Interlink Cloud Blog

Interlink Cloud Blog

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.
Matt Scherocman

Exchange Online Deleted Items Retention Workaround

So, we all have that person, or should I say people, in our organization that use deleted items as a means to actually organize email. Usually, it is because they don't want to organize it. They just delete it and figure they can find it later. This amazing irony of deleting something, then using it as a search folder is somewhat impaired by Exchange Online in Office365. Microsoft's policy for deleted items retention is 30 days which means your favorite deleted items organizer will close Outlook one day and lose their primary means for searching email.

Fortunately, or unfortunately, there is a workaround for this called Litigation Hold in Exchange Online. This accidental feature design for legal keeps all mail retained permanently, and allows deleted items to be stored indefinetely. The challenge is whether or not you really want to do this. Or do you want to take the opportunity to force good behaviors? And the answer is that you don't have a choice because it's the CEO or CIO who is doing it, and they dictate the business rules while we as IT Services cannot. We find ways to make it work.

Before you begin   To learn how to install and configure Windows PowerShell and connect to the service, see Use Windows PowerShell in Exchange Online.

Run the following command to configure the litigation-hold duration for a mailbox that’s already on litigation hold.

Set-Mailbox  -LitigationHoldDuration <duration, in days>

Example   The following command sets the duration of the litigation hold on Ann Beebe’s mailbox to one year.

Set-Mailbox "Ann Beebe" -LitigationHoldDuration 365

Run the following command to put a mailbox on litigation hold and set the litigation-hold duration.

Set-Mailbox  -LitigationHoldEnabled $true -LitigationHoldDuration <duration, in days>

Example   The following command puts Pilar Pinilla’s mailbox on litigation hold, and sets the litigation-hold duration for 7 years.

Set-Mailbox "Pilar Pinilla" -LitigationHoldEnabled $true -LitigationHoldDuration 2555

Note   You have to use the IncludeLitigationHoldDuration parameter with the Get-Mailbox cmdlet to view the value of the litigation-hold duration. For example, run the following command to display all litigation-hold settings for Pilar Pinilla.

Get-Mailbox "Pilar Pinilla" -IncludeLitigationHoldDuration | fl Litigation*

After this you will get a pop-up box with two options: one is a note that you can send to the mailbox owner telling them the details of being on litigation hold, in this case because you need to keep all deleted email indefinetely. Then, a URL if you want to point them to a policy online. As you'll notice, the mailbox is in pending. It will take up to 60 minutes to take effect in Exchange Online.

I hope this was helpful. As always, more posts to come!

Continue reading
  3646 Hits
  0 Comments
Matt Scherocman

Office365 Voicemail and Exchange Messaging in Action

Several posts ago, I did a short review of Exchange online and Lync online. During that time we discussed another soon-to-be-revealed post, reviewing the capabilities of Office365 and Unified Messaging. So, let’s get right down to it!

First – What does it get you?
1. Obvious – voicemail through Exchange – using SIP gateways configured to connect to UM online.
2. Faxing – Yes, you can have an on premise fax solution, with SIP capabilities or compatible with exchange, along with a gateway. However, most providers doing Exchange 2010 UM integration for faxing support Microsoft SIP, some are even Virtual Machines.
3. Outlook voice access – Perhaps the most critical to some of us!!!
4. Missed call notifications.

Configuring – If you’ve configured Exchange UM on premise, you have an immediate advantage. Very simple:

Note that we can set the dial play URI type, this includes SIP URI, and the preference of most, E.164.

So, we have configured our UM dial plan. Now let’s get our gateway in place. The gateway will be the interface between either your standard POTS based PBX or another IP PBX. There are many gateways out there that can do SIP/TLS in a supported fashion with Microsoft.

Now, configure your respective gateway based on the new UM IP gateway configuration – The following will be generated for configuration:

Note here is where Microsoft is giving you the SIP forwarding address. This will assist you in configuring your SIP gateway. Seems easy enough, but depending on the device you use and your unique situation, as well as the general IT principle, nothing is ever as easy as it looks. Fortunately, we can troubleshoot!

Now, let’s not forget we have to set an auto-attendant up. For SIP and E.164, keep in mind you must configure this for the E.164 extension type. See the configuration options below:

Also – If you are using E.164 or telex you will need at least one UM Hunt Group:

Get stuck? Well you can check call logs, and user logs right from the Exchange online console:

Very familiar look and feel, however the architecture of this is key. It’s great to show you what it is capable of doing, but to get it functioning is based on your situation. However, the one thing that doesn’t change regardless of where you are, is that  you must understand the concepts and technologies that power this experience. For many of us, telephony integration into systems is new because we are systems, but there are also some of you out there that decided to learn core infrastructure. With systems and infrastructure knowledge, you begin working toward understanding the Microsoft Lync, and Exchange PBX solutions, and how online ports those into hosted integration.

Hope this was a helpful post, more to come soon!

Continue reading
  4916 Hits
  0 Comments
Matt Scherocman

What is Versionless?

Versionless software is software that is always up to date with incremental improvements.  Microsoft has flipped the coin.  Clients used to have to wait for functionality to be available in the cloud.  Now the cloud gets the functionality first and on premise comes later.  This change is tremendous for clients.  The number one obstacle that clients have told me to utilizing new software is the deployment.  Now in the cloud, Microsoft takes care of that deployment and keeps the product up to date.  From the slides you can see their commitment to the cloud and how much functionality is being released on a regular basis. The 2013 graphic was produced in the late summer time frame so it doesn’t include new functionality like encryption included in the E3 plans that came out later in the year.
What we've delivered 1

What We've Delivered 2

 

This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  5368 Hits
  0 Comments
Matt Scherocman

What Data Security and Compliance is Built into Office 365?

Security is at the heart of Office 365.  Here are some great bullet points from a recent Microsoft blog listing.  Check out the full article here:  http://blogs.office.com/b/office365tech/archive/2013/10/23/cloud-services-you-can-trust-security-compliance-and-privacy-in-office-365.aspx
Built-in capabilities

    • Physical security - We monitor our data centers 24/7 and we have technologies and processes to protect our data centers from unauthorized access or natural disasters
    • Security best practices -We use best practices in design like Secure Development Lifecycle and operations like defense-in-depth to keep your data secure in our data centers
    • Data encryption - Every customers' email content is encrypted at rest using BitLocker Advanced Encryption Standard (AES) encryption
    • Secure network layer - Our networks are segmented, providing physical separation of critical back-end servers from the public-facing interfaces at the same time our Edge router security detects intrusions and signs of vulnerability
    • Automated operations like Lock Box processes - Access to the IT systems that store customer data is strictly controlled via lock box processes. This access control mechanism is similar to a system where two people have to turn the key for an action to be allowed.

Compliance

    • Independently Verified - Third party audits verify that Office 365 meets many key world-class industry standards and certifications
    • Control framework - We follow a strategic approach of implementing extensive standard controls that in turn satisfy various industry regulations. Office 365 supports over 600 controls that enable us to meet complex standards and offer contracts to customers in regulated industries or geographies, like ISO 27001, the EU Model Clauses, HIPAA Business Associate Agreements, FISMA/FedRAMP
    • Comprehensive Data Processing Agreement - Our Data Processing Agreement comprehensively addresses privacy and security of customer data, helping customers comply with local regulations

Privacy

    • No Advertising - We do not scan email, documents, build analytics or data mine to build advertising products. In fact, we do not use your information for anything other than providing you services you have subscribed for.
    • Data Portability - As an Office 365 customer, your data belongs to you, and you can export your data at any time with no restrictions. We act only as a data processor and provider of productivity services, not as a data owner
    • Notice and Consent - When we act upon your data, we let you know why and we ask for permission in advance or redirect any inquiries to our customers unless legally prevented to do so.
    • Breach Response - We have strong, tested and audited processes to inform you if there is a breach and re-mediate issues if they occur.
    • Data Minimization - We strive to minimize the actual amount of customer data that our internal teams have access to.


This posting is provided “AS IS” with no warranties, and confers no rights.

Continue reading
  4861 Hits
  0 Comments
Matt Scherocman

What Reports Does Microsoft Have Available For Monitoring Skype for Business Usage?

Microsoft has NEW Lync Reporting in Office 365.

These reports help you to visualize lync usage throughout your business.

Follow the link below for more information:

http://blogs.office.com/b/office365tech/archive/2013/10/03/visualize-lync-usage-for-your-business-with-new-reports.aspx

This posting is provided “AS IS” with no warranties, and confers no rights

Continue reading
  4190 Hits
  0 Comments

Welcome to the Interlink Cloud Blog

All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.