Exchange Enterprise Demo Guide
Exchange Enterprise Demo Guide
Exchange Enterprise Demo Guide
Contents
The new Exchange is designed to help you increase user productivity and keep your organization safe, while maintaining the control you
need.
This document provides demonstrations of many features available with the new version of Exchange.
Sections include:
Setup Instructions
Demo 1: Remain in Control, Online and On-premises
Demo 2: Do More, On Any Device
Demo 3: Keep Your Organization Safe
2
Microsoft Confidential
Setup Instructions
Setup Instructions
Setup Requirements
All times referenced in this demo use the Pacific Time zone.
Setup Instructions
On the Auto Account Setup page, use the information below to complete the account information, and then click Next.
Your Name
Sara Davis
E-mail Address
SaraD@yourtenantname.onmicrosoft.com
Password
pass@word1
j.
Click OK.
Setup Instructions
f.
Close Outlook.
5
Microsoft Confidential
Setup Instructions
e. On the DemoDocs page, next to Project Falcon Customer Data, click the Open Menu ellipsis.
f.
In the document preview, click the Open Menu ellipsis, and then click Download a Copy.
g. In the download manager, click the Save menu, and then click Save as.
h. In the Save As window, browse to the DemoDocs folder, and then click Save.
i.
In the top right of your IE window, click your tenant administrator name, and then click Sign Out.
j.
Click DISCARD and then, in the discard message dialog box, click discard.
Click SAVE.
s.
Microsoft Confidential
Setup Instructions
t.
In the Location box, type Starbucks Seattle, and then click Search Bing.
7
Microsoft Confidential
8
Microsoft Confidential
9
Microsoft Confidential
Demo Exercise
Speaker Script
Steps
Microsoft Confidential
company.
If we click into the Recipients feature pane, youll notice that just like
in other feature panes, the EAC has further tabs of granular settings
11
Microsoft Confidential
name. This helps admins more quickly find what theyre trying to find,
and also helps them learn the query language for the EAC to more
easily perform more powerful searches. They could also use
advanced search options if they want to go basic the basic input.
Next, if we click on the Compliance Management feature pane, youll
notice that this single console allows Exchange admins to manage a
12
Microsoft Confidential
First, IT can allow end users to manage many of their own userrelated settings, and some organizational settings, through their
individual Outlook Web App options. If we click this gear icon here
and select Options from the dropdown menu, well get to that page.
Now youll see some of the user self-service options that Contosos IT
13
Microsoft Confidential
she can change this photo, as well as update her contact information
in these other fields here. For example she can add another phone
number. Since many calls to the Help Desk in organizations today are
about changing personal contact information, Saras ability to make
updates herself in her Outlook Web App options can actually help
offload a significant amount of burden from the Help Desk.
Besides being able to modify her contact information, there are other
important settings Sara can manage. Clicking into groups allows her
to view and even create, delete, or update distribution groups that
she either owns or is a member of. Creating a new group is as easy
as clicking the + button, giving the group a name and an email
address, selecting the members, and choosing whether the group is
open to join and leave. Next, this phone feature pane gives her a
place to view and manage the phones and other devices connected
to her Exchange account. This page is important because it allows her
to recover her device password, or even remotely wipe or block the
device if it has been lost or stolen, helping her better protect her
personal as well as company data. From all of the feature panes and
tabs here within Saras Outlook Web App options, you can see that
these are just a few examples of the types of user settings IT can
delegate to users to manage themselves based on company and IT
6.
7.
8.
9.
10.
11.
12.
13.
14.
Microsoft Confidential
15. In the top navigation, click Admin and then click Exchange.
we can see that out-of-the-box, the new Exchange comes set up with
certain RBAC role groups, or logical groups of administrative tasks
defined, already created. Specialist users can be added to these role
groups to manage just that set of tasks. For example, if we click the
Help Desk RBAC role group, we can see that it contains tasks like
managing user self-service options or read-only views of all of the
15
Microsoft Confidential
right people to whom we want to delegate this role/task lets say Allie
Bellew, and click save. And with that, weve created a new role
group!
In addition to delegating the management of organizational settings
and ability to perform administrative tasks, RBAC Role Groups can be
used to delegate management of a whole set of end user
productivity settings. For example, if we click on the Organization
feature pane, we see that Sara is a member of a Role Group that can
manage which Apps for Outlook are installed for the organization.
She is also allowed to install new ones, which she can do by clicking
this + button here. Youll notice that there are three options for
how to install an app: she can peruse the Office Marketplace for
21.
22.
23.
24.
Click New.
In the Name box, type DG Management.
Under Roles, click Add.
In the role list, click Distribution Groups, click add, and then
click ok.
25. Under Members, click Add.
26. In the Select Members windows, click Allie Bellew, click add,
and then click ok.
16
Microsoft Confidential
Lets say that Sara wants to go ahead and see if there are any new
Apps for Outlook on the Office Marketplace that she thinks Contoso
might benefit from having installed. Shell select the Add from the
Office Store option, which will take her to the Office Marketplace
directly. While there are apps she could deploy to add bring rich
content into other Office applications like Word or Excel, shell focus
on Outlook apps at the moment.
Sara sees the LinkedIn for Outlook app, and decides to take a closer
look. When she clicks into the details, she gets a description of the
app, screenshots showing it in action, details such as number of
downloads, ratings, and reviews, and, of course, the ability to
download the app with the click of a button. Once the page is done
loading, Sara is done! The LinkedIn for Outlook app is now installed.
When she refreshes the list of Apps for Outlook, she can see it now
included, and she or an admin can scope who in the organization
this app will be available for.
While in the Organization feature pane, Sara can also manage
32. On the Office and SharePoint Apps page, scroll down to the
Outlook section, and then click LinkedIn for Outlook.
Microsoft Confidential
43. Log off the Exchange Admin Center and close the browser
window.
19
Microsoft Confidential
20
Microsoft Confidential
21
Microsoft Confidential
Sender Photos
Conversation View
Quick Actions
Inline Reply
Pop-up MailTips
Retention Policies
In-Place Archive
Apps for Outlook
Always Move Messages in This Conversation
Ignore Conversation
Voicemail in the inbox
Site Mailboxes
Outlook Web App compatibility with Firefox, Safari, and
Chrome
Integrated Instant Messaging
Me Card
Smart Search
IRM-protected messages
Webready Document Viewing (Office Web App viewing?)
Enhanced Contact Card
People Hub
People Search
Outlook Web App Options
Call Answering Rules
Mobile Device Options (other name?)
Remote Wipe
Calendar Views
Quick Compose Form
Places
Calendar Overlay
Calendar Sharing
Outlook Web App in Cached Mode
22
Microsoft Confidential
Demo Exercise
Speaker Script
Steps
1. Open Outlook, in the profile menu, click Sara Davis and then
click OK.
People without ever leaving her inbox, and without taking up space
when she doesnt need them. This is particularly important for
23
Microsoft Confidential
8. Click Calendar.
9. In the menu, click Home.
10. In the upper right, click the push pin
to keep the ribbon
bar open for the rest of the demo.
11. In the ribbon bar, click WORK WEEK and then click WEEK.
12. In the bottom navigation, click People.
her.
24
Microsoft Confidential
Looking closely, we can see there are lots of messages from different
conversations, different threads a lot of stuff has piled up for Sara,
some read and some unread items, like many people have in their
inbox. Thats because the email here is arranged by date. While many
people do like to arrange their information by date, Outlook and
Exchange have this option you can click to change to a Conversation
View. The Conversation View is the default in Outlook. And as soon
as Sara selects this option, her Inbox becomes a lot more
manageable the scroll bar is even gone! This is all the messages
that are in the Inbox. Other messages havent disappeared, theyre all
15. In the message list, click the By Date menu and then click
Show as Conversations.
16. In the Microsoft Outlook dialog box, click All mailboxes.
17. In the message list, click the Review Proposal for Tailspin Toys
conversation
18. Expand the conversation to show all emails in the
conversation.
25
Microsoft Confidential
we also see messages from other folders, in this case the Sent Items
folder and the Tailspin Toys folder.
This way, if Sara likes to keep her Inbox clean and file emails away
into folders, such as this one from Aziz Hassouneh, that are a part of
that Review Proposal for Tailspin Toys conversation, it brings those
emails into view in her Inbox. It looks as if they are in her Inbox, even
though they are actually in the Tailspin Toys folder.
This helps solve the problem of when you get an email and youre
trying to find older messages to understand the whole conversation,
but those messages are stored in various folders. No matter which
folder youre looking in, Conversation View will show you all the
messages that are associated with that conversation in the view.
Youll also notice that when you look at the reading pane, you have
the full conversation, just as youre always used to.
The other thing youll notice are these dots and lines, which are what
we call the reply trail. The reply trail shows which messages are
replies to preceding messages, and if the conversation has split for
26
Microsoft Confidential
21. Click the newest email in the thread from Bonnie Kearney.
22. In the preview pane, click REPLY ALL.
23. In the To box, type All Employees and then press Ctrl+K.
Saras Inline replies as part of the conversation she replied to. This
means that if Sara opens another email before sending this response,
her draft will be kept right here waiting for her along with the rest of
the original conversation when shes ready to return to it she
doesnt have to go searching for it in the Drafts folder! She can just
pick up where she left off and continue typing her message before
sending it off.
24. In the email thread, click the next message from Aziz
Hassouneh.
Before sending this response, one thing Sara notices is that there is a
warning, or MailTip, that has popped up, like an early warning system
to help Sara avoid making mistakes.
25. Click the newest message from Bonnie Kearney which now
reads [Draft] in the Subject line.
If you look closer, youll notice that this MailTip lets Sara know that
that some members of All Employees are actually outside the
organization. So even though Sara might not have known this (she
just replied-all to an alias she probably thought only included
everyone from within the company) she can now see that there are
27
Microsoft Confidential
actually people outside the company and she may want to rethink
sending this attachment to the whole group. In this case, maybe its
better to send the attachment to her manager Janet Schorr for
28. Remove all recipients from the To and Cc boxes, and then, in
the To box, type JanetS and then press Ctrl+K.
29. Click Send.
notice in this Review Proposal for Tailspin Toys email is that theres a
retention policy here. Retention policies can automatically be set on
the server and applied to some or all email. So in this case her Inbox
default deletion time is 6 months.
However, there may be multiple retention policies that are designed.
In this case, when youre dealing with a partnership agreement, there
may be legal needs, regulatory needs, to hold those messages for a
longer period of time than what might be the standard retention
period.
So if you notice, theres a retention policy up here, and Sara has the
28
Microsoft Confidential
although her Inbox default deletion time might have been 6 months
from now, she can say Were doing a partnership agreement that is
expected to run for the next three years, so I want to reference this
email throughout that period of time. By choosing that, her mail is
now set to a 3 year Partnership Policy timeline.
Now Sara can take those Review Proposal for Tailspin Toys messages
and file them in folders, or she can also archive them to remove
clutter from her folders. The new Exchange and the new Outlook
provide Sara with access to her In-Place Archive. Sara no longer has
to worry about putting files into her .PST to make sure that shes
keeping her mailbox small, and then worrying that when she tries to
connect from another location, say over the web, that she wont be
32. Use the cursor to point to the different policies and then click
the Partner Policy (3 years) policy.
able to access that information because its stored in a local .PST file.
By putting her .PSTs, indeed all of her archived information, into her
In-Place Archive available in Exchange, Saras able to take
information that she might no longer need, and she can hold on to
those messages for regulatory reasons without taking up space within
her mailbox. She has access to that archive from anywhere that she
logs in with Outlook on a PC, as well as Outlook in the browser,
tablet, or phone.
And, when Sara wants to return to those emails and respond to
them, she can interact with her In-Place Archive just like any other
folder. She can expand conversations like this Budget Forecast for
29
Microsoft Confidential
40. In the reading pane, click Bing Maps and interact with the
map.
41. In the Bing Maps pane, click show you around.
42. Click Suggested Meetings; this may be displayed as
Suggested Meet with the ellipsis if the reading pane is not
large enough to fit the text.
43. Click SCHEDULE MEETING.
30
Microsoft Confidential
Move Always will not only put the selected messages in the desired
folder, but all new messages that come in as part of this same
conversation will be automatically moved to that folder as well. That
way, if Sara likes to use her Inbox as the place to keep track of her
critical work, she can know that recreation items she identified would
automatically end up in that folder and she can look at them on her
own schedule instead of having them show up directly in her inbox.
Think of it as setting an automatic rule on the server for the messages
that you define.
But in this case, lets say that Sara is completely done with this email
thread, or its one of those reply-all disaster threads thats gotten out
of control. Instead of Always Move, which will keep putting those
emails in her selected Inbox folder, Sara can press the Ignore button
so that all of those emails and all future emails in this conversation
will all be sent directly to Deleted Item. Sara wont have to keep
deleting them herself. Its like a mute button for troublesome email
threads.
31
Microsoft Confidential
With voicemails and their previews right here in her inbox, Sara gets
notified when she gets a voicemail even if shes on a device and not
at her desk at work. She can choose what voicemails to listen to in
what order, and the preview lets her decide if she needs to take
action. This could be valuable if somebody called while Sara was in a
meeting she no longer has to leave the meeting and answer the
53. In the message list, click the Voice Mail email from Alex
Darrow.
call, or let it go to voicemail and then later go and get it. And she can
continue to access her voicemails whenever she wants to.
The next item Sara sees in her inbox is this one here with the subject
Youre Now an Owner of the Project Falcon Team Mailbox, which is
54. Note the Voice Mail Preview in the body of the message.
letting Sara know that shes been added by her manager to a Site
Mailbox about Contosos new long-term initiative called Project
Falcon. Site Mailboxes in the new Office allow users to store
documents and emails related to group projects in project-specific
folders that span SharePoint and Exchange. This is a great way for
Sarah to manage her project data and communications for
32
Microsoft Confidential
55. In the message list, click Youre Now an Owner of the Project
Falcon Team Mailbox.
on it.
If you look at the navigation pane, you can see that Sara is already a
member of another Site Mailbox for Tailspin Toys. Sara has this
Updated Budget email here with an attachment that was only sent
to her. Sara knows this information would be useful to the rest of her
teammates. But instead of forwarding the attachment by email to a
team distribution list, here in Outlook, Sara can just drag the
57. In the folder pane, expand the Tailspin Toys team mailbox.
58. In Saras primary Inbox, in the message list, click the Updated
Budget for Tailspin Toys email.
33
Microsoft Confidential
34
Microsoft Confidential
71. In the message list, click the Voice Mail from Alex Darrow.
72. In the message list, click the [Hiring]: Candidate Interview
email from Janet Schorr.
73. In the folder pane, click and then expand Personal Archive.
74. In the folder pane, click Inbox.
75. In the message list, with the Review Proposal for Tailspin Toys
35
Microsoft Confidential
right here next to her photo at the top right of the screen. Exchange
automatically sets her presence based on the appointments in her
calendar, but Sara can manually choose another presence status if
she wants. If shes not happy with the photo she has in the system,
she can click this button right here to change it. In the window that
76. In the message list, click the Northwind Update Reply ASAP
message from Janet Schorr.
77. Point to the exclamation point in the message.
opens, she can click browse to upload an alternative photo into the
system so that it shows up both in her experience and for anybody
else that receives an email from her.
The next thing Sara needs to do is find an attachment about the
Northwind Traders acquisition that she received a while back from
Bonnie Kearney, Senior VP of Sales/Marketing. When she clicks the
search icon, the search box appears and she can begin typing
North. While shes typing, youll notice that the improved search
78. Click the ellipsis next to FORWARD and then click reply by IM.
79. In the new IM window, type I saw your email, what is the
issue? and then press Enter
80. In the upper right corner, click Sara Davis.
81. Point to the different presence options.
Together, all of these search enhancements help Sara spend less time
typing and re-typing search parameters, and more time finding the
right email and acting on it.
36
Microsoft Confidential
Sara was looking for this Northwind Acquisition Details email because
of its attachments. You can see that with the new Exchange, her
Outlook Web App provides a preview of the photo she received, but
what she really is looking for is this Northwind Acquisition Outline
PowerPoint right here. And, thanks to Office Web Apps, Sara can
preview this PowerPoint attachment in a web browser without having
to save it to the local kiosk machine at the airport, or even rely on the
message presence icons, and she notices her colleague Garth Fort
was on this email. Sara can click on Garths name to get a hover card,
which she can use to quickly get a bit more information about him or
click to communicate by email, IM, or meeting request. Clicking here
expands the hover card to show Sara a full contact card with all of
Garths information from the company directory. Sara actually wants
to add this contact information to her personal contacts, which she
can easily do just by clicking this button.
When she flips over to her People Hub and scrolls down to the [G]
section, Sara can see the listing for Garth Fort she just added which
has only his company directory information, including work phone
37
Microsoft Confidential
number. Sara can also see that just above it there is a partial entry
she had created entered when she exchanged cell phone numbers
with Garth while working on a project a while back. If Sara goes back
into the contact card for Garth Fort, she sees that Exchange has
suggested she link this new Garth Fort company directory entry with
the existing Garth entry, so shell see only one single contact card
with all of Garths contact information going forward. That single card
Having created her single contact card for Garth Fort, Sara thinks it
that project, Alex Darrow. She begins typing, and the improved
people search capabilities in the new Exchange provide Sara with a
set of prioritized results. You can see these are not just in alphabetical
order Exchange is actually sorting the results by relevance to Sara,
based on the frequency and type of communications shes had with
each contact. In this case, Alex Darrow is a few entries down since
Sara hasnt talked with him in a little while. Sara can also expand
Alexs listing to choose between multiple email addresses Sara has
consolidated for him from multiple sources, like she just did with
Garth Fort. Sara selects Alexs corporate email, types a quick
101.
In the My Contacts list, click second Garth Fort.
102.
In the detail pane, under Linked Contacts, click
Manage
38
Microsoft Confidential
106.
107.
108.
over the next few days. The first view she sees is how she left her
calendar the last time she looked at it, in month plus agenda view.
This view can be particularly useful for when Sara has fewer items on
her calendar and they are spaced out across the month. Here, the
month view portion lets Sara get an at-a-glance sense of how dense
her month looks and where her calendar items fall throughout the
month, including the first few calendar items of each day. The
agenda view portion is new in Outlook Web App and lets her see
events formatted as an ordered list. This offers Sara additional
context on whatever day she has selected from the month view, and
109.
In the To box, type A
If the list of cached names does not appear, click Search
contacts & directory.
110.
the day shes selected. When Sara has more items on her calendar,
Click AlexD@youronlinetenantdomain
111.
traditional grid view, Sara can of course switch to using a week view,
112.
In the Subject box, type How is the project going?
and then click SEND
113.
can use to easily show or hide them on the calendar surface. Besides
her own family calendar, you can see Sara can toggle on her
39
Microsoft Confidential
114.
115.
organizations, Sara and Brian are able to share and view each others
calendars as simply as if they were both in the same organization.
Sara could also show/hide see any calendars that she subscribed to
on the internet. Internet calendar subscriptions are useful because
they provide access to non-Exchange calendars which are being
published over the internet, and they can be viewed along with
Exchange calendars in a consistent fashion.
In this case, since Sara and her colleague Molly Dempsey are
116.
In the top right, click week, click work week, and then
click day.
117.
Click week.
traveling to Los Angeles for business, Sara wants to set up an inperson meeting with Brian from Tailspin Toys to discuss some details
of the partnership. So she toggles off the unrelated calendars and
118.
119.
goes back to her calendar. Here, Sara could look at her and Brians
calendars overlaid and manually find a time that works for both. For
example, it looks like 2:00pm on Tuesday works for the two of them.
However, Exchange provides a scheduling assistant in the meeting
request form which will help Sara find a time to meet with Brian as
well as any other attendees, and plan the rest of the meetings
details, all in one place. So, she clicks the new event to launch the
120.
In the folder list, click the Brian Johnson (TAILSPIN)
check box.
40
Microsoft Confidential
form and get started. She types Discuss Tailspin in Person in the
subject line and then clicks add attendees. Here, she adds both
Brian from Tailspin as well as her coworker Molly, and you see their
free/busy information appear side by side in this day view. Youll also
notice that because of external calendar sharing, Sara sees the
free/busy information for Brian just as clearly as she can for her
internal coworker Molly. If she selects the 2:00pm on Tuesday time
we saw earlier, youll notice that Molly has a conflict. Sara could flip
121.
In the folder list, click the sports team iCal (optional if
setup) check box.
from one day to the next to find a time that works for all three, but
this scheduling assistant can help her do this more quickly. So Sara
clicks on this week button up here, and youll see the free/busy grid
change. What you see now is a graphical representation of how free
or busy a given time block is for all of the added attendees for the
meeting. Saras own calendar is indicated in blue. When more of a
cell is shaded, that means more attendees have conflicts. An unshaded cell means that all attendees are available. Using this view,
122.
Clear the check boxes for each other calendar except
Brian Johnsons.
123.
In the top left, click new event.
124.
In the Subject box, type Discuss Tailspin in Person
125.
In the top navigation, SCHEDULING ASSISTANT.
126.
In the add attendees box, type Brian Johnson, and
then click Search contacts & directory.
127.
In the add attendees box, type MollyD, and then click
41
Microsoft Confidential
own free/busy column. Sara can click this check mark to accept the
scheduling information and get back to the main meeting request
130.
131.
form.
The other thing Sara can do to enrich the meeting request is add a
geographical location instead. She clicks the location field and delete
the conference room, then shell want to list the Starbucks she has in
mind for the meeting with Brian and Molly. As Sara begins typing
Starbucks, Exchange provides her with a list of places she has
previously used, prioritized by relevance just like people search
results are when Sara types recipient names to add to an email. You
132.
Point to date and time boxes which are now updated
with the new schedule.
can tell Sara likes her coffee, since she has a few other Starbucks
shes previously used. But in this case, shes never been to the
Starbucks here in Los Angeles where shes going to meet Brian. So
she keeps typing Starbucks Los Angeles, CA 90010, and additional
location capabilities in the new Exchange let her click the search icon,
to actually resolve her typed location against physical addresses using
133.
134.
135.
Bing Maps. And this is not a static map, either. Sara can very easily
interact with it to find the right Starbucks shes looking for in this
case, this one at 3680 Wilshire Blvd and even zoom in to get a
street view of what the area looks like nearby. When Sara clicks ok,
42
Microsoft Confidential
136.
137.
138.
And just like contact cards, the new Exchange stores these Places, so
they can become prioritized options for her to select from when
typing in the location field in the future.
Having added all of the information she needs to the meeting
request, Sara can click this envelope button to send it off to the
attendees and add it to her own calendar.
If Sara wants to check out the latest status on one of her other
meetings, like this Tailspin Toys Proposal Review + Lunch meeting
here, all she has to do is click and shell see a peek of the meetings
information. If she clicks Accepted, she can see the full form with all
of the required and optional attendees. If shes the meeting
organizer, she can see whether theyve accepted the meeting
invitation or not. And, if the meetings location has been resolved
against physical addresses using the internet, the map pivot will
appear as well. Sara can click this pivot to see the meetings location
on a map and interact with it to get more context on the area,
including moving the map around, zooming in/out, getting a street
view, clicking to get directions, etc.
Saras been able to get a good deal of work done at the internet caf
kiosk while waiting for her flight. Before she boards the plane,
139.
In the Location box, complete typing Starbucks Los
Angeles, CA 90010
140.
Click Search Bing.
If necessary, in the Enable Location Services dialog box, click
Allow once.
141.
Interact with the map.
142.
In the search results list, click the Starbucks, 3680
Wilshire Blvd location.
143.
Click OK.
144.
however, she wants to set things up so that calls to her work phone
43
Microsoft Confidential
145.
Click SEND.
146.
In the folder pane, click the Brian Johnson (TAILSPIN)
check box to remove the calendar from view.
147.
In the Calendar, in the Tuesday column, click Tailspin
Toys Proposal Review + Lunch.
148.
In the calendar peek, under EDIT, click Accepted
apply. She can then say transfer the call, and she can choose to
automatically transfer it, either to a manually-entered phone number,
like if she actually wanted to send it to her own mobile phone while
shes on the go, or in this case she can send all calls to her colleague
149.
Click map.
150.
Molly Dempsey. That way, Molly can handle any important issues
Sara might have missed during her absence. All of this and much
more is available as part of Call Answering Rules, so that people can
manage their phone and their voicemail the same way theyre used
to managing their email: all in one place.
Sara can also manage her mobile devices personal and workprovided ones here in her Outlook Web App options. She clicks
phone and then mobile devices, and in this tab, she could see any
devices she had added that were configured to synchronize with her
44
Microsoft Confidential
Exchange account. She can also disable the sync relationship, access
her device recovery password, and initiate a remote device wipe in
case she has lost her phone and wants to make sure nobody else can
access her data. While Sara can wipe her phone herself if she needs
to, there could be times where her company needs to do the wipe
instead, for example if Sara leaves the company.
151.
Sara would also come to Outlook Web App options if she wanted to
Settings
and then click Options
152.
In the left navigation, click phone.
153.
On the voice mail tab, under call answering rules, click
New.
154.
In the New Call Answering Rule window, in the Name
of rule box, type Forward calls to Molly.
155.
Under If a caller reaches my voice mail, and, click the
Select one menu, and then click If my automatic replies are
turned on.
156.
Under Do the following, click the Select Options.
157.
In the options window, click Call Transfer.
158.
In the Call transfer window, in the For box, type
MollyD.
159.
Click the Press the menu and then click 1.
160.
In the Phone number box, type 52003, and then click
save.
161.
In the options window, click ok.
162.
In the New Call Answering Rule window, click save.
manage her Site Mailboxes. She goes here to site mailboxes, and
under my site mailboxes she sees those she is already a part of and
has access to, including the Tailspin project and the Project Falcon
project she was just invited to join.
Lastly, Sara can also check on her Apps for Outlook, i.e. the apps
which show in emails based on content, and provide appropriate
actions or information to her right there in the email. In the
navigation pane, click apps This page not only shows her which
apps are active for her account, but the IT department can let Sara
manage her apps depending on company policies. For example, in
addition to apps IT rolls out to the Company, Sara could be allowed
to add new apps for herself by clicking the add button here. There
are options for how Sara can be allowed to have. She can be given
permission to shop in the Office Marketplace for new apps. She could
also be allowed to add an app from a URL that her company
provided, if the company had a custom line-of-business app it had
163.
45
Microsoft Confidential
could be allowed to select this last option and add it from a file on
her desktop. Of course, at any time Sara can click this disable
button to get rid of any of these apps if she no longer wants it active
for her account.
One of the last things to note is that the new Exchange provides Sara
with offline access to her account using Outlook Web App in the
browser. This means that if Saras internet connection cuts out, or she
brings her laptop into an elevator, shell still be able to open emails,
accept meeting requests, view upcoming appointments on her
164.
165.
166.
calendar, and look up contact details just like shes used to doing
with the rich Outlook client on her PC. To give you a sense for what
this looks like, you can see that when I unplug the Ethernet cable or
turn on Airplane Mode on my device, I can still click into this email.
So, whether Sara is connected using the rich new Outlook client or
Outlook Web App in her favorite browser, and even if shes lost her
internet connection, the new Exchange offers Sara better anywhere
access to her email, calendar, and contacts than ever before.
46
Microsoft Confidential
168.
169.
In the top navigation, click Outlook.
170.
In Outlook Web App, in the upper-right corner, click
Settings.
171.
In the Settings menu, click Use mail offline.
17. In the dialog box, read the information and then click yes.
18. In the dialog box, click add to favorites.
19. In the Add a Favorite dialog box, click Add.
20. In the folder pane, point to Synchronizing.
21. At the bottom of the browser window, review the message
and click Yes.
Wait for the mailbox to finish Synchronizing. If you wish to
continue without finishing synchronization, be aware that
some messages may not be available offline.
22. On the demo computer, disable your network connection.
This can be done either by removing your network cable, or
by disabling your WiFi card. Alternatively, from the Start
screen, type ncpa.cpl and then press Enter.
In the list of Network Connections, locate network adapter
connecting to the Internet, right-click the adapter, and then
click Disable.
23. Switch to Outlook Web App.
24. In the Inbox, click different messages to show that email is still
available when disconnected from the network.
47
Microsoft Confidential
48
Microsoft Confidential
49
Microsoft Confidential
50
Microsoft Confidential
Demo Exercise
Speaker Script
Steps
51
Microsoft Confidential
8. Click the New menu and then click New DLP Policy from
template.
it in a testing mode that doesnt impact the way messages are sent
and received, since thats often the way companies approach and
52
Microsoft Confidential
deploy compliance solutions For this demo, Ill tell it to test without
sending notifications. I can save it, and just like that, Ive created a
DLP Policy for the organization!
If I go back into our policy, we can take a look and see how this policy
is built on top of Exchange transport rules, which enforce policy by
automatically acting on email meeting specified criteria while in
transport through Exchange. Leveraging transport rules lets the new
Exchange offer flexible and rich DLP Policy options for admins, while
still being easy and familiar to manage as a package. When I dive into
one of these rules, U.S PII: Scan email sent outside - low count, you
can first see the conditions upon which the rule will fire as part of this
policy: if the recipient is outside the organization and the data is of a
certain type. If I click here, you can see this low count rule only
applies if there are 1 to 9 instances of that type of data. This is
because the DLP Policy template is set up to react differently
depending on the volume of numbers included in the email. If, say, a
few numbers are sent accidentally during the course of business, then
the template allows the message to be sent but with a warning to the
user, and an incident management report will be sent to the
Compliance Officer Denis. But, if I click here into this other high
count rule, youll see that if there are more than 10 instances of
sensitive data, the system will block the user from sending without a
forced override and justification. So you see, DLP Policies are flexible
and can take different actions in a very granular way.
53
Microsoft Confidential
24. Under Data loss prevention policy, double-click the PCICreditCard policy.
First, you can see that the rule will act on any email sent internally or
externally with credit card formatted data. When we click on the
credit card string, you can see how easy it is to add or modify credit
card formats or other sensitive information types. Next, you can see
that this rule will scan for this type of data in the subject line, body,
and even attachments included with the email.
Next, you can see the actions that will be applied when the conditions
are met. One of these actions includes showing DLP Policy Tips to
users who trigger this credit card DLP Policy. DLP Policy Tips help
empower users to be compliant by providing a granular notification
in Outlook when they may be violating corporate policies. They can
be soft warnings like mentioned earlier with the low count rule of our
31. Next to Notify the sender with a Policy Tip, click Block the
message, but allow the sender to override and send.
54
Microsoft Confidential
Next, we can see that this DLP Policy has been set up so that it will
simply block emails with credit card information from being sent
externally, until either the sensitive content or external recipients are
removed from the email.
So you see, DLP Policies can be set up with strict and soft controls.
Policy Tips help protect an organizations sensitive information while
minimizing the impact the companys Policies have on the way users
conduct their business.
Lastly, if administrators want to expand their collection of DLP Policies
46.
47.
48.
49.
56
Microsoft Confidential
53. In the New tags list, click Applied by Users to Items and
Folders (Personal).
54. In the New Tag window, in the Name box, type Project
Falcon.
55. Under Retention action, click Delete and Allow Recovery.
56. Under Retention period, in the When the item reaches the
following age (in days) box, type 1825, and then click save.
57. Click the Retention Policies tab.
58. Double-click the Company Retention Policy.
59. On the Company Retention Policy page, under Retention
Tags, click Add (+).
57
Microsoft Confidential
this email. She simply goes up and selects Retention Policy. And what
that does is bring up our item-level retention policies pushed out by
the Administrator. She can see a few options, including the policy we
72. In the message list, click the 5-year Long-Range Plan from
Tony Krijnen email.
73. In the ribbon bar, click Assign Policy, and then click Project
Falcon (5 years).
Now, lets say that Sara is responsible for the return on investment
calculations for Project Falcon. And, though the numbers look
promising for Contoso, shes decided its a good idea to edit the
numbers to make them look even better. She wants to fill her
colleague in with a quick email. So she clicks new and starts typing a
quick message:
74.
75.
76.
77.
Microsoft Confidential
With Project Falcon on her mind, Sara thinks its a good time to send
one of the project documents which happens to contain a bunch of
credit card numbers to her manager for review, and well see our
DLP Policy come into play. Sara begins another new message, but
she accidentally adds an external recipient jim@fabrikam.com instead
of her internal manager, Janet Schorr. She types Project Falcon info
in the subject line and then adds this Project Falcon customer data
attachment. And look what happens once shes added the
attachment: Sara gets the Policy Tip we set up earlier that educates
her that her email contains sensitive content. It wasnt the body or
even attachment name that triggered the note. Exchange analyzed all
of the content of the message, including the attachment.
If Sara hovers here, she can see what type of sensitive content was
discovered, in this case, credit card information in the attachment.
Sara can also use this link to go read more about Contosos policies.
If she felt like the Policy was inaccurate or incorrectly applied, she
could use the report button to provide feedback to the
administrator on what is referred to as a false positive. The admin
can then update the Policy to better reflect company policy.
79.
80.
81.
82.
83.
Since the recipient is external, the DLP Policy is strictly enforced and
Policy Tip states that the message simply cannot be sent until she
either removes the sensitive content or the external recipient. She
cannot send the email and break policy.
If Sara removes the external recipient, and adds her manager Janet
instead, you can see that since Janet is an internal recipient, the Policy
60
Microsoft Confidential
62
Microsoft Confidential
Im pretty sure well get the Project Falcon funding were looking
for. I made sure of it with the calculations I included in my
spreadsheet, if you know what I mean. She might want to remove
those last two sentences. Now Sara will go ahead and save the email,
confident that shes saved herself from getting in trouble.
Sara then proceeds to the Project Falcon team site and edits the
actual Excel spreadsheet to reflect a more realistic return on
114.
In the ribbon bar, click Actions
.
115.
In the menu, click Edit Message.
116.
Select the text I made sure of it with the calculations I
included in my spreadsheet, if you know what I mean and
then delete the selected text.
117.
.
63
Microsoft Confidential
64
Microsoft Confidential
And here we see the results. Our discovery search results provide us
with some metrics on how many items from the different types of
sources were discovered, and if we scroll down here, we can actually
see an item-level preview list of results. You can see in the Exchange
results tab there are a bunch results from searching Exchange, as well
as refiners to scope the results just to things like email, meetings,
contacts, tasks, notes, and Lync instant messages. We can hover over
any of the Exchange results, such as this email here, to get a peek, or
we can click on it and get a full preview using Outlook Web App.
This other tab shows the SharePoint results, including sites and
documents from SharePoint document libraries. We can similarly
refine the SharePoint results by document type, site, etc. And, we also
get peeks at the metadata and can open SharePoint sites in the
browser, or document results in the Microsoft Office client to see the
full document itself.
Its important to note that because of the In-Place hold that Denis put
on Sara Daviss mailbox and the other sources of data, these search
results contain not only the current versions of the emails and
documents, but any other versions modified along the way were held
as well once the in-place hold was enabled. This means we could
132.
Under Sources, review the number of items found in
the searched locations.
133.
Under Query Statistics, expand project NEAR(20)
falcon.
134.
Expand the sub items and review the items listed for
each query string.
135.
On the Exchange tab, review the list of discovered
items.
136.
Point to one of the emails to see the email peek.
137.
Click the email to open a preview in a new tab or
window.
138.
Close the tab.
65
Microsoft Confidential
145.
Switch to Internet Explorer and the Project Falcon
Audit.
146.
Click the Exchange tab.
147.
Point to the two New Project coming emails found in
Sara Davis mailbox.
To do this, Denis presses this export button here, which takes him to
a page where he can make some selections about how to export the
data. For example, he can remove duplicate items, or remove all IRM
protection from items, depending on the requirements for his search
results. Hell keep the defaults, and press export. Denis can specify
where to save the data set, and get the export started.
And this concludes our demonstration on how the new Exchange is
designed to help keep your organization safe. Youve seen some
real-life examples of how new features supporting Data Loss
Prevention, Archiving, In-Place Hold and eDiscovery can dramatically
simplify what can otherwise be extremely time consuming and costly
66
Microsoft Confidential
67
Microsoft Confidential