Exchange Online
Mail Flow
Presenter name
Presenter role
This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided
to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in
such packages is strictly prohibited.
The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or
implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement.
Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond
to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the
accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product,
domain name, e-mail address, logo, person, place, or event is intended or should be inferred.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject
matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this
document does not give you any license to these patents, trademarks, copyrights, or other intellectual property.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of
this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means
(electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
For more information, see Use of Microsoft Copyrighted Content at
http://www.microsoft.com/about/legal/permissions/
Microsoft, Internet Explorer, Outlook, SkyDrive, Windows Vista, Zune, Xbox 360, DirectX, Windows Server and
Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. All other trademarks are property of their respective owners.
Overview
Objectives
Rules
Types Of
Rules
Transport Rules
Let you apply messaging policies to messages in the transport pipeline
Actions, such as redirecting a message or adding recipients, rightsprotecting messages, and rejecting or silently deleting a message can
be taken
Transport Protection Rules
Administrators can use transport protection rules to implement
messaging policies to inspect message content, encrypt sensitive
email content, and use rights management to control access to the
content
Outlook Protection Rules
In Exchange Online, Outlook, and OWA users and administrators can
apply Information Rights Management (IRM) protection to messages by
applying an Active Directory Rights Management Services (AD RMS)
rights policy template. This requires an AD RMS deployment in the
organization
6
Transport
Rules
Transport
Rule
Components
Choose a mode for this rule: (Enforce, Test with Policy Tips,
Test without Policy Tips)
How to
Create a
New Rule?
Transport
Rules via
PowerShell
10
Encryption
11
Office 365
Message
Encryption
Office 365 Message Encryption is a new service that lets you send encrypted
emails to people outside your company
Admin:
Simple to provision and configure
Policy driven via Transport Rules
Customizable branding of encrypted emails and mail reading portal
Allows for Enterprise content inspection and compliance
Sender:
Ability to send encrypted messages to any SMTP address regardless of
recipients client or service provider
Recipient:
View encrypted messages on Office 365 Message Encryption portal after sign-in
Office 365 Message Encryption portal has rich OWA controls for viewing and
composing messages
Replies from the portal are also encrypted
12
Admin
Configurati
on
13
Receiving
and
responding
to
encrypted
messages
14
How it
works
Exchange Online
Policy detection and
Enforcement
O365 User
Delive
r
d
Sen
Internet User
Mail Reading Portal
t
Pos
Tenant
configuration
Microsoft
account/Organization
Account
15
Message Tracking
16
Message
Trace
17
How to Run
a Message
Trace
18
View
Message
Trace
Results
19
Message
Tracing via
PowerShell
20
Accepted
Domains
21
Accepted
Domains
22
Domain
Types
Authoritative
All recipient mailboxes in that domain are hosted by Exchange
Online and all email is delivered directly to Exchange Online
More than one accepted domain can be configured as
authoritative
Required for Directory-Based Edge Blocking
Internal Relay
Responsibility for mail delivery is shared between Exchange
Online and another messaging system
Typically, your on-premises messaging system receives mail
first and then relays mail to the Internet for delivery to
Exchange Online recipients
23
Connectors
24
Connector
Types
25
Using
Connectors
27
Module
Review
28
Module
Summary
In
30
2013
2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks
in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of
this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation.MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR
STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION