![]() http://twitter.com/PartnerID 2437508 ![]() How it Works @outlookanywhere With just a simple mail exchange (MX) record configuration change, our MS Hosted Services can be up and running quickly. There is no hardware to provision; no software to buy, install or configure; and no expensive training required for your IT staff. Furthermore, there is no need for you to change or modify your existing e-mail infrastructure, or to even install and maintain any new hardware or software. The heart of Exchange Hosted Services is its distributed network of data centers located at key sites along the Internet backbone. Each data center contains fault-tolerant servers that are load-balanced from site to site and from server to server. In the unlikely event that one data center is unavailable, traffic can be easily routed to another data center, minimizing the chances of interruption to the service. And Microsoft algorithms analyze and route message traffic between data centers to help ensure secure and timely delivery. http://www.microsoft.com/business/thenewefficiency/keynote/demo/uc_management.aspx
-Email, shared calendar and contacts -Flexible mailbox sizes -Anywhere Access -Mobility with Active Sync devices
Flexible Deployment -Online & on-premises co-existence
-Active Directory synchronization
-Data migration
-Information & desk-less worker
Security and Availability
-Built in anti-virus and anti-spam
-Multi-layer data protection
-Compliance archiving
-Email encryption
Simplified Management
-Unified administration center
-24x7 support
-99.9% service level agreement Flexible Mailbox Sizes and Policies
-5GB allocation per standard user license (25GB Maximum)
-Pooled storage at company level
-Assign different mailbox size limits per user
-Additional storage available for purchase -Flexible send warning policy ![]() ![]() Exchange Hosted Filtering employs five layers of preventive and protective functionality to prevent increasingly complex e-mail–borne threats from infiltrating businesses and violating corporate policy on e-mail use. The five components are as follows:
![]() Exchange Hosted Archive Service ComponentsSupport to help satisfy industry and regulatory retention requirementsExchange Hosted Archive has many features that aid in compliance including multiple retention periods, legal hold, supervision by keyword or percentage and immutable storage.Granular Reporting and Auditing CapabilitiesAny good security policy encompasses granular audits and logging of system transactions. EHA has numerous auditing reports available in addition to several traceable administrative and user events.Rapid search and retrievalIndexed storage enables fast retrieval of messages for e-discovery and other investigations.Fully functional backup e-mail systemIf primary e-mail systems go down, users and administrators will still have access to archived e-mail and can send and receive new messages in real time.![]() ![]() A: The Hosted Continuity archive solution employs an integrated hardware and software combination to meet the goal of storing data in a non-rewritable and non-erasable format. Our proprietary software uses integrated code that prevents the e-mail records from being overwritten, modified or removed. In addition, the code cannot be disabled or removed from the system. Microsoft Hosted Encryption
-MS Technet Web site Policy-Enforced Encryption Questions
Insert introduction here. ![]() A. To encrypt all messages except for a message containing a specific opt-out subject line
Taking these steps will cause all messages to be encrypted, except for any message that contains the predetermined keyword or phrase in the subject line. No other encryption rules should be written if using this set-up. ![]() Decrypt rules can be set based on the subject line or the individual recipients email address. A decrypt rule will decrypt the message at our data center, so the message will be in plain text before it reaches the end-user. The end-user will not be required to read the message via the ZDM. It is recommended that TLS handoffs are accepted before using decrypt rules. ![]() A. A basic HIPPA rule set is provided as a courtesy. If messages have a key word or phrase in a first list and a keyword or phrase in a second set list the message will then be encrypted. Please see the Policy Filter section of the Exchange Hosted Filtering Administration Center Guide for more detail on the exact keywords and phrases. ![]() Get Started Today. Click on the 5thnk logo! OR Send an email to sales@5thnk.com, or an email to sales@ittakesateam.net |