done in Exchange 2010 with a single cmdlet in the Exchange Management Shell. Situation: Delegated administration has greatly improved with each release of Exchange Server, but Exchange 2007 still required modification of ACL’s to create specialized administrative roles (i.e. Compliance Officer role). In Exchange 2003, managing permissions required customization of ACL’s (about 560 ACE’s in total). A whole whitepaper dedicated to ACL modification. In Exchange 2007, property sets made it easier, but doing split permissions was still complicated and required ACL modification. A lengthy E2k7 whitepaper was written how to do this for Unified Messaging. Permissions were focused on AD objects, and didn’t map 1:1 with tasks.   Slide Objective: Exchange 2010 RBAC capabilities allow Exchange administrators to easily create specialized administrative roles. This delegated administration.   Talking Points: RBAC simplifies the administrators’ ability to create specialized roles with specialized actions. For example: Creating a helpdesk administrator role who only has the ability to create new mailboxes or change mailbox quota or message size limits Creating a specialized Telephony Specialist role, whose permissions are limited to managing UM dial plans Creating a specialized compliance officer role, whose permissions are limited to performing cross-mailbox searches for legal discovery Creating a human resources role, whose permissions are limited to only able to update employee contact information Creating a branch office administrator role, whose only permissions are to modify details for mailboxes within the specific branch (Organizational Unit or OU) Roles-Based Access Control is simple to manage. Administrators will use the Exchange Management Shell to: Create Roles to define/grant the set of operations for a specific user (i.e. ability to create a new mailbox, or set mailbox quota limit). Define Scope of where the operations can be run (i.e. a specific organizational unit, like North America OU or Finance Dept). Assign the roles and scope to a set of users (i.e. Unified Messaging Admin, Helpdesk Admin, Compliance Officer, etc…). What required an entire whitepaper (in Exchange Server 2007) to create a specialized Unified Messaging role, can now be done in Exchange 2010 with a single cmdlet in the Exchange Management Shell.

    11. Simplify Administration Situation: The largest percentage of helpdesk calls incurred by an organization using Exchange include: Distribution Group management, message tracking, changes to personal information in address book, and other similar tasks. The annual cost of helpdesk support staff for e-mail systems with 7,500 mailboxes is approximately $20/mailbox. This cost goes up the smaller the organization. (“Email Support Staff Requirements and Costs: A Survey of 136 Organizations”, Ferris Research, June 2008).   Slide Objective: Exchange 2010 RBAC capabilities allow Exchange administrators to give selective self-management capabilities to end-users. By moving self-service tasks to end-users, organizations can reduce the costs for helpdesk support, and allow IT staff to focus on more important tasks.   Talking Points: RBAC allows IT administrators to move specific self-service tasks to end-users. Distribution Group management – End-users can create new DGs, manage memberships and ownership, as well as delete DGs. Message tracking – End-users can track delivery receipt information of all messages sent. Editing personal information in address book – End-users can modify select user information, such as mobile phone number. End-user self-service management is performed through a web-based management interface (aka. Exchange Control Panel). Other typical end-user tasks/options will be moved from to this web-based management interface, such as: Out of Office, Inbox Rules, Mobile device management, etc…Situation: The largest percentage of helpdesk calls incurred by an organization using Exchange include: Distribution Group management, message tracking, changes to personal information in address book, and other similar tasks. The annual cost of helpdesk support staff for e-mail systems with 7,500 mailboxes is approximately $20/mailbox. This cost goes up the smaller the organization. (“Email Support Staff Requirements and Costs: A Survey of 136 Organizations”, Ferris Research, June 2008).   Slide Objective: Exchange 2010 RBAC capabilities allow Exchange administrators to give selective self-management capabilities to end-users. By moving self-service tasks to end-users, organizations can reduce the costs for helpdesk support, and allow IT staff to focus on more important tasks.   Talking Points: RBAC allows IT administrators to move specific self-service tasks to end-users. Distribution Group management – End-users can create new DGs, manage memberships and ownership, as well as delete DGs. Message tracking – End-users can track delivery receipt information of all messages sent. Editing personal information in address book – End-users can modify select user information, such as mobile phone number. End-user self-service management is performed through a web-based management interface (aka. Exchange Control Panel). Other typical end-user tasks/options will be moved from to this web-based management interface, such as: Out of Office, Inbox Rules, Mobile device management, etc…

    12. Deployment Flexibility Situation: Employees wonder why they can’t get large (multi-gigabyte) storage limits for their work email like they can for their personal e-mail accounts (Hotmail, Yahoo, Google, etc.). Exchange Server 2007 enabled organizations deploy new storage configurations (Direct Attached storage) and offer larger mailboxes to their employees. Storage costs still remain a major expense in most Exchange environments.   Slide Objective: Emphasize that Exchange 2010 provides administrators unprecedented flexibility in choosing a storage architecture.   Talking Points: With Exchange Server 2003, if you wanted to deploy a highly available (clustered) infrastructure, the only storage option available was a Storage Area Network (SAN). Exchange Server 2007 added the ability to use Direct Attached Storage in a clustered Exchange deployment, and reductions in disk I/O allowed greater freedom in disk choice. Exchange 2010 includes additional improvements to performance, reliability, and high availability that enable an even wider range of storage options: Exchange 2010 delivers a 70% reduction in disk I/O from Exchange 2007 levels. This means that more disks meet the minimum performance required to run Exchange. I/O patterns are optimized so that disk writes do not come in bursts. This removes a barrier that had previously limited the use of SATA (desktop class) disks. Exchange 2010 is more resilient to storage problems. When corruption is caused by minor disk faults, Exchange automatically repairs the affected database pages using one of the database copies configured for high availability. When Exchange 2010 is deployed with advanced high availability (3+ replicated database copies), RAID-less architectures can be used, resulting in dramatic cost savings. This flexibility of storage choice gives administrators the freedom to deploy large (multi-gigabyte) mailboxes without breaking their hardware budgets. Situation: Employees wonder why they can’t get large (multi-gigabyte) storage limits for their work email like they can for their personal e-mail accounts (Hotmail, Yahoo, Google, etc.). Exchange Server 2007 enabled organizations deploy new storage configurations (Direct Attached storage) and offer larger mailboxes to their employees. Storage costs still remain a major expense in most Exchange environments.   Slide Objective: Emphasize that Exchange 2010 provides administrators unprecedented flexibility in choosing a storage architecture.   Talking Points: With Exchange Server 2003, if you wanted to deploy a highly available (clustered) infrastructure, the only storage option available was a Storage Area Network (SAN). Exchange Server 2007 added the ability to use Direct Attached Storage in a clustered Exchange deployment, and reductions in disk I/O allowed greater freedom in disk choice. Exchange 2010 includes additional improvements to performance, reliability, and high availability that enable an even wider range of storage options: Exchange 2010 delivers a 70% reduction in disk I/O from Exchange 2007 levels. This means that more disks meet the minimum performance required to run Exchange. I/O patterns are optimized so that disk writes do not come in bursts. This removes a barrier that had previously limited the use of SATA (desktop class) disks. Exchange 2010 is more resilient to storage problems. When corruption is caused by minor disk faults, Exchange automatically repairs the affected database pages using one of the database copies configured for high availability. When Exchange 2010 is deployed with advanced high availability (3+ replicated database copies), RAID-less architectures can be used, resulting in dramatic cost savings. This flexibility of storage choice gives administrators the freedom to deploy large (multi-gigabyte) mailboxes without breaking their hardware budgets.

    13. Deployment Flexibility Situation: Customers are looking for a way to stage an Exchange deployment as well as make the right decisions around securing the platform and reducing surface area for critical, Internet facing capabilities.   Slide Objective: Highlight the flexibility and control a role based deployment model helps reduce installation time and ease rollout.   Talking Points: Like Exchange Server 2007, Exchange 2010 is a modular system of five server roles–Edge Transport, Hub Transport, Mailbox, Client Access, and Unified Messaging – that reduces the time required for installation; minimizes manual, post-install configuration by the administrator, and limits the surface area available for attack to increase security. Administrators also gain the flexibility to deploy only the features and services necessary on a given server and manage accordingly. All server roles, with the exception of Edge Transport, can be deployed on a single server, and only the Hub Transport and Mailbox server roles are required for Exchange Server installation.Situation: Customers are looking for a way to stage an Exchange deployment as well as make the right decisions around securing the platform and reducing surface area for critical, Internet facing capabilities.   Slide Objective: Highlight the flexibility and control a role based deployment model helps reduce installation time and ease rollout.   Talking Points: Like Exchange Server 2007, Exchange 2010 is a modular system of five server roles–Edge Transport, Hub Transport, Mailbox, Client Access, and Unified Messaging – that reduces the time required for installation; minimizes manual, post-install configuration by the administrator, and limits the surface area available for attack to increase security. Administrators also gain the flexibility to deploy only the features and services necessary on a given server and manage accordingly. All server roles, with the exception of Edge Transport, can be deployed on a single server, and only the Hub Transport and Mailbox server roles are required for Exchange Server installation.

    14. Added in Service Pack 1 New ECP UI Capabilities that were previously available via PowerShell only or available in the EMC which restricted the ability of an IT Pro to delegate these tasks to non-admins via ECP and prevented these tasks from being exposed in management UI for the tenant admin. Improved HA Improved Continuous Replication (Block Mode) An enhanced version of Continuous Replication which reduces data loss during a failover event. When passive mailbox copies are up to date, as the active database is updated, each update written to the database log file is also shipped to the passive mailbox copies. In the event of a failure, the passive database copy is updated with the latest log updates which minimizes data loss. Datacenter Resilience Improved support for 2-node Datacenter resilient topologies ( Now supports Datacenter Activation Coordinator mode (DAC) Mode with two servers in a DAG ) Quality Improvements Faster failovers with improved post-failover client experience (Failover drives the database to a clean shutdown by playing all logs. The mount process then simply brings database up, with no recovery required, which speeds up the failover time. ) Mailbox database redistribution (New script which can move active mailbox databases back to the copy with the highest activation preference)New ECP UI Capabilities that were previously available via PowerShell only or available in the EMC which restricted the ability of an IT Pro to delegate these tasks to non-admins via ECP and prevented these tasks from being exposed in management UI for the tenant admin. Improved HA Improved Continuous Replication (Block Mode) An enhanced version of Continuous Replication which reduces data loss during a failover event. When passive mailbox copies are up to date, as the active database is updated, each update written to the database log file is also shipped to the passive mailbox copies. In the event of a failure, the passive database copy is updated with the latest log updates which minimizes data loss. Datacenter Resilience Improved support for 2-node Datacenter resilient topologies ( Now supports Datacenter Activation Coordinator mode (DAC) Mode with two servers in a DAG ) Quality Improvements Faster failovers with improved post-failover client experience (Failover drives the database to a clean shutdown by playing all logs. The mount process then simply brings database up, with no recovery required, which speeds up the failover time. ) Mailbox database redistribution (New script which can move active mailbox databases back to the copy with the highest activation preference)

    15. Anywhere Access Situation: Users are demanding the freedom to connect from wherever they are.   Slide Objective: Exchange 2010 expands on the investments we made in Exchange 2007 through innovations that help enable greater workforce productivity by giving users the freedom to securely access their business communications, including e-mail, voice mail, and instant messaging, as well as collaborate effectively from virtually any platform, web-browser, or device.    Talking Points: Next is Anywhere Access. Exchange 2010 offers enhancements that can help your users get more done by giving them the freedom to securely access their communications: e-mail, voice mail, instant messaging, and more, from virtually any platform, web-browser, or device.   Exchange continues to be a leader in empowering mobile workers by delivering the best three screen user experience available through Outlook on the desktop, Outlook Web App via web-browsers, and Exchange ActiveSync for mobile devices.   Your users can realize numerous productivity gains thanks to new features which help them more easily organize and prioritize the communications in their inboxes like the enhanced conversation view powered by Exchange 2010.    Transform your traditional voice mail experience with Exchange 2010 which can replace your aging and costly voice mail systems as well as offer new innovations, such as speech-to-text previews of received voice messages and the flexibility for your users to create customized voice mail menus and call handling rules to ensure important calls are given top priority.   Lastly, Exchange 2010 adds a full featured, rich web-based e-mail experience on a range of browsers, including Internet Explorer, Mozilla Firefox, and Apple Safari. We continue to offer native support for virtually every mobile device, including a premium experience with Windows Mobile through Exchange ActiveSync. With the mobile device policy advancements found in Exchange 2010, you have a great, out-of-the-box option for delivering mobile e-mail to your workforce without being locked into a specific device or service platform.Situation: Users are demanding the freedom to connect from wherever they are.   Slide Objective: Exchange 2010 expands on the investments we made in Exchange 2007 through innovations that help enable greater workforce productivity by giving users the freedom to securely access their business communications, including e-mail, voice mail, and instant messaging, as well as collaborate effectively from virtually any platform, web-browser, or device.    Talking Points: Next is Anywhere Access. Exchange 2010 offers enhancements that can help your users get more done by giving them the freedom to securely access their communications: e-mail, voice mail, instant messaging, and more, from virtually any platform, web-browser, or device.   Exchange continues to be a leader in empowering mobile workers by delivering the best three screen user experience available through Outlook on the desktop, Outlook Web App via web-browsers, and Exchange ActiveSync for mobile devices.   Your users can realize numerous productivity gains thanks to new features which help them more easily organize and prioritize the communications in their inboxes like the enhanced conversation view powered by Exchange 2010.    Transform your traditional voice mail experience with Exchange 2010 which can replace your aging and costly voice mail systems as well as offer new innovations, such as speech-to-text previews of received voice messages and the flexibility for your users to create customized voice mail menus and call handling rules to ensure important calls are given top priority.   Lastly, Exchange 2010 adds a full featured, rich web-based e-mail experience on a range of browsers, including Internet Explorer, Mozilla Firefox, and Apple Safari. We continue to offer native support for virtually every mobile device, including a premium experience with Windows Mobile through Exchange ActiveSync. With the mobile device policy advancements found in Exchange 2010, you have a great, out-of-the-box option for delivering mobile e-mail to your workforce without being locked into a specific device or service platform.

    16. Manage Inbox Overload Situation: People are getting more and more e-mail. Inbox overload is now a frequent issue for information workers. Statistics show that over 10% of IWs feel their e-mail is totally out of control. Volumes of e-mail are increasing and people need new tools to manage this information or risk “drinking from the fire hose.” Conversation view is designed to specifically address this growing problem of massive amounts of information by allowing users to more directly control their e-mail and put it into context.   Slide Objective: The audience should walk away understanding that we provide powerful new ways to filter, view, organize and manage their email. We provide systems to make them more efficient to handle the larger amount of information they are receiving and set them up to effectively handle and interact with that information.   Talking Points: Filters help you find what you’re looking for in a mailbox; and in search results. Conversation view is a whole new paradigm for how you read your mail that will greatly enhance your productivity. Conversation view helps you put messages in context knowing both how they fit into the conversation thread as well as if they are a branch of the main conversation. Conversation view enables you to manage a conversation as a single item in your inbox; including moving or “ignoring” all current and future messages within the conversation.Situation: People are getting more and more e-mail. Inbox overload is now a frequent issue for information workers. Statistics show that over 10% of IWs feel their e-mail is totally out of control. Volumes of e-mail are increasing and people need new tools to manage this information or risk “drinking from the fire hose.” Conversation view is designed to specifically address this growing problem of massive amounts of information by allowing users to more directly control their e-mail and put it into context.   Slide Objective: The audience should walk away understanding that we provide powerful new ways to filter, view, organize and manage their email. We provide systems to make them more efficient to handle the larger amount of information they are receiving and set them up to effectively handle and interact with that information.   Talking Points: Filters help you find what you’re looking for in a mailbox; and in search results. Conversation view is a whole new paradigm for how you read your mail that will greatly enhance your productivity. Conversation view helps you put messages in context knowing both how they fit into the conversation thread as well as if they are a branch of the main conversation. Conversation view enables you to manage a conversation as a single item in your inbox; including moving or “ignoring” all current and future messages within the conversation.

    17. Manage Inbox Overload Situation: People send embarrassing e-mails (or worse) to the wrong recipients (think MS email of reporters dossier to that reporter, RNC lobbying efforts though White House accounts, or pharmaceutical email sent out with all recipients names visible); MailTips is designed to make sure your communications are right the first time and to avoid such embarrassing mistakes. Slide Objective: The audience should walk away from this slide seeing that Exchange helps users send more effective messages the first time. It helps them not send messages to which they will get an OOF response and avoid sending mail to external recipients or large lists of people that might create an embarrassing mistake.   Talking Points: Know someone is OOF before you send a message (look at the oof and send to the right person from the start). Be alerted to important issues like external recipients or large lists of people this will be sent to. Know internal rules that will block your message from being sent before you send it (too many attachments, too big of an attachment, recipient can’t receive the message, and other custom rules defined by the system administrator).Situation: People send embarrassing e-mails (or worse) to the wrong recipients (think MS email of reporters dossier to that reporter, RNC lobbying efforts though White House accounts, or pharmaceutical email sent out with all recipients names visible); MailTips is designed to make sure your communications are right the first time and to avoid such embarrassing mistakes. Slide Objective: The audience should walk away from this slide seeing that Exchange helps users send more effective messages the first time. It helps them not send messages to which they will get an OOF response and avoid sending mail to external recipients or large lists of people that might create an embarrassing mistake.   Talking Points: Know someone is OOF before you send a message (look at the oof and send to the right person from the start). Be alerted to important issues like external recipients or large lists of people this will be sent to. Know internal rules that will block your message from being sent before you send it (too many attachments, too big of an attachment, recipient can’t receive the message, and other custom rules defined by the system administrator).

    18. Enhance Voice Mail Situation: Unified Messaging in Exchange 2007 took a major step towards providing a universal inbox by helping users manage their voice mail and e-mail in the same place. Triaging voice mail remained a task separate from that of e-mail as users had to have speakers available and find themselves a private location to listen to potentially confidential or private voice mails. Providing a simple text based transcription of voice mail provides users a quick and easy way to identify the importance of a voice mail and how to prioritize a response without having to necessarily play the audio over a phone or PC. This becomes particularly valuable when checking in with e-mail and voice mail while on a mobile device or while in a setting, such as a meeting, where listening to a voice mail is not possible.   Slide Objective: The audience should walk away understanding that we are taking our past investments in Unified Messaging even further in the next release of Exchange. With further enhancement of UM to include text-based transcription of voice mail, we provide users more choice when consuming voice mail message and further integrate voice mail into the universal inbox.   Talking Points: Text transcription of voice mail within the body of the voice mail message in the inbox. Embedded media player side-by-side with text transcription to enable users to play voice mail as necessary. Inbox rules which trigger on key words and phrases can now apply to voice mail as well as e-mail. Confidence level of transcription reflected visually in the text.Situation: Unified Messaging in Exchange 2007 took a major step towards providing a universal inbox by helping users manage their voice mail and e-mail in the same place. Triaging voice mail remained a task separate from that of e-mail as users had to have speakers available and find themselves a private location to listen to potentially confidential or private voice mails. Providing a simple text based transcription of voice mail provides users a quick and easy way to identify the importance of a voice mail and how to prioritize a response without having to necessarily play the audio over a phone or PC. This becomes particularly valuable when checking in with e-mail and voice mail while on a mobile device or while in a setting, such as a meeting, where listening to a voice mail is not possible.   Slide Objective: The audience should walk away understanding that we are taking our past investments in Unified Messaging even further in the next release of Exchange. With further enhancement of UM to include text-based transcription of voice mail, we provide users more choice when consuming voice mail message and further integrate voice mail into the universal inbox.   Talking Points: Text transcription of voice mail within the body of the voice mail message in the inbox. Embedded media player side-by-side with text transcription to enable users to play voice mail as necessary. Inbox rules which trigger on key words and phrases can now apply to voice mail as well as e-mail. Confidence level of transcription reflected visually in the text.

    19. Enhance Voice Mail Situation: As information overload becomes more commonplace, individuals take more advantage of features of Exchange and Outlook such as Inbox Rules to manage how inbound communication is directed to make them most efficient in their daily work. The integration of voice mail into the Inbox with Unified Messaging brings with it the opportunity to use similar tools to manage how inbound phone calls are processed to further enhance communications with personal auto attendant.   Slide Objective: The audience should understand that they have a powerful new way to manage incoming phone calls in a UI and paradigm which is familiar and easy-to-use. They should feel that they can tailor their voice communication in similar ways to which they have been tailoring e-mail communication over the years with Outlook and Outlook Web App Inbox Rules.   Talking Points: Create rules which present customized menus to individuals or groups (or everyone) allowing you to direct their calls based on tailored options that relate to your business. Ensure that top priority communication is routed directly to you via “find me” functionality which can be configured to ring all contact phone numbers sequentially. Modify auto attendant simply and easily via Outlook or Outlook Web App whenever required; like setting a custom menu when you are out of the office.Situation: As information overload becomes more commonplace, individuals take more advantage of features of Exchange and Outlook such as Inbox Rules to manage how inbound communication is directed to make them most efficient in their daily work. The integration of voice mail into the Inbox with Unified Messaging brings with it the opportunity to use similar tools to manage how inbound phone calls are processed to further enhance communications with personal auto attendant.   Slide Objective: The audience should understand that they have a powerful new way to manage incoming phone calls in a UI and paradigm which is familiar and easy-to-use. They should feel that they can tailor their voice communication in similar ways to which they have been tailoring e-mail communication over the years with Outlook and Outlook Web App Inbox Rules.   Talking Points: Create rules which present customized menus to individuals or groups (or everyone) allowing you to direct their calls based on tailored options that relate to your business. Ensure that top priority communication is routed directly to you via “find me” functionality which can be configured to ring all contact phone numbers sequentially. Modify auto attendant simply and easily via Outlook or Outlook Web App whenever required; like setting a custom menu when you are out of the office.

    20. Collaborate Effectively Situation: People use many different platforms to communicate these days. From getting a message on the go on your mobile phone to sending out a contract proposal at a desktop; users are looking for ways to keep in better touch as their mobility increases. Access though Macs, PCs, Web Browsers, and mobile phones all are a critical part of the connected infrastructure that allows businesses to increase their productivity and decrease decision making time.   Slide Objective: The Audience should walk away understanding that Exchange is providing the one stop for their communications needs. Exchange inboxes will be accessible from a wide variety of platforms and technologies. This broad access to rich Exchange data experiences allows them to be more flexible in their organizations while still having a consistent management story on the administrative side. This means lower costs with greater support for the platforms their organizations chooses to use; in other words, lower cost, greater choice.   Talking Points: Rich desktop clients are available for both PCs and Macs though Outlook and Entourage. Rich web browser access to OWA premium is now available for 99% of the browser market. Users can use IE for the premium experience they have come to expect, or use Safari and Firefox for very similar premium experiences. OWA Lite is still available for those with restricted bandwidth or accessibility needs. Exchange ActiveSync® is fast becoming the standard for Push e-mail to smartphones. For almost any smartphone that an organization has decided to support, there is an Exchange ActiveSync enabled client available. Situation: People use many different platforms to communicate these days. From getting a message on the go on your mobile phone to sending out a contract proposal at a desktop; users are looking for ways to keep in better touch as their mobility increases. Access though Macs, PCs, Web Browsers, and mobile phones all are a critical part of the connected infrastructure that allows businesses to increase their productivity and decrease decision making time.   Slide Objective: The Audience should walk away understanding that Exchange is providing the one stop for their communications needs. Exchange inboxes will be accessible from a wide variety of platforms and technologies. This broad access to rich Exchange data experiences allows them to be more flexible in their organizations while still having a consistent management story on the administrative side. This means lower costs with greater support for the platforms their organizations chooses to use; in other words, lower cost, greater choice.   Talking Points: Rich desktop clients are available for both PCs and Macs though Outlook and Entourage. Rich web browser access to OWA premium is now available for 99% of the browser market. Users can use IE for the premium experience they have come to expect, or use Safari and Firefox for very similar premium experiences. OWA Lite is still available for those with restricted bandwidth or accessibility needs. Exchange ActiveSync® is fast becoming the standard for Push e-mail to smartphones. For almost any smartphone that an organization has decided to support, there is an Exchange ActiveSync enabled client available.

    21. Collaborate Effectively Situation: Having a view of not only your calendar, but others calendars is critical to being productive. From a parent who needs to see a spouse’s calendar to know whose night it is to pick up the kids, to the ability for teams to share a calendar of critical events for all of the team members. Shared calendars are necessary to raise the level of productivity for the group. Likewise, coordinating with people outside your organization has been a manual process that now can be accomplished with the ease that we allow people to share calendars internally. This makes scheduling meetings with external partners fast, efficient, and effective.   Slide Objective: The audience should walk away from this slide understanding that we’ve really gone from just holding your calendar to allowing you to flexibly use your calendar and interact with others, internally and externally, through your calendar.   Talking Points: Customers can now share their calendar externally the way they currently share them internally. Customers can now view multiple calendars in OWA. Talking Points: Customers can now share their calendar externally the way they currently share them internally. Customers can now view multiple calendars in OWA. Situation: Having a view of not only your calendar, but others calendars is critical to being productive. From a parent who needs to see a spouse’s calendar to know whose night it is to pick up the kids, to the ability for teams to share a calendar of critical events for all of the team members. Shared calendars are necessary to raise the level of productivity for the group. Likewise, coordinating with people outside your organization has been a manual process that now can be accomplished with the ease that we allow people to share calendars internally. This makes scheduling meetings with external partners fast, efficient, and effective.   Slide Objective: The audience should walk away from this slide understanding that we’ve really gone from just holding your calendar to allowing you to flexibly use your calendar and interact with others, internally and externally, through your calendar.   Talking Points: Customers can now share their calendar externally the way they currently share them internally. Customers can now view multiple calendars in OWA. Talking Points: Customers can now share their calendar externally the way they currently share them internally. Customers can now view multiple calendars in OWA.

    22. Added in Service Pack 1

    23. Protection and Compliance Situation: Tighter regulatory requirements and growing e-mail volumes require greater vigilance to prevent data breaches.   Slide Objective: Give a high-level overview of IPC benefits in Exchange 2010.   Talking Points: Protection and Compliance Exchange 2010 adds integrated information protection, control, and compliance tools to help simplify and automate the process of protecting your company’s communications and meeting regulatory requirements. New, integrated e-mail archiving capabilities support preserving and discovering e-mail data without changing the user or IT Pro experience. For example, users can easily “drag and drop” e-mails from their .PST files into a new Exchange 2010 personal archive, which can be managed through more flexible retention policies, including a new legal hold feature that can preserve any e-mails a user deletes or edits for future e-Discovery purposes or other compliance related needs. Users can easily access archived e-mail in both Outlook 2010 and Outlook Web App, helping you eliminate the proliferation of .PST files on your network. New, web-based multi-mailbox search can be delegated to specialized users such as compliance officers to conduct discovery searches across both the primary and archive e-mail data. New Transport Protection Rules help safeguard sensitive business information by enabling you to automatically apply Information Rights Management policies to both e-mail and voice mails, after a message is sent, based on a range of message content criteria. Users can easily read and author IRM-protected messages natively through Outlook Web App without plug-ins or extra steps.Situation: Tighter regulatory requirements and growing e-mail volumes require greater vigilance to prevent data breaches.   Slide Objective: Give a high-level overview of IPC benefits in Exchange 2010.   Talking Points: Protection and Compliance Exchange 2010 adds integrated information protection, control, and compliance tools to help simplify and automate the process of protecting your company’s communications and meeting regulatory requirements. New, integrated e-mail archiving capabilities support preserving and discovering e-mail data without changing the user or IT Pro experience. For example, users can easily “drag and drop” e-mails from their .PST files into a new Exchange 2010 personal archive, which can be managed through more flexible retention policies, including a new legal hold feature that can preserve any e-mails a user deletes or edits for future e-Discovery purposes or other compliance related needs. Users can easily access archived e-mail in both Outlook 2010 and Outlook Web App, helping you eliminate the proliferation of .PST files on your network. New, web-based multi-mailbox search can be delegated to specialized users such as compliance officers to conduct discovery searches across both the primary and archive e-mail data. New Transport Protection Rules help safeguard sensitive business information by enabling you to automatically apply Information Rights Management policies to both e-mail and voice mails, after a message is sent, based on a range of message content criteria. Users can easily read and author IRM-protected messages natively through Outlook Web App without plug-ins or extra steps.

    24. E-mail Archiving Situation: Because of growing and changing regulatory environments, organizations need custom, easy-to-implement e-mail archiving capabilities that do not interfere excessively with user workflows.   Slide objective: Audience should understand how they can get robust e-mail archiving and discovery tools without burdening the IT department or users.   Talking points: Exchange 2010 offers you new, integrated e-mail archiving tools that can help you preserve and discover e-mail data, without having to change the way your users or IT admins work with and manage Exchange.   Introduced in this latest release are such features as:   A personal archive that seamlessly surfaces in both Outlook and Outlook Web App. This secondary mailbox appears a set of folders in your users’ e-mail clients, allowing them to use familiar tools and actions to manage both live and archived e-mail data. For administrators, the very same admin tools used to manage other aspects of Exchange, such as the Exchange Management Console or PowerShell, can be used to configure and enable this personal archive. Retention policies that allow IT staff to define, deploy, and automate the expiry and archiving of e-mail data. These new policies are both granular and flexible, and can be set at either the folder or item level. New to Exchange 2010 is a legal hold policy that, when enabled on a user’s mailbox, retains any edits or deletions made by the user under hold. This new feature also adds a single item restore capability to help undo accidental user deletions, without having to restore from a point in time backup. The new, easy to use, web-based multi-mailbox search that can be delegated to specialist users—such as a compliance officer or human resources personnel—to conduct e-discovery tasks, without having to generate additional overhead for the IT department.   Together, these integrated e-mail archiving, retention, and discovery capabilities form just one aspect of our large mailbox strategy which includes all of the great Exchange 2010 mailbox resiliency and storage performance innovations, as well as choice in storage hardware we’ve already discussed. Situation: Because of growing and changing regulatory environments, organizations need custom, easy-to-implement e-mail archiving capabilities that do not interfere excessively with user workflows.   Slide objective: Audience should understand how they can get robust e-mail archiving and discovery tools without burdening the IT department or users.   Talking points: Exchange 2010 offers you new, integrated e-mail archiving tools that can help you preserve and discover e-mail data, without having to change the way your users or IT admins work with and manage Exchange.   Introduced in this latest release are such features as:   A personal archive that seamlessly surfaces in both Outlook and Outlook Web App. This secondary mailbox appears a set of folders in your users’ e-mail clients, allowing them to use familiar tools and actions to manage both live and archived e-mail data. For administrators, the very same admin tools used to manage other aspects of Exchange, such as the Exchange Management Console or PowerShell, can be used to configure and enable this personal archive. Retention policies that allow IT staff to define, deploy, and automate the expiry and archiving of e-mail data. These new policies are both granular and flexible, and can be set at either the folder or item level. New to Exchange 2010 is a legal hold policy that, when enabled on a user’s mailbox, retains any edits or deletions made by the user under hold. This new feature also adds a single item restore capability to help undo accidental user deletions, without having to restore from a point in time backup. The new, easy to use, web-based multi-mailbox search that can be delegated to specialist users—such as a compliance officer or human resources personnel—to conduct e-discovery tasks, without having to generate additional overhead for the IT department.   Together, these integrated e-mail archiving, retention, and discovery capabilities form just one aspect of our large mailbox strategy which includes all of the great Exchange 2010 mailbox resiliency and storage performance innovations, as well as choice in storage hardware we’ve already discussed.

    25. E-mail Archiving Situation: The explosive growth of regulatory compliance and corporate governance requirements has made it challenging for e-mail administrators and compliance officers to provide end users with simple tools for managing retention policies of the high volume of e-mail messages being sent and received daily. It is impractical for a small group of people to police e-mail to this end directly, so tools which enable end users to apply retention policies which are defined by the organization and tools which automatically apply such policies without IT intervention are required to effectively mitigate the risk associated with compliance and governance.   Slide Objective: The audience should walk away understanding that Exchange increases flexibility and functionality allowing retention policies to be applied to e-mails individually or at the folder level. IT administrators and compliance officers can define policies and distribute them to select groups of users ensuring that users choose from only policies which are appropriate for their role in the company.   Talking Points: Retention policies can now be applied to any individual e-mail or folder rather than just a restricted set of managed folders. Policies are defined centrally and pushed to the client, exposed directly to users in the UI for selection or notification. Transport rules can be designed to automatically apply default policies for select groups of users or based on select attributes of e-mail. Situation: The explosive growth of regulatory compliance and corporate governance requirements has made it challenging for e-mail administrators and compliance officers to provide end users with simple tools for managing retention policies of the high volume of e-mail messages being sent and received daily. It is impractical for a small group of people to police e-mail to this end directly, so tools which enable end users to apply retention policies which are defined by the organization and tools which automatically apply such policies without IT intervention are required to effectively mitigate the risk associated with compliance and governance.   Slide Objective: The audience should walk away understanding that Exchange increases flexibility and functionality allowing retention policies to be applied to e-mails individually or at the folder level. IT administrators and compliance officers can define policies and distribute them to select groups of users ensuring that users choose from only policies which are appropriate for their role in the company.   Talking Points: Retention policies can now be applied to any individual e-mail or folder rather than just a restricted set of managed folders. Policies are defined centrally and pushed to the client, exposed directly to users in the UI for selection or notification. Transport rules can be designed to automatically apply default policies for select groups of users or based on select attributes of e-mail.

    26. E-mail Archiving Situation: Traditional e-mail systems require complex access control policies and provide hard to use tools in order to meet the growing needs of eDiscovery and requirements of Human Resources departments relative to searching corporate communication throughout the e-mail infrastructure. Those responsible for these tasks are non-IT users who are unfamiliar with e-mail administration tools and do not have access to the e-mail servers. These compliance officers and HR representatives are having to follow complex processes and use complex tools, aided by IT, to handle what is already a complex problem due to legal and corporate governance. Solutions are required which empower these individuals to go about their business without IT intervention and which ensure that only those assigned by the organization to perform such tasks are able to.   Slide Objective: The audience should see that Exchange goes beyond traditional administration models to empower delegation of tasks associated with compliance away from the e-mail administrator and put these tasks into the hands of those responsible with easy-to-use tools.   Talking Points: Cross-mailbox search user interface enables compliance officers and HR to perform searches based on select e-mail attributes across the entire mail infrastructure. Roles based administration allows for easy delegated access to this tool with no complex Access Control Requirements. eDiscovery processes may be followed without IT intervention and only by those authorized. Compliance officers and HR representatives use familiar and easy-to-use tools within the existing UI of Outlook Web App (compared to Get Mailbox PowerShell commands in Exchange Server 2007). Situation: Traditional e-mail systems require complex access control policies and provide hard to use tools in order to meet the growing needs of eDiscovery and requirements of Human Resources departments relative to searching corporate communication throughout the e-mail infrastructure. Those responsible for these tasks are non-IT users who are unfamiliar with e-mail administration tools and do not have access to the e-mail servers. These compliance officers and HR representatives are having to follow complex processes and use complex tools, aided by IT, to handle what is already a complex problem due to legal and corporate governance. Solutions are required which empower these individuals to go about their business without IT intervention and which ensure that only those assigned by the organization to perform such tasks are able to.   Slide Objective: The audience should see that Exchange goes beyond traditional administration models to empower delegation of tasks associated with compliance away from the e-mail administrator and put these tasks into the hands of those responsible with easy-to-use tools.   Talking Points: Cross-mailbox search user interface enables compliance officers and HR to perform searches based on select e-mail attributes across the entire mail infrastructure. Roles based administration allows for easy delegated access to this tool with no complex Access Control Requirements. eDiscovery processes may be followed without IT intervention and only by those authorized. Compliance officers and HR representatives use familiar and easy-to-use tools within the existing UI of Outlook Web App (compared to Get Mailbox PowerShell commands in Exchange Server 2007).

    27. Email Archiving

    28. Protect Communications Situation: One of the common concerns around information protection and control (or data loss prevention) systems is that the system will generate false positives and restrict mail that didn’t need to be restricted.   Slide Objective: Audience learning: with Exchange 2010, administrators can better control sensitive data while minimizing disruptions and maintaining everyday workflow.   Talking Points: With the addition of so many new controls to Exchange 2010, administrators can now fine tune their policies so that the right level of control is applied to the right email. We define it here as the application of soft and hard controls. For example, an administrator may want to provide an automated alert to users whenever they are sending to an external audience without necessarily blocking that mail. This is where MailTips can be useful. Further down the continuum, an administrator could create a Transport Rule that applies enterprise rights management encryption automatically based on specific content within the e-mail.   There is always the option of blocking or re-routing an email altogether. Even in these cases, detailed transport rules can be developed that only work on very specific scenarios, whether it be a particular user or group of users, message types, regular expressions (such as a social security number) – even keywords within Microsoft Office system file attachments, such as a Microsoft Excel® spreadsheet.  Situation: One of the common concerns around information protection and control (or data loss prevention) systems is that the system will generate false positives and restrict mail that didn’t need to be restricted.   Slide Objective: Audience learning: with Exchange 2010, administrators can better control sensitive data while minimizing disruptions and maintaining everyday workflow.   Talking Points: With the addition of so many new controls to Exchange 2010, administrators can now fine tune their policies so that the right level of control is applied to the right email. We define it here as the application of soft and hard controls. For example, an administrator may want to provide an automated alert to users whenever they are sending to an external audience without necessarily blocking that mail. This is where MailTips can be useful. Further down the continuum, an administrator could create a Transport Rule that applies enterprise rights management encryption automatically based on specific content within the e-mail.   There is always the option of blocking or re-routing an email altogether. Even in these cases, detailed transport rules can be developed that only work on very specific scenarios, whether it be a particular user or group of users, message types, regular expressions (such as a social security number) – even keywords within Microsoft Office system file attachments, such as a Microsoft Excel® spreadsheet.  

    29. Protect Communications Situation: Electronic communications is ubiquitous today. The ease of transmitting e-mail and information attached to e-mail also increases the risk of unauthorized viewing and distribution. Leaks of confidential information can result in lost revenue, compromised ability to compete, unfairness in purchasing and hiring decisions, diminished customer confidence, and more. This risk demands solutions which are not only secure but easy to apply, whether it’s to messages sent inside an organization, outside the organization to partners, or as is increasingly the case, to a hosted archive service.   While users can already apply RMS manually to an email, Information Leakage Protection (ILP) becomes even more effective when this protection can be applied automatically, based on rules defined by the administrator. This not only eases the burden on the user to protect company IP within email but ensures better, more consistent compliance with corporate policies.   Slide Objective: The audience should understand that RMS can now be applied through Transport which, in turn, paves the way for broader, more granular ILP as well as protection of voicemail.   Talking Points: Protect voice mail messages with the same core technology as you protect e-mail, documents, spreadsheets, and presentations. Apply RMS automatically in Outlook or through Transport rules. Leverage the same rich Information Rights Managements experience in OWA as you have become familiar with in Outlook. Encrypt message in transport without the complex requirements of PKI and S/MIME. Ensure governance and compliance requirements are met by archiving protected messages in the clear alongside the encrypted message if required. Automatic RMS protection of e-mail and attachments can be done through: An Outlook add-in. RMS is activated based on the sender’s department, the identity of the recipient (user or DL), and whether all recipients are internal or not. Two RMS templates are offered by default: Do Not Forward or Internet Confidential (mail is protected but user has rights to forward, copy, etc.). Others can be added. The activation can be overridden by user. Transport rules which key off of e-mail attributes (e.g. sender, keywords, subject line) Situation: Electronic communications is ubiquitous today. The ease of transmitting e-mail and information attached to e-mail also increases the risk of unauthorized viewing and distribution. Leaks of confidential information can result in lost revenue, compromised ability to compete, unfairness in purchasing and hiring decisions, diminished customer confidence, and more. This risk demands solutions which are not only secure but easy to apply, whether it’s to messages sent inside an organization, outside the organization to partners, or as is increasingly the case, to a hosted archive service.   While users can already apply RMS manually to an email, Information Leakage Protection (ILP) becomes even more effective when this protection can be applied automatically, based on rules defined by the administrator. This not only eases the burden on the user to protect company IP within email but ensures better, more consistent compliance with corporate policies.   Slide Objective: The audience should understand that RMS can now be applied through Transport which, in turn, paves the way for broader, more granular ILP as well as protection of voicemail.   Talking Points: Protect voice mail messages with the same core technology as you protect e-mail, documents, spreadsheets, and presentations. Apply RMS automatically in Outlook or through Transport rules. Leverage the same rich Information Rights Managements experience in OWA as you have become familiar with in Outlook. Encrypt message in transport without the complex requirements of PKI and S/MIME. Ensure governance and compliance requirements are met by archiving protected messages in the clear alongside the encrypted message if required. Automatic RMS protection of e-mail and attachments can be done through: An Outlook add-in. RMS is activated based on the sender’s department, the identity of the recipient (user or DL), and whether all recipients are internal or not. Two RMS templates are offered by default: Do Not Forward or Internet Confidential (mail is protected but user has rights to forward, copy, etc.). Others can be added. The activation can be overridden by user. Transport rules which key off of e-mail attributes (e.g. sender, keywords, subject line)

    30. Advanced Security Situation: Most customers already have some form of anti-malware engine in place. But viruses continue to be a problem. That’s because when new threats are discovered, the time it takes for scan engine vendors to release antivirus signatures to detect them varies greatly—in some cases by days or weeks!   Slide Objective: The audience should learn how Forefront products provide superior spam and virus filtering through multi-engine architecture, automatic updating, and streamlined management.   Talking Points: The Forefront Protection for Exchange Server (FPE) engine set is proven to promote faster detection rates of new threats than single-engine solutions (AV-Test.org). Administrators can run up to five scan engines simultaneously and in different combinations at Edge, Hub, and Mailbox servers.   An AV-Test of consumer antivirus products revealed that, on average, Forefront engine sets provided a response in 3.1 hours or less, while single-engine vendors provided responses in 5 days, 4 days, and 6 days respectively.   The diversity of antivirus engines protects against a single point of failure. Forefront Protection for Exchange Server manages these engines so that if one engine fails or goes offline to update, other engines continue to protect the IT environment without slowing mail delivery. Forefront also manages all updates, consolidating from al 5 engines and pushing them out customers, automatically. This automatic – and continuous – updating services also applies to Forefront's new anti-spam content filter, which is licensed from Cloudmark. Recent independent test revealed a 99% spam detection rate with Cloudmark, ranking it among the top content filters ion the market today. Now another advantage of Forefront is the option to offload your security management to the cloud for lower TCO, with Forefront Online Protection for Exchange.   Forefront Online Security for Exchange includes comprehensive Service Level Agreements (SLAs) that include: 5-9s network uptime 100% protection against all known e-mail viruses A spam Capture of at least 98% and a False positive commitment of less than 1 in 250,000 e-mails   Customers also have the advantage of combining with an on premises installation with cloud services for hybrid protection. With Forefront’s new unified management functionality, you can manage security settings for all three products from one console. Situation: Most customers already have some form of anti-malware engine in place. But viruses continue to be a problem. That’s because when new threats are discovered, the time it takes for scan engine vendors to release antivirus signatures to detect them varies greatly—in some cases by days or weeks!   Slide Objective: The audience should learn how Forefront products provide superior spam and virus filtering through multi-engine architecture, automatic updating, and streamlined management.   Talking Points: The Forefront Protection for Exchange Server (FPE) engine set is proven to promote faster detection rates of new threats than single-engine solutions (AV-Test.org). Administrators can run up to five scan engines simultaneously and in different combinations at Edge, Hub, and Mailbox servers.   An AV-Test of consumer antivirus products revealed that, on average, Forefront engine sets provided a response in 3.1 hours or less, while single-engine vendors provided responses in 5 days, 4 days, and 6 days respectively.   The diversity of antivirus engines protects against a single point of failure. Forefront Protection for Exchange Server manages these engines so that if one engine fails or goes offline to update, other engines continue to protect the IT environment without slowing mail delivery. Forefront also manages all updates, consolidating from al 5 engines and pushing them out customers, automatically. This automatic – and continuous – updating services also applies to Forefront's new anti-spam content filter, which is licensed from Cloudmark. Recent independent test revealed a 99% spam detection rate with Cloudmark, ranking it among the top content filters ion the market today. Now another advantage of Forefront is the option to offload your security management to the cloud for lower TCO, with Forefront Online Protection for Exchange.   Forefront Online Security for Exchange includes comprehensive Service Level Agreements (SLAs) that include: 5-9s network uptime 100% protection against all known e-mail viruses A spam Capture of at least 98% and a False positive commitment of less than 1 in 250,000 e-mails   Customers also have the advantage of combining with an on premises installation with cloud services for hybrid protection. With Forefront’s new unified management functionality, you can manage security settings for all three products from one console.

    31. Added in Service Pack 1

    32. Optimized for Software + Services Situation: Users may choose on-premises, cloud-based, or hybrid deployments based on their needs.   Slide Objective: Describe how companies can benefit from deployment flexibility in Exchange 2010.   Talking Points: Different deployment scenarios offer distinct benefits depending on your needs: Running Exchange Server on-premises gives you complete control of your environment, the most options for customization, and provides the maximum security for your sensitive data. Hosting your e-mail with Exchange Online can help you reduce costs, focus IT on business priorities, and ensure that your users benefit from the latest technology. Coexistence capabilities mean that you can mix the two in a hybrid deployment and segment your users to give them the right level of service at the lowest cost. You can mix and match between online and on-premises software according to your organization’s needs. Regardless of which deployment option you choose, you’ll get the robust messaging capabilities you expect from Exchange. Situation: Users may choose on-premises, cloud-based, or hybrid deployments based on their needs.   Slide Objective: Describe how companies can benefit from deployment flexibility in Exchange 2010.   Talking Points: Different deployment scenarios offer distinct benefits depending on your needs: Running Exchange Server on-premises gives you complete control of your environment, the most options for customization, and provides the maximum security for your sensitive data. Hosting your e-mail with Exchange Online can help you reduce costs, focus IT on business priorities, and ensure that your users benefit from the latest technology. Coexistence capabilities mean that you can mix the two in a hybrid deployment and segment your users to give them the right level of service at the lowest cost. You can mix and match between online and on-premises software according to your organization’s needs. Regardless of which deployment option you choose, you’ll get the robust messaging capabilities you expect from Exchange.

    33. The Exchange Difference   Key competitive differentiators Richest functionality 3 screen Native workloads (UM, ILP, Archiving) Flexibility & Choice S+S Management & Control IT Pro richness Developer Story Development Ecosystem EWS EMC Unified Business Platform Platform (BPIO)   Key competitive differentiators Richest functionality 3 screen Native workloads (UM, ILP, Archiving) Flexibility & Choice S+S Management & Control IT Pro richness Developer Story Development Ecosystem EWS EMC Unified Business Platform Platform (BPIO)

    34. Situation: Exchange 2010 delivers next-generation business messaging capabilities.   Slide Objective: Sum up the major benefits of Exchange Online 2010.   Talking Points: Realize “the new efficiency” with Exchange 2010. Reduce IT costs with a more flexible and reliable messaging infrastructure. Drive greater productivity and effective collaboration through anywhere access. Use built-in archiving, retention, and information protection and control to enhance security and regulatory compliance. This is just the tip of the iceberg—we invite you to learn more.Situation: Exchange 2010 delivers next-generation business messaging capabilities.   Slide Objective: Sum up the major benefits of Exchange Online 2010.   Talking Points: Realize “the new efficiency” with Exchange 2010. Reduce IT costs with a more flexible and reliable messaging infrastructure. Drive greater productivity and effective collaboration through anywhere access. Use built-in archiving, retention, and information protection and control to enhance security and regulatory compliance. This is just the tip of the iceberg—we invite you to learn more.

    35. End of Exchange 2010 Overview Module

More Related