In this segment you learn how to set the IRM configuration to allow Exchange content protected by RMS to be searched using eDiscovery management roles.
- [Instructor] Most of this chapter…has been about using Information Rights Management…to keep message content away from anyone…but the intended recipient.…While this is the primary goal,…there are situations where it gets in the way.…Electronic discovery, or e-discovery,…is where any electronic system,…including your exchange server, is searched for data…to be used as evidence in legal proceedings.…During a legal investigation,…there needs to be a super-user, or some account,…that's able to search all messages,…including the encrypted ones.…
For this purpose, IRM in exchange,…has two settings to allow this type of search.…These settings can easily be turned on and off…with a single management shell cmdlet,…so you don't have to leave them on all the time.…I've opened the management shell on this exchange server…so we can see the two settings,…using the Get IRM configuration cmdlet.…I want to draw your attention to the middle of this list.…
You will notice that the search and the e-discovery…by super-user options are set to false.…
AuthorScott M Burrell
- Planning and configuring Active Directory (AD)
- Creating and configuring mailboxes
- Delegating mailboxes
- Mailbox and mailbox folder permissions
- Mail-enabled users
- Send as versus Send on Behalf
- Using public folders
- Managing public folder permissions
- RBAC versus AD split permissions
- Configuring user assignment policies
- Protecting Exchange content
- Message signing and encryption
- Troubleshooting IRM failure
Skill Level Intermediate
Deploying Exchange Server 2016with Robert McMillen3h 1m Intermediate
Exchange 2016: Client Access Serviceswith Scott M Burrell1h 50m Intermediate
Exchange 2016: Mailbox Databaseswith Scott M Burrell2h 30m Intermediate
Exchange 2016: Transport Serviceswith Scott M Burrell2h 24m Intermediate
1. Plan and Configure Active Directory (AD)
3. Other Mail-Enabled Objects
4. Role-Based Access Control
5. Protecting Exchange Content
Next steps1m 51s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.