programming4us
           
 
 
Applications Server

Exchange Server 2010 : Designing and Implementing AD RMS Integration (part 3) - Transport and Journal Report Decryption

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
11/30/2010 11:24:31 AM
3. Transport and Journal Report Decryption

Exchange Server 2010 can also be configured to decrypt IRM-protected content, to allow for content scanning, applying disclaimers, facilitating discovery searches, and allowing the journaling of decrypted copies of messages.

3.1. Transport Decryption

Transport decryption provides the ability for you to enforce messaging policies access on IRM-protected messaging content by allowing access to the content by agents in the transport pipeline. When enabled, IRM-protected messages are decrypted by the Decryption agent; only messages protected with the AD RMS clusters in your organization can be decrypted. The Decryption agent is a built-in transport agent; built-in agents are not returned in the output of the Get-TransportAgent cmdlet.

Messages that have been IRM protected using transport rules do not need to be decrypted by the Decryption agent; the transport rules apply protection when fired by the OnRoutedMessage event, whereas the decryption agent fires on the OnEndOfData and OnSubmit transport events.


Note:

After the Decryption agent decrypts the message, it is available to custom or third-party agents that are installed on the Hub Transport server so that these agents can perform their actions on the message. Although the message is always encrypted again before leaving the Hub Transport server, you need to test the behavior of these custom or third-party agents before deploying them in a production environment.

For example, if the actions of a custom or third-party agent cause a new message to be created and the original message to be attached to it, only the new message is re-encrypted; the original attached message is left unencrypted. This means that the final recipients of the new message have access to the original message in an unprotected state, and can take any action they wish with it, such as cutting, copying, printing, or forwarding it.


If an error occurs while decrypting a message, or re-encrypting it before the message is passed on, the Hub Transport server attempts the action twice more. If the third attempt fails, the Hub Transport considers this a permanent error and takes the following action:

  • If the permanent error occurred during decryption and if transport decryption is set to Mandatory, an NDR is sent that includes the encrypted message. If transport decryption is set to Optional, no action is taken and the message is delivered even if decryption fails.

  • An NDR is always returned if the permanent error occurs during re-encryption; this NDR never includes the decrypted message.

To configure transport decryption, the Federated Delivery Mailbox must be granted Super Users privileges for your AD RMS cluster; this is covered in detail in the Section 5 section of this article. When Super Users privileges have been configured, enable transport decryption using the Set-IRMConfiguration cmdlet. The following example enables transport decryption and rejects messages that can't be decrypted, returning an NDR to the sender:

Set-IRMConfiguration -TransportDecryptionSetting Mandatory

The acceptable values for TransportDecryptionSetting are Mandatory, Optional, or Disabled.

3.2. Journal Report Decryption

If your organization uses premium journaling, any messages protected with IRM may need to be journaled unencrypted to enable successful discovery of that content in the event of a legal or regulatory discovery request. When enabled, journal report decryption saves a clear-text copy of the IRM-protected message in the journal report along with the original IRM-protected message.


Note:

Journal report decryption only supports premium journaling, and thus requires an Exchange Enterprise client access license (CAL).


The decryption of the IRM-protected message is performed by the Journal Report Decryption agent, a built-in transport agent. This agent fires on the OnCategorizedMessage event while transport rules protect messages with IRM on the OnRoutedMessage event, before the Journal Report Decryption agent sees them. Thus, messages protected by transport rules are decrypted again by the Journal Report Decryption agent. Similar to transport decryption, the Journal Report Decryption agent only decrypts messages IRM protected by the AD RMS cluster in your organization.

Generally, only sensitive information is protected with IRM, so when you enable journal report decryption the journaling mailbox may contain sensitive information that is not encrypted. Best practice thus dictates that access to the journaling mailbox be monitored closely and access allowed only to authorized individuals.

As with transport decryption, the Federated Delivery Mailbox must be granted Super Users privileges for your AD RMS cluster before journal report decryption can be enabled; this is covered in detail in the Section 8.7.2.5 section of this chapter. After Super Users privileges have been configured, journal report decryption is enabled using the Set-IRMConfiguration cmdlet:

Set-IRMConfiguration -JournalReportEncryptionEnabled $true

Other -----------------
- Exchange Server 2010 : Multi-Mailbox Search (part 2) - Performing a Multi-Mailbox Search
- Exchange Server 2010 : Multi-Mailbox Search (part 1) - Litigation Hold
- BizTalk Server 2009 : Consuming WCF services without orchestration
- BizTalk Server 2009 : Consuming WCF services from orchestrations
- BizTalk Server 2009 : Exposing WCF services from schemas
- Active Directory Domain Services 2008: Exclude an Attribute from Directory Service Auditing
- Active Directory Domain Services 2008: Configure Auditing on Object Security Access Control Lists
- Active Directory Domain Services 2008: Disable the Detailed Directory Service Replication Auditing Subcategory
- Active Directory Domain Services 2008: Enable the Detailed Directory Service Replication Auditing Subcategory
- Active Directory Domain Services 2008: Disable the Directory Service Replication Auditing Subcategory
- Active Directory Domain Services 2008: Enable the Directory Service Replication Auditing Subcategory
- Active Directory Domain Services 2008: Disable the Directory Service Changes Auditing Subcategory
- Active Directory Domain Services 2008: Enable the Directory Service Changes Auditing Subcategory
- Active Directory Domain Services 2008: Disable the Directory Service Access Auditing Subcategory
- Active Directory Domain Services 2008: Enable the Directory Service Access Auditing Subcategory
- Active Directory Domain Services 2008: Retrieve the State of Directory Service Access Auditing Subcategories
- Exchange 2010 : Managing Exchange Recipients (part 4)
- Exchange 2010 : Managing Exchange Recipients (part 3)
- Exchange 2010 : Managing Exchange Recipients (part 2)
- Exchange 2010 : Managing Exchange Recipients (part 1)
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us