SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Microsoft Exchange Products

                                  Mail Attender, Archive Attender, Discovery
                                  Attender & PST Backup Attender

                                  The Attender Utilities suite from Sherpa Software is the perfect solution for extending and
                                  expanding your administrative control of Exchange 2010. Microsoft has introduced a
                                  number of features designed to accommodate the Exchange 2010 larger inbox size, but
                                  when your business requires a more sophisticated approach to retention policies, content
                                  management or searching, Sherpa tools deliver!


                Sherpa Software Supplements Your Microsoft Exchange 2010 Deployment

               Exchange 2010 Features                                             Sherpa Software Features
                      Personal Archive                                                  Personal Archive
A specialized mailbox that is associated with a userʼs primary     Sherpa Tools provide a convenient way of managing content in
mailbox.                                                           the Exchange 2010 Personal Archive:


    •    Users can drag email from PST files into the Personal     •   Mail Attender may be used to identify PST files residing on
         Archive to make them easier to access online.                 desktop computers; then, can initiate rules to transfer mes-
    •    Email items from the primary mailbox can also be              sages from the desktop PST into the Personal Archive.
         moved to the Personal Archive automatically using             Similarly, network based PST data may also be imported
         Retention Polices, which reduces the mailbox size and         into the Personal Archive.
         improves application and network performance.             •   Mail Attender rules may be run on a scheduled basis to
                                                                       apply more complex retention policy criteria to either the
                                                                       mailbox or the Personal Archive.


                        Retention policies                                              Retention policies
You can apply retention settings to specific items, conversa-      Exchange 2010 retention policies offer a limited set of criteria
tions, or folders in an email mailbox.                             for managing your email content and must be developed using
                                                                   the Exchange management shell.
    •    The Exchange administrator configures policies, which
         are displayed in Outlook 2010 inside each email mes-      •   Archive Attender offers a wider set of policy selection cri-
         sage, along with a header that states the applied pol-        teria including message age, message date, message size
         icy and delete date.                                          or message subject.
    •    Two types of policies are available to users: delete      •   For more complex retention needs, Mail Attender condi-
         policies and archive policies. Both types of policies         tions may be used to trigger archiving. Mail Attender offers
         can be combined on the same item or folder.                   over 70 different types of conditional selection criteria.
    •    Administrators can also use archive policies to control   •   Archive Attender provides the ability to move archived
         when messages are automatically moved from a pri-             messages to a storage medium outside of the Exchange
         mary mailbox to the Personal Archive.                         data store.
                                                                   •   Archive Attender policies may be applied directly to the
                                                                       mailbox or Personal Archive by the administrator on a
                                                                       scheduled basis.




                                    FREE trial versions at www.sherpasoftware.com
Extend Your Microsoft Exchange 2010 Administration Capabilities with Mail Attender

               Exchange 2010 Features                                               Sherpa Software Features
                         Legal Hold                                                           Legal Hold
Exchange 2010 enables you to immediately preserve usersʼ            Exchange 2010 requires the use of a hold-in-place strategy
deleted and edited mailbox items (including email, appoint-         where items are ʻlockedʼ in the recipients mailbox until the le-
ments, and tasks) from both their primary mailboxes and Per-        gal hold has expired. Often times administrators would prefer
sonal Archives.                                                     to pursue a less obtrusive type of legal hold policy.


    •    Legal Hold can be set on individual mailboxes or           •   Archive Attender can be used as an integral part of your
         across the enterprise and can be set for a specific            retention strategy. By archiving mail from the Exchange
         time period (for example, you can place a mailbox on           journal mailbox and sequestering it in a designated archive
         hold for 90 days).                                             storage location, you can effectively build a central compli-
    •    Legal Hold also includes an option that automatically          ance repository that may be used for legal hold and search
         alerts users through Outlook 2010 that a hold has              purposes without impacting (or notifying) the end-user that
         been placed on their mailboxes.                                their messages are ʻon-holdʼ.
                      Single Item Restore                                                Single Item Restore
Exchange 2010, administrators can control how long deleted          •   Mail Attender offers administrators complete control over
and edited email is kept in the Recoverable Items folder.               the deletion process. Deletions may be scheduled from
                                                                        particular folders or constrained by any of the Mail Atten-
                                                                        der conditions.
                                                                    •   Mail Attender supports up to four different types of deletion
                                                                        including moving data to the Exchange dumpster.
                     Multi-Mailbox Search                                                Multi-Mailbox Search
Users can search a variety of mailbox items, including email,       The discovery search capability included in Exchange 2010 is
attachments, calendar appointments, tasks, and contacts, as         inherently limited. Sherpaʼs Discovery Attender offers a list of
well as Information Rights Management-protected content.            extensive search features that Exchange does not provide:


    •    Multi-mailbox search can work simultaneously across        •   Permits the searching of over 60 common types of docu-
         both primary mailboxes and Personal Archives with an           ment attachments without the need to install specific iFil-
         easy-to-use, Web-based console.                                ters as Exchange does.
    •    For legal discovery purposes, email located through        •   A host of powerful search criteria including regular expres-
         search can be copied and moved to a specified mail-            sions and fuzzy search terms.
         box, as defined by the administrator, for further inves-   •   The ability to save searches for later reuse or refine the
         tigation.                                                      results set for subsequent searching
    •    Rich filtering capabilities include sender, receiver,      •   Search results may be saved in a variety of different for-
         message type, sent/receive date, and cc/bcc, along             mats (including PST files) to be shared with third parties or
         with advanced regular expressions.                             imported into case management tools.
                                                                    •    In addition to multi-mailbox searching, include network
                                                                         PST files, public folders, archives or file shares in a search
                                                                         request.
             Role-based Access Control (RBAC)                                       Role-based Access Control (RBAC)
Exchange 2010, administrators can grant specific rights to us-      Discovery Attender provides records manager, compliance
ers, such as records managers, compliance officers, and litiga-     officers or litigators the ability to search a wide variety of source
tors perform multi-mailbox searches and other role-specific         material (including mailboxes, PST files and file shares) with a
tasks.                                                              single search query




                                                    www.sherpasoftware.com

Mais conteúdo relacionado

Mais de Sherpa Software

Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Sherpa Software
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationSherpa Software
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youSherpa Software
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital AgeSherpa Software
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesSherpa Software
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheSherpa Software
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Software
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationSherpa Software
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-DiscoverySherpa Software
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the NumbersSherpa Software
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Sherpa Software
 

Mais de Sherpa Software (12)

Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!Free Infographic: Where are you housing your data? IT Admins Weigh In!
Free Infographic: Where are you housing your data? IT Admins Weigh In!
 
Gensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive ConsolidationGensui Acme Imaging — Episode 5: Archive Consolidation
Gensui Acme Imaging — Episode 5: Archive Consolidation
 
Short Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt youShort Story: Gensui Imaging - What you don't know can hurt you
Short Story: Gensui Imaging - What you don't know can hurt you
 
The Sherpa Approach: Meeting the Demands of the Digital Age
The Sherpa Approach:  Meeting the Demands of the Digital AgeThe Sherpa Approach:  Meeting the Demands of the Digital Age
The Sherpa Approach: Meeting the Demands of the Digital Age
 
What's New with Discovery Attender for Notes
What's New with Discovery Attender for NotesWhat's New with Discovery Attender for Notes
What's New with Discovery Attender for Notes
 
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals CatastropheShort Story: Gensui Imaging – The Encrypted Journals Catastrophe
Short Story: Gensui Imaging – The Encrypted Journals Catastrophe
 
Sherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui ImagingSherpa Short Story: Data Leakage at Gensui Imaging
Sherpa Short Story: Data Leakage at Gensui Imaging
 
Email Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your OrganizationEmail Regulatory Compliance: Preparing Your Organization
Email Regulatory Compliance: Preparing Your Organization
 
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
The Sherpa Approach:  Features and Limitations of Exchange E-DiscoveryThe Sherpa Approach:  Features and Limitations of Exchange E-Discovery
The Sherpa Approach: Features and Limitations of Exchange E-Discovery
 
Discovery Attender by the Numbers
Discovery Attender by the NumbersDiscovery Attender by the Numbers
Discovery Attender by the Numbers
 
Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?Email Classification - Why Should it Matter to You?
Email Classification - Why Should it Matter to You?
 
The Case for NSF
The Case for NSFThe Case for NSF
The Case for NSF
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Comparing Exchange 2010 Features to Sherpa Software Exchange Solutions

  • 1. Microsoft Exchange Products Mail Attender, Archive Attender, Discovery Attender & PST Backup Attender The Attender Utilities suite from Sherpa Software is the perfect solution for extending and expanding your administrative control of Exchange 2010. Microsoft has introduced a number of features designed to accommodate the Exchange 2010 larger inbox size, but when your business requires a more sophisticated approach to retention policies, content management or searching, Sherpa tools deliver! Sherpa Software Supplements Your Microsoft Exchange 2010 Deployment Exchange 2010 Features Sherpa Software Features Personal Archive Personal Archive A specialized mailbox that is associated with a userʼs primary Sherpa Tools provide a convenient way of managing content in mailbox. the Exchange 2010 Personal Archive: • Users can drag email from PST files into the Personal • Mail Attender may be used to identify PST files residing on Archive to make them easier to access online. desktop computers; then, can initiate rules to transfer mes- • Email items from the primary mailbox can also be sages from the desktop PST into the Personal Archive. moved to the Personal Archive automatically using Similarly, network based PST data may also be imported Retention Polices, which reduces the mailbox size and into the Personal Archive. improves application and network performance. • Mail Attender rules may be run on a scheduled basis to apply more complex retention policy criteria to either the mailbox or the Personal Archive. Retention policies Retention policies You can apply retention settings to specific items, conversa- Exchange 2010 retention policies offer a limited set of criteria tions, or folders in an email mailbox. for managing your email content and must be developed using the Exchange management shell. • The Exchange administrator configures policies, which are displayed in Outlook 2010 inside each email mes- • Archive Attender offers a wider set of policy selection cri- sage, along with a header that states the applied pol- teria including message age, message date, message size icy and delete date. or message subject. • Two types of policies are available to users: delete • For more complex retention needs, Mail Attender condi- policies and archive policies. Both types of policies tions may be used to trigger archiving. Mail Attender offers can be combined on the same item or folder. over 70 different types of conditional selection criteria. • Administrators can also use archive policies to control • Archive Attender provides the ability to move archived when messages are automatically moved from a pri- messages to a storage medium outside of the Exchange mary mailbox to the Personal Archive. data store. • Archive Attender policies may be applied directly to the mailbox or Personal Archive by the administrator on a scheduled basis. FREE trial versions at www.sherpasoftware.com
  • 2. Extend Your Microsoft Exchange 2010 Administration Capabilities with Mail Attender Exchange 2010 Features Sherpa Software Features Legal Hold Legal Hold Exchange 2010 enables you to immediately preserve usersʼ Exchange 2010 requires the use of a hold-in-place strategy deleted and edited mailbox items (including email, appoint- where items are ʻlockedʼ in the recipients mailbox until the le- ments, and tasks) from both their primary mailboxes and Per- gal hold has expired. Often times administrators would prefer sonal Archives. to pursue a less obtrusive type of legal hold policy. • Legal Hold can be set on individual mailboxes or • Archive Attender can be used as an integral part of your across the enterprise and can be set for a specific retention strategy. By archiving mail from the Exchange time period (for example, you can place a mailbox on journal mailbox and sequestering it in a designated archive hold for 90 days). storage location, you can effectively build a central compli- • Legal Hold also includes an option that automatically ance repository that may be used for legal hold and search alerts users through Outlook 2010 that a hold has purposes without impacting (or notifying) the end-user that been placed on their mailboxes. their messages are ʻon-holdʼ. Single Item Restore Single Item Restore Exchange 2010, administrators can control how long deleted • Mail Attender offers administrators complete control over and edited email is kept in the Recoverable Items folder. the deletion process. Deletions may be scheduled from particular folders or constrained by any of the Mail Atten- der conditions. • Mail Attender supports up to four different types of deletion including moving data to the Exchange dumpster. Multi-Mailbox Search Multi-Mailbox Search Users can search a variety of mailbox items, including email, The discovery search capability included in Exchange 2010 is attachments, calendar appointments, tasks, and contacts, as inherently limited. Sherpaʼs Discovery Attender offers a list of well as Information Rights Management-protected content. extensive search features that Exchange does not provide: • Multi-mailbox search can work simultaneously across • Permits the searching of over 60 common types of docu- both primary mailboxes and Personal Archives with an ment attachments without the need to install specific iFil- easy-to-use, Web-based console. ters as Exchange does. • For legal discovery purposes, email located through • A host of powerful search criteria including regular expres- search can be copied and moved to a specified mail- sions and fuzzy search terms. box, as defined by the administrator, for further inves- • The ability to save searches for later reuse or refine the tigation. results set for subsequent searching • Rich filtering capabilities include sender, receiver, • Search results may be saved in a variety of different for- message type, sent/receive date, and cc/bcc, along mats (including PST files) to be shared with third parties or with advanced regular expressions. imported into case management tools. • In addition to multi-mailbox searching, include network PST files, public folders, archives or file shares in a search request. Role-based Access Control (RBAC) Role-based Access Control (RBAC) Exchange 2010, administrators can grant specific rights to us- Discovery Attender provides records manager, compliance ers, such as records managers, compliance officers, and litiga- officers or litigators the ability to search a wide variety of source tors perform multi-mailbox searches and other role-specific material (including mailboxes, PST files and file shares) with a tasks. single search query www.sherpasoftware.com