![]() Perhaps someone sent out information that they should not have, or a company is compelled by a legal order to remove all references to an event, project, or product. It's common to receive requests from an authority (e.g., the HR department, senior management, legal advisors), asking administrators to remove specific messages from user mailboxes. However, we live in a litigious environment, so the need for search-and-destroy activities has evolved. With servers protected by reliable antivirus barriers, administrators aren't likely to be forced to rush to disinfect mailboxes by searching and removing infected messages. Today's antivirus products all use a supported Microsoft API for fast and reliable access to mailbox contents. HOW TO COMPLETELY REMOVE SEARCH AND DESTROY CODEIt was only after Sybari (bought by Microsoft in 2005) introduced the "ESE shimmy," enabling its antivirus engine to load its code before the Information Store, that we had reliable and robust antivirus products for Exchange that could catch viruses quickly. In these cases, administrators might be forced to log on to user mailboxes to check for and remove problem messages before they could spread infection. ![]() Viruses could often sneak past the checks on incoming email to penetrate mailboxes. As the number of mailboxes grew and the volume of messages increased, this technique struggled to cope. These engines depended on the ability to log on to every mailbox on a server to check incoming messages. In the early days of email viruses - around the time that users still happily opened any message that proclaimed love for the proud recipient (the first I Love You virus appeared in May 2000) - many antivirus engines that protected email servers were slow and ponderous. ![]() HOW TO COMPLETELY REMOVE SEARCH AND DESTROY HOW TOFor example, how do you remove objectionable items from user mailboxes without teaching every user how to use Outlook or another client to purge items, especially when accessing an item might download a malicious payload? The good news is that Exchange 2010's built-in compliance features can also be used to locate and eradicate problematic items. In any case, although the legal community will luxuriate in its ability to expedite discovery searches and review the results, messaging administrators often have more mundane concerns. Although small organizations also need to comply with legislative or other regulatory directives, large organizations tend to devote the most attention to this aspect of email - if only because they are often targets for discovery actions launched by external parties. And why shouldn't this be the case? Microsoft invested heavily during the development of Exchange 2010 to create an array of features that could satisfy the compliance requirements of large organizations. Multi-mailbox discovery searches receive a lot of headline attention when discussion turns to the features of Microsoft Exchange 2010 (or Exchange Online, as deployed in Microsoft Office 365). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |