16. What OWA Browser
• 150-400 items per folder UI
• Inbox, Drafts, recently used
JSON
• All Contacts
• A year of calendar
Offline Store +
How Business Logic
• Folders & Items
• AppCache • Views In IE:
• IndexedDB or WebSQL • Notifications %username%
• Queued Actions Local Settings
Where Microsoft
Internet
• Browser’s choice DB Abstraction Explorer
Indexed DB
• Per URL, browser, user, machine Internet.edb
WebSQL IDB
29. Use proximity searches to
understand context
Fine tune
complex queries
Get instant
statistics
Query results across
Exchange, Lync &
SharePoint
Laser focused refiners to help
find the data you need
32. L7 LB
CA
Ex Ex S
HT
MBX MBX
Ex Ex
• Separate HA solutions
SAN for each role
• Separate roles for ease • Introduced the DAG
• Role differentiation of deployment and
through manual management • Rich management
configuration segmentation experience using RBAC
• Backups and hardware • Support cheaper • Support for Hybrid
solutions for “reliability” storage deployments
2000/2003 2007 2010
33. Forefront Online
Protection for
Exchange
Internal Network Phone system
(PBX or VOIP)
Edge
Transport Hub Transport
Routing and Routing and policy
AV/AS
External
SMTP
servers Mailbox Unified Messaging
Stores mailbox and Voice mail and
public folder items voice access
Mobile phone
Web Client Access
browser Layer 7 LB Client connectivity
Web services
AD
Outlook (remote
user)
Outlook (local user)
Line of business application
38. Forefront Online
Protection for
Exchange
Internal Network
Exchange 2010 CAS MBX
Edge (Array) (DAG)
Transport
Layer 4 load balancing
External
SMTP
servers
Mobile phone
Web
browser
Outlook (remote Phone system
user) (PBX or VOIP)
Outlook (local user) LOB Application
39. EWS protocol
MRS proxy
protocol
SMTP
MRS
Protocols, EWS
MRSProxy
Transport Transport MRS
MRSProxy
EWS
Server Agents RPC CA Assistants
Custom WS
Assistants RPC CA
XSO MailItem Banned XSO MailItem
E2010
Business Logic
CTS Other API CTS Other API
Content Content
Store index Store index
Storage ESE File ESE File
system system
Server1 (Vn) Server2 (Vn+1)
Slide objectiveLet’s talk about some of the communication challenges. StoriesMultitude of devices: 10 years ago, connected workers had a PC, possibly a bulky laptop, possibly a mobile phone (Motorola StarTAC, anyone?), and dial-up Internet. Today, we have smartphones, IP phones, slates, tablets, laptops, desktops, and netbooks, and people want access to email and business information from anywhere, on any device. Information explosion: In the next decade, mankind’s data will increase 44 times, while the number of IT professionals will grow by only 1.4 times. At a certain point, worker productivity is hampered by too much information. Workers need smart ways to deal with information so that they can find what they need in the flood of data. In fact, in the next year alone, there will be more data generated than in all of mankind’s history, and it is all in your inbox. Compliance necessities: Some of that information is intellectual property, some is business-critical data, some of it is personally identifiable information. Managing this is a challenging and complex task. Every year since 1995 has been deemed by some analyst or press figure the “Year of Compliance.” The reality is that many organizations put it off or do the minimum required by law or industry regulation. Organizations have to figure out how to take this incredible quantity of information moving at unprecedented velocity to more places and people than ever before—and keep it safe and secure. Multigenerational workforce:In 2012, there will be one Baby Boomer for every working-age person in the developed world. The Millennial generation is the first generation that has grown up immersed in connected technology. In the 2016 U.S. presidential election, the voting majority will be Generation Y. Organizations that want to recruit the best and brightest of this generation need to provide technology that helps them reach their goals—just as they are accustomed to from their consumer experiences. At the same time, the workforce is diverse. You need to have technology that enables people to get work done no matter what their comfort level. Things are moving at a fast pace. Many organizations feel overwhelmed when thinking about the future of messaging. the new Exchange will continue to help solve business needs and an innovative and smart manner. More data pointsInformation explosion:Wikipedia estimates that in 2010, humans will have 1.2 zettabytes (or 1.2 billion terabytes) of information (50 Libraries of Congress), and the rate at which we create information continues to accelerate. Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours Canada: 2.6 hoursFrance: 2.3 hoursAustralia: 1.6 hoursGermany: 0.9 hoursNetherlands: 0.5 hours 55 percent of students surveyed by Youth Trends said they had a smartphone. One year earlier, just 26 percent did. Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours
Devices:Fast and fluid experience with touch, pen, mouse & keyboardImmersive touch-optimized Windows 8 appsSupport for Mobile DevicesCloud:Office - on demand, roaming & up-to-dateNew cloud app development modelEnterprise-grade reliability and standardsSocial:Newsfeeds & microblogging, extend with YammerPervasive social capabilities across OfficeMultiparty HD video & Skype federationControl:DLP, data retention & unified eDiscoveryReimagined deployment model for Office appsCommon management experience across Office 365
Slide objectiveCommunicate that Humans think in terms of people, not contact cards; so should software. We’re working to provide a much more personal and connected experience. Talking pointsIntegrate with internal and external social networks. Communicate with the right people instantly. the new Exchange will make it much easier to find the right people and communicate with them in the most efficient way.People love the WP7 linking ability. When it goes server side, you get benefits across any device. Unified contacts – Outlook/OWA – cut down on duplicatecontacts.Contact card – Outlook – New contact card lays out information in a easy to read format along with easy access to communication means.Hover card – OWA – OWA now has the same Hovercard that users have and love in Outlook.Outlook Social connector – Outlook – view information from your email and other social networks about a person to get a full view of your communications with that person and what is important to them.
Slide objectiveThere is a ton of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
Slide objectiveThere is a wealth of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
A lots happened since the last MECLet’s take a little walk down memory laneEx2000Exchange 2000 along with IE5 marked a fundamental shift in developing web applicationIE5 could absorb XML out of the box but there was no way to really ask for it.This inspired the development of XMLHTTP.Experience is split - IE5 and above gets one experience - All other browsers get down level experienceEx2003First version of OWA that was co-designed with OLKMajor features addedSpell checkRulesThemesTasksForms Based AuthExchange 2007Ground up rewriteASP .Net 2.0/C#Runs on middle tierAwesome feature set!!
Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
Exchange Online Protection Built on the very successful FOPE serviceCurrent SLAs100% protection against all known virusesCapture at least 98% of all inbound spam emailsFalse Positive commitment of less than 1 in 250,000 emailsEOP now integrated with office 365 for management and onboarding.Sender Reputation protection by send through a “high risk” pool to ensure protection of Organizations reputationMajor Improvements over FOPE:Integrated consoleSPAM improvementsComprehensive protectionMulti-engine antivirus Continuously evolving anti-spam protectionBuilt on Forefront Online Protection for Exchange (FOPE)Enterprise class reliabilityGeographically load-balanced datacentersQueuing capabilities to help ensure no mail is lostCommon administration consoleOffice 365 integrationDetailed reporting
Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".
Integrated archiving and data hold capabilitiesCentrally managed or used assigned retention policies
Situation: Leakage or loss of data through email is a growing risk and concern for many organizations today – because of regulations, breaches of trust or loss of business critical information. Exchange approach to the problem is to provide a range of soft and hard controls.Talking Points:Flexible solution:Customers have differing needs – solution needs to be flexibleWithin a given organization, different types of data, different parts of the company require different levels of enforcementProtect against loss without getting in users’ wayAttempts to implement policy can’t get in the way of business processes, or these will failExchange has been making investments in this area for the last few releasesTransport rules in Exchange 2007Transport rules + Rights protection in Exchange 2010MailTips in Exchange 2010 / Outlook 2010 (alert user before the email is sent) – “Bob Jones is outside of your organization”Actions are built in today already (as part of transport rules) – block, monitor, RMS protect, etcIn Exchange 2013 we build on this foundation and bring full DLP to the product
In the new Exchange, the DLP features will support major regulatory requirements out of the box, including PCI DSS.It will also be extensible, allowing admins to install specific templates offered by security partners. For example, a DLP template built by a partner for the German market would take action on email that includes German driver’s license numbers.Provide granular information about corporate policies at the right time, while not getting in the way of doing business Talking points Exchange gives you the control to manage compliance in order to meet your business and regulatory needs.The goal is to help you with accidental data loss. Detect sensitive data before it is sent with built-in templates that filter mail content for PCI DSS, GLBA, and other regulations. Import DLP policy templates from top security partners or build your own.Today, it is important to help users do the right thing in a complex world of compliance. Education for usersDLP is built upon transport rules (v3). While it was possible to do in Exchange Server 2010 or Exchange Online, now it is packaged, and with reporting/charts/classifications, and it is out of the box Stories When was the last time you saw the employee handbook with all of the regulations on what you were and weren’t supposed to do?. Most people aren’t malicious, but they aren’t educated. More infoClassificationScanning will examine both message contents and attachmentsOut-of-the-box classification rules work to detect common types of sensitive data. Actions are built in today (in transport rules). We are adding deep analysis (content inspection)Policy engineWell-defined entities (e.g., CC#, SSN) Probabilistic techniques for fuzzy matches (e.g., SOX, medical terms) RSA partnershipDLP policy template: Logical grouping of classification rules, transport rules, and reporting to achieve an objectiveThere will be several templates in the box.PII, financial, healthcare (for the type of healthcare issues that HR would deal with. We are not building templates for hospitals, though we enable partners to do that through our extensibility story)U.S. and Europe Custom classification rulesFingerprinting for org. documents that share common characteristics (e.g., 1040 form) Custom regex and keyword matchesOffice document metadata ExtensibilityClassification rules: Open format for classification rule schemaISVs create new packages of classification rules, transport rules, and reporting for specific regulations ActionsBuilt on Exchange Transport Rules; has same actions availableSupports discovery phase of compliance: two clicks to start monitoring sensitive information IW ExperienceContextual education for information workers Detect sensitive data in email before it is sentText is customizable by admins from Exchange Admin Center
SituationWith the explosive growth of compliance requirements both inside and outside organizations, compliance has become everyone’s responsibility. Neither the IT department nor the legal and compliance departments can keep tabs on all of the information that is exchanged in the ordinary course of business. Organizations need tools that enable self-service and automated compliance wherever possible. Talking pointsThere is a solid partnership between the teams. We all work together now.Perform unified searches regardless of document type or location, across Exchange, SharePoint, Lync, and file shares.Search and view content by project, legal matter, or business context.Save money when there is a litigation need by producing results quickly and efficiently.Provide native safety for messaging content.This is an evolution of our compliance (v3) and search infrastructure (FAST)Data stays where it lives (In-Place) where it has the most relevance.
Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".