programming4us
programming4us
ENTERPRISE

Exchange Server 2010 : Administering Mailbox Content - Monitor and Restrict Communication (part 2) - Apply Common Monitoring and Restriction Scenarios

- How To Install Windows Server 2012 On VirtualBox
- How To Bypass Torrent Connection Blocking By Your ISP
- How To Install Actual Facebook App On Kindle Fire
6/16/2011 2:55:52 PM

2. Apply Common Monitoring and Restriction Scenarios

This section of the article walks you through a few fictitious scenarios where monitoring or restricting email would be a good idea. You'll learn how to do the following:

  • Prevent two parties from sending email to each other.

  • Require approval by a third party when messages are sent about a specific topic.

  • Monitor email between two people without their knowledge.

2.1. Restrict Communications with an Ethical Wall

In Exchange Server 2010, you can restrict communications between parties using an ethical wall. An ethical wall is a transport rule that drops messages from one party to another. Some organizations may implement ethical walls to prevent any potential conflicts of interest. For example, some large contracting organizations may have multiple programs that compete for the same contract. You could use an ethical wall to prevent these programs from exchanging messages.

To establish an ethical wall, you can use a transport rule that drops messages. The high-level steps for configuring an ethical wall are as follows:

  1. Create two distribution groups and place both parties in different groups.

  2. Create a transport rule to drop messages and return a Non-Delivery Report (NDR) when a message is sent from the members of one group to another.

To create an ethical wall between two parties using the EMC:

  1. Open the EMC and browse to the Organization Configuration => Hub Transport node in the Console tree.

  2. In the Actions pane, click the New Transport Rule action. This launches the New Transport Rule wizard.

  3. On the Introduction screen, type a name for the transport rule, such as Ethical Wall between Program A and Program B, in the Name field. Ensure that the Enable Rule box is checked and click Next.

  4. On the Conditions screen, select the condition Between Members Of Distribution List And Distribution List. In the rule description text box, click on the words Distribution List and select the two distribution groups that should not communicate with each other. This completed configuration is shown in Figure 4.

    Figure 4. Configuring ethical wall conditions

    Click the Next button to continue.

  5. In the Actions dialog box, select the action Send Rejection Message To Sender With Enhanced Status Code. In the rule description text box, modify the Rejection Message text to the message that you want the sender to receive when mail is sent to the other party.

    Also, change the Enhanced Status Code to 5.7.1, which is a standard message rejection code. The configuration of the actions is shown in Figure 5.

    Click Next to continue.

  6. On the Exceptions screen, leave everything unchecked and click Next.

    Figure 5. Specifying the ethical wall actions
  7. On the Create Rule screen, click New to create the ethical wall.

  8. At the Completion screen, click Finish to complete the process and close the wizard.

2.2. Enforce Email Approval Based on Keyword

A scenario that you may encounter is the potential leakage of important information about a topic. In this scenario, there have been leaks to the public about Contoso's new product called "Arius." Contoso doesn't want to restrict all communication about Arius, but it does want to ensure that any explicitly malicious communication is caught. In this scenario I will show you how to create a rule that forwards messages that are sent outside the company about Arius to the marketing team for approval. To configure this email inspection rule in the EMC, use the following steps:

  1. Open the EMC and browse to the Organization Configuration => Hub Transport node in the Console tree.

  2. In the Actions pane, click the New Transport Rule task. This launches the New Transport Rule wizard.

  3. On the Introduction screen, type a name for the transport rule, such as Arius Approval, in the Name field. Ensure that the Enable Rule box is checked and click Next.

  4. On the Conditions screen, select the condition When The Subject Field Or The Body Of The Message Contains Text Patterns. In the rule description text box, click on the words Text Patterns and type the keywords that you want to trigger this rule. In this scenario, I will only use the keyword arius.

    Also select the condition Sent To Users That Are Inside Or Outside The Organization, Or Partners. In the rule description, set this rule to trigger when messages are sent outside the organization. This completed configuration is shown in Figure 6.

    Figure 6. Configuring the conditions for email inspection

    Click Next to continue.

  5. On the Actions screen, select the action Forward The Message To Addresses For Moderation. In the rule description text box, click the Addresses text and select the mailbox that you want to use for approving these messages. In this scenario, the marketing@contoso.com mailbox will approve all external communications about Arius.

    The configuration of the actions is shown in Figure 7.

    Figure 7. Specifying the approver for moderated messages

    Click Next to continue.

  6. On the Exception screen, leave everything unchecked and click Next.

  7. On the Create Rule screen, click New to create the ethical wall.

  8. At the Completion screen, click Finish to complete the process and close the wizard.

2.3. Quietly Monitor Communications Between Certain Parties

In this final scenario, Contoso suspects that one of their employees, John Morris, is collaborating with Bob Jones in accounting, in order to launder money for an underground crime ring. One acceptable way of monitoring communications between John and Bob is through journaling. However, journaling will obtain everything sent and received by those two people instead of just the messages that they sent to each other. Therefore, we will use a transport rule to monitor the email conversations between Bob and John without them knowing.

  1. Open the EMC and browse to the Organization Configuration => Hub Transport node in the Console tree.

  2. In the Actions pane, click the New Transport Rule task. This launches the New Transport Rule wizard.

  3. On the Introduction screen, type a name for the transport rule, such as Monitor Bob and John, in the Name field. Ensure that the Enable Rule box is checked and click Next.

  4. At the Conditions screen, select the conditions From People and Sent To People. In the rule description text box, click the word People and select John and Bob's addresses. Click Next to continue.

  5. On the Actions screen, select the action Blind Carbon Copy (Bcc) The Message To Addresses. In the rule description text box, click the Addresses text and select the mailbox that you want to use for monitoring these messages. This configuration is shown in Figure 8.

    Figure 8. Configuring the transport rule to monitor email communications

    Click Next to continue.

  6. On the Exception screen, leave everything unchecked and click Next.

  7. On the Create Rule screen, click New to create the ethical wall.

  8. At the Completion screen, click Finish to complete the process and close the wizard.

Other  
  •  Exchange Server 2010 : Administering Mailbox Content - Protect and Disclose Information
  •  SharePoint 2010 : Workflow Modeling and Development Tools (part 2) - Visual Studio 2010 & Workflow Modeling Tools Comparison
  •  SharePoint 2010 : Workflow Modeling and Development Tools (part 1) - Microsoft Visio 2010 & SharePoint Designer 2010
  •  SharePoint 2010 : Creating and Managing Workflows - Workflows in SharePoint 2010
  •  Exchange Server 2010 : Meet Message Retention Compliance (part 3) - Keep a Record of Email Communications
  •  Exchange Server 2010 : Meet Message Retention Compliance (part 2) - Archive Email
  •  Exchange Server 2010 : Meet Message Retention Compliance (part 1) - Enforce Records Management
  •  Exchange Server 2010 : Maintaining Reliability and Availability - Recover Data
  •  Exchange Server 2010 : Maintaining Reliability and Availability - Back Up Exchange
  •  Exchange Server 2010 : Utilize the Availability Options for Servers Based on Role (part 3) - Implement Redundant Transport Servers
  •  
    Top 10
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
    - Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
    - Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
    - Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
    - Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    programming4us programming4us
    programming4us
     
     
    programming4us