SlideShare a Scribd company logo
1 of 46
© Microsoft Corporation. All Rights Reserved.
© Microsoft Corporation. All Rights Reserved.
Michael Van
Horenbeeck
Technology Consultant @ Xylos
Did you already work with
 or install Exchange 2013
         (in a lab)?
44X




                             1.4X




Multitude of   Information           Compliance   Multigenerational
Devices        Explosion             Necessity    Workforce
Client improvements
Janet Schorr
          janets@litware.com

          Jim Ptaszynski
          jimp@fabrikam.com

          Josh Bailey

Finding   joshb@adventureworks.com
          Josh Bailey
          Joanna Yuan
          boshb@adventureworks.com
          joannay@southridgevideo.com
          Josh Bailey’s Personal Email
          joshbailey97@live.com
          Jiri Burian

people    jirib@contoso.com
          Joanna Yuan
          joannay@southridgevideo.com
          Jeffrey Zeng
          jeffreyz@wingtiptoys.com
          Jiri Burian
          jirib@contoso.com
          Joe Healy


is easy   joeh@cohowinery.com
          Jeffrey Zeng
          jeffreyz@wingtiptoys.com
          Juan-Carlos Rivas
          juancarlosr@proseware.com
          Joe Healy
          joeh@cohowinery.com
          Get more results for j
          Juan-Carlos Rivas
            Displaying top 8 results




                                         Copyright© Microsoft Corporation
Work across Outlook and
                                                       Outlook Web App




                                   The app detects triggers in the email and
Copyright© Microsoft Corporation        displays relevant information
Copyright© Microsoft Corporation
mail
1.        Data is sourced locally
                                   2.        Activity is queued & replayed
                                   3.        Server updates are copied as
                                             they happen


                                   OWA Client                 Exchange
                                                               Server
                                         1

                                                        3
                                        Offline
                                        Store           2




Copyright© Microsoft Corporation
What                                                       OWA     Browser
•   150-400 items per folder                  UI
•   Inbox, Drafts, recently used
                                          JSON
•   All Contacts
•   A year of calendar
                                        Offline Store +
How                                     Business Logic
                                    •    Folders & Items
• AppCache                          •    Views                   In IE:
• IndexedDB or WebSQL               •    Notifications           %username%
                                    •    Queued Actions          Local Settings

Where                                                            Microsoft
                                                                 Internet
• Browser’s choice                      DB Abstraction           Explorer
                                                                 Indexed DB
• Per URL, browser, user, machine                                Internet.edb
                                    WebSQL           IDB
Demo
Management
Management interface




                                   Replaces the MMC-based Exchange Management Console
                                   Fully web-based (/ecp virtual directory)
                                   Designed to allow administrators to perform most common
                                   tasks
Copyright© Microsoft Corporation
Security & Compliance
Management interface




Copyright© Microsoft Corporation
Sender notifications




                                                          Admin notifications

Copyright© Microsoft Corporation
Block email based on language




Block email based on geography



                                 Copyright© Microsoft Corporation
Policy details transparently
                                                                 displayed to end user




                                   Right click to assign policy to an
Copyright© Microsoft Corporation   item, folder or to all your email
Copyright© Microsoft Corporation
A PolicyTip notifies you of a policy
                                   violation while composing an email
Copyright© Microsoft Corporation
Use proximity searches to
       understand context




                                    Fine tune
                                 complex queries
                                                      Get instant
                                                       statistics




                                    Query results across
                                     Exchange, Lync &
                                        SharePoint

Laser focused refiners to help
   find the data you need
Demo
Architecture
L7 LB

                                         CA
    Ex           Ex                      S
                                                   HT



                                         MBX       MBX
    Ex           Ex
                                                                •   Separate HA solutions
           SAN                                                      for each role
                                  •   Separate roles for ease   •   Introduced the DAG
•   Role differentiation              of deployment and
    through manual                    management                •   Rich management
    configuration                     segmentation                  experience using RBAC
•   Backups and hardware          •   Support cheaper           •   Support for Hybrid
    solutions for “reliability”       storage                       deployments

          2000/2003                         2007                          2010
Forefront Online
                   Protection for
                     Exchange
                                             Internal Network                          Phone system
                                                                                       (PBX or VOIP)
                                 Edge
                               Transport                    Hub Transport
                               Routing and                 Routing and policy
                                 AV/AS

 External
  SMTP
 servers                                                        Mailbox                Unified Messaging
                                                           Stores mailbox and            Voice mail and
                                                           public folder items            voice access
 Mobile phone



     Web                                                               Client Access
   browser                                    Layer 7 LB              Client connectivity
                                                                        Web services


                                                                                                  AD
Outlook (remote
     user)

                                             Outlook (local user)
                                                                       Line of business application
Exchange deployments can be
                                   complicated
                                   Load balancing is difficult and can
                                   require expensive solutions
                                   When dedicated server roles are
                                   deployed, hardware can go
                                   unutilized or under-utilized
                                   Too many namespaces required



Copyright© Microsoft Corporation
Architecture
Use Building Blocks to facilitate
                                   deployments at all scales – from self-
                                   hosted, small organizations to Office
                                   365
                                   •   Server role evolution
                                   •   Network layer improvements
                                   •   Versioning and inter-op principles




Copyright© Microsoft Corporation
Hardware efficiency
                                   Deployment simplicity
                                   Cross-version inter-op
                                   Failure isolation




Copyright© Microsoft Corporation
Forefront Online
                   Protection for
                     Exchange
                                             Internal Network
                             Exchange 2010                                        CAS               MBX
                                 Edge                                            (Array)           (DAG)
                               Transport




                                                        Layer 4 load balancing
 External
  SMTP
 servers


 Mobile phone



     Web
   browser



Outlook (remote                                                                                         Phone system
     user)                                                                                              (PBX or VOIP)


                                             Outlook (local user)                          LOB Application
EWS protocol


                                                                 MRS proxy
                                                                  protocol

                                                                   SMTP

                                MRS
Protocols,       EWS
                              MRSProxy
                                                   Transport                       Transport               MRS
                                                                                                         MRSProxy
                                                                                                                               EWS


Server Agents      RPC CA           Assistants
                                                                  Custom WS
                                                                                               Assistants              RPC CA




                       XSO                  MailItem                      Banned        XSO                         MailItem
                                                                E2010
Business Logic
                              CTS            Other API                                              CTS             Other API



                                         Content                                                              Content
                   Store                  index                                      Store                     index
Storage                       ESE                    File                                          ESE                    File
                                                   system                                                               system


                             Server1 (Vn)                                                       Server2 (Vn+1)
Exchange 2010      Exchange 2013
                      Architecture       Architecture

                                           L4 LB
    Hardware
  Load Balancer
                       L7 LB           AuthN, Proxy,        Client Access
                                         Re-direct
                     AuthN, Proxy,
                       Re-direct
  Client Access
 Hub Transport,     Protocols, API,
Unified Messaging      Biz-logic      Protocols, Assista
                                      nts, API, Biz-logic
                                                              Mailbox
     Mailbox         Assistants,
                      Store, CI
                                         Store, CI
What about…
No “real” way to achieve high-
                                   availability
                                   SMTP-based replication
                                   Multi-master model




Copyright© Microsoft Corporation
Called “Public Folder Mailboxes”
Reside within a mailbox database
Leverage Database Availability Group
for true high availability
Single-master model!




                                       Copyright© Microsoft Corporation
Work
Smarter, Anywhere.
What's new in Exchange 2013?

More Related Content

What's hot

03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010mcini
 
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013Microsoft Décideurs IT
 
Windows and Linux Interopability
Windows and Linux InteropabilityWindows and Linux Interopability
Windows and Linux InteropabilityNovell
 
On prem vs cloud exchange
On prem vs cloud exchangeOn prem vs cloud exchange
On prem vs cloud exchangebtanmdsny
 
Lifetime Products Exchange07 Final
Lifetime Products Exchange07 FinalLifetime Products Exchange07 Final
Lifetime Products Exchange07 FinalEllie Vollerthum
 
The acs lync appliance v4 5 nl
The acs lync appliance   v4 5 nlThe acs lync appliance   v4 5 nl
The acs lync appliance v4 5 nlWendy Frodyma
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Private Cloud
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material EnBenedict Ji
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...Dave Hay
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityNovell
 
Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniEMC Forum India
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Novell
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell TeamingNovell
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkEduardo Castro
 
Cloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleCloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleBob Rhubart
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesNovell
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1truong14
 
Microsoft Unified Communications - Outlook/Exchange Better Together Presentation
Microsoft Unified Communications - Outlook/Exchange Better Together PresentationMicrosoft Unified Communications - Outlook/Exchange Better Together Presentation
Microsoft Unified Communications - Outlook/Exchange Better Together PresentationMicrosoft Private Cloud
 
Xml session01
Xml session01Xml session01
Xml session01Niit Care
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementNovell
 

What's hot (20)

03.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 201003.09.10 Stn Presentation On Exchange Server And Share Point 2010
03.09.10 Stn Presentation On Exchange Server And Share Point 2010
 
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013
Plongée en eaux profondes dans l'architecture du nouvel Exchange 2013
 
Windows and Linux Interopability
Windows and Linux InteropabilityWindows and Linux Interopability
Windows and Linux Interopability
 
On prem vs cloud exchange
On prem vs cloud exchangeOn prem vs cloud exchange
On prem vs cloud exchange
 
Lifetime Products Exchange07 Final
Lifetime Products Exchange07 FinalLifetime Products Exchange07 Final
Lifetime Products Exchange07 Final
 
The acs lync appliance v4 5 nl
The acs lync appliance   v4 5 nlThe acs lync appliance   v4 5 nl
The acs lync appliance v4 5 nl
 
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
Microsoft Unified Communications - Introduction to Exchange Server 2010 (II) ...
 
Thinkfree Office Live Introduction Material En
Thinkfree Office Live   Introduction Material EnThinkfree Office Live   Introduction Material En
Thinkfree Office Live Introduction Material En
 
Web sphere user group march 2012 - desktop single sign-on in an active dire...
Web sphere user group   march 2012 - desktop single sign-on in an active dire...Web sphere user group   march 2012 - desktop single sign-on in an active dire...
Web sphere user group march 2012 - desktop single sign-on in an active dire...
 
Domain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows InteroperabilityDomain Services for Windows: Best Practices for Windows Interoperability
Domain Services for Windows: Best Practices for Windows Interoperability
 
Track 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahaniTrack 2, session 5, aligning security with business kartik shahani
Track 2, session 5, aligning security with business kartik shahani
 
Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8Best Practices for Administering Novell GroupWise 8
Best Practices for Administering Novell GroupWise 8
 
Custom Development with Novell Teaming
Custom Development with Novell TeamingCustom Development with Novell Teaming
Custom Development with Novell Teaming
 
SQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar BiztalkSQL Server 2008 para Implementar Biztalk
SQL Server 2008 para Implementar Biztalk
 
Cloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleCloud Computing: Making IT Simple
Cloud Computing: Making IT Simple
 
Integrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell TechnologiesIntegrating Apple Macs Using Novell Technologies
Integrating Apple Macs Using Novell Technologies
 
Ft direct product present v3.1
Ft direct product present v3.1Ft direct product present v3.1
Ft direct product present v3.1
 
Microsoft Unified Communications - Outlook/Exchange Better Together Presentation
Microsoft Unified Communications - Outlook/Exchange Better Together PresentationMicrosoft Unified Communications - Outlook/Exchange Better Together Presentation
Microsoft Unified Communications - Outlook/Exchange Better Together Presentation
 
Xml session01
Xml session01Xml session01
Xml session01
 
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security ManagementSecuring Your Endpoints Using Novell ZENworks Endpoint Security Management
Securing Your Endpoints Using Novell ZENworks Endpoint Security Management
 

Viewers also liked

Microsoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMicrosoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMotty Ben Atia
 
Lync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep DiveLync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep DiveHarold Wong
 
Microsoft Lync 2010 Call Flows Explained
Microsoft Lync 2010 Call Flows ExplainedMicrosoft Lync 2010 Call Flows Explained
Microsoft Lync 2010 Call Flows ExplainedMUCUGL
 
Microsoft lync server 2013 step by step for anyone
Microsoft lync server 2013 step by step for anyoneMicrosoft lync server 2013 step by step for anyone
Microsoft lync server 2013 step by step for anyoneVinh Nguyen
 
Microsoft Exchange Technology Overview
Microsoft Exchange Technology OverviewMicrosoft Exchange Technology Overview
Microsoft Exchange Technology OverviewMike Pruett
 
Skype for business and lync troubleshooting guide (Version 1.0 )
Skype for business and lync troubleshooting guide   (Version 1.0 )Skype for business and lync troubleshooting guide   (Version 1.0 )
Skype for business and lync troubleshooting guide (Version 1.0 )Thomas Poett
 
Microsoft Exchange 2013 architecture
Microsoft Exchange 2013 architectureMicrosoft Exchange 2013 architecture
Microsoft Exchange 2013 architectureMotty Ben Atia
 
Microsoft Exchange 2010 in 10 slides
Microsoft Exchange 2010 in 10 slidesMicrosoft Exchange 2010 in 10 slides
Microsoft Exchange 2010 in 10 slidesAndre Debilloez
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Serverbedekarpm
 
Apple Watch User Onboarding Analysis
Apple Watch User Onboarding AnalysisApple Watch User Onboarding Analysis
Apple Watch User Onboarding AnalysisDenys Nevozhai
 
Presentation on microsoft
Presentation on microsoftPresentation on microsoft
Presentation on microsoftJoel Pais
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft CorporationVijaykumar Nishad
 
Google Inc
Google IncGoogle Inc
Google Incida k
 
Netwerk Bewust Verbruiken, Sharing and Repairing
Netwerk Bewust Verbruiken, Sharing and RepairingNetwerk Bewust Verbruiken, Sharing and Repairing
Netwerk Bewust Verbruiken, Sharing and RepairingNetwerk Bewust Verbruiken
 
Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1tatevabrahamyan
 

Viewers also liked (20)

Microsoft Exchange 2013 Introduction
Microsoft Exchange 2013 IntroductionMicrosoft Exchange 2013 Introduction
Microsoft Exchange 2013 Introduction
 
Exchange Server 2013 Architecture Deep Dive, Part 1
Exchange Server 2013 Architecture Deep Dive, Part 1Exchange Server 2013 Architecture Deep Dive, Part 1
Exchange Server 2013 Architecture Deep Dive, Part 1
 
Lync 2013: Architecture & Administration
Lync 2013: Architecture & AdministrationLync 2013: Architecture & Administration
Lync 2013: Architecture & Administration
 
Lync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep DiveLync 2010 Conferencing Deep Dive
Lync 2010 Conferencing Deep Dive
 
What’s new in lync 2010, microsoft
What’s new in lync 2010, microsoftWhat’s new in lync 2010, microsoft
What’s new in lync 2010, microsoft
 
Microsoft Lync 2010 Call Flows Explained
Microsoft Lync 2010 Call Flows ExplainedMicrosoft Lync 2010 Call Flows Explained
Microsoft Lync 2010 Call Flows Explained
 
Microsoft lync server 2013 step by step for anyone
Microsoft lync server 2013 step by step for anyoneMicrosoft lync server 2013 step by step for anyone
Microsoft lync server 2013 step by step for anyone
 
Microsoft Exchange Technology Overview
Microsoft Exchange Technology OverviewMicrosoft Exchange Technology Overview
Microsoft Exchange Technology Overview
 
Skype for business and lync troubleshooting guide (Version 1.0 )
Skype for business and lync troubleshooting guide   (Version 1.0 )Skype for business and lync troubleshooting guide   (Version 1.0 )
Skype for business and lync troubleshooting guide (Version 1.0 )
 
Microsoft Exchange 2013 architecture
Microsoft Exchange 2013 architectureMicrosoft Exchange 2013 architecture
Microsoft Exchange 2013 architecture
 
Microsoft Exchange 2010 in 10 slides
Microsoft Exchange 2010 in 10 slidesMicrosoft Exchange 2010 in 10 slides
Microsoft Exchange 2010 in 10 slides
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Server
 
Apple Watch User Onboarding Analysis
Apple Watch User Onboarding AnalysisApple Watch User Onboarding Analysis
Apple Watch User Onboarding Analysis
 
Presentation on microsoft
Presentation on microsoftPresentation on microsoft
Presentation on microsoft
 
PPT on Microsoft Corporation
PPT on Microsoft CorporationPPT on Microsoft Corporation
PPT on Microsoft Corporation
 
Google Inc
Google IncGoogle Inc
Google Inc
 
Netwerk Bewust Verbruiken, Sharing and Repairing
Netwerk Bewust Verbruiken, Sharing and RepairingNetwerk Bewust Verbruiken, Sharing and Repairing
Netwerk Bewust Verbruiken, Sharing and Repairing
 
Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1Kisamjakajin hashvetvutyun1
Kisamjakajin hashvetvutyun1
 
Informe consulta general
Informe consulta generalInforme consulta general
Informe consulta general
 

Similar to What's new in Exchange 2013?

Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureEMC Forum India
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
Jimwebber soa
Jimwebber soaJimwebber soa
Jimwebber soad0nn9n
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
Cloud Computing - Making IT Simple
 Cloud Computing - Making IT Simple Cloud Computing - Making IT Simple
Cloud Computing - Making IT SimpleBob Rhubart
 
Overview SQL Server 2012
Overview SQL Server 2012Overview SQL Server 2012
Overview SQL Server 2012Juan Fabian
 
Elastic Caching for a Smarter Planet - Make Every Transaction Count
Elastic Caching for a Smarter Planet - Make Every Transaction CountElastic Caching for a Smarter Planet - Make Every Transaction Count
Elastic Caching for a Smarter Planet - Make Every Transaction CountYakura Coffee
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummiesrosegrif1
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented ArchitectureBob Rhubart
 
Migrate to share point 2013 with avepoint 2.14.13
Migrate to share point 2013 with avepoint 2.14.13Migrate to share point 2013 with avepoint 2.14.13
Migrate to share point 2013 with avepoint 2.14.13Mary Leigh Mackie
 
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...Michael Noel
 
What‘s new in Office 365
What‘s new in Office 365What‘s new in Office 365
What‘s new in Office 365SPC Adriatics
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityJerome Leonard
 
Complex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBaseComplex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBasedarach
 
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011Cloudera, Inc.
 
Leverage Azure and SQL Azure to build SaaS applications
Leverage Azure and SQL Azure to build SaaS applications Leverage Azure and SQL Azure to build SaaS applications
Leverage Azure and SQL Azure to build SaaS applications Common Sense
 
TechFuse 2012: Rich Coexistence
TechFuse 2012: Rich CoexistenceTechFuse 2012: Rich Coexistence
TechFuse 2012: Rich CoexistenceAvtex
 
Soa204 Kawasaki Final
Soa204 Kawasaki FinalSoa204 Kawasaki Final
Soa204 Kawasaki FinalAnush Kumar
 

Similar to What's new in Exchange 2013? (20)

Transform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information InfrastructureTransform Microsoft Application Environment With EMC Information Infrastructure
Transform Microsoft Application Environment With EMC Information Infrastructure
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Jimwebber soa
Jimwebber soaJimwebber soa
Jimwebber soa
 
Office 365 Identity Management options
Office 365 Identity Management options Office 365 Identity Management options
Office 365 Identity Management options
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Cloud Computing - Making IT Simple
 Cloud Computing - Making IT Simple Cloud Computing - Making IT Simple
Cloud Computing - Making IT Simple
 
Overview SQL Server 2012
Overview SQL Server 2012Overview SQL Server 2012
Overview SQL Server 2012
 
Elastic Caching for a Smarter Planet - Make Every Transaction Count
Elastic Caching for a Smarter Planet - Make Every Transaction CountElastic Caching for a Smarter Planet - Make Every Transaction Count
Elastic Caching for a Smarter Planet - Make Every Transaction Count
 
Cisco storageconnectfordummies
Cisco storageconnectfordummiesCisco storageconnectfordummies
Cisco storageconnectfordummies
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented Architecture
 
Db trends final
Db trends   finalDb trends   final
Db trends final
 
Migrate to share point 2013 with avepoint 2.14.13
Migrate to share point 2013 with avepoint 2.14.13Migrate to share point 2013 with avepoint 2.14.13
Migrate to share point 2013 with avepoint 2.14.13
 
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
 
What‘s new in Office 365
What‘s new in Office 365What‘s new in Office 365
What‘s new in Office 365
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
 
Complex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBaseComplex Er[jl]ang Processing with StreamBase
Complex Er[jl]ang Processing with StreamBase
 
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011
Hadoop in the Enterprise - Dr. Amr Awadallah @ Microstrategy World 2011
 
Leverage Azure and SQL Azure to build SaaS applications
Leverage Azure and SQL Azure to build SaaS applications Leverage Azure and SQL Azure to build SaaS applications
Leverage Azure and SQL Azure to build SaaS applications
 
TechFuse 2012: Rich Coexistence
TechFuse 2012: Rich CoexistenceTechFuse 2012: Rich Coexistence
TechFuse 2012: Rich Coexistence
 
Soa204 Kawasaki Final
Soa204 Kawasaki FinalSoa204 Kawasaki Final
Soa204 Kawasaki Final
 

More from Microsoft TechNet - Belgium and Luxembourg

More from Microsoft TechNet - Belgium and Luxembourg (20)

Windows 10: all you need to know!
Windows 10: all you need to know!Windows 10: all you need to know!
Windows 10: all you need to know!
 
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de KeukelaereConfiguration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
Configuration Manager 2012 – Compliance Settings 101 - Tim de Keukelaere
 
Windows 8.1 a closer look
Windows 8.1 a closer lookWindows 8.1 a closer look
Windows 8.1 a closer look
 
So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.So you’ve successfully installed SCOM… Now what.
So you’ve successfully installed SCOM… Now what.
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
Deploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr ClientsDeploying and managing ConfigMgr Clients
Deploying and managing ConfigMgr Clients
 
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
Self Service BI anno 2013 – Where Do We Come From and Where Are We Going?
 
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware UpdatingHands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
Hands on with Hyper-V Clustering Maintenance Mode & Cluster Aware Updating
 
SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012SCEP 2012 inside SCCM 2012
SCEP 2012 inside SCCM 2012
 
Jump start your application monitoring with APM
Jump start your application monitoring with APMJump start your application monitoring with APM
Jump start your application monitoring with APM
 
What’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent ChatWhat’s new in Lync Server 2013: Persistent Chat
What’s new in Lync Server 2013: Persistent Chat
 
What's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & DevicesWhat's new for Lync 2013 Clients & Devices
What's new for Lync 2013 Clients & Devices
 
Office 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and managementOffice 365 ProPlus: Click-to-run deployment and management
Office 365 ProPlus: Click-to-run deployment and management
 
SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options SharePoint Installation and Upgrade: Untangling Your Options
SharePoint Installation and Upgrade: Untangling Your Options
 
The application model in real life
The application model in real lifeThe application model in real life
The application model in real life
 
Microsoft private cloud with Cisco and Netapp - Flexpod solution
Microsoft private cloud with Cisco and Netapp -  Flexpod solutionMicrosoft private cloud with Cisco and Netapp -  Flexpod solution
Microsoft private cloud with Cisco and Netapp - Flexpod solution
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management Moving from Device Centric to a User Centric Management
Moving from Device Centric to a User Centric Management
 
Network Management in System Center 2012 SP1 - VMM
Network Management in System Center 2012  SP1 - VMM Network Management in System Center 2012  SP1 - VMM
Network Management in System Center 2012 SP1 - VMM
 
Hackers (Not) Halted
Hackers (Not) Halted Hackers (Not) Halted
Hackers (Not) Halted
 

Recently uploaded

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

What's new in Exchange 2013?

  • 1. © Microsoft Corporation. All Rights Reserved.
  • 2. © Microsoft Corporation. All Rights Reserved.
  • 4. Did you already work with or install Exchange 2013 (in a lab)?
  • 5.
  • 6. 44X 1.4X Multitude of Information Compliance Multigenerational Devices Explosion Necessity Workforce
  • 7.
  • 9. Janet Schorr janets@litware.com Jim Ptaszynski jimp@fabrikam.com Josh Bailey Finding joshb@adventureworks.com Josh Bailey Joanna Yuan boshb@adventureworks.com joannay@southridgevideo.com Josh Bailey’s Personal Email joshbailey97@live.com Jiri Burian people jirib@contoso.com Joanna Yuan joannay@southridgevideo.com Jeffrey Zeng jeffreyz@wingtiptoys.com Jiri Burian jirib@contoso.com Joe Healy is easy joeh@cohowinery.com Jeffrey Zeng jeffreyz@wingtiptoys.com Juan-Carlos Rivas juancarlosr@proseware.com Joe Healy joeh@cohowinery.com Get more results for j Juan-Carlos Rivas Displaying top 8 results Copyright© Microsoft Corporation
  • 10. Work across Outlook and Outlook Web App The app detects triggers in the email and Copyright© Microsoft Corporation displays relevant information
  • 12.
  • 13.
  • 14. mail
  • 15. 1. Data is sourced locally 2. Activity is queued & replayed 3. Server updates are copied as they happen OWA Client Exchange Server 1 3 Offline Store 2 Copyright© Microsoft Corporation
  • 16. What OWA Browser • 150-400 items per folder UI • Inbox, Drafts, recently used JSON • All Contacts • A year of calendar Offline Store + How Business Logic • Folders & Items • AppCache • Views In IE: • IndexedDB or WebSQL • Notifications %username% • Queued Actions Local Settings Where Microsoft Internet • Browser’s choice DB Abstraction Explorer Indexed DB • Per URL, browser, user, machine Internet.edb WebSQL IDB
  • 17.
  • 18. Demo
  • 20. Management interface Replaces the MMC-based Exchange Management Console Fully web-based (/ecp virtual directory) Designed to allow administrators to perform most common tasks Copyright© Microsoft Corporation
  • 21.
  • 24. Sender notifications Admin notifications Copyright© Microsoft Corporation
  • 25. Block email based on language Block email based on geography Copyright© Microsoft Corporation
  • 26. Policy details transparently displayed to end user Right click to assign policy to an Copyright© Microsoft Corporation item, folder or to all your email
  • 28. A PolicyTip notifies you of a policy violation while composing an email Copyright© Microsoft Corporation
  • 29. Use proximity searches to understand context Fine tune complex queries Get instant statistics Query results across Exchange, Lync & SharePoint Laser focused refiners to help find the data you need
  • 30. Demo
  • 32. L7 LB CA Ex Ex S HT MBX MBX Ex Ex • Separate HA solutions SAN for each role • Separate roles for ease • Introduced the DAG • Role differentiation of deployment and through manual management • Rich management configuration segmentation experience using RBAC • Backups and hardware • Support cheaper • Support for Hybrid solutions for “reliability” storage deployments 2000/2003 2007 2010
  • 33. Forefront Online Protection for Exchange Internal Network Phone system (PBX or VOIP) Edge Transport Hub Transport Routing and Routing and policy AV/AS External SMTP servers Mailbox Unified Messaging Stores mailbox and Voice mail and public folder items voice access Mobile phone Web Client Access browser Layer 7 LB Client connectivity Web services AD Outlook (remote user) Outlook (local user) Line of business application
  • 34. Exchange deployments can be complicated Load balancing is difficult and can require expensive solutions When dedicated server roles are deployed, hardware can go unutilized or under-utilized Too many namespaces required Copyright© Microsoft Corporation
  • 36. Use Building Blocks to facilitate deployments at all scales – from self- hosted, small organizations to Office 365 • Server role evolution • Network layer improvements • Versioning and inter-op principles Copyright© Microsoft Corporation
  • 37. Hardware efficiency Deployment simplicity Cross-version inter-op Failure isolation Copyright© Microsoft Corporation
  • 38. Forefront Online Protection for Exchange Internal Network Exchange 2010 CAS MBX Edge (Array) (DAG) Transport Layer 4 load balancing External SMTP servers Mobile phone Web browser Outlook (remote Phone system user) (PBX or VOIP) Outlook (local user) LOB Application
  • 39. EWS protocol MRS proxy protocol SMTP MRS Protocols, EWS MRSProxy Transport Transport MRS MRSProxy EWS Server Agents RPC CA Assistants Custom WS Assistants RPC CA XSO MailItem Banned XSO MailItem E2010 Business Logic CTS Other API CTS Other API Content Content Store index Store index Storage ESE File ESE File system system Server1 (Vn) Server2 (Vn+1)
  • 40. Exchange 2010 Exchange 2013 Architecture Architecture L4 LB Hardware Load Balancer L7 LB AuthN, Proxy, Client Access Re-direct AuthN, Proxy, Re-direct Client Access Hub Transport, Protocols, API, Unified Messaging Biz-logic Protocols, Assista nts, API, Biz-logic Mailbox Mailbox Assistants, Store, CI Store, CI
  • 42. No “real” way to achieve high- availability SMTP-based replication Multi-master model Copyright© Microsoft Corporation
  • 43. Called “Public Folder Mailboxes” Reside within a mailbox database Leverage Database Availability Group for true high availability Single-master model! Copyright© Microsoft Corporation
  • 44.

Editor's Notes

  1. Introduction & Welcome
  2. Slide objectiveLet’s talk about some of the communication challenges.  StoriesMultitude of devices: 10 years ago, connected workers had a PC, possibly a bulky laptop, possibly a mobile phone (Motorola StarTAC, anyone?), and dial-up Internet. Today, we have smartphones, IP phones, slates, tablets, laptops, desktops, and netbooks, and people want access to email and business information from anywhere, on any device.  Information explosion: In the next decade, mankind’s data will increase 44 times, while the number of IT professionals will grow by only 1.4 times. At a certain point, worker productivity is hampered by too much information. Workers need smart ways to deal with information so that they can find what they need in the flood of data. In fact, in the next year alone, there will be more data generated than in all of mankind’s history, and it is all in your inbox.  Compliance necessities: Some of that information is intellectual property, some is business-critical data, some of it is personally identifiable information. Managing this is a challenging and complex task. Every year since 1995 has been deemed by some analyst or press figure the “Year of Compliance.” The reality is that many organizations put it off or do the minimum required by law or industry regulation. Organizations have to figure out how to take this incredible quantity of information moving at unprecedented velocity to more places and people than ever before—and keep it safe and secure.  Multigenerational workforce:In 2012, there will be one Baby Boomer for every working-age person in the developed world. The Millennial generation is the first generation that has grown up immersed in connected technology. In the 2016 U.S. presidential election, the voting majority will be Generation Y.  Organizations that want to recruit the best and brightest of this generation need to provide technology that helps them reach their goals—just as they are accustomed to from their consumer experiences. At the same time, the workforce is diverse. You need to have technology that enables people to get work done no matter what their comfort level. Things are moving at a fast pace. Many organizations feel overwhelmed when thinking about the future of messaging. the new Exchange will continue to help solve business needs and an innovative and smart manner. More data pointsInformation explosion:Wikipedia estimates that in 2010, humans will have 1.2 zettabytes (or 1.2 billion terabytes) of information (50 Libraries of Congress), and the rate at which we create information continues to accelerate.   Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours Canada: 2.6 hoursFrance: 2.3 hoursAustralia: 1.6 hoursGermany: 0.9 hoursNetherlands: 0.5 hours 55 percent of students surveyed by Youth Trends said they had a smartphone. One year earlier, just 26 percent did.  Time spent by Gen Y on email per week (eMarketer with Accenture):India: 6.5 hours Canada: 6.3 hours Brazil: 5.2 hours Italy: 4.4 hoursGermany: 4.1 hoursNetherlands: 3.6 hoursAustralia: 3.4 hoursFrance: 2.5 hours Time spent by Gen Y on Instant Messenger per week (eMarketer with Accenture):Brazil: 6.2 hours Italy: 5.2 hours India: 3.3 hours
  3. Devices:Fast and fluid experience with touch, pen, mouse & keyboardImmersive touch-optimized Windows 8 appsSupport for Mobile DevicesCloud:Office - on demand, roaming & up-to-dateNew cloud app development modelEnterprise-grade reliability and standardsSocial:Newsfeeds & microblogging, extend with YammerPervasive social capabilities across OfficeMultiparty HD video & Skype federationControl:DLP, data retention & unified eDiscoveryReimagined deployment model for Office appsCommon management experience across Office 365
  4. Slide objectiveCommunicate that Humans think in terms of people, not contact cards; so should software. We’re working to provide a much more personal and connected experience. Talking pointsIntegrate with internal and external social networks. Communicate with the right people instantly. the new Exchange will make it much easier to find the right people and communicate with them in the most efficient way.People love the WP7 linking ability. When it goes server side, you get benefits across any device. Unified contacts – Outlook/OWA – cut down on duplicatecontacts.Contact card – Outlook – New contact card lays out information in a easy to read format along with easy access to communication means.Hover card – OWA – OWA now has the same Hovercard that users have and love in Outlook.Outlook Social connector – Outlook – view information from your email and other social networks about a person to get a full view of your communications with that person and what is important to them.
  5. Slide objectiveThere is a ton of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
  6. Slide objectiveThere is a wealth of data in your inbox. Then there is data in other applications that relates to this data. the new Exchange puts it together in a useable and manageable way.StoryThink about how your current workflow when you have a new business contact/partner/client, etc., say Bob@externalcompany.com. You usually only have an email address with a name associated to it, perhaps a little more context if you email various sources. Prior to your meeting, it would be great to know details about his insights and perhaps some of the company’s past history. This will help gauge the correct level of presentation. With the new Exchange, your admin (or you if they desire), can install a CRM application directly into Outlook and OWA so you get this information in context. The information exists, and it is right in front of you. the new Exchange helps you make it usable. We can make that experience better and give the developer and partner community a chance to promote/sell this. Talking pointsExtend browser-based, singlesign-on simplicity for multiple applications.Use extensions to create an integrated, customized experience that brings all the apps people need together in one place.Give users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.
  7. A lots happened since the last MECLet’s take a little walk down memory laneEx2000Exchange 2000 along with IE5 marked a fundamental shift in developing web applicationIE5 could absorb XML out of the box but there was no way to really ask for it.This inspired the development of XMLHTTP.Experience is split - IE5 and above gets one experience - All other browsers get down level experienceEx2003First version of OWA that was co-designed with OLKMajor features addedSpell checkRulesThemesTasksForms Based AuthExchange 2007Ground up rewriteASP .Net 2.0/C#Runs on middle tierAwesome feature set!!
  8. Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
  9. Slide objectiveManagement of applications that are deployed to Outlook and Outlook Web App is controlled and managed from a seamless interface.StoryThink about the management experience and the deployment experience for applications in your organization. This is especially compounded when faced with a mission critical application like email. With the new Exchange, we make this easier and more powerful, by having an integrated application environment to publish and control deployment of apps to Outlook and Outlook Web App.Talking pointsGive users access to the right applications with privacy and deployment scopes so that you can give people precisely the functionality they need without added risk.Powerful management ofapps - You can auto-deploy apps, block apps, and have control over the experience. It is from a native
  10. Exchange Online Protection Built on the very successful FOPE serviceCurrent SLAs100% protection against all known virusesCapture at least 98% of all inbound spam emailsFalse Positive commitment of less than 1 in 250,000 emailsEOP now integrated with office 365 for management and onboarding.Sender Reputation protection by send through a “high risk” pool to ensure protection of Organizations reputationMajor Improvements over FOPE:Integrated consoleSPAM improvementsComprehensive protectionMulti-engine antivirus Continuously evolving anti-spam protectionBuilt on Forefront Online Protection for Exchange (FOPE)Enterprise class reliabilityGeographically load-balanced datacentersQueuing capabilities to help ensure no mail is lostCommon administration consoleOffice 365 integrationDetailed reporting
  11. Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".
  12. Integrated archiving and data hold capabilitiesCentrally managed or used assigned retention policies
  13. Situation: Leakage or loss of data through email is a growing risk and concern for many organizations today – because of regulations, breaches of trust or loss of business critical information. Exchange approach to the problem is to provide a range of soft and hard controls.Talking Points:Flexible solution:Customers have differing needs – solution needs to be flexibleWithin a given organization, different types of data, different parts of the company require different levels of enforcementProtect against loss without getting in users’ wayAttempts to implement policy can’t get in the way of business processes, or these will failExchange has been making investments in this area for the last few releasesTransport rules in Exchange 2007Transport rules + Rights protection in Exchange 2010MailTips in Exchange 2010 / Outlook 2010 (alert user before the email is sent) – “Bob Jones is outside of your organization”Actions are built in today already (as part of transport rules) – block, monitor, RMS protect, etcIn Exchange 2013 we build on this foundation and bring full DLP to the product
  14. In the new Exchange, the DLP features will support major regulatory requirements out of the box, including PCI DSS.It will also be extensible, allowing admins to install specific templates offered by security partners. For example, a DLP template built by a partner for the German market would take action on email that includes German driver’s license numbers.Provide granular information about corporate policies at the right time, while not getting in the way of doing business Talking points Exchange gives you the control to manage compliance in order to meet your business and regulatory needs.The goal is to help you with accidental data loss. Detect sensitive data before it is sent with built-in templates that filter mail content for PCI DSS, GLBA, and other regulations. Import DLP policy templates from top security partners or build your own.Today, it is important to help users do the right thing in a complex world of compliance. Education for usersDLP is built upon transport rules (v3). While it was possible to do in Exchange Server 2010 or Exchange Online, now it is packaged, and with reporting/charts/classifications, and it is out of the box Stories When was the last time you saw the employee handbook with all of the regulations on what you were and weren’t supposed to do?. Most people aren’t malicious, but they aren’t educated.  More infoClassificationScanning will examine both message contents and attachmentsOut-of-the-box classification rules work to detect common types of sensitive data. Actions are built in today (in transport rules). We are adding deep analysis (content inspection)Policy engineWell-defined entities (e.g., CC#, SSN) Probabilistic techniques for fuzzy matches (e.g., SOX, medical terms) RSA partnershipDLP policy template: Logical grouping of classification rules, transport rules, and reporting to achieve an objectiveThere will be several templates in the box.PII, financial, healthcare (for the type of healthcare issues that HR would deal with. We are not building templates for hospitals, though we enable partners to do that through our extensibility story)U.S. and Europe Custom classification rulesFingerprinting for org. documents that share common characteristics (e.g., 1040 form) Custom regex and keyword matchesOffice document metadata ExtensibilityClassification rules: Open format for classification rule schemaISVs create new packages of classification rules, transport rules, and reporting for specific regulations ActionsBuilt on Exchange Transport Rules; has same actions availableSupports discovery phase of compliance: two clicks to start monitoring sensitive information IW ExperienceContextual education for information workers Detect sensitive data in email before it is sentText is customizable by admins from Exchange Admin Center
  15. SituationWith the explosive growth of compliance requirements both inside and outside organizations, compliance has become everyone’s responsibility. Neither the IT department nor the legal and compliance departments can keep tabs on all of the information that is exchanged in the ordinary course of business. Organizations need tools that enable self-service and automated compliance wherever possible. Talking pointsThere is a solid partnership between the teams. We all work together now.Perform unified searches regardless of document type or location, across Exchange, SharePoint, Lync, and file shares.Search and view content by project, legal matter, or business context.Save money when there is a litigation need by producing results quickly and efficiently.Provide native safety for messaging content.This is an evolution of our compliance (v3) and search infrastructure (FAST)Data stays where it lives (In-Place) where it has the most relevance.
  16. Blocking SPAMTop ranked filtering service gets better with faster more proactive ways of catching and eliminating spamNew fingerprinting techniques to react faster (in real time – don’t have to wait until user community reports it)For example; when we find a bad IP that is sending spamWe’ll do more than just block the mail from We’ll start collecting all of the email from that know bad server and analyzing it to find out characteristics of the spam, so that we can more effectively block it.International SPAM SupportAbility to select geo-regions/countries for blockingAbility to filter on languages (86 languages supported)Geo-regions enforcement happens in Connection Filtering LayerLanguage enforcement happens at the Content Filtering layer Bulk Mail marked as SPAMThe admin can decide how to classify these type of messages – will be treated based on what your choice of how to manage SPAM.Bacn (pronounced like bacon), is email that has been subscribed to and is therefore not unsolicited (like e-mail spam), but is often not read by the recipient for a long period of time, if at all. Bacn has been described as "email you want but not right now.“Bacn differs from spam in that the recipient has signed up to receive it. Bacn is also not necessarily sent in bulk. Some examples of common bacn messages are news alerts, periodic messages from e-merchants from whom one has made previous purchases, messages from social networking sites, and wiki watch lists.[3]The name bacn is meant to convey the idea that such email is "better than spam, but not as good as a personal email".