Exchange Online Hightlights


365 Microsoft Office 365 Advisor since 2009 365
                        365                    
Only Microsoft Office 365 Subscription Advisors can offer trials and Purchase Offerings 

All Offerings deploy from a Microsoft Owned Data Center run by Microsoft 




With just a simple mail exchange (MX) record configuration change, our MS Hosted Services can be up and running quickly. There is no hardware to provision; no software to buy, install or configure; and no expensive training required for your IT staff.

Furthermore, there is no need for you to change or modify your existing e-mail infrastructure, or to even install and maintain any new hardware or software. The heart of Exchange Hosted Services is its distributed network of data centers located at key sites along the Internet backbone. Each data center contains fault-tolerant servers that are load-balanced from site to site and from server to server. In the unlikely event that one data center is unavailable, traffic can be easily routed to another data center, minimizing the chances of interruption to the service. And Microsoft algorithms analyze and route message traffic between data centers to help ensure secure and timely delivery.



View the DEMO

http://www.microsoft.com/business/thenewefficiency/keynote/demo/uc_management.aspx



Business Messaging Capabilities


-Email, shared calendar and contacts
-F
lexible mailbox sizes
-Anywhere Access
-Mobility with Active Sync devices



Flexible Deployment
-Online & on-premises co-existence
-Active Directory synchronization
-Data migration
-Information & desk-less worker

Security and Availability
-Built in anti-virus and anti-spam
-Multi-layer data protection
-Compliance archiving
-Email encryption

Simplified Management
-Unified administration center
-24x7 support
-99.9% service level agreement

Flexible Mailbox Sizes and Policies
 
-5GB allocation per standard user license (25GB Maximum)
-Pooled storage at company level
-Assign different mailbox size limits per user
-Additional storage available for purchase
-
Flexible send warning policy


Always up to date software





Microsoft Exchange Hosted Filtering
-MS Technet Web Site



 Layered Protection

Exchange Hosted Filtering employs five layers of preventive and protective functionality to prevent increasingly complex e-mail–borne threats from infiltrating businesses and violating corporate policy on e-mail use. The five components are as follows:

  • Threat Prevention   This first layer of protection uses many techniques, including sender reputation analysis, to weed out junk e-mail. Directory Services, a component of Threat Prevention, allows organizations to specify all valid users on a domain to block inbound e-mail addressed to invalid recipients. It also defends against directory harvest attacks.
  • Antivirus Protection   This filter incorporates multiple antivirus engines with heuristic detection capabilities to deliver zero-hour protection, thus minimizing the window of vulnerability after virus outbreaks.
  • Anti-spam Protection   By layering anti-spam technologies, the anti-spam filter detects all kinds of spam before they reach the corporate network. Technologies include rules-based scoring, fingerprinting, and sender policy framework (SPF) lookups.
  • Policy Enforcement   Administrators can use the highly flexible policy rule-writer to control mail flow for compliance. The policy filter offers many rule actions, such as reject, allow, and redirect. It also supports pattern matching in the subject and body of e-mail.
  • Disaster Recovery   Delivery of legitimate e-mail must be ensured. Filtered e-mail is protected by instantly and automatically queuing messages for later delivery if the destination e-mail server is unavailable.

Microsoft Exchange Hosted Archive
-MS Technet Web Site


Exchange Hosted Archive Service Components

Support to help satisfy industry and regulatory retention requirements

Exchange Hosted Archive has many features that aid in compliance including multiple retention periods, legal hold, supervision by keyword or percentage and immutable storage.

Granular Reporting and Auditing Capabilities

Any good security policy encompasses granular audits and logging of system transactions. EHA has numerous auditing reports available in addition to several traceable administrative and user events.

Rapid search and retrieval

Indexed storage enables fast retrieval of messages for e-discovery and other investigations.

Fully functional backup e-mail system

If primary e-mail systems go down, users and administrators will still have access to archived e-mail and can send and receive new messages in real time.
Microsoft Exchange Hosted Continuity
-MS Technet Web site


 Q: Are the Hosted Continuity archive datacenters SAS70 compliant?

A: The Hosted Continuity service is located at SAS70 compliant AT&T datacenters.

A copy of our SAS70 compliance can be obtained through technical support. Our Microsoft datacenters are ISO17799 compliant. We do not have any certifications for our Microsoft datacenters.

 Q: What type of electronic storage media is used for the Hosted Continuity archive?

A: The Hosted Continuity archive solution employs an integrated hardware and software combination to meet the goal of storing data in a non-rewritable and non-erasable format. Our proprietary software uses integrated code that prevents the e-mail records from being overwritten, modified or removed. In addition, the code cannot be disabled or removed from the system.

 Q: What is the type of hardware used for the Hosted Continuity archive storage?

A: The hardware used for the Hosted Continuity archive comprises HP and Dell computers with AMD processors. The storage used is SAN EMC Clarrion CX3-40.

 Q: What Internet browsers and versions can be used with the Web-based interface?

A: Only Internet Explorer can be used with the Web-based interface. The Web-based interface is designed to be compatible with Internet Explorer, v.6 and higher.

 Q: Are there any message types that cannot be journaled?

A: Public folder replication messages, directory replication messages and journal messages are exempt from message journaling.


Microsoft Hosted Encryption
-MS Technet Web site

Policy-Enforced Encryption Questions

Insert introduction here.

 Q. What kinds of policy rules can be enabled?

A. Message can be encrypted based on rules for sender, sender domain, recipient, recipient domain, or keywords in the subject or message body.

 Q. Can policy rules be set up using regular expressions?

A. Yes. Please see the help text on the Policy Filter for assistance in setting up reg-ex rules on the subject line or message body.

 Q. After a policy rule is created, when will that rule begin encrypting messages?

A. Rules begin to replicate throughout the global network at the top of each hour. On average, full replication takes 30 minutes beyond that.

 Q. Why is there an HTML attachment with every encrypted message?

A. The data is encrypted and stores the secure message in an HTML attachment. Users can use the Zero Download Messenger (ZDM) to read and reply to their messages by opening the HTML attachment and authenticating their identity.

 Q. How can all messages be encrypted except for those with a single opt-out phrase?

A. To encrypt all messages except for a message containing a specific opt-out subject line

  1. On the Policy Filter tab, create a single outbound encryption rule.

  2. In the Subject line field create a keyword or phrase which will not encrypt the message.

  3. Select the Not Match check box.

  4. Save the new rule.

Taking these steps will cause all messages to be encrypted, except for any message that contains the predetermined keyword or phrase in the subject line. No other encryption rules should be written if using this set-up.

 Q. How does the inbound decrypt rule work?

Decrypt rules can be set based on the subject line or the individual recipients email address. A decrypt rule will decrypt the message at our data center, so the message will be in plain text before it reaches the end-user. The end-user will not be required to read the message via the ZDM. It is recommended that TLS handoffs are accepted before using decrypt rules.

 Q. Are any HIPPA compliance rules provided?

A. A basic HIPPA rule set is provided as a courtesy. If messages have a key word or phrase in a first list and a keyword or phrase in a second set list the message will then be encrypted. Please see the Policy Filter section of the Exchange Hosted Filtering Administration Center Guide for more detail on the exact keywords and phrases.




Get Started Today. Click on the 5thnk logo! OR Send an email to sales@5thnk.com, or an email to sales@ittakesateam.net