Free Essay

Journaling and Archiving

In:

Submitted By robbycollazo2
Words 543
Pages 3
Journaling and Archiving

Author Note This research is being submitted on September 7, 2013, for N234/CET2810C Section 01 Microsoft Exchange Server course.

Journaling and Archiving Archiving is the process of moving a message from one data store to another. Usually this is a user-centric function, being done so a mail user has later access to a message not stored in their main mail file. Often, there is a 1:1 relationship between the primary mail file and the archive. Thus, each user has access to their own archive. Archiving is a kind of agreement between the e-mail and the user being supported. On one hand, the administrator frees up space on the primary server, while on the other hand the user retains access to move messages. Journaling is the process of copying a message from one data store to another. Journaling is a company-centric management technique and is done to demonstrate compliance and facilitates e-discovery. Unlike archives, typical users generally have little to do with the journaled messages. Here are some key reasons why an administrator should consider archiving and journaling:
Archiving
* Server Performance: Moving messages off the mail server will greatly increase its performance. Mail applications will open faster, providing a better user experience. * Efficient Search and Retrieval for Users: Depending on the archive policy you implement, your users may find that they rarely need to access the archive, but when they do, they will usually be looking for a particular email. Therefore, the archive has the ability to be searchable. * End-user Convenience: For good or bad, email tends to be repository for business content. Being able to retain this content and have it within easy reach is important for the end-users. * Email Administrator Convenience: Budget freezes mean that email administrators need to get more for less. Moving messages off to less expensive secondary storage allows for them to do that.
Journaling
* Efficient E-discovery Response: During litigation, the email administrator may be asked to produce all relevant emails from a certain time frame. * Compliance and Security: Relying on end users to retain email messages for compliance is often not in your best interest. A journaling system will securely retain a copy of a message even after all other copies have been deleted. * Email Administrator Convenience: The right journaling solution, once configured and tuned, should be low-touch and efficient, using secondary storage and reducing back up windows.

References
Adshead, A. (2011, June 13). Email archiving services: How they work and how to select a service. Retrieved September 6, 2013, from http://www.computerweekly.com/feature/Email-archiving-services-How-they-work-and-how-to-select-a-service
Bruzzese, P. J. (2011, November 11). Which is best: Exchange 2010 archiving vs. third-party tools | Microsoft Windows - InfoWorld. Retrieved September 6, 2013, from http://www.infoworld.com/d/microsoft-windows/which-best-exchange-2010-archiving-vs-third-party-tools-180295
Lindsay, G. (2010, August 26). The What and Why of Archiving and Journaling. Retrieved September 6, 2013, from http://www.slideshare.net/Sherpasoftware/the-what-and-why-of-archiving-and-journaling
TechNet (2013, February 13). Journaling: Exchange 2013 Help. Retrieved September 7, 2013, from http://technet.microsoft.com/en-us/library/aa998649 (v=exchg.150).aspx

Similar Documents

Free Essay

E-Mail Archiving

...Data and E-mail Archiving 1 Data and E-mail Archiving: Legal Concerns Joel Zart Capella University TS5536-Ethics in Technology Data and E-mail Archiving 2 Table of Contents Abstract……………………………………………………………………………………Page 3 Introduction to the world of Archiving……………………………………………………Page 4 Laws and penalties associated with archiving……………………………………………..Page 5 My ethical and legal dilemma……………………………………………………………...Page 6 Ethical dilemmas in archiving……………………………………………………………...Page 6 Process of identifying archiving liability…………………………………………………...Page 7 The solution based on law…………………………………………………………………..Page 8 The affects…………………………………………………………………………………..Page 9 The solution………………………………………………………………………………...Page 10 Conclusion………………………………………………………………………………….Page 11 References………………………………………………………………………………….Page 12 Data and E-mail Archiving 3 Abstract The purpose of this is to analyze the importance of data and e-mail archiving within an enterprise organization. At my organization I am currently in the planning stages of having a fully fledged data and e-mail archiving solution in place by the end of 2009. Archiving data and e-mail within an enterprise is important for legal litigation. According to industry experts 90% of communication in business takes place through e-mail and electronic documentation such as instant messaging and word documents (2009 para.1). Companies are now required to archive all communication to not only protect the company but also their employees....

Words: 2619 - Pages: 11

Premium Essay

Gggg

...A file system (filesystem) is means to organize data expected to be retained after a program terminates by providing procedures to store, retrieve and update data, as well as manage the available space on the device(s) which contain it. A file system organizes data in an efficient manner and is tuned to the specific characteristics of the device. There is usually a tight coupling between the operating system and the file system. Some filesystems provide mechanisms to control access to the data and metadata. Insuring reliability is a major responsibility of a filesystem. Some filesystems provide a means for multiple programs to update data in the same file nearly at the same time. Without a filesystem programs would not be able to access data by file name or directory and would need to be able to directly access data regions on a storage device. File systems are used on data storage devices such as magnetic storage disks or optical discs to maintain the physical location of the computer files. They may provide access to data on a file server by acting as clients for a network protocol (e.g., NFS, SMB, or 9P clients), or they may be virtual and exist only as an access method for virtual data (e.g., procfs). This is distinguished from a directory service and registry. Types of file systems Disk file systems A disk file system takes advantages of the ability to randomly address data on a disk storage media in a short amount of time. Additional considerations include the...

Words: 5110 - Pages: 21

Free Essay

Teradata Introduction

...Coffing Data Warehousing Education Outline 02/17/05 TERADATA EDUCATION OUTLINE Coffing Data Warehousing has provided quality Teradata education, products and services for over a decade. We offer customized solutions to maximize your warehouse. Toll Free: 1-877-TERADAT Business Phone: 1-937-855-4838 Email: mailto:CDWSales@CoffingDW.com Website: http://www.CoffingDW.com In addition to the course material listed in this outline, we also offer Teradata classes in Teradata Basics, Implementation, SQL, Database Administration, Design and Utilities. Please contact us so we can customize a course to fit your specific needs. © 2006 Coffing Data Warehousing – All rights reserved. Confidential. 1 Coffing Data Warehousing Education Outline 02/17/05 PURPOSE Coffing Data Warehousing has been providing quality Teradata education for over a decade. We offer customized courses to maximize the effectiveness of each class. The purpose of this proposal is to build a lasting relationship with your company. To this end, we have combined our comprehensive Teradata education services in a unique package that we feel best suits the diverse needs of your company while offering our high quality product at competitive pricing. Coffing Data Warehousing is excited to offer you, our preferred partner, an innovative new way to look at training at the CoffingDW Teradata University (CDW-TU). This approach provides the ability to maximize learning potential. Our goal is to make your employees...

Words: 1512 - Pages: 7

Premium Essay

This Is Not a Test

...Commands with some options: * tar - options to create and extract, preserve options, gzip compress (you should have used either of these when you created your kernel source code backup.) * chmod - options to recursively change user, group and other permissions on files/directories * chown - options to recursively change file and directory user ownership * chgrp - options to recursively change file and directory group ownership * kill - superkill vs sending other signals to a process * ps - options to list all running processes on a Linux/Gnu system * top – Interactive Linux Tasks Status Display * grep - know how to use to find specific lines of info in output/files (you should have learned about this command in Intro to Unix/Linux Systems.) Shell expansion characters - be able to respond to questions regarding usage of '*' - asterisk, all files or all matching strings '?' - question mark, single character  What are the components of a Linux distribution? * Kernel * Desktop Environment * System Libraries * System Tools * Developmental Tools * File Structure Popular Distributions:  * Redhat,  * CentOS * Fedora  * Suse * Debian * Ubuntus What sort of hardware architecture can Linux be installed on? * Intel-x86 systems * Embedded systems From what sources can Linux be installed? * CD- ROM * Hard Disk * Floopy Disk * USB * Network Installation...

Words: 4587 - Pages: 19

Premium Essay

Paper

...Ec-council.Braindumps.312-49.v2014-03-11.by.ANGELA.180q Number: 312-49 v8 Passing Score: 700 Time Limit: 240 min File Version: 16.5 http://www.gratisexam.com/ Exam Code: 312-49 Exam Name: Computer Hacking Forensic Investigator Practice Testw CHFI-1-105 QUESTION 1 When a file or folder Is deleted, the complete path, including the original file name, Is stored In a special hidden file called "INF02" In the Recycled folder. If the INF02flle Is deleted, It Is re-created when you _______ A. B. C. D. Restarting Windows Kill the running processes In Windows task manager Run the antivirus tool on the system Run the anti-spy ware tool on the system Correct Answer: A Section: (none) Explanation Explanation/Reference: A QUESTION 2 Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame. A. B. C. D. 8-bit 16-bit 24-bit 32-bit Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 3 The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time,service and instance, server name and IP address, request type, target of operation, etc. Identify theservice status code from the following IIS log. 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2,SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, / dollerlogo.gif, A. B. C. D. W3SVC2 4210 3524 100 Correct Answer: D Section: (none) Explanation...

Words: 11383 - Pages: 46

Free Essay

Linux as a Personal Desktop Operating System

...Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need to Use This Book.........................................................................................................4 What Is Linux? ........................................................................................................................................5 Linus Torvalds and the Birth of Linux.............................................................................................5 Why Choose Linux?.........................................................................................................................6 What Is Red Hat Linux 9?................................................................................................................7 What Is Covered in This Book?..............................................................................................................8 Conventions in This Book......................................................................................................................9 Customer Support...............

Words: 155032 - Pages: 621

Premium Essay

Cissp

...CISSP: The Domains Table of Contents INTRODUCTION 4 DOMAIN 1: ACCESS CONTROL WHAT’S NEW IN ACCESS CONTROL? AN OVERVIEW 5 5 7 DOMAIN 2: SOFTWARE DEVELOPMENT SECURITY WHAT’S NEW IN APPLICATIONS SECURITY (NOW SOFTWARE DEVELOPMENT SECURITY)? AN OVERVIEW 9 9 10 DOMAIN 3: BUSINESS CONTINUITY & DISASTER RECOVERY WHAT’S NEW? AN OVERVIEW 12 12 13 DOMAIN 4: CRYPTOGRAPHY WHAT’S NEW? AN OVERVIEW 17 17 18 DOMAIN 5: INFORMATION SECURITY GOVERNANCE & RISK MANAGEMENT WHAT’S NEW? AN OVERVIEW 21 21 22 DOMAIN 6: LEGAL, REGULATIONS, INVESTIGATIONS, AND COMPLIANCE WHAT’S NEW? AN OVERVIEW 24 24 26 DOMAIN 7: SECURITY OPERATIONS WHAT’S NEW? AN OVERVIEW 28 28 29 DOMAIN 8: PHYSICAL & ENVIRONMENTAL SECURITY WHAT’S NEW? AN OVERVIEW 32 32 33 DOMAIN 9: SECURITY ARCHITECTURE & DESIGN WHAT’S NEW? AN OVERVIEW 36 36 38 DOMAIN 10: TELECOMMUNICATIONS & NETWORK SECURITY WHAT’S NEW? AN OVERVIEW 40 40 41 INFOSEC INSTITUTE’S CISSP BOOT CAMP COURSE OVERVIEW COURSE SCHEDULE 44 44 45 INTRODUCTION (ISC)²’s CISSP Exam covers ten domains which are:           Access Control Application Development Security Business Continuity and Disaster Recovery Planning Cryptography Information Security Governance and Risk Management Legal regulations, investigations, and compliance Operations Security Physical and Environmental Security Security Architecture and Design Telecommunications...

Words: 11687 - Pages: 47

Free Essay

Rute Linux Tutorial

...LINUX: Rute User’s Tutorial and Exposition Paul Sheer August 14, 2001 Pages up to and including this page are not included by Prentice Hall. 2 “The reason we don’t sell billions and billions of Guides,” continued Harl, after wiping his mouth, “is the expense. What we do is we sell one Guide billions and billions of times. We exploit the multidimensional nature of the Universe to cut down on manufacturing costs. And we don’t sell to penniless hitchhikers. What a stupid notion that was! Find the one section of the market that, more or less by definition, doesn’t have any money, and try to sell to it. No. We sell to the affluent business traveler and his vacationing wife in a billion, billion different futures. This is the most radical, dynamic and thrusting business venture in the entire multidimensional infinity of space-time-probability ever.” ... Ford was completely at a loss for what to do next. “Look,” he said in a stern voice. But he wasn’t certain how far saying things like “Look” in a stern voice was necessarily going to get him, and time was not on his side. What the hell, he thought, you’re only young once, and threw himself out of the window. That would at least keep the element of surprise on his side. ... In a spirit of scientific inquiry he hurled himself out of the window again. Douglas Adams Mostly Harmless Strangely, the thing that least intrigued me was how they’d managed to get it all done. I suppose I sort of knew. If I’d learned...

Words: 159689 - Pages: 639

Premium Essay

Intro to Linux

...A Practical Guide to Linux Commands, Editors, and Shell Programming SECOND EDITION ® Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Library of Congress Cataloging-in-Publication...

Words: 228961 - Pages: 916

Premium Essay

Paper

...Management of Information Security Third Edition This page intentionally left blank Management of Information Security Third Edition Michael Whitman, Ph.D., CISM, CISSP Herbert Mattord, M.B.A., CISM, CISSP Kennesaw State University ———————————————————————— Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Management of Information Security, Third Edition Michael E. Whitman and Herbert J. Mattord Vice President, Career and Professional Editorial: Dave Garza Executive Editor: Stephen Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Developmental Editor: Lynne Raughley Editorial Assistant: Meghan Orvis Vice President, Career and Professional Marketing: Jennifer McAvey Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Marketing Coordinator: Shanna Gibbs Production Director: Carolyn Miller Production Manager: Andrew Crouth Senior Content Project Manager: Andrea Majot Senior Art Director: Jack Pendleton Cover illustration: Image copyright 2009. Used under license from Shutterstock.com Production Technology Analyst: Tom Stover © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information...

Words: 229697 - Pages: 919

Premium Essay

Visualizing Research

...Visualizing Research This page intentionally left blank Visualizing Research A Guide to the Research Process in Art and Design Carole Gray and Julian Malins © Carole Gray and Julian Malins 2004 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise without the prior permission of the publisher. Carole Gray and Julian Malins have asserted their right under the Copyright, Designs and Patents Act, 1988, to be identified as the authors of this work. Published by Ashgate Publishing Limited Gower House Croft Road Aldershot Hants GU11 3HR England Ashgate website: http://www.ashgate.com British Library Cataloguing in Publication Data Gray, Carole Visualizing research : a guide to the research process in art and design 1.Art – Research 2.Design – Research 3.Universities and colleges – Graduate work I.Title II.Malins, Julian 707.2 Library of Congress Cataloging-in-Publication Data Gray, Carole, 1957Visualizing research : a guide to the research process in art and design / by Carole Gray and Julian Malins. p. cm. Includes index. ISBN 0-7546-3577-5 1. Design--Research--Methodology--Handbooks, manuals, etc. 2. Art--Research--Methodology-Handbooks, manuals, etc. 3. Research--Methodology--Handbooks, manuals, etc. I. Malins, Julian. II. Title. NK1170.G68 2004 707’.2--dc22 ISBN 0 7546 3577 5 Typeset by Wileman Design Printed and bound...

Words: 81106 - Pages: 325

Premium Essay

Business Continuity and Disaster Recovery Planning for It Professionals

...436_XSS_FM.qxd 4/20/07 1:18 PM Page ii 443_Disaster_Rec_FM.qxd 5/25/07 3:07 PM Page i Visit us at w w w. s y n g r e s s . c o m Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our customers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our solutions@syngress.com Web pages. There you may find an assortment of valueadded features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in downloadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress...

Words: 189146 - Pages: 757