Professional Documents
Culture Documents
Introduction to Supporting
Administration
Records Management Features
Conditions and Terms of Use
Microsoft Confidential - For Internal Use Only
This training package content is proprietary and confidential, and is intended only for users
described in the training materials. This content and information is provided to you under a Non-
Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the
content and/or information included in this package is strictly prohibited.
THE CONTENTS OF THIS PACKAGE ARE FOR INFORMATIONAL AND TRAINING PURPOSES ONLY AND ARE
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, WHETHER EXPRESS OR IMPLIED, INCLUDING BUT
NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE, AND NON-INFRINGEMENT.
Training package content, including URL and other Internet Web site references, is subject to
change without notice. Because Microsoft must respond to changing market conditions, the
content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft
cannot guarantee the accuracy of any information presented after the date of publication. Unless
otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos,
people, places, and events depicted herein are fictitious, and no association with any real company,
organization, product, domain name, e-mail address, logo, person, place, or event is intended or
should be inferred.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual
property rights covering subject matter in this document. Except as expressly provided in written
license agreement from Microsoft, the furnishing of this document does not give you any license to
these patents, trademarks, copyrights, or other intellectual property.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
rights under copyright, no part of this document may be reproduced, stored in or introduced into a
retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written
permission of Microsoft Corporation.
For more information, see Use of Microsoft Copyrighted Content at
http://www.microsoft.com/about/legal/permissions/ .
Microsoft®, Internet Explorer, and Windows® are either registered trademarks or trademarks of
Microsoft Corporation in the United States and/or other countries. Microsoft products mentioned
herein may be either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries. The names of actual companies and products mentioned herein may
be the trademarks of their respective owners.
About the Authors
Author: Jonathan Runyon
Bio: Jonathan is a Sr. Support Escalation Engineer with the Enterprise
Communications Support group based in Las Colinas Texas. He has 8 years of
support experience for Exchange Server and participated in the Beta of
Exchange 2007 as a beta rotational engineer. Jonathan has created or
contributed to creation of several training courses including: Exchange Server
2007 Introduction to Supporting Information Worker, and Exchange Server
2007 Introduction to the Exchange Management Shell. He is also co-author of
the book Windows PowerShell for Exchange Server 2007 SP1.
Table of Contents
Records Management Features............................................................................................................1
Conditions and Terms of Use................................................................................................................2
Microsoft Confidential - For Internal Use Only....................................................................................2
Copyright and Trademarks....................................................................................................................2
Table of Contents..................................................................................................................................4
Module Overview..................................................................................................................................1
Lesson 1: Records Management Overview...........................................................................................2
Records Management Concepts.........................................................................................................................3
Terminology.....................................................................................................................................................3
Scenarios.........................................................................................................................................................5
Exchange 2010 Records Management Features.................................................................................................7
Messaging Records Management...................................................................................................................7
User Archive....................................................................................................................................................7
Discovery.........................................................................................................................................................7
Recovery and Retention..................................................................................................................................8
Lesson Review.....................................................................................................................................................9
Lesson 4: Discovery...........................................................................................................................139
Discovery Basics...............................................................................................................................................140
Discovery Basics..........................................................................................................................................140
Managing Discovery........................................................................................................................................142
EMS Discovery Management Commands...................................................................................................142
ECP Discovery Management.......................................................................................................................153
Diagnostics and Troubleshooting....................................................................................................................154
Subtopic H3.................................................................................................................................................154
Lesson Review.................................................................................................................................................155
Additional Resources........................................................................................................................173
Module Review.................................................................................................................................174
Module Assessment..........................................................................................................................175
To complete the Assessment:.....................................................................................................................175
Appendix...........................................................................................................................................176
MRM Application Log Events..........................................................................................................................177
MRM Errors and Events..............................................................................................................................177
ETW Tracing for MRM.....................................................................................................................................182
Subtopic H3.................................................................................................................................................182
Advanced Query Syntax (AQS)........................................................................................................................183
Desktop Search Syntax................................................................................................................................183
Properties by File Kind.................................................................................................................................186
DRAFT Records Management Features
Lesson 5: Dumpster 2.0
Module Overview
This module explains | introduces | …
Terminology
There are several terms related to Exchange 2010 Records Management features. It is
important to understand the terms described in Table 1.
Table 1: MRM Terminology
Term Definition
Auto-Tagging Automatic application of policy tags to user e-mail. When auto-
tagging is activated by the user, Exchange applies policy tags called
retention auto-tags for messaging records management to new
messages in accordance with patterns of previous user messaging
tagging.
Content Settings Content settings are the retention information of the policy tags that
are applied to mailbox items.
Default Policy Tag (DPT) Policy tag that applies to all items in a mailbox that do not have a
retention policy tag
EBA Event Based Assistant. The MRM Assistant operates both as a Time-
Based(Message Expiration) and an Event-Based Assistant(stamping
Retention Date)
ECP Exchange Control Panel. This is the self-service UI.
End User The end user IW (information worker) who by default has the
minimum set of rights.
Enforced Action Refers to a Policy Tag (also called Default Policy Tag) that applies to an
entire enterprise mandatorily.
Expiry Compliance jargon for forced retention and expiration of mail
messages. Also describes the overall experience.
FAI Folder Associated Item. These are messages in the mailbox not visible
in Outlook or OWA to the IW. MRM uses a specific FAI item to
communicate the Retention Policy to Outlook.
Filer User who regularly files mailboxes items into folders.
Journaling The ability to record communications, including e-mail
communications, in an organization for use in the organization's e-
mail retention or archival strategy. In MRM, "journaling" commonly
means simply saving a copy of an item to another location specified
by an SMTP address.
Legacy Client Outlook 2003 SP1 and Outlook 2007.
Legal Hold Situation when data within a mailbox should be retained for litigation
purposes in an organization. AKA Litigation Hold.
Legacy Exchange Servers Exchange 2007 servers.
MCS Managed Content Settings, or Content Setting (CS) for short. These
Scenarios
Scenarios are an effective way to introduce concepts and develop an understanding of
how Exchange 2010 Records management features might be used in different situations.
One of the chief complaints is user education. Information Workers (IW) don’t always
make the best choices related to MRM, and complain that it is not easy to determine the
best ways to use Managed Folders for retention of important information. Another
concern for users centered on expiration of items when it is not expected, and difficulty in
determining what has happened once an item has expired and is no longer where it was
expected to be.
The Exchange administrator believes that many aspects of the MRM solution are
successful, but needs a better solution that addresses the concerns of IWs, without
compromising the overall benefit of records management. Users need a solution that
Archiving
The Exchange administrator for Tail Spin Toys has received feedback from the corporate
director of IT Operations about serious concerns over the way the company’s IWs handle
long term retention of important information. Some time ago mailbox quotas were
implemented as a way of controlling mailbox storage constraints. The majority of IWs
implement personal data files with Outlook 2007 as a way of providing additional
storage. However, this has resulted in challenges for the records managers in charge of
compliance.
The Exchange administrator has been asked to implement a solution that would prevent
users from saving messaging information to personal data files, while providing them an
archiving solution that is flexible and easy to maintain.
Discovery
The records compliance officer for the Fourth Coffee Company is in charge of providing
any corporate information requested by legal officers as part of any litigation with which
the company is involved. This includes the discovery and collection of information across
all the user mailboxes in the company. The records manager is familiar with the use of
certain messaging clients, but is decidedly intimidated when it comes to Exchange
management tools. In the current messaging environment, the records manager has to
work closely with Exchange managers to discover and collect information. This poses
several challenges including the exposure of sensitive information to those that would not
normally have access.
The Exchange administrator understands the needs of the records manager and has been
asked to implement a solution that would allow the records manager to discover and
collect information without the involvement of the Exchange management team. Also the
records manager needs to have access to records management features that would allow
for the granular control of retention actions that would otherwise result in the loss of
important information. The tools for managing records management features should be
easily accessible and require no installation of Exchange bits on the workstation where
the management occurs. Finally the records manager should only have access to the
pertinent information and records management interfaces.
User Archive
User Archive allows you to provide users with an alternate storage location to store
historical messaging data. Users have seamless access to their archive mailbox using
Outlook 2010 and Outlook Web App. Using either of these client applications, users can
view an archive mailbox and move or copy messages between their primary mailbox and
the archive. User archive allows you to present a consistent view of messaging data to
users, and eliminate user overhead required to manage PST files. Eliminating use of PST
files significantly reduces an organization's exposure to the risks outlined in the previous
section.
Creating and managing archive mailboxes is integrated with mailbox management tasks,
allowing you to easily manage archive mailboxes. You can create an archive mailbox
when creating the primary user mailbox, or enable an archive mailbox for existing
mailbox users. Archive mailboxes can be disabled and removed. A user's archive mailbox
resides on the same mailbox database as the user's primary mailbox. When moving the
user's primary mailbox from one mailbox database to another, the archive mailbox is
moved with the primary mailbox.
Discovery
Exchange Server 2010 Discovery helps organizations facing legal discovery
requirements, as part of organizational policy, compliance requirements, or lawsuits, to
search for relevant content in Exchange mailboxes. Exchange 2010 provides a seamless
experience for searching e-mail content in mailboxes across the entire Exchange
organization.
Discovery leverages content indexes created by Exchange Search. The Exchange Control
Panel (ECP) provides an easy-to-use search interface for non-technical personnel such as
legal and compliance officers, records managers and human resources (HR)
professionals. Role Based Access Control (RBAC) provides the Discovery Management
role group to delegate discovery tasks to non-technical personnel, without the need to
provide elevated privileges that may allow a user to make any operational changes to
Exchange Server configuration.
Lesson Review
<Review points and/or questions>
Features
Exchange Server 2007 addresses these ideas with the following features.
Users classify and sort messages into these special folders according to management
polices defined by the administrator. A description of the management policy that applies
to each folder can be displayed for users in both Outlook 2007 and Outlook Web Access
clients. Users can also enable inbox rules to move items as they are received to a managed
folder, further refining the categorization process.
Challenges
While the features of MRM 1.0 introduced by Exchange 2007 addressed the
organizational needs for records management, there were several challenges that
surfaced.
FILER CASE:
IW has to move personal folders to the “Managed Folders” hierarchy or give up
personal folders.
IW can choose the ‘longest’ retention period for all email, bypassing the intent of
expiration schemes.
IW waste a lot of time filing each mail into a managed folder.
IWs specifically asked to be able to control the managed folder hierarchy and apply
policy to a given folder in a MSIT survey.
PILER CASE
IW does not get compliance experience within Inbox.
The recipient has to physically file each mail into a managed folder to get the
compliance experience. A piler user who does not file email cannot benefit from
compliance based on managed folders.
IW email expires and is automatically moved to a “Cleanup Review” folder. The IW
gets no visual clues or message to indicate when this happens.
Managed Folders
Primary to Messaging Records Management are Managed Folders and the corresponding
Content Settings. Managed Folders are represented by an object in the Active Directory
(AD) directory. Configuration information stored in the attributes on these objects
control how these and other Messaging Records Management components work together,
and how Messaging Records Management appears to the end user.
Managed Folder configuration objects are located in the Configuration partition of AD in
the following container:
Services/Microsoft Exchange/<Organization Name>/ELC Folders Container
In a process called provisioning, these AD objects are mapped one to one with actual
folders in the mailboxes to which provisioning has been applied. The provisioning
process also stamps mailbox folders with properties consumed by client applications so
that appropriate comments and icons appear to the user.
The scope of Managed Folders is organization-wide, so folder names must be unique.
There are two types of Managed Folders: default and custom.
Default Folders
Entire Mailbox Junk Email
Calendar Notes
Contacts Outbox
Deleted Items Sent Items
Drafts Tasks
Inbox RSS Feeds
Journal Sync Issues
Additional Managed Default Folders can be created for any mailbox folder type as long as
the directory name is unique. Existing folders can be renamed to accommodate an overall
naming scheme. Managed Default Folders can be created, configured and deleted via the
Exchange Management Console (EMC) or Exchange Management Shell (EMS). The
Exchange 2010 management tools are 100% backwards compatible with MRM 1.0
components created with Exchange 2007 management tools.
Retention Policy - Retention polices are configurable by item age and type and can
be applied to any folder in a user’s mailbox. Different retention policies for different
message types can be applied to the same folder at the same time. Item age can be
defined in the policy by when the item was originally received or when it was
moved into the folder where the policy is applied. The actions taken against an item
when enforcing a retention policy include:
o Delete the item permanently, or soft delete the item so it can still be
recovered from the dumpster
o Move the item to a managed folder to give the user a chance to review and
take further action
o Mark the item as expired in the user’s mailbox, as a result prompting the
user to take further action.
Journaling Policy - Items that are important can be automatically journaled to
another location when placed in a managed folder to which a Journaling policy
applies. The other location can be any recipient with an SMTP address that accepts
messages. This could be another Exchange mailbox, a mail enabled Public Folder, a
Share Point store or a third party archival solution. The Journaling process stamps
items with a label that identifies the policy that journaled the item along with any
additional classification information if so defined. The item is sent as an attachment
to a journaling message that is sent to journaling recipient.
There can be more than one Content Setting object tied to a single Managed Folder, with
different retention and journaling policies each affecting a different message class.
The scope of Content Setting objects is confined to the parent Managed Folder, so
duplicate names across the organization are allowed.
Only one Content Setting object of a specific message class can be specified for each
Managed Folder. The message class is specified at the time of object creation and cannot
be changed.
Mailbox
Accounts
Managed Folder
Mailbox Policies
Managed
Content Settings
The scope of Managed Folder Mailbox Policies is organization-wide, so policy names must
be unique. A single policy can apply multiple managed folders, but only one policy can be
applied to a mailbox enabled account.
Managed Folder Mailbox Policy objects are located in the Configuration partition of AD in
the following container:
Services/Microsoft Exchange/<Organization Name>/ELC Mailbox Policies
The Managed Folder Assistant is covered in more detail later in this lesson.
Note:
Default Tags
A Default Policy Tag can be associated with a Retention Policy and applies to all items in
the mailbox that neither have a retention tag explicitly applied to them, nor inherit a tag
from the folder they reside in. A Default Policy Tag can have more than one Managed
Content Settings associated with it for different item types such as e-mail messages,
voicemail, Contacts. Additionally, it can also have a Content Settings with journaling
settings. You cannot have more than one Default Policy Tag associated with a Retention
Policy.
Personal Tags
Personal Tags are retention tags that are available for users to manually select and apply
to folders and items in the mailbox. Personal Tags are assigned to users as part of their
Retention Policy, or assigned directly to the user as an optional-in (opt-in) retention tag.
When a user selects and applies a personal retention tag to an item, it overrides the
default retention policy tag previously applied to the item.
Unlike default tags, Personal tags can have only one Managed Content Settings for expiry
of a single message type. Multiple personal tags can be associated to a retention policy,
each with a different expiration action for the same message class.
System Tags
System tags are pre-defined retention tags that are created for use internally by Exchange
2010. System tags are used for retention policies that are automatically applied to
mailboxes that use the User Archive feature, and mailboxes that are used for moderation.
Retention Policy
Retention policies make it possible to group one or more retention tags and apply them to
mailboxes. A retention policy can have one or more retention policy tags, a maximum of
one default policy tag, and any number of personal tags. Retention tags can be linked or
unlinked from a retention policy at any time.
Retention policies can be applied to mailboxes using the EMS. A mailbox cannot have
more than one retention policy applied at the same time.
Assistant Infrastructure
The Assistant Infrastructure is low-level code that runs in the Mailbox Assistants and Mail
Submission services on Exchange Server 2007 Mailbox role servers.
Business logic functionality in previous versions of Exchange was implemented as part of
information store processing. This design presented challenges in product testing and
limited the ability to incorporate new features. To address these problems, a new
architecture based on assistants is designed to process events from the store, or perform
scheduled tasks, instead of being a part of the store. The separation of the business logic
from the store simplifies design and results in a more testable product.
The purpose of the Assistant Infrastructure is to provide the functionality common to all
assistants. This functionality includes:
Store Event management (polling, dispatching, watermark storage)
Thread management (use of thread pool)
Throttling (to limit impact to the store)
Mailbox state management (mailbox deleted, moved, disconnected)
Database management (new database / deleted database)
Error handling (transient and permanent exceptions)
Poison event detection
The Assistant Infrastructure was first implemented by Exchange Server 2007 and
continues to be used in Exchange 2010.
Time-based Assistant
A time-based assistant processes items based on a predetermined schedule, but can also
be invoked via an administrative task. Time-based assistants do no processing based on
events; rather they interact with individual mailboxes and take some action based on the
condition of items therein. The time-based assistants implemented by Exchange Server
2010 include:
Email Lifecycle Assistant (MRM Assistant - scheduled)
TopNWords Assistant
Calendar Repair Assistant
Sharing Policy Assistant
Event-based Assistant
An event-based assistant processes tasks based on events of interest from the
information store. An event is generated and stored in the store’s Events History Table
each time a message is received, submitted, modified, or deleted. For example, when a
meeting request message is received, the store generates an event entry in the table. The
Assistant Driver reacts to this event and passes a notification to any event-based assistant
that may be interested. The event-based assistants implemented by Exchange Server
2010 include:
Email Lifecycle Assistant (MRM Assistant - event)
Approval Framework Assistant
Calendaring Attendant (Free\Busy Assistant)
Conversation Assistant
Resource Booking Attendant
OOF Assistant
The responsibilities of the Managed Folder Assistant for MRM 1.0 are divided between
three distinct functions.
The Folder Provisioner is responsible for creating and applying folder policies to
provisioned folders.
The Retention Enforcer is responsible for expiring mail in folders that have
retention policies associated with them.
The Journaling Enforcer is responsible for copying mail from a user’s mailbox to a
designated store (Official File).
These functions are identical to the Managed Folder assistant processing provided in
Exchange 2007. This ensures 100% compatibility for organizations that have already
implemented MRM 1.0 and transition user mailboxes from Exchange 2007 to Exchange
2010.
In addition to this backwards-compatibility processing, the time-based MRM assistant is
responsible for the following MRM 2.0 processing.
When a Exchange Administrator removes a policy or updates it(such as change the
expiration time), the time-based MRM assistant picks up this change and stamps
each message in the mailbox.
The time-based MRM assistant processes the training algorithm for auto-tagging.
Calendar Items
Depending on whether a calendar item is in the Deleted Items folder, the managed folder
assistant uses the following rules to calculate the age of calendar items and enforce
retention limits. The steps for each rule are listed in Table 1 in the order in which they are
performed.
Table 3: Calculating Retention for Calendar Items
Tasks
Depending on whether a task is in the Deleted Items folder, the managed folder assistant
uses the rules listed in the following table to calculate the age of tasks and enforce
retention limits. The steps for each rule are listed in Table 1 in the order in which they are
performed.
Table 4: Calculating Retention for Tasks
Other Items
For all other types of items, the managed folder assistant uses the following rules to
calculate the age and enforce retention limits. These items include:
E-mail messages
Contacts
Documents
Faxes
Journal items
Meeting requests, responses, and cancellations
Missed calls
The steps for each rule are listed in Table 1 in the order in which they are performed.
Table 5: Calculating Retention for Other Items
Corrupt Items
Any corrupt items in a mailbox are skipped by the managed folder assistant and do not
expire.
AutoTagging
AutoTagging is an additional feature of MRM 2.0 that allows further automation of
retention policies by automatically applying retention tags to items based on past user
behavior, without affecting user workflow.
AutoTagging Basics
AutoTagging uses a machine learning algorithm (Conjugate Gradient Logistic
Regression Algorithm) that tracks users' tagging behavior. Given a sampling that is large
enough for it to learn, AutoTagging can predict the user's tagging behavior from the
sampling. The user must have manually tagged a minimum of 500 messages in the
mailbox for AutoTagging to start learning. Message characteristics, content, and the user-
assigned retention tags are inspected by the AutoTagging algorithm, and a model created
to predict the user's tagging behavior. Once learning is complete, AutoTagging
automatically assigns the appropriate retention tags to new items as they arrive.
Administrative Control
Regardless of whether AutoTagging is enabled on a mailbox by the user or the
administrator, Exchange 2010 lets the administrator control AutoTagging functionality as
required.
Enable or Disable AutoTagging: Administrators can enable or disable
AutoTagging for a mailbox.
Clear Tags: Retention tags for all automatically tagged messages in a mailbox can
be cleared by administrators.
CrossValidate: Administrators can check the efficiency of AutoTagging's
knowledge of a mailbox user's tagging behavior. Administrators can crossvalidate
the efficiency of AutoTagging for the mailbox, and compare the number of
AutoTagged messages with the number of messages with tags overridden by the
user.
AutoTagging Processing
AutoTagging processing is handled by the MRM assistant. There are two “agents” that
work in conjunction to determine how a user has used tags in the past, build a model of
that activity, and then apply tags automatically based on that model. The agents are:
Training Agent – The training agent is responsible for “learning” the tagging habits
of a user by examining the messages tagged by the user. The training agent is
processed by the time-based MRM Assistant.
Prediction Agent – The prediction agent uses the model created by the training
agent to apply tags automatically to new items as they are delivered. The prediction
agent is processed by the event-based MRM Assistant.
The information required for AutoTagging processing is stored in each mailbox in hidden
FAI messages store in the associated contents of the Inbox folder. The FAI items are:
AutoTag Settings FAI message - (IPM.Configuration.MRM.AutoTagSetting) The
AutoTag Settings message contains the information required by the MRM assistant
for processing AutoTagging. The information is stored in XML format. Included in
the data are counters that indicate the number of messages that have been auto
tagged by the assistant, and the number of messages that have been re-tagged by
the user.
Model FAI message - (IPM.Configuration.MRM.AutoTag.Model) The Model
message is used to store the model that was built by the training agent. The data is
used by the prediction agent when applying auto tags.
AutoTagging processing can be broken down into these simple steps:
1. The IW turns on Auto-Tagging in the ECP.
2. The MRM time-based assistant contains logic for the training algorithm. Based on the
IW’s already tagged messages, the MRM time-based assistant writes a hidden FAI
message item that contains a mapping of keywords and RPTs along with attached
probabilities for each keyword.
3. For new incoming e-mail, the event-based MRM Assistant uses the training data to
stamp the appropriate RPT based on the learning. The event-based assistant considers
the confidence level and threshold before stamping the new message with an Auto-Tag.
4. It is still possible for the IW to override the custom default. Moving to a folder or item-
level override will be supported just like it is with a standard default. Turning off
Retention Auto-Tags stops new messages being stamped with Retention Auto-Tags.
Figure 2 shows a high-level diagram of the component of AutoTagging.
Events History
Table
Managing MRM
This section describes the management tasks for MRM.
Common Parameters
There are parameters that are common to most of the cmdlets described in this lesson.
For efficiency sake, these parameters are described in, and apply to wherever they are
used in the syntax list for each cmdlet.
Table 6: Common Parameters
New-ManagedFolder
Set-ManagedFolder
Remove-ManagedFolder
Get-ManagedContentSettings
New-ManagedContentSettings
Set-ManagedContentSettings
Remove-ManagedContentSettings
Get-ManagedFolderMailboxPolicy
New-ManagedFolderMailboxPolicy
Set-ManagedFolderMailboxPolicy
Remove-ManagedFolderMailboxPolicy
Get-ManagedFolder
Use the Get-ManagedFolder cmdlet to retrieve the attributes of one or more managed
folders.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Exchange 2010 relies on Role Based Access Control (RBAC) to control access to
Note: the tasks described in this section. RBAC is covered in detail as part of a
separate module that is a prerequisite for this topic.
Syntax
Figure 1 shows the syntax for Get-ManagedFolder.
Parameters
Table 1 describes the parameters for Get-ManagedFolder and how they are used.
Table 7: Get-ManagedFolder Parameters
Paramet Description
er
Identity The Identity parameter refers to the name, distinguished name (DN), or GUID of the
managed folder. The Identity parameter cannot be used in conjunction with the
Mailbox parameter.
Mailbox The Mailbox parameter refers to the identity of the mailbox. Valid values include
SMTP address, domain name, and alias. The command retrieves all the folders that
apply to the specified user. The Mailbox parameter cannot be used in conjunction
with the Identity parameter.
Examples
The Get-ManagedFolder cmdlet retrieves the specified managed folder attributes:
If only an Identity parameter value is present, the command retrieves the
specified folder and all associated attributes.
Managed folders that users add by means of an organization's managed folder
opt-in Web site are not displayed by this command.
If no parameter values are specified, the command retrieves all the folder
objects and their associated attributes.
The Get-ManagedFolder cmdlet accepts a ManagedFolder object or an identity string as
pipelined input. The following example uses Get-ManagedFolder without any additional
parameters to list all managed folders:
[PS] C:\>Get-ManagedFolder
This example uses the -Identity parameter to retrieve information on the managed folder
named “Deleted Items”. Because the name contains a space character, the name bust be
enclosed in quotes as shown:
[PS] C:\>Get-ManagedFolder -Identity "Deleted Items"
This example uses the -Mailbox parameter to retrieve information on the managed folder
that is linked to the managed folder policy assigned to the specified user user12:
[PS] C:\>Get-ManagedFolder -Mailbox user12
To see all of the settings returned by Get-ManagedFolder, pass the results by pipeline to
the Format-List command as shown in this example:
[PS] C:\>Get-ManagedFolder -Identity "Entire Mailbox Seattle" | Format-List
RunspaceId : 5f7227f0-c5c5-4c2e-8fff-d9ced58a9768
FolderType : All
Description : ManagedDefaultFolder
FolderName : All
LocalizedFolderName : {}
StorageQuota : unlimited
Comment : Voicemail Items in your Mailbox are moved to
Deleted Items after 7 days
LocalizedComment : {}
MustDisplayCommentEnabled : True
BaseFolderOnly : False
TemplateIds : {Seattle Mailboxes}
RetentionPolicyTag : {}
AdminDisplayName :
ExchangeVersion : 0.1 (8.0.535.0)
Name : Entire Mailbox Seattle
DistinguishedName : CN=Entire Mailbox Seattle,CN=ELC Folders
Container,CN=contoso,CN=Microsoft Exchange,CN=Serv
ices,CN=Configuration,DC=contoso,DC=com
Identity : Entire Mailbox Seattle
Guid : 1c6323bf-d0c0-4046-815d-53c22d6ae892
ObjectCategory : contoso.com/Configuration/Schema/ms-Exch-ELC-
Folder
The properties of interest that appear in the output from Get-ManagedFolder are shown
in Table 2.
Table 8: Get-ManagedFolder Properties
New-ManagedFolder
The New-ManagedFolder cmdlet creates a new managed folder in the Active Directory
(AD) directory. By default, managed custom folders are created with this cmdlet.
However, you can also create additional copies of managed default folders using the
DefaultFolderType parameter to specify which type of default folder to create (for
example, an additional Inbox folder). When you create multiple copies of a managed
default folder, you can assign different content settings to each one.
You must assign a unique name (using the Name parameter) to each of the managed
default folders that you create. Users, however, always see the unaltered default folder
name. Although the folder names that users see in their mailboxes can be reassigned for
managed custom folders (using the Set-ManagedFolder command FolderName
parameter), the folder names seen by users for managed default folders can't be changed.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 2 shows the syntax for New-ManagedFolder.
Figure 4: New-ManagedFolder Syntax
Parameters
Table 3 describes the parameters for New-ManagedFolder and how they are used.
Table 9: New-ManagedFolder Parameters
Parameter Description
DefaultFolderType The DefaultFolderType parameter refers to the type of default
Examples
The following example uses New-ManagedFolder to create a new custom managed folder
that has a storage quota of 100 MB:
[PS] C:\>New-ManagedFolder -Name “Business Critical” -FolderName "Business
Critical" -StorageQuota 100MB
This example creates a managed folder that has a default folder name and comment in
English, localized folder name in Spanish and French, and localized comment in Spanish
and French.
[PS] C:\> New-ManagedFolder -Name EngineeringSpecs -FolderName "Engineering
Specifications" -LocalizedFolderName Spanish:" Especificaciones de
ingeniería ", French:"Spécifications Ingénieur" -Comment "Messages related
to Engineering Specifications are kept for 5 years" -LocalizedComment
Spanish:" Mensajes relacionados con especificaciones de ingeniería se
mantienen durante 5 años ", French:" Messages liés aux caractéristiques
ingénieur sont conservés pendant 5 ans"
This example creates a new managed default folder for all items in the mailbox:
Set-ManagedFolder
The Set-ManagedFolder cmdlet modifies the specified parameters of a managed folder.
The Set-ManagedFolder cmdlet accepts a managed custom folder or an identity string as
pipelined input.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 3 shows the syntax for Set-ManagedFolder.
Figure 5: Set-ManagedFolder Syntax
Parameters
Table 4 describes the parameters for Set-ManagedFolder and how they are used.
Table 10: Set-ManagedFolder Parameters
Parameter Description
Identity The Identity parameter refers to the name, distinguished name
(DN), or GUID of the managed folder.
BaseFolderOnly The BaseFolderOnly parameter refers to whether the managed
content settings should be applied only to the managed folder or
to the folder and all its subfolders.
Comment The Comment parameter refers to the default administrator
comment to be displayed with the folder in Microsoft Office
Outlook 2007.
FolderName The FolderName parameter refers to the name of the folder
Example
The following example uses Set-ManagedFolder to specify a storage quota of 50 MB and
sets the flag that prevents users from minimizing the comment from Outlook:
[PS] C:\>Set-ManagedFolder -Identity “Engineering Specifications”
-StorageQuota 50MB -MustDisplayCommentEnabled $True
Remove-ManagedFolder
Use the Remove-ManagedFolder cmdlet to remove a managed folder from AD.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 4 shows the syntax for Remove-ManagedFolder.
Figure 6: Remove-ManagedFolder Syntax
Parameters
Table 5 describes the parameters for Remove-ManagedFolder and how they are used.
Table 11: Remove-ManagedFolder Parameters
Paramet Description
er
Identity The Identity parameter refers to the name, distinguished name (DN), or GUID of the
managed folder.
Examples
The following example uses Remove-ManagedFolder to remove the managed folder
specified with the -Identity parameter. The user is prompted to confirm the remove
operation before any changes are committed:
[PS] C:\>Remove-ManagedFolder -Identity "Test Managed Custom Folder"
Confirm
Are you sure you want to perform this action?
Removing managed custom folder "Test Managed Custom Folder". This will
remove all managed content settings that apply to this folder for all
mailboxes to which a policy containing this folder applies. This will not
delete the folder in a user's mailbox, or its contents. Users will be able
to move, rename, or delete this folder from their mailboxes.
[Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"): y
Get-ManagedContentSettings
Use the Get-ManagedContentSettings cmdlet to retrieve managed content settings
associated with managed folders. Managed content settings are settings that you apply to
managed folders to control the lifespan of items in users' mailboxes.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Syntax
Figure 5 shows the syntax for Get-ManagedContentSettings.
Figure 7: Get-ManagedContentSettings Syntax
Parameters
Table 6 describes the parameters for Get-ManagedContentSettings and how they are
used.
Table 12: Get-ManagedContentSettings Parameters
Parameter Description
FolderName The FolderName parameter refers to the name or GUID of the managed
folder to which the managed content settings apply. When used, this
command retrieves all the policies that apply to that folder. This parameter
can't be used with the Identity parameter.
Identity The Identity parameter refers to the name, distinguished name (DN), or
GUID of the set of managed content settings. When used, this command
retrieves the folder content settings and all associated attributes. This
parameter can't be used with the FolderName parameter.
RetentionPolicyTa The RetentionPolicyTag parameter isn't available at this time.
g
Examples
The Get-ManagedContentSettings cmdlet retrieves from one to all of the managed content
settings. You can also retrieve only the managed content settings associated with a
specified managed folder. If only the Identity parameter is present, the folder content
settings and all associated attributes are returned. If the Identity parameter isn't present,
the command returns all content settings. If the FolderName parameter is present, the
command returns all content settings contained in the specified managed folder and all
the attributes of each setting.
The following example uses Get-ManagedContentSettings to return a list of all managed
content setting objects in AD:
[PS] C:\>Get-ManagedContentSettings
This example returns information for the managed content settings specified by the
-Identity parameter:
[PS] C:\>Get-ManagedContentSettings -Identity "Entire Mailbox Seattle -
Delete Voice Mail after 7 days"
To see all of the settings returned by Get- ManagedContentSettings, pass the results by
pipeline to the Format-List command as shown in this example:
[PS] C:\>Get-ManagedContentSettings -Identity "Entire Mailbox Seattle -
Delete Voice Mail after 7 days" | Format-List
RunspaceId : 5f7227f0-c5c5-4c2e-8fff-d9ced58a9768
MessageClassDisplayName : Voice Mail
MessageClass : IPM.Note.Microsoft.Voicemail*
Description : Managed Content Settings
RetentionEnabled : True
RetentionAction : DeleteAndAllowRecovery
AgeLimitForRetention : 7.00:00:00
MoveToDestinationFolder :
TriggerForRetention : WhenDelivered
MessageFormatForJournaling : UseTnef
JournalingEnabled : False
AddressForJournaling :
LabelForJournaling :
ManagedFolder : Entire Mailbox Seattle
ManagedFolderName : Entire Mailbox Seattle
AdminDisplayName :
ExchangeVersion : 0.1 (8.0.535.0)
Name : Entire Mailbox Seattle - Delete Voice Mail
after 7 days
DistinguishedName : CN=Entire Mailbox Seattle - Delete Voice Mail
afte
r 7 days,CN=Entire Mailbox Seattle,CN=ELC
Folders
Container,CN=contoso,CN=Microsoft
Exchange,CN=Serv
ices,CN=Configuration,DC=contoso,DC=com
Identity : Entire Mailbox Seattle - Delete Voice Mail
after 7 days
Guid : 156b3dc2-a7d5-4173-b6ef-535daba56046
ObjectCategory : contoso.com/Configuration/Schema/ms-Exch-ELC-
Content-Settings
ObjectClass : {top, msExchELCContentSettings}
WhenChanged : 8/11/2009 11:33:03 AM
WhenCreated : 8/11/2009 11:33:03 AM
WhenChangedUTC : 8/11/2009 6:33:03 PM
WhenCreatedUTC : 8/11/2009 6:33:03 PM
OrganizationId :
OriginatingServer : CONSEADC1.contoso.com
IsValid : True
New-ManagedContentSettings
Use the New-ManagedContentSettings cmdlet to create managed content settings for
managed folders.
Managed content settings are settings that you associate with managed folders to control
the lifespan of items in users' mailboxes. Lifespan is controlled in the following ways:
By controlling content retention and removing content that's no longer needed.
By automatically journaling important content to a separate storage location
outside the mailbox.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 6 shows the syntax for New-ManagedContentSettings.
Parameters
Table 8 describes the parameters for New-ManagedContentSettings and how they are
used.
Table 14: New-ManagedContentSettings Parameters
Parameter Description
FolderName The FolderName parameter refers to the name or GUID of the
managed folder to which the managed content settings apply.
Examples
The following example uses New-ManagedContentSettings to create managed content
settings for the managed default folder Executive Deleted Items. When added to a
managed folder mailbox policy and applied to a mailbox, items in the Deleted Items folder
will be permanently deleted 30 days from the date of delivery:
This example creates managed content settings Exec-Calendar_cs for the Calendar
message class. The managed content settings apply to the custom folder Executive
Calendar. Retention is enabled, and items are moved to the Deleted Items folder after 180
days.
[PS] C:\>New-ManagedContentSettings -Name Exec-Calendar_cs -FolderName
“Executi
ve Calendar” -MessageClass Calendar -RetentionEnabled $true -RetentionAction
MoveToDeletedItems -AgeLimitForRetention 180
Set-ManagedContentSettings
Use the Set-ManagedContentSettings cmdlet to modify existing managed content settings
for a managed folder. Although the New-ManagedContentSettings cmdlet has the
MessageClass parameter, the Set-ManagedContentSettings cmdlet doesn't. If you want to
change the message type to which content settings apply, you must delete and then re-
create the content settings.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 7 shows the syntax for Set-ManagedContentSettings.
Figure 9: Set-ManagedContentSettings Syntax
Parameters
Table 9 describes the parameters for Set-ManagedContentSettings and how they are
used.
Table 15: Set-ManagedContentSettings Parameters
Parameter Description
Identity The Identity parameter refers to the name, distinguished name
(DN), or GUID of the managed content settings.
AddressForJournaling The AddressForJournaling parameter refers to the address of the
journaling recipient that's the destination of journaling
operations.
AgeLimitForRetention The AgeLimitForRetention parameter refers to the age at which
retention is enforced on an item. The age limit corresponds to the
number of days from the date that the item was delivered or the
date that an item was created if it wasn't delivered.
If this parameter isn't present and the RetentionEnabled
parameter is set to $true, an error is returned.
JournalingEnabled The JournalingEnabled parameter refers to that journaling is
enabled when it's set to $true.
LabelForJournaling The LabelForJournaling parameter refers to a label that's attached
to an item. This label is used by the destination store to
determine the content of the item and enforce the appropriate
policy.
MessageFormatForJournalin The MessageFormatForJournaling parameter refers to the format
g in which an item should be journaled in. You can use the following
values:
UseMsg Microsoft Outlook .MSG format
UseTnef Outlook MAPI format
MoveToDestinationFolder The MoveToDestinationFolder parameter refers to the name of
the destination folder for a retention action.
Name The Name parameter refers to a unique name for the managed
content settings.
RetentionAction The RetentionAction parameter refers to one of the following
actions to take when an item reaches its retention age limit,
specified by the AgeLimitForRetention parameter. The following
retention actions can be used:
MoveToDeletedItems
MoveToFolder
DeleteAndAllowRecovery
PermanentlyDelete
MarkAsPastRetentionLimit
MoveToArchive
If this parameter isn't present and the RetentionEnabled
parameter is set to $true, an error is returned.
RetentionEnabled The RetentionEnabled parameter refers to that retention is
enabled when it's set to $true.
Examples
The following example uses Set-ManagedContentSettings to set the journaling
configuration for the EngineeringSpecs_cs content settings object:
Set-ManagedContentSettings -Identity EngineeringSpecs_cs -JournalingEnabled
$true -AddressForJournaling specfolder@contoso.com
-MessageFormatForJournaling UseMsg -LabelForJournaling "Journaled by
Engineering Specs"
Remove-ManagedContentSettings
Use the Remove-ManagedContentSettings cmdlet to delete managed content settings
from a managed folder. When managed content settings are removed from a managed
folder, the folder effectively ceases to be a managed folder, and folder contents are no
longer under MRM.
Removing managed content settings disables any retention and journaling policies for the
folder. It doesn't affect whether you can move, delete, or rename the folder, or whether
the folder has a quota or policy statement that's displayed in Microsoft Outlook or
Microsoft Office Outlook Web App.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role assignment
policy and role groups:
Organization Management
Records Management
Syntax
Figure 8 shows the syntax for Remove-ManagedContentSettings.
Parameters
Table 10 describes the parameters for Remove-ManagedContentSettings and how they
are used.
Table 16: Remove-ManagedContentSettings Parameters
Paramet Description
er
Identity The Identity parameter refers to the name, distinguished name (DN), or GUID of the
managed content settings.
Examples
The following example uses Remove-ManagedContentSettings to remove the managed
content settings object specified by the -Identity parameter. The user is prompted to
confirm the remove operation before any changes are committed:
[PS] C:\>Remove-ManagedContentSettings -Identity EngineeringSpecs_cs
Confirm
Are you sure you want to perform this action?
Removing managed content settings EngineeringSpecs_cs.
[Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"):o
Get-ManagedFolderMailboxPolicy
Use the Get-ManagedFolderMailboxPolicy cmdlet to return all attributes of one or more
managed folder mailbox policies. A managed folder mailbox policy is a logical grouping of
one or more managed folders. Policies are applied to mailboxes. The Get-
ManagedFolderMailboxPolicy cmdlet lists one or more managed folder mailbox policies
created in the Microsoft Exchange Server 2010 organization. All policies can be listed.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Syntax
Figure 9 shows the syntax for Get-ManagedFolderMailboxPolicy.
Figure 11: Get-ManagedFolderMailboxPolicy Syntax
Parameters
Table 11 describes the parameters for Get-ManagedFolderMailboxPolicy and how they
are used.
Table 17: Get-ManagedFolderMailboxPolicy Parameters
Paramet Description
er
Identity The Identity parameter refers to the name, distinguished name (DN), or GUID of the
managed folder mailbox policy.
Examples
The following example uses Get-ManagedFolderMailboxPolicy to return a list of all
managed folder mailbox policies in the organization:
[PS] C:\>Get-ManagedFolderMailboxPolicy
Name ManagedFolderLinks
MailboxPolicyFlags
---- ------------------
------------------
Seattle Mailboxes {Entire Mailbox Seattle}
Dallas Mailboxes {Entire Mailbox Dallas}
Charlotte Mailboxes {Entire Mailbox Charlotte}
This example uses the -Identity parameter to return the specified policy:
[PS] C:\>Get-ManagedFolderMailboxPolicy -Identity "Dallas Mailboxes"
Name ManagedFolderLinks
MailboxPolicyFlags
---- ------------------
------------------
Dallas Mailboxes {Entire Mailbox Dallas}
RunspaceId : 5f7227f0-c5c5-4c2e-8fff-d9ced58a9768
ManagedFolderLinks : {Entire Mailbox Dallas}
AdminDisplayName :
New-ManagedFolderMailboxPolicy
Use the New-ManagedFolderMailboxPolicy cmdlet to create a managed folder mailbox
policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 10 shows the syntax for New-ManagedFolderMailboxPolicy.
Parameters
Table 13 describes the parameters for New-ManagedFolderMailboxPolicy and how they
are used.
Table 19: New-ManagedFolderMailboxPolicy Parameters
Parameter Description
Name The Name parameter refers to the name of the new managed folder
mailbox policy.
ManagedFolderLink The ManagedFolderLinks parameter refers to the list of managed folders to
s which the managed folder mailbox policy is to be linked.
Examples
This example creates the managed folder mailbox policy Dallas Mailboxes, with the
managed folder to which the managed folder mailbox policy is to be linked:
[PS] C:\>New-ManagedFolderMailboxPolicy -Name "Dallas Mailboxes”
-ManagedFolder
Links “Entire Mailbox Dallas”
Set-ManagedFolderMailboxPolicy
Use the Set-ManagedFolderMailboxPolicy cmdlet to change the settings of a managed
folder mailbox policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 11 shows the syntax for Set-ManagedFolderMailboxPolicy.
Parameters
Table 14 describes the parameters for Set-ManagedFolderMailboxPolicy and how they
are used.
Table 20: Set-ManagedFolderMailboxPolicy Parameters
Parameter Description
Identity The Identity parameter refers to the name, distinguished name (DN), or
GUID of the managed folder mailbox policy.
ManagedFolderLink The ManagedFolderLinks parameter refers to managed folders to which
s the managed folder mailbox policy is to be linked. The managed folders
that you link to a policy appear in all mailboxes to which the policy is
applied.
Name The Name parameter refers to a unique name for the policy.
Examples
This example changes the name of the managed folder mailbox policy “Fargo Users” to
“Fargo Mailboxes”:
[PS] C:\>Set-ManagedFolderMailboxPolicy -Identity “Fargo Users” -Name “Fargo
Ma ilboxes”
This example links the managed custom folder “Entire Mailbox Fargo” to the managed
folder mailbox policy Fargo Mailboxes:
[PS] C:\>Set-ManagedFolderMailboxPolicy -Identity “Fargo Mailboxes”
-ManagedFol derLinks “Entire Mailbox Fargo”
Remove-ManagedFolderMailboxPolicy
Use the Remove-ManagedFolderMailboxPolicy cmdlet to delete managed folder mailbox
policies. If you remove a managed folder mailbox policy that's applied to users'
mailboxes, the affected mailboxes may no longer have retention settings. Therefore,
before using this cmdlet to remove a policy, you should determine if the managed folder
mailbox policy is applied to any users, and apply another policy to those users.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 12 shows the syntax for Remove-ManagedFolderMailboxPolicy.
Figure 14: Remove-ManagedFolderMailboxPolicy Syntax
Parameters
Table 15 describes the parameters for Remove-ManagedFolderMailboxPolicy and how
they are used.
Table 21: Remove-ManagedFolderMailboxPolicy Parameters
Paramet Description
er
Identity The Identity parameter refers to the name, distinguished name (DN), or GUID of the
managed folder mailbox policy.
Examples
This example removes the managed folder mailbox policy “Test Policy IT Users”. The user
is prompted to confirm the remove operation before any changes are committed:
[PS] C:\>Remove-ManagedFolderMailboxPolicy -Identity "Test Policy IT Users"
Confirm
Are you sure you want to perform this action?
Removing managed folder mailbox policy "Test Policy IT Users".
[Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"):
Start-RetentionAutoTagLearning
Get-RetentionPolicyTag
Use the Get-RetentionPolicyTag cmdlet to retrieve settings for a retention policy tag. A
retention policy tag is used by users to tag messages or folders. Managed content settings
are associated with a tag.
There are three types of tags: default, personal, or system. Default tags from a retention
policy are applied to all items by default, unless the user explicitly applies personal or
system tags to an item or moves the item to a folder that has a personal or system tag
applied. Retention policy tags can also be applied automatically by the Microsoft Outlook
Auto Tagging feature.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Syntax
Figure 13 shows the syntax for Get-RetentionPolicyTag.
Figure 15: Get-RetentionPolicyTag Syntax
Parameters
Table 16 describes the parameters for Get-RetentionPolicyTag and how they are used.
Table 22: Get-RetentionPolicyTag foo Parameters
Parameter Description
Identity The Identity parameter refers to the name of the tag.
IncludeSystemTag The IncludeSystemTags switch refers to whether to return any system tags.
s
Mailbox The Mailbox parameter causes the cmdlet to retrieve all retention policy tags
that apply to the mailbox user specified.
OptionalInMailbo The OptionalInMailbox parameter causes the cmdlet to retrieve all opt-in
x retention policy tags available to the mailbox user specified by the Mailbox
parameter.
Examples
The following example uses Get-RetentionPolicyTag to return a list of all retention policy
tags that are not system tags:
<the standard formatted output for this cmdlet is not working in this build>
This example uses the -IncludeSystemTags parameter to return a list of all retention
policy tags that are system tags:
<the standard formatted output for this cmdlet is not working in this build>
This example returns properties for the retention policy tag specified by the -Identity
parameter:
[PS] C:\>Get-RetentionPolicyTag -Identity "Entire Mailbox Seattle - Voice
Mail"
RunspaceId : 3b455b59-06f0-4123-9a4a-81746f6db9bf
IsPrimary : False
MessageClassDisplayName : Voice Mail
MessageClass : IPM.Note.Microsoft.Voicemail*
Description : Managed Content Settings
RetentionEnabled : True
RetentionAction : DeleteAndAllowRecovery
AgeLimitForRetention : 7.00:00:00
MoveToDestinationFolder :
TriggerForRetention : WhenDelivered
MessageFormatForJournaling : UseTnef
JournalingEnabled : False
AddressForJournaling :
LabelForJournaling :
Type : All
SystemTag : False
LocalizedRetentionPolicyTagName : {}
Comment : This tag moves Voicemail items to the
Deleted
Items folder after 7 days
LocalizedComment : {}
MustDisplayCommentEnabled : False
LegacyManagedFolder :
AdminDisplayName :
ExchangeVersion : 1.0 (0.0.0.0)
Name : Entire Mailbox Seattle - Voice Mail
DistinguishedName : CN=Entire Mailbox Seattle - Voice
Mail,CN=Ret
The properties of interest that appear in the output from Get-RetentionPolicyTag are
shown in Table 17.
Table 23: Get-RetentionPolicyTag Properties
New-RetentionPolicyTag
Use the New-RetentionPolicyTag cmdlet to create a retention policy tag.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 14 shows the syntax for New-RetentionPolicyTag.
Parameters
Table 18 describes the parameters for New-RetentionPolicyTag and how they are used.
Table 24: New-RetentionPolicyTag Parameters
Parameter Description
Name The Name parameter refers to the name of the tag.
AddressForJournaling The AddressForJournaling parameter refers to the journaling
recipient to which journaled messages are sent. This
parameter is required if the JournalingEnabled parameter is
set to $true.
AgeLimitForRetention The AgeLimitForRetention parameter refers to the age at
which retention is enforced on an item. The age limit
corresponds to the number of days from the date the item
was delivered, or the date an item was created if it wasn't
delivered. If this parameter isn't present and the
RetentionEnabled parameter is set to $true, an error is
returned.
Comment The Comment parameter refers to a comment for the tag.
IsPrimary The IsPrimary parameter refers to that the tag should be
Rss
Tasks
Voicemail
Valid parameter values for custom message classes include:
* A specific message class (for example, IPM.NOTE).
* The asterisk wildcard character (*), which indicates that
the content settings apply to all message classes.
* *.NOTE and IPM.*.NOTE aren't acceptable.
When wildcard characters are used, these policies apply only
to message classes that don't have a specific content setting.
Therefore, IPM.NOTE.SMIME overrides IPM.NOTE.*.
Specific settings supersede general settings. For example,
Voicemail supersedes AllMailboxContent.
MessageFormatForJournaling The MessageFormatForJournaling parameter refers to the
message format that an item should be journaled in. You can
use the following values:
UseMsg Outlook .msg format
UseTnef Outlook MAPI format.
MustDisplayCommentEnabled The MustDisplayCommentEnabled parameter refers to
whether the comment can be hidden. The default value is
$true.
RetentionAction The RetentionAction parameter refers to one of the
following actions:
MarkAsPastRetentionLimit This action marks a
message as past retention limit.
MoveToDeletedItems This action moves a message
to the Deleted Items folder.
DeleteAndAllowRecovery This action deletes a
message and allows recovery from recoverable items.
PermanentlyDelete This action permanently
deletes a message. A message that has been permanently
deleted can't be recovered using the Recoverable Items
folder. Permanently deleted messages are not returned in a
Discovery search, unless litigation hold is enabled for the
mailbox.
MoveToArchive This action moves a message to
the user's archive mailbox.
If this parameter isn't present and the RetentionEnabled
parameter is set to $true, an error is returned.
RetentionEnabled The RetentionEnabled parameter refers to that retention is
enabled when it's set to $true.
SystemTag The SystemTag parameter refers to that the tag is created
for internal Exchange functionality.
Type The Type parameter refers to the type of retention tag being
created. Valid values include:
Calendar
Contacts
DeletedItems
Drafts
Inbox
JunkMail
Journal
Notes
Outbox
SentItems
Tasks
All
RssSubscriptions
SyncIssues
ConversationHistory
Personal
To create a Default Policy Tag, specify the type All.
Examples
This example creates the retention policy tag Finance-DeletedItems for the Deleted Items
default folder. When applied to a mailbox as a part of a retention policy, the tag
permanently deletes items of all types in the Deleted Items folder in 30 days:
[PS] C:\>New-RetentionPolicyTag "Finance-DeletedItems" -Type DeletedItems
-Mess
ageClass AllMailboxContent -RetentionEnabled $true -AgeLimitForRetention 30
-Re
tentionAction PermanentlyDelete
This example creates the default policy tag Finance-Default. When applied to a mailbox as
part of a retention policy, the tag permanently deletes all items without a retention tag
within 365 days. Items of a particular message class such as Voicemail, for which a default
tag (a retention tag of type All) exists, aren't impacted. The IsPrimary parameter is used
to define this tag as a primary tag.
[PS] C:\>New-RetentionPolicyTag "Finance-Default" -Type All -MessageClass
AllMa
ilboxContent -RetentionEnabled $true -AgeLimitForRetention 365
-RetentionAction PermanentlyDelete -IsPrimary $true
This example creates the retention tag VoiceMail of type All for voicemail messages.
[PS] C:\>New-RetentionPolicyTag "VoiceMail" -Type All -Comment "Use this tag
fo
r all voicemail" -MessageClass Voicemail -RetentionEnabled $true
-AgeLimitForRe
tention 30 -RetentionAction PermanentlyDelete
This example creates the retention tag Business Critical of type Personal. When applied to
mailbox items as part of a retention policy, the items are permanently deleted in 7 years.
[PS] C:\>New-RetentionPolicyTag "Business Critical" -Type Personal -Comment
"Us
e this tag for all business critical mail" -RetentionEnabled $true
-AgeLimitFor
Retention 2556 -RetentionAction PermanentlyDelete
Set-RetentionPolicyTag
Use the Set-RetentionPolicyTag cmdlet to modify the properties of a retention policy tag.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 15 shows the syntax for Set-RetentionPolicyTag.
Parameters
Table 19 describes the parameters for Set-RetentionPolicyTag and how they are used.
Table 25: Set-RetentionPolicyTag Parameters
Parameter Description
Identity The Identity parameter refers to the name, distinguished
name (DN), or GUID of the retention policy tag to be
modified.
Mailbox The Mailbox parameter refers to a mailbox for assigning opt-
in tags. You must use this parameter with the
OptionalInMailbox parameter.
AddressForJournaling The AddressForJournaling parameter refers to the journaling
recipient to which journaled messages will be sent. This
parameter is required if the JournalingEnabled parameter is
set to $true.
AgeLimitForRetention The AgeLimitForRetention parameter refers to the age at
which retention is enforced on an item. The age limit
SentItems
Tasks
All
ManagedCustomFolder
RssSubscriptions
SyncIssues
ConversationHistory
Personal
To create a default tag, specify All.
Examples
This example changes the comment for the AllUsers-DeletedItems retention policy tag:
[PS] C:\>Set-RetentionPolicyTag "AllUsers-DeletedItems" -Comment "Items in
the Deleted Items folder will be automatically deleted in 120 days"
This example makes optional retention tags available to user user12 using the Mailbox
and OptionalInMailbox parameters:
[PS] C:\>Set-RetentionPolicyTag -Mailbox user12 -OptionalInMailbox
"ProjectA","ProjectB"
Remove-RetentionPolicyTag
Use the Remove-RetentionPolicyTag cmdlet to remove a retention policy tag. A retention
policy tag that has managed content settings associated with it can't be removed.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 16 shows the syntax for Remove-RetentionPolicyTag.
Figure 18: Remove-RetentionPolicyTag Syntax
Parameters
Table 20 describes the parameters for Remove-RetentionPolicyTag and how they are
used.
Parameter Description
Identity The Identity parameter refers to the name of the retention policy tag.
Examples
This example removes the retention policy tag Finance-DeletedItems:
[PS] C:\>Remove-RetentionPolicyTag -Identity "Finance-DeletedItems"
Get-RetentionPolicy
Use the Get-RetentionPolicy cmdlet to retrieve the settings for retention policies. A
retention policy is associated with a group of retention policy tags that specify retention
settings for items in a mailbox. A policy may contain one default retention policy tag and
multiple non-default retention policy tags. A mailbox can have only one retention policy
applied to it. The Get-RetentionPolicy cmdlet displays all policy settings associated with
the specified policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Syntax
Figure 17 shows the syntax for Get-RetentionPolicy.
Figure 19: Get-RetentionPolicy Syntax
Parameters
Table 21 describes the parameters for Get-RetentionPolicy and how they are used.
Table 27: Get-RetentionPolicy Parameters
Parameter Description
Identity The Identity parameter refers to the policy name.
Examples
The following example uses Get-RetentionPolicy to return a list of all retention policies:
<the standard formatted output for this cmdlet is not working in this build>
This example returns the properties of the retention policy specified using the -Identity
parameter:
[PS] C:\>Get-RetentionPolicy -Identity "Seattle Mailboxes - No Archive"
RunspaceId : 3b455b59-06f0-4123-9a4a-81746f6db9bf
RetentionPolicyTagLinks : {Entire Mailbox Seattle - All Messages, Entire Mai
lbox Seattle - Meeting Messages, Entire Mailbox Se
attle - Voice Mail}
AdminDisplayName :
ExchangeVersion : 1.0 (0.0.0.0)
Name : Seattle Mailboxes - No Archive
DistinguishedName : CN=Seattle Mailboxes - No Archive,CN=Retention Pol
icies Container,CN=contoso,CN=Microsoft Exchange,C
N=Services,CN=Configuration,DC=contoso,DC=com
Identity : Seattle Mailboxes - No Archive
Guid : 4d177460-b543-4398-af2f-3cd2ec76f56c
ObjectCategory : contoso.com/Configuration/Schema/ms-Exch-Mailbox-R
ecipient-Template
ObjectClass : {top, msExchRecipientTemplate, msExchMailboxRecipi
entTemplate}
WhenChanged : 8/13/2009 3:05:02 PM
WhenCreated : 8/13/2009 3:05:02 PM
WhenChangedUTC : 8/13/2009 10:05:02 PM
WhenCreatedUTC : 8/13/2009 10:05:02 PM
OrganizationId :
OriginatingServer : CONSEADC1.contoso.com
IsValid : True
New-RetentionPolicy
Use the New-RetentionPolicy cmdlet to create a new retention policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 18 shows the syntax for New-RetentionPolicy.
Parameters
Table 23 describes the parameters for New-RetentionPolicy and how they are used.
Table 28: New-RetentionPolicy Parameters
Parameter Description
Name The Name parameter refers to the policy name.
RetentionPolicyTagLink The RetentionPolicyTagLinks parameter refers to the names of
s retention policy tags to be associated with this policy.
Examples
The following example uses New-RetentionPolicy to create a new retention policy that is
linked to 3 retention policy tags:
[PS] C:\>New-RetentionPolicy -Name "Seattle Mailboxes - No Archive"
-RetentionP
olicyTagLinks "Entire Mailbox Seattle - Voice Mail", "Entire Mailbox Seattle
- Meeting Messages", "Entire Mailbox Seattle - All Messages"
Set-RetentionPolicy
Use the Set-RetentionPolicy cmdlet to change the properties of an existing retention
policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 19 shows the syntax for Set-RetentionPolicy.
Figure 21: Set-RetentionPolicy Syntax
Parameters
Table 24 describes the parameters for Set-RetentionPolicy and how they are used.
Table 29: Set-RetentionPolicy Parameters
Parameter Description
Identity The Identity parameter refers to the name, distinguished name (DN), or
GUID of the retention policy.
Name The Name parameter refers to a unique name for the retention policy.
RetentionPolicyTagLink The RetentionPolicyTagLinks parameter refers to the identity of
s retention policy tags to associate with the retention policy. Mailboxes
that get a retention policy applied have retention tags linked with that
retention policy.
Examples
The following example adds a new retention policy tag to an existing retention policy.
Because the RetentionPolicyTagLinks property is multi-valued, steps must be take to
preserve the existing settings else they are overwritten with the new value. The first step
is to store the current value in a variable using this command:
[PS] C:\>$TagLinks = Get-RetentionPolicy "Seattle Mailboxes - No Archive").
Ret
entionPolicyTagLinks
The next step is to store the identity of the retention policy tag that is being added to the
retention policy, using this command:
[PS] C:\>$NewTagLink = Get-RetentionPolicyTag -Identity “Seattle Mailboxes -
Ta
sks”
The new retention policy tag is added to the list of current retention policy tags with this
command:
[PS] C:\>$TagLinks += $NewTagLink
Finally the complete list of retention policy tags is written to the retention policy using
Set-RetentionPolicy as shown in this command:
[PS] C:\>Set-RetentionPolicy "Seattle Mailboxes - No Archive"
-RetentionPolicyT
agLinks $TagLinks
Remove-RetentionPolicy
Use the Remove-RetentionPolicy cmdlet to remove a retention policy. Removing a
retention policy that's assigned to users results in those users not having any retention
policy assigned. If another retention policy isn't assigned to those users, messages in
those mailboxes may never expire.
This may be a violation of the organization's messaging retention policies. When you
attempt to remove a policy that's assigned to users, Microsoft Exchange Server 2010
displays a confirmation message indicating that the policy is assigned to users. Note that
this message is in addition to the confirmation prompt displayed when removing a
retention policy.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 20 shows the syntax for Remove-RetentionPolicy.
Figure 22: Remove-RetentionPolicy Syntax
Parameters
Table 25 describes the parameters for Remove-RetentionPolicy and how they are used.
Table 30: Remove-RetentionPolicy Parameters
Paramet Description
er
Identity The Identity parameter refers to the retention policy name.
Force The Force switch refers to whether to override the confirmation prompt that appears
when removing a retention policy that's assigned to users. Removing a policy that's
assigned to users results in those users not having any retention policy. You don't
have to specify a value with the Force switch.
Examples
The following example Remove-RetentionPolicy:
[PS] C:\>Remove-RetentionPolicy -Identity "Fargo Mailboxes - No Archive"
Confirm
Are you sure you want to perform this action?
Removing retention policy "Fargo Mailboxes - No Archive".
[Y] Yes [A] Yes to All [N] No [L] No to All [?] Help (default is "Y"): y
[PS] C:\>
Get-MailboxComplianceConfiguration
The Get-MailboxComplianceConfiguration cmdlet retrieves AutoTagging information
from the mailbox, including AutoTagging status, number of messages required to be
tagged in the mailbox to enable AutoTagging functionality, and tagging statistics.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Help Desk
Hygiene Management
Organization Management
Records Management
View-Only Organization Management
Syntax
Figure 17 shows the syntax for Get-MailboxComplianceConfiguration.
Figure 23: Get-MailboxComplianceConfiguration Syntax
Parameters
Table 21 describes the parameters for Get-MailboxComplianceConfiguration and how
they are used.
Table 31: Get-MailboxComplianceConfiguration Parameters
Parameter Description
Identity The Identity parameter identifies the mailbox. You can use the
following values:
GUID
ADObjectGUID
Distinguished name (DN)
Domain\Account
User principal name (UPN)
LegacyExchangeDN
SmtpAddress
Alias
Anr The Anr parameter specifies a string on which to perform an
ambiguous name resolution (ANR) search. You can specify a partial
string and search for objects with an attribute that matches that
string. The default attributes searched are:
CommonName (CN)
DisplayName
FirstName
LastName
Alias
Credential The Credential parameter specifies the user name and password to
use to access Active Directory.
Filter The Filter parameter specifies one or more attributes that are used
to restrict the mailboxes that are returned by the query.
IgnoreDefaultScope The IgnoreDefaultScope parameter instructs the command to
ignore the default recipient scope setting for the Exchange
Management Shell session and use the entire forest as the scope.
This allows the command to access Active Directory objects that
aren't currently in the default scope. Using the IgnoreDefaultScope
parameter introduces the following restrictions:
You can't use the DomainController parameter. The
command uses an appropriate global catalog server automatically.
You can only use the DN for the Identity parameter. Other
forms of identification, such as alias or GUID, aren't accepted.
You can't use the OrganizationalUnit and Identity
parameters together.
You can't use the Credential parameter with this parameter.
OrganizationalUnit The OrganizationalUnit parameter specifies an organizational unit
(OU) and is used to limit the results. If you use this parameter, you
only get mailboxes in the container that you specify. You can use
either the OU or the domain name. If you use the OU, you must
specify the canonical name of the OU.
ReadFromDomainControlle The ReadFromDomainController parameter specifies that the user
r information is read from a domain controller in the user's domain.
If you set the recipient scope to include all recipients in the forest
and don't use this parameter, it's possible that the user information
is read from a global catalog with outdated information. If you use
this parameter, multiple reads might be necessary to get the
information.
By default, the recipient scope is set to the domain that hosts your
servers that run Exchange.
ResultSize The ResultSize parameter specifies the maximum number of results
to return. If you want to return all mailboxes that match the query,
use unlimited for the value of this parameter. The default value is
1000.
SortBy The SortBy parameter specifies the attribute by which to sort the
results. You can sort by only one attribute at a time. You can sort by
the following attributes:
Alias
Display name
Name
The results are sorted in ascending order.
Examples
The following example uses Get-MailboxComplianceConfiguration to return the
compliance configuration information for the specified mailbox.
[PS] C:\>Get-MailboxComplianceConfiguration -Identity user11
Set-MailboxComplianceConfiguration
Use the Set-MailboxComplianceConfiguration cmdlet to enable AutoTagging for a
mailbox. Before enabling AutoTagging for a mailbox, the mailbox user must have tagged
at least 500 messages using either item-level or folder-level tags.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 19 shows the syntax for Set-MailboxComplianceConfiguration.
Figure 24: Set-MailboxComplianceConfiguration Syntax
Parameters
Table 24 describes the parameters for Set-MailboxComplianceConfiguration and how
they are used.
Table 33: Set-MailboxComplianceConfiguration Parameters
Parameter Description
Identity The Identity parameter specifies the mailbox. You can use one of
the following values:
GUID
DistinguishedName (DN)
Domain\Account
User principal name (UPN)
LegacyExchangeDN
SmtpAddress
Alias
IgnoreDefaultScope The IgnoreDefaultScope parameter instructs the command to
ignore the default recipient scope setting for the Exchange
Management Shell session and use the entire forest as the
scope. This allows the command to access Active Directory
objects that aren't currently in the default scope. Using the
IgnoreDefaultScope parameter introduces the following
restrictions:
You can't use the DomainController parameter. The
Examples
The following example uses Set-MailboxComplianceConfiguration to turn on automatic
tagging for the specified user:
[PS] C:\>Set-MailboxComplianceConfiguration -Identity user14
-RetentionAutoTag
gingEnabled $True
Start-RetentionAutoTagLearning
Use the Start-RetentionAutoTagLearning cmdlet to start auto-tagging for a specified
mailbox or to cross-validate auto-tagging results for the mailbox.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role assignment
policy and role groups:
Organization Management
Records Management
Syntax
Figure 21 shows the syntax for Start-RetentionAutoTagLearning.
Parameters
Table 26 describes the parameters for Start-RetentionAutoTagLearning and how they are
used.
Table 34: Start-RetentionAutoTagLearning Parameters
Parameter Description
Identity The Identity parameter identifies the mailbox. You can use one of the
following values:
GUID
Distinguished name (DN)
Domain\Account
User principal name (UPN)
LegacyExchangeDN
SmtpAddress
Alias
CrossValidate The CrossValidate switch refers to whether items in the specified mailbox
are being auto-tagged.
Clear The Clear switch refers to whether to clear auto-tags from the specified
mailbox.
NumberOfSegment The NumberOfSegments parameter refers to the number of segments.
s Auto-tagging divides a mailbox into the number of segments specified and
learns tagging behavior from n-1 segments. Tags are then predicted for
items in the remaining segment based on this behavior. This is done for
each segment.
The default value is 10.
The minimum value is 2.
Examples
The following example uses Start-RetentionAutoTagLearning to start the learning mode
for automatic tagging for the specified user:
[PS] C:\>Start-RetentionAutoTagLearning -Identity user14 -Train
This example uses the -CrossValidate parameter to gather data on if and how automatic
tagging is progressing for the specified user:
[PS] C:\>Start-RetentionAutoTagLearning -Identity user14 -CrossValidate
Get-Mailbox
Use the Get-Mailbox cmdlet to view mailbox objects and attributes, populate property
pages, or supply mailbox information to other tasks. No parameters are required. If the
cmdlet is used without a parameter, all mailboxes in the organization are listed.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Discovery Management
Help Desk
Records Management
Recipient Management
Hygiene Management
Server Management
UM Management
View-Only Organization Management
Syntax
Figure 22 shows the syntax for Get-Mailbox for parameters that relate to MRM.
Parameters
Table 27 describes the parameters for Get-Mailbox and how they are used.
Parameter Description
Identity
Anr The Anr parameter refers to a string on which to perform an
ambiguous name resolution (ANR) search. You can specify a partial
string and search for objects with an attribute that matches that
string. The default attributes searched are:
CommonName (CN)
DisplayName
FirstName
LastName
Alias
Arbitration The Arbitration parameter refers to that the mailbox for which you
are executing the command is an arbitration mailbox. Arbitration
mailboxes are used for managing approval workflow. For example,
an arbitration mailbox is used for handling moderated recipients
and distribution group membership approval.
Archive The Archive parameter refers to whether to return information
about the recipient's archive mailbox.
Credential The Credential parameter refers to the user name and password to
use to access Active Directory. This parameter requires the creation
and passing of a credential object. This credential object is created
by using the Get-Credential cmdlet.
Database The Database parameter refers to the database from which to get
the mailbox. You can use the following values:
GUID of the database
Database name
Server name\database name
If you don't specify the server name, the command searches for the
database on the local server. This parameter can't be used in
conjunction with the Filter parameter.
DomainController The DomainController parameter refers to the fully qualified
domain name (FQDN) of the domain controller that retrieves data
from Active Directory.
Filter The Identity parameter identifies the mailbox. You can use one of
the following values:
GUID
Distinguished name (DN)
Domain\Account
User principal name (UPN)
LegacyExchangeDN
SmtpAddress
Alias
IgnoreDefaultScope The IgnoreDefaultScope parameter instructs the command to
ignore the default recipient scope setting for the Exchange
Management Shell session and use the entire forest as the scope.
This allows the command to access Active Directory objects that
aren't currently in the default scope. Using the IgnoreDefaultScope
parameter introduces the following restrictions:
You can't use the DomainController parameter. The
command uses an appropriate global catalog server automatically.
You can only use the DN for the Identity parameter. Other
forms of identification, such as alias or GUID, aren't accepted.
You can't use the OrganizationalUnit and Identity
parameters together.
You can't use the Credential parameter.
OrganizationalUnit The OrganizationalUnit parameter refers to an organizational unit
(OU) and is used to limit the results. If you use this parameter, you
only get mailboxes in the container that you specify. You can use
either the OU or the domain name. If you use the OU, you must
specify the canonical name of the OU.
ReadFromDomainControlle The ReadFromDomainController parameter refers to that the user
r information is read from a domain controller in the user's domain.
If you set the recipient scope to include all recipients in the forest
and don't use this parameter, it's possible that the user information
is read from a global catalog with outdated information. If you use
this parameter, multiple reads might be necessary to get the
information. By default, the recipient scope is set to the domain
that hosts your servers that run Exchange.
RecipientTypeDetails The RecipientTypeDetails parameter refers to the type of recipients
returned. Recipient types are divided into recipient types and
subtypes. Each recipient type contains all common properties for
all subtypes. For example, the type UserMailbox represents a user
account in Active Directory with an associated mailbox. Because
there are several mailbox types, each mailbox type is identified by
the RecipientTypeDetails parameter. For example, a conference
room mailbox has RecipientTypeDetails set to
ConferenceRoomMailbox, whereas a user mailbox has
RecipientTypeDetails set to UserMailbox. For this command, the
available recipient type details are:
ArbitrationMailbox
ConferenceRoomMailbox
DiscoveryMailbox
EquipmentMailbox
LinkedMailbox
RoomMailbox
SharedMailbox
UserMailbox
ResultSize The ResultSize parameter refers to the maximum number of results
to return. If you want to return all mailboxes that match the query,
use unlimited for the value of this parameter. The default value is
1000.
Server The Server parameter refers to an individual server and is used to
limit the results. If you use this parameter, you only get mailboxes
that reside on the server that you specify. Use the common name
of the server that you want to specify.
SortBy The SortBy parameter refers to the attribute by which to sort the
results. You can sort by only one attribute at a time. You can sort by
the following attributes:
Alias
Display name
Name
Examples
The following example Get-Mailbox:
[PS] C:\>get-mailbox -Identity user14
To see only the properties that are related to records management, the following
command passes the results of Get-Mailbox by pipeline to the Format-List command,
which uses a list of property names to limit the returned data:
The properties of interest that appear in the output from Get-Mailbox are shown in Table
31.
Table 36: Get-Mailbox Properties
New-Mailbox
Use the New-Mailbox cmdlet to create a user in Active Directory and mailbox-enable this
new user. New-Mailbox includes parameters for configuring User Archive and MRM
settings during mailbox creation.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Recipient Management
Syntax
Figure 23 shows the syntax for New-Mailbox.
The syntax, parameter details and examples for New-Mailbox that are covered
Note: in this section include only the minimum required for creating a new mailbox,
plus the parameters specific to configuring records management features. For
full details on the New-Mailbox cmdlet, see help information from the EMS
using this command: Get-Help New-Mailbox -Full.
Parameters
Table 30 describes the parameters for New-Mailbox that are specific to records
management and how they are used.
Table 37: New-Mailbox Parameters
Parameter Description
Archive The Archive parameter refers to whether to create an
archive mailbox for the specified user. You don't have to
specify a value with this parameter.
Discovery The Discovery parameter refers to that this mailbox is a
Discovery mailbox. Discovery mailboxes are created as
target mailboxes for Discovery searches. After being
created or enabled, a Discovery mailbox can't be
repurpose
d or converted to another type of mailbox. You don't
have to include a value with this parameter. For more
information, see Understanding Discovery.
ManagedFolderMailboxPolicy The ManagedFolderMailboxPolicy parameter refers to
the managed folder mailbox policy to enable for the
mailbox that you create.
ManagedFolderMailboxPolicyAllowed The ManagedFolderMailboxPolicyAllowed parameter
refers to whether to bypass the warning that MRM
features aren't supported for e-mail clients using
versions of Microsoft Outlook earlier than Office Outlook
2007. When a managed folder mailbox policy is assigned
to a mailbox using the ManagedFolderMailboxPolicy
parameter, the warning appears by default unless the
ManagedFolderMailboxPolicyAllowed parameter is used.
Examples
The following example New-Mailbox:
Foo
Enable-Mailbox
Use the Enable-Mailbox cmdlet to mailbox-enable an existing user or Active Directory
InetOrgPerson object. Mailbox-enabling an existing user or InetOrgPerson object creates
additional mailbox attributes on the user object in AD. When the user logs on to the
mailbox or receives e-mail messages, a mailbox object in the Exchange database is
created.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Recipient Management
Syntax
Figure 24 shows the syntax for Enable-Mailbox.
Figure 28: Enable-Mailbox Syntax
The syntax, parameter details and examples for Enable-Mailbox that are
Note: covered in this section include only the minimum required for creating a new
mailbox, plus the parameters specific to configuring records management
features. For full details on the Enable-Mailbox cmdlet, see help information
from the EMS using this command: Get-Help Enable-Mailbox -Full.
Parameters
Table 31 describes the parameters for Enable-Mailbox and how they are used.
Parameter Description
Identity The Identity parameter refers to the user or
InetOrgPerson object that you want to mailbox-enable.
You can use one of the following values:
GUID
Distinguished name (DN)
Domain\Account
UPN
Archive The Archive parameter refers to that this mailbox is an
Archive mailbox.
Discovery The Discovery parameter refers to that this mailbox is a
Discovery mailbox. Discovery mailboxes are created as
target mailboxes for Discovery searches. You don't have
to include a value with this parameter.
After being created or enabled, a Discovery mailbox can't
be converted to another type of mailbox.
ManagedFolderMailboxPolicy The ManagedFolderMailboxPolicy parameter refers to
the managed folder mailbox policy to enable for the
mailbox that you create. If you don't specify this
parameter, the default managed folder mailbox policy is
used.
ManagedFolderMailboxPolicyAllowed The ManagedFolderMailboxPolicyAllowed parameter
refers to whether to bypass the warning that MRM
features aren't supported for e-mail clients using
versions of Microsoft Outlook earlier than Office Outlook
2007. When a managed folder mailbox policy is assigned
to a mailbox using the ManagedFolderMailboxPolicy
parameter, the warning appears by default unless the
ManagedFolderMailboxPolicyAllowed parameter is used.
Outlook 2003 Service Pack 3 clients are supported but
are provided limited functionality for MRM.
Examples
The following example Enable-Mailbox:
Foo
Set-Mailbox
Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. You can use this
cmdlet for one mailbox at a time. To perform bulk management, you can pipeline the
output of various Get- cmdlets (for example, the Get-Mailbox or Get-User cmdlets) and
configure several mailboxes in a single-line command. You can also use the Set-Mailbox
cmdlet in scripts.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Recipient Management
Records Management
Discovery Management
Syntax
Figure 25 shows the syntax for Set-Mailbox.
Figure 29: Set-Mailbox Syntax
Parameters
Table 32 describes the parameters for Set-Mailbox and how they are used.
Table 39: Set-Mailbox Parameters
Parameter Description
Identity The Identity parameter refers to the mailbox. You can
use the following values:
ADObjectID
Alias
Distinguished name (DN)
Domain\Account
GUID
LegacyExchangeDN
SmtpAddress
User principal name (UPN)
ArchiveName The ArchiveName parameter refers to the name of the
archive mailbox. Use this parameter to change the name
of the archive.
ArchiveQuota The ArchiveQuota parameter refers to the archive
mailbox size at which it no longer accepts messages.
When you enter a value, qualify the value with one of
the following units:
MB (megabytes)
GB (gigabytes)
TB (terabytes)
PB (petabytes)
Unqualified values are treated as bytes. The value must
be greater than the value of the ArchiveWarningQuota
parameter. The valid input range for either parameter is
from 1MB through 8192 PB.
ArchiveWarningQuota The ArchiveWarningQuota parameter refers to the
archive mailbox size at which a warning message is sent
to the user.
When you enter a value, qualify the value with one of
the following units:
MB (megabytes)
GB (gigabytes)
TB (terabytes)
PB (petabytes)
Unqualified values are treated as bytes. The value of
must be less than the value of the ArchiveQuota
parameter. The valid input range for either parameter is
from 1MB through 8191 PB.
EndDateForRetentionHold The EndDateForRetentionHold parameter refers to the
end date for retention hold for MRM. To use this
parameter, the RetentionHoldEnabled parameter must
be set to $true.
LitigationHoldEnabled The LitigationHoldEnabled parameter refers to that the
mailbox is under litigation hold and that messages can't
be deleted from the user's account. The two possible
values for this parameter are $true or $false. The default
value is $false. After a mailbox is placed on litigation
hold, deleted items and all versions of changed items are
retained in the Recoverable Items folder. Items that are
purged from the dumpster are also retained and the
items are held indefinitely. If you enable litigation hold,
single-item recovery quotas aren't applied.
ManagedFolderMailboxPolicy The ManagedFolderMailboxPolicy parameter refers to a
Examples
The following example Set-Mailbox:
Foo
Get-MailboxServer
Use the Get-MailboxServer cmdlet to return a Mailbox server object and all its attributes.
If no parameter is specified, a complete list of the Mailbox servers in the entire Exchange
organization is returned.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Delegated Setup
Hygiene Management
Organization Management
Public Folder Management
Recipient Management
Server Management
View-Only Organization Management
Syntax
Figure 25 shows the syntax for Get-MailboxServer.
Figure 30: Get-MailboxServer Syntax
Parameters
Table 33 describes the parameters for Get-MailboxServer and how they are used.
Table 40: Get-MailboxServer Parameters
Paramet Description
er
Identity The Identity parameter refers to the Mailbox server. You can use the following values:
Name
GUID
Distinguished name (DN)
Status The Status parameter refers to whether you want to get additional status information,
such as locale.
You don't need to specify any value with this parameter.
If you specify this parameter, you should format the output in such a way that you can
view the additional attributes. For example, pipe the output to the Format-List
cmdlet.
Examples
The following example Get-MailboxServer:
Foo
The properties of interest that appear in the output from Get-MailboxServer are shown in
Table 34.
Table 41: Get-MailboxServer Properties
Set-MailboxServer
Use the Set-MailboxServer cmdlet to modify attributes on a computer running Microsoft
Exchange with the Mailbox server role installed.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Server Management
Syntax
Figure 27 shows the syntax for Set-MailboxServer.
Figure 31: Set-MailboxServer Syntax
Parameters
Table 35 describes the parameters for Set-MailboxServer and how they are used.
Table 42: Set-MailboxServer Parameters
Parameter Description
Identity The Identity parameter refers to the Mailbox server.
You can use the following values:
GUID
Distinguished name (DN)
Name of a Mailbox server
FolderLogForManagedFoldersEnabled The FolderLogForManagedFoldersEnabled
parameter refers to whether the folder log for
managed folders is enabled for messages that were
moved to managed folders. The two possible values
for this parameter are $true or $false. If you specify
$true, information about folders that have managed
folder mailbox policies applied to them is logged.
JournalingLogForManagedFoldersEnabled The JournalingLogForManagedFoldersEnabled
parameter refers to whether the log for managed
folders is enabled for journaling. The two possible
values for this parameter are $true or $false. If you
specify $true, information about messages that were
journaled is logged. The logs are located at the
location you specify with the
LogPathForManagedFolders parameter.
LogDirectorySizeLimitForManagedFolders The LogDirectorySizeLimitForManagedFolders
parameter refers to the size limit for all managed
folder log files from a single message database. After
the limit is reached for a set of managed folder log
files from a message database, the oldest files are
deleted to make space for new files.
The size of the managed folder log files is calculated
as the total size of all log files that have the same
name prefix. For example, for a file with the name
Managed_Folder_Assistant[Storage Group 01]
[Mailbox Database 01]20061018-1.log, the prefix is
Managed_Folder_Assistant[Storage Group 01]
[Mailbox Database 01]. If you rename log files or
copy other files into the managed folder log
directory, these files aren't counted in the log files
size calculation. The managed folder log files for
each message database have a unique name prefix.
Therefore, this limit applies to the log files for each
message database, and not to all the log files in the
directory.
If you have more than one message database, the
maximum size of the managed folder log directory
isn't the size specified in the
LogDirectorySizeLimitForManagedFolders parameter
Examples
The following example Set-MailboxServer:
Foo
Start-ManagedFolderAssistant
Use the Start-ManagedFolderAssistant cmdlet to immediately start messaging MRM
processing of mailboxes on the servers that you specify.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 28 shows the syntax for Start-ManagedFolderAssistant.
Figure 32: Start-ManagedFolderAssistant Syntax
Parameters
Table 36 describes the parameters for Start-ManagedFolderAssistant and how they are
used.
Table 43: Start-ManagedFolderAssistant Parameters
Paramet Description
er
Identity The Identity parameter refers to the names of servers on which mailboxes are to be
processed. If a server isn't specified, mailboxes on the local server are processed. The
Identity parameter can't be used in combination with the Mailbox parameter.
Mailbox The Mailbox parameter refers to an individual mailbox to be processed. The mailbox is
specified as an e-mail address, domain\user name, or mailbox GUID. The Mailbox
parameter can't be used in combination with the Identity parameter.
Examples
The following example uses Start-ManagedFolderAssistant to start the managed folder
assistant on server CONSEAMB1:
[PS] C:\>Start-ManagedFolderAssistant -Identity CONSEAMB1
This example starts the managed folder assistant to process on the mailbox for user11:
[PS] C:\>Start-ManagedFolderAssistant -Mailbox usereleven@contoso.com
Stop-ManagedFolderAssistant
Use the Stop-ManagedFolderAssistant cmdlet to immediately stop MRM from processing
users' mailboxes on the specified servers.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Records Management
Syntax
Figure 28 shows the syntax for Stop-ManagedFolderAssistant.
Figure 33: Stop-ManagedFolderAssistant Syntax
Parameters
Table 37 describes the parameters for Stop-ManagedFolderAssistant and how they are
used.
Table 44: Stop-ManagedFolderAssistant Parameters
Paramet Description
er
Identity The Identity parameter refers to the names of servers on which the managed folder
assistant is to be stopped. If a server isn't specified, the managed folder assistant on
the local server is stopped.
Examples
The following example uses Stop-ManagedFolderAssistant to stop the managed folder
assistant on mailbox server CONSEAMB1:
[PS] C:\>Stop-ManagedFolderAssistant -Identity CONSEAMB1
Get-MailboxStatistics
Use the Get-MailboxStatistics cmdlet to obtain information about a mailbox, such as the
size of the mailbox, the number of messages it contains, and the last time it was accessed.
In addition, you can get the move history or a move report of a completed move request.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Help Desk
Syntax
Figure 30 shows the syntax for Get-MailboxStatistics.
Figure 34: Get-MailboxStatistics Syntax
Parameters
Table 38 describes the parameters for Get-MailboxStatistics and how they are used.
Table 45: Get-MailboxStatistics Parameters
Paramet Description
er
Identity The Identity parameter refers to a mailbox. When you specify a value for the Identity
parameter, the command looks up the mailbox specified in the Identity parameter,
connects to the server where the mailbox resides, and returns the statistics for the
mailbox. You can use one of the following values:
GUID
Distinguished name (DN)
Domain\Account
User principal name (UPN)
Legacy Exchange DN
SMTP address
Alias
Archive The Archive switch parameter refers to whether to return mailbox statistics for the
archive mailbox associated with the specified mailbox. You don't have to specify a
value with this parameter.
Examples
The following example uses Get-MailboxStatistics to display the mailbox statistics of the
archive mailbox for the specified user:
[PS] C:\>Get-MailboxStatistics -Identity user11 -Archive
To see all of the settings returned by Get-MailboxStatistics, pass the results by pipeline to
the Format-List command as shown in this example:
[PS] C:\>Get-MailboxStatistics -Identity user11 -Archive | Format-List
RunspaceId : 5f7227f0-c5c5-4c2e-8fff-d9ced58a9768
The properties of interest that appear in the output from Get-MailboxStatistics are shown
in Table 39.
Table 46: Get-MailboxStatistics Properties
Get-MailboxFolderStatistics
Use the Get-MailboxFolderStatistics cmdlet to retrieve information about the folders in a
specified mailbox, including the number and size of items in the folder, the folder name
and ID, and other information.
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the following role groups:
Organization Management
Recipient Management
Help Desk
Hygiene Management
View-Only Organization Management
Syntax
Figure 30 shows the syntax for Get-MailboxFolderStatistics.
Figure 35: Get-MailboxFolderStatistics Syntax
Parameters
Table 40 describes the parameters for Get-MailboxFolderStatistics and how they are
used.
Table 47: Get-MailboxFolderStatistics Parameters
Parameter Description
Identity The Identity parameter refers to a mailbox. When you specify a
value for the Identity parameter, the command looks up the
mailbox specified in the Identity parameter, connects to the
server where the mailbox resides, and returns the statistics for
the mailbox. You can use one of the following values:
GUID
Distinguished name (DN)
Domain\Account
User principal name (UPN)
Legacy Exchange DN
SMTP address
Alias
FolderScope The FolderScope parameter refers to the scope of the search by
folder type. Valid parameter values include:
All
Calendar
Contacts
ConversationHistory
DeletedItems
Drafts
Inbox
JunkEmail
Journal
ManagedCustomFolder
Notes
Outbox
RecoverableItems
RssSubscriptions
SentItems
SyncIssues
Tasks
If the ManagedCustomFolder value is entered, the command
returns the output for all managed custom folders. If the
RecoverableItems value is entered, the command returns the
output for the Recoverable Items folder and the Deletions,
Purges, and Versions subfolders.
IncludeOldestAndNewestItem The IncludeOldestAndNewestItems parameter refers to whether
s to return the dates of the oldest and newest items in each
folder.
Examples
The following example uses Get-MailboxFolderStatistics to display the mailbox statistics
of the archive mailbox for the specified user:
<pending>
The properties of interest that appear in the output from Get-MailboxFolderStatistics are
shown in Table 39.
Table 48: Get-MailboxFolderStatistics Properties
-LogFileAgeLimitForManagedFolders
Specifies how long to retain managed folder logs. Log files that exceed the maximum
retention period are deleted. To specify a value, enter it as a time span: dd.hh:mm:ss
where d = days, h = hours, m = minutes, and s = seconds. For example, to specify a 30-day
interval, enter 30.00:00:00. Maps to msExchELCAuditLogFileAgeLimit attribute. Default
value is: 00:00:00 (indefinite)
- LogDirectorySizeLimitForManagedFolders
Specifies the size limit for all managed folder log files from a single message database.
After the limit is reached for a set of managed folder log files from a message database,
the oldest files will be deleted to make room for new files. The size of the managed folder
log files is calculated as the total size of all log files that have the same name prefix. For
example, for a file with the name Managed_Folder_Assistant[Storage Group 01][Mailbox
Database 01]20061018-1.log, the prefix is Managed_Folder_Assistant[Storage Group 01]
[Mailbox Database 01].
If you rename log files or copy other files into the managed folder log directory, these files
are not counted in the log files size calculation. The managed folder log files for each
message database have a unique name prefix. Therefore, this limit applies to the log files
for each message database, not to all the log files in the directory. If you have more than
one message database, the maximum size of the managed folder log directory is not the
size specified in the LogDirectorySizeLimitForManagedFolders parameter because the
managed folder log files that are generated by different databases have different name
prefixes. The maximum size of the managed folder log directory will be X times the
specified value if you have X message databases.
You must specify either an integer or "unlimited." When you enter a value, qualify the
value with one of the following units: B (bytes), KB (kilobytes), MB (megabytes), GB
(gigabytes), TB (terabytes)
Unqualified values are treated as bytes. Maps to
msExchELCAuditLogDirectorySizeLimit attribute. Default value is: unlimited.
-LogFileSizeLimitForManagedFolders
Specifies the maximum size for each managed folder log file. When the log file size limit is
reached, a new log file is created. When you enter a value, qualify the value with one of
the following units: B (bytes), KB (kilobytes), MB (megabytes), GB (gigabytes), TB
(terabytes)
-RetentionLogForManagedFoldersEnabled
Specifies whether the managed folder logs information about messages that have reaches
their retention limits. The two possible values for this parameter are $true or $false. If
you specify $true, information about messages that have been processed because they
have reached their retention limits will be logged. Maps to the 0x02 bit of attribute
msExchMailboxRoleFlags. Default value is: $false
-JournalingLogForManagedFoldersEnabled
Specifies whether the log for managed folders is enabled for journaling. The two possible
values for this parameter are $true or $false. If you specify $true, information about
messages that were journaled will be logged. Maps to the 0x04 bit of attribute
msExchMailboxRoleFlags. Default value is: $false
-FolderLogForManagedFoldersEnabled
Specifies whether the folder log for managed folders is enabled for messages that were
moved to managed folders. The two possible values for this parameter are $true or $false.
If you specify $true, information about folders that have managed folder mailbox policies
applied to them will be logged. Maps to the 0x08 bit of attribute
msExchMailboxRoleFlags. Default value is: $false
-SubjectLogForManagedFoldersEnabled
Specifies whether the subject of messages will be displayed in managed folder logs. The
two possible values for this parameter are $true or $false. If you specify $false, the subject
of messages will be blank in the managed folder logs. Maps to the 0x10 bit of attribute
msExchMailboxRoleFlags. Default value is: $false
Heading Description
Date-Time Timestamp for when the action was recorded. Takes the
form YYYY-MM-DD+UTC. Example:
2007-03-22T14:47:11.562Z
Managed-Folder-Assistant-Action Records the action taken. Possible values are Retention,
Journaling, ManagedFolderProvisioning
Folder-Full-Path Records the mailbox folder path where the action took
place. Example:
In this example, the log file header information includes the version of Exchange Server
that generated the file, the log file type, the date the log was begun and the field names.
This log file can be opened in Excel for a much more comprehensive view.
Each log file can be separated into sections in the context of the mailbox being acted upon
at the time, as identified by the comment “Starting to process mailbox:” as shown in the
example log excerpt.
Lesson Review
<Review points and/or questions>
PST file resides. When accessing a mailbox using Outlook on another computer or
Outlook Web App, messages stores in PST files are inaccessible.
Archive Quotas
Archive mailboxes are designed to allow users to store historical messaging data outside
their primary mailbox. One of the reasons users resort to using PST files is low mailbox
storage quotas, and the restrictions imposed when different mailbox quotas are exceeded.
For example, users can be prevented from sending messages when the mailbox size
exceeds the Prohibit send quota, and both sending and receiving of messages can be
blocked when the mailbox size exceeds the Prohibit send and receive quota.
To eliminate the need for PST files, it is important to provide an archive mailbox with
storage limits that meet user requirements. At the same time, organizations may require
some control on storage and growth of archive mailboxes to monitor or control storage
costs or better plan for expansion of storage.
Archive mailboxes can be configured with an ArchiveWarningQuota and an
ArchiveQuota. When a user's archive mailbox exceeds the ArchiveWarningQuota limit,
an event is logged in the Application event log. When the archive mailbox exceeds the
ArchiveQuota, moving messages to the archive mailbox is blocked. By default, the
ArchiveWarningQuota and ArchiveQuota are set to unlimited.
Client Experience
From a client application, the User Archive mailbox appears as an additional mailbox in
the folder tree view. The default convention for the display name of the User Archive
mailbox is Online Archive - <user display name>. This is to help differentiate the
archive mailbox from the user’s primary mailbox. The Outlook 2010 client also uses a
different icon from the primary mailbox.
For this release of Exchange 2010, a User Archive mailbox is only accessible from
Microsoft Outlook 2010 and Exchange 2010 OWA. The end-user experience is very
similar between the two clients, but there are some slight differences that are discussed
in the following sections.
From the archive mailbox the end-user is free to manage messaging items as they would
items in the primary mailbox. It is expected that this experience is very similar to that
when using PST files in previous versions of Outlook and Exchange. The specific details of
typical end-user actions when using the archive mailbox are as follows:
Moving Items - The archive mailbox supports the standard move actions – drag & drop,
right-click and choose move. It also supports being the target of item moves as part of the
enforcement of MRM retention policies on the Exchange server.
Deleted Items - Items can be deleted from the archive mailbox. Deleted items are no
longer visible to the end user, but are in the Mailbox dumpster. Items in the Deleted Items
folder in the archive mailbox are automatically emptied in accordance with retention
settings for the primary mailbox.
Rules - Client side Inbox rules can be configured in Outlook to move items to selected
folders in the archive mailbox. Server side rules configured in OWA are not supported.
Search - Searching the archive mailbox works the same as searching an additional
mailbox. The archive mailbox shows up in the list of All Items search stores. Archive
mailboxes are indexed in the same way as primary mailboxes and can be included in
discovery searches.
Categorize - Message categorization works the same as on messages in the primary
mailbox. Categories are preserved on messages moved from the primary to the archive
mailbox.
Flag for Follow Up - Flagging of items works the same as on the primary mailbox.
Reminders - Reminders on items in the archive mailbox do not fire. (additional work
may allow the configuration of Reminder settings for items in the archive mailbox post
RTM).
Reply to Messages - Replies from the archive mailbox behave the same as if they were
sent from the primary mailbox account. The reply shows as having been sent from the
primary mailbox user and has their e-mail address. The sent message shows up in the
primary mailbox Sent Items folder.
Retention Tags - The user is able to set retention tags on items in the archive; however,
when an item is moved from the primary mailbox to the archive, all policies are striped.
There are a different set of policies for the archive and the primary mailbox because
certain policies don’t make sense for messages in the archive mailbox (such as move to
archive).
administrator, there are no additional steps required during the OWA logon procedure to
access the archive mailbox. The User Archive mailbox appears as an additional mailbox in
the folder tree as shown in Figure 2.
Like Outlook 2010, using OWA the user is free to manage items in the archive mailbox as
they would items in the primary mailbox. Archive mailboxes in OWA support all regular
mailbox item types that are already supported in the OWA primary mailbox.
Figure 39: Outlook Web App Folder Tree View
The Exchange 2010 OWA code handles the archive mailbox in a way similar to that used
for accessing delegate mailbox in previous versions of OWA. Unlike accessing a delegate
mailbox, Exchange 2010 OWA understands that the primary mailbox owner is also the
owner of the archive and that the full mailbox hierarchy is to be displayed. At logon OWA
sets up two separate sessions, one to the primary mailbox and a secondary session to the
archive mailbox.
Mailbox Properties
The structure of an archive mailbox is very similar to a regular user mailbox but with
some important differences. In order for the archive mailbox to be treated as a regular
mailbox, it contains the special mailbox folders that are necessary for all mailboxes:
• Inbox
• Calendar
• Contacts
• Notes
However, these mandatory folders exist in the Non-IPM Subtree of the archive mailbox,
and thus are not visible to the client. These special folders are hidden and cannot have
any content added to them at any time. The folders can be viewed with the MAPI Editor
using a profile for the primary mailbox owner.
These attributes and values correspond to the properties that are returned by the Get-
Mailbox command as shown in the following example:
Get-Mailbox -Identity user11 | Format-List *archive*
ArchiveGuid : 7097e2a0-af86-449e-b16a-530b3a54c194
ArchiveName : {Online Archive - user eleven}
ArchiveQuota : unlimited
ArchiveWarningQuota : 2 GB (2,147,483,648 bytes)
Lesson Review
<Review points and/or questions>
Lesson 4: Discovery
This lesson explains | introduces | provides a detailed …
Discovery Overview
Exchange Server 2010 Discovery helps organizations facing legal discovery requirements,
as part of organizational policy, compliance requirements, or law suits, to search for
relevant content in Exchange mailboxes. Exchange 2010 provides a seamless experience
for searching e-mail content in mailboxes across the entire Exchange organization.
Discovery Basics
Exchange 2010 Discovery can be a useful search and data collection tool for different
audiences within organizations, and serve different needs. Some of the common uses of
Discovery include the following:
Legal Discovery - Complying with legal discovery requests for messaging records
is increasingly becoming one of the most important tasks for organizations
involved in law suits.
Internal investigations - Requests from managers or legal departments as part of
internal investigations.
Human Resources - Requests from HR departments as part of regular monitoring
of e-mail content or specific searches based on HR requirements.
Without a dedicated tool, searching messaging records spread over a number of different
mailboxes, residing in different mailbox databases on e-mail servers throughout a
dispersed organization can be time-consuming and resource-intensive task. When faced
with requests for messaging records pertaining to a certain subject, Discovery fills the
critical need of being able to search a large volume of e-mail messages stored in
mailboxes across one or more Exchange 2010 servers, possibly in different locations.
Exchange Search
Discovery uses the content indexes created by Exchange Search. New capabilities have
been added to Exchange Search to allow it to provide the extensive search functionality
required by Discovery. Having a single content indexing engine ensures no additional
resources are utilized for crawling and indexing mailbox databases for Discovery when
discovery requests are received by IT departments.
The Exchange Control Panel (ECP) provides an easy-to-use search interface for non-
technical personnel such as HR, records managers and legal professionals. Role Based
Access Control (RBAC) provides the Discovery Management role to allow secure search
access to non-technical personnel, without providing elevated privileges to make any
operational changes to Exchange Server configuration.
Performing a Search
A Discovery search can be performed by a user who has the Discovery Management role
assigned. Discovery tasks are performed using the ECP or shell cmdlets. When
performing a search, a search object is created in Exchange 2010, which can be
manipulated to start, stop, modify and remove the search. Items returned by Discovery
are copied to the mailbox designated as the target mailbox in the search. Multiple
searches can run concurrently.
Discovery Mailbox
Microsoft Exchange Server 2010 Setup creates a Discovery mailbox by default. Discovery
mailboxes are available as target mailboxes for Discovery searches in the Exchange
Control Panel. You can create additional Discovery mailboxes as required. A Discovery
mailbox can't be repurposed or converted to another type of mailbox. You can remove a
Discovery mailbox using the same procedure used to remove other types of mailboxes.
Managing Discovery
The Discovery feature is managed using the Exchange Management Shell (EMS) and the
Exchange Control Panel (ECP).
Common Parameters
There are parameters that are common to most of the cmdlets described in this lesson.
For efficiency sake, these parameters are described in, and apply to wherever they are
used in the syntax list for each cmdlet.
Table 50: Common Parameters
Permissions
A user must be granted access through role assignment before running this task. By
default the required access is granted by role assignment to the Discovery Management
role group.
Exchange 2010 relies on Role Based Access Control (RBAC) to control access to
Note: the tasks described in this section. RBAC is covered in detail as part of a
separate module that is a prerequisite for this topic.
Get-MailboxSearch
Use the Get-MailboxSearch cmdlet to view mailbox searches that are in progress,
complete, or stopped.
Syntax
Figure 1 shows the syntax for Get-MailboxSearch.
Figure 40: Get-MailboxSearch Syntax
Parameters
Table 1 describes the parameters for Get-MailboxSearch and how they are used.
Table 51: Get-MailboxSearch Parameters
Paramet Description
er
Identity The Identity parameter specifies the name of the search query. If a name isn't
provided, all mailbox search queries are returned.
ResultSiz The ResultSize parameter specifies the maximum number of results to return. The
e default result size is 1000. Use unlimited to return all mailbox searches.
Examples
The Get-MailboxSearch cmdlet
New-MailboxSearch
Use the New-MailboxSearch cmdlet to start a new Discovery search. Discovery searches
are performed across all servers running Exchange Server 2010 in an Exchange
organization.
Syntax
Figure 1 shows the syntax for New-MailboxSearch.
Figure 41: New-MailboxSearch Syntax
Parameters
Table 1 describes the parameters for New-MailboxSearch and how they are used.
Table 52: New-MailboxSearch Parameters
Parameter Description
Name The Name parameter specifies a friendly name for the search. Search
results are copied to a folder in the mailbox specified by the
TargetMailbox parameter. The folder name is the same as the search
name.
TargetMailbox The TargetMailbox parameter specifies the identity of the destination
mailbox where search results are copied. You can use the following
values:
Alias
Display Name
Domain\Account
SMTP address
Distinguished name (DN)
Object GUID
User Principal Name (UPN)
LegacyExchangeDN
DoNotIncludeArchive The DoNotIncludeArchive parameter specifies whether archive
mailboxes are included in the search. By default, archive mailboxes
Examples
The New-MailboxSearch cmdlet
Set-MailboxSearch
Use the Set-MailboxSearch cmdlet to modify an existing Discovery search.
Syntax
Figure 1 shows the syntax for Set-MailboxSearch.
Figure 42: Set-MailboxSearch Syntax
Parameters
Table 1 describes the parameters for Set-MailboxSearch and how they are used.
Table 53: Set-MailboxSearch Parameters
Parameter Description
Identity The Identity parameter specifies the name of the Discovery search
DoNotIncludeArchive The DoNotIncludeArchive parameter specifies whether items in the
user's Archive mailbox are included in Discovery searches. By default,
items in the user's Archive mailbox are included in Discovery
searches. If set to $true, the DoNotIncludeArchive parameter
instructs Discovery to exclude Archive mailboxes from the search.
EndDate The EndDate parameter specifies an end date for the search.
Force The Force switch suppresses the confirmation prompt displayed
before modifying a search. When modifying a search, previous search
results are removed from the target mailbox, and the search is
restarted after modification. The Force switch doesn't require a value.
IncludeUnsearchableItem The IncludeUnsearchableItems parameter specifies whether
s Discovery includes unsearchable items in the search results. If set to
$true, Discovery includes unsearchable items in the search results.
These items, regardless of whether they match the search criteria,
are copied to the target mailbox.
Language The Language parameter specifies a locale for the Discovery search.
LogLevel The LogLevel parameter specifies a logging level for the Discovery
search. Valid values are:
Basic Basic details of the search are kept.
Full In addition to details in the Basic logging level, a full list
of all messages returned is included.
Suppress Logging is suppressed. No logs are kept.
ManagedBy The ManagedBy parameter specifies the users or groups who are
allowed to manage the search, including taking actions such as
starting, stopping, modifying, or removing the search.
MessageTypes The MessageTypes parameter specifies the message types that
should be included in the Discovery search. Valid values include:
Email
Meetings
Tasks
Notes
Docs
Journals
Contacts
IM
Name The Name parameter specifies a name for the search. The top-level
folder created in the target mailbox, where items returned by the
search are copied, is also named after the search name.
Recipients The Recipients parameter specifies one or more recipients and is a
Examples
The Set-MailboxSearch cmdlet
Remove-MailboxSearch
Use the Remove-MailboxSearch cmdlet to remove a mailbox search.
Syntax
Figure 1 shows the syntax for Remove-MailboxSearch.
Parameters
Table 1 describes the parameters for Remove-MailboxSearch and how they are used.
Table 54: Remove-MailboxSearch Parameters
Parameter Description
Identity The Identity parameter specifies the name of the mailbox search.
Examples
The Remove-MailboxSearch cmdlet
Search-Mailbox
Use the Search-Mailbox cmdlet to search a mailbox and copy the results to a specified
target mailbox.
Syntax
Figure 1 shows the syntax for Search-Mailbox.
Parameters
Table 1 describes the parameters for Search-Mailbox and how they are used.
Table 55: Search-Mailbox Parameters
Parameter Description
Identity The Identity parameter specifies the identity of the mailbox to search.
You can use the following values:
Alias
Display name
Domain\Account
SMTP address
Distinguished name (DN)
Object GUID
User principal name (UPN)
LegacyExchangeDN
DoNotIncludeArchive The DoNotIncludeArchive switch specifies that the user's archive
mailbox shouldn't be included in the search. You don't need to specify
a value for this switch.
IncludeUnsearchableItem The IncludeUnsearchableItems switch specifies whether to include
s items that couldn't be indexed by Exchange Search. When set to
$true, the IncludeUnsearchableItems switch specifies that items that
couldn't be indexed by Exchange Search should be included in the
search results.
LogLevel The LogLevel parameter specifies the logging level for the search. It
can have one of the following values:
Suppress No logs are kept.
Basic Basic information about the query and who ran it is
kept.
Full In addition to the information kept by the Basic log
level, the Full log level adds a complete list of search results.
SearchDumpster The SearchDumpster parameter specifies whether to search the
Recoverable Items folder, which is the storage location in which items
deleted from the Deleted Items folder are located until they're
purged from the mailbox database.
SearchQuery The SearchQuery parameter specifies a search string or a query
formatted using Advanced Query Syntax (AQS). If this parameter is
empty, all messages are returned.
TargetMailbox The TargetMailbox parameter specifies the identity of the destination
mailbox where search results are copied. You can use the following
values:
Alias
Display name
Domain\Account
SMTP address
DN
Object GUID
UPN
LegacyExchangeDN
You can't use this parameter with the EstimateResultOnly switch.
TargetFolder The TargetFolder parameter specifies a folder name to save search
results in the mailbox specified in the TargetMailbox parameter.
EstimateResultOnly The EstimateResultOnly switch specifies that only an estimate of the
total number and size of messages returned by the search be
provided. Messages aren't copied to the target mailbox. You can't use
this switch with the TargetMailbox parameter.
Examples
The Search-Mailbox cmdlet
Stop-MailboxSearch
Use the Remove-MailboxSearch cmdlet to remove a mailbox search.
Syntax
Figure 1 shows the syntax for Stop-MailboxSearch.
Figure 45: Stop-MailboxSearch Syntax
Parameters
Table 1 describes the parameters for Stop-MailboxSearch and how they are used.
Table 56: Stop-MailboxSearch Parameters
Parameter Description
Identity The Identity parameter specifies the name of the mailbox search.
Examples
The Stop-MailboxSearch cmdlet
Start-MailboxSearch
Use the Start-MailboxSearch cmdlet to start a Discovery search that's been stopped. Any
previous results returned by the same search are removed when starting it again.
Syntax
Figure 1 shows the syntax for Start-MailboxSearch.
Figure 46: Start-MailboxSearch Syntax
Parameters
Table 1 describes the parameters for Start-MailboxSearch and how they are used.
Table 57: Start-MailboxSearch Parameters
Paramet Description
er
Identity The Identity parameter specifies the name of the search. The name is referenced
Examples
The Start-MailboxSearch cmdlet
Lesson Review
<Review points and/or questions>
Term Definition
Dumpster 2.0 A hidden folder in the mailbox where soft-deleted items are kept to
support recovery by the IW. Items are purged from this folder after 14
days by default. The customer-facing name is Recoverable Items.
Delete Pressing the “delete” key for an item in a folder other than the Deleted
Items. This moves the item to the Deleted Items folder.
Soft delete Pressing the “delete” key for an item in Deleted Items or using the “shift-
delete” key combination for an item in any folder. This moves the item to
Dumpster 2.0.
Hard delete Clicking the “Purge” button in the “Recover Deleted Items” view in
Outlook. This permanently deletes the item from the Dumpster 2.0 folder.
Litigation Hold A new Exchange 2010 feature in which copies of modified items are kept
in Dumpster 2.0 in addition to soft deleted items. Hard-deleted items are
captured there as well. These items are kept indefinitely. This feature is
off by default.
Single item recovery Similar to legal hold, copies of modified items and hard deleted items are
kept in Dumpster 2.0. The difference is that these items are purged after
default of 14 days.
Copy on Write Whenever certain properties of an item or modified, a copy made prior to
(COW) the modification is placed in Dumpster 2.0.
Calendar logging For the purposes of calendar reliability, a copy is made of each calendar
item whenever the item is modified. This copy is stripped of the body and
attachments and placed in Dumpster 2.0. For more detail, please refer to
the linked documents below.
Non-IPM Subtree
│
└─ Recoverable Items
│
├─ Deletions
│
├─ Versions
│
└─ Purges
The Deletions folder contains all items soft-deleted by the information worker that can
be recovered using Outlook’s or OWA's “Recover Deleted Items” view.
The Versions folder contains any item modified by the IW. Items in the Versions folder
are not visible in Outlook.
The Purges folder contains any item purged using Outlook’s “Recover Deleted Items”
view. This reduces the number of items shown to make finding the right one easier by
eliminating the confusion of finding several items that appear the same in the limited
Outlook dumpster view.
Because the folders are subfolders of Recoverable Items, Search (Content Indexing) and
MRM are able to generate a single view for all dumpster items.
Some additional behavioral notes:
All items in dumpster 2.0 are indexed and searchable using the Discovery feature.
All items in dumpster 2.0 are moved with the mailbox when the mailbox is moved to
another Exchange 2010 mailbox database.
The dumpster 2.0 folder is given a quota. This prevents cases potential DOS attacks by
placing large amounts of data in the dumpster, a risk in dumpster 1.0.
To allow administrators to determine the size of the dumpster, the Get-MailboxStatistics
cmdlet returns the size of dumpster 2.0.
Dumpster 2.0 is included as part of each Exchange 2010 mailbox, including archive
mailboxes.
The single item recovery feature is enabled by default for all Exchange 2010 mailboxes. It
is possible to turn this feature off for organizations that are satisfied with their backup
solutions and do not want to use additional disk space to capture modified items. Also,
there may be situations where malfunctioning clients repeatedly change items needlessly,
filling the dumpster with modified copies. Disabling the feature as a mitigation step
during troubleshooting stops the mailbox from being filled while the client issue is
resolved.
Turning off single item recovery has two effects:
Copies of modified items are no longer placed in the dumpster.
Items can be manually purged (hard-deleted) from the dumpster for cleanup
purposes. This can be done using Outlook or OWA, or by using the “search and
destroy” functionality included in the Discovery feature.
Dumpster Cleanup
The dumpster has a quota to protect against DOS attacks. This quota is large enough to
prevent most IWs from ever hitting it, though it is possible in certain situations it could
happen. In that case, we will automatically purge the oldest items to get below the quota
and avoid the need for IT involvement. Because of this, we cannot guarantee that 100%
of items deleted or modified within the last 14 days will be preserved. Since this should
occur rarely and the dumpster quota can be changed or removed, this is acceptable.
The IW will experience the following scenarios:
1. An IW deletes an item from the “Deleted Items” folder or shift-deletes from any
folder (soft delete): the item is moved to dumpster, where it can be recovered in the
Outlook “Recover Deleted Items” view.
2. An IW purges from the “Recover Deleted Items” view in Outlook (hard delete): the
operation fails and returns an error to the client.
3. There is a hard delete operation via MAPI/EWS for any folder: the item is moved to
dumpster unless it is already there. In that case, the operation returns an error to the
client.
4. An IW modifies an item: a copy of the original item placed in the Versions folder. The
IW does not see these items in the Outlook “Recover Deleted Items” view so they are not
aware of this. This reduces the number of items that the IW sees to only those that were
deleted, making the items he/she wants to recover more discoverable. It also eliminates
the confusion of finding several items that appear the same in the limited dumpster
view and not knowing which one to recover. If there is a rare case where the IW needs
to recover a version of an item, it can be recovered by an IT Pro using the discovery
feature.
Common Parameters
There are parameters that are common to most of the cmdlets described in this lesson.
For efficiency sake, these parameters are described in, and apply to wherever they are
used in the syntax list for each cmdlet.
Table 60: Common Parameters
Lesson Review
<Review points and/or questions>
Scenario
You are assisting a customer who is having issues with…
Scenario
You have completed recovering files from a back up and now need to restore the files.
Tasks
<Define starting conditions, including virtual machines and lab files required>.
1. <Task>.
a. <Step>.
b. <Step>.
Setting | Parameter Value
Item 1
Item 2
2. <Task>.
Sample solution
Your result should look something like the Sample in <Lab Title>, <Exercise Title> in the
Lab Manual that accompanies this course.
For step by step instructions, see <Lab Title>, <Exercise Title> in the Lab Manual that
accompanies this course.
Review
1. <Question>
Answer
2. <Question>
Answer
Scenario
You have received email from your manager requesting a maintenance action.
Tasks
1. Read this Email from your manager explaining the situation.
2. Review these supporting documents:
a. Company organization chart.
b. Company ____ data.
c. Report on problems with the ____ system.
3. Open the VM containing the company system and resolve the issues.
Sample solution
Your result should look something like the Sample in <Lab Title>, <Exercise Title> in the
Lab Manual that accompanies this course.
For step by step instructions, see <Lab Title>, <Exercise Title> in the Lab Manual that
accompanies this course.
Review
1. <Question>
Answer
2. <Question>
Answer
Scenario
You are assisting a customer that is having issues <add scenario here>.
Tasks
<Define starting conditions, including virtual machines and lab files required>.
1. <Task>.
a. <Step>.
i. <Sub-step>.
ii. <Sub-step>.
b. <Step>.
2. <Task>.
Setting | Parameter Value
Item 1
Item 2
3. <Task>.
a. <Step>.
b. Edit the registry as shown below:
Key Name:
HKEY_CURRENT_USER\Software\Microsoft\PCHealth\ErrorReporting\DW
Value:
Name: DWAllQueuesHeadless
Type: REG_DWORD
Data: 0x1
c. <Step>.
Review
1. <Question>
Answer
2. <Question>
Answer
Additional Resources
<Title>
Presenter | Author: <Names>
Recorded: <Conference, Month, Year>
<Abstract>
Link to Source doc on Web
Link to copy in local \Additional_Resources folder
Module Review
<Review points and/or questions>
Module Assessment
Now that you have completed all the course elements in this module, you are ready for
the assessment.
Appendix
Slide 1
This lesson explains | introduces | provides a detailed …
Note:
The managed folder assistant will resume where it left off
the next time it runs.
9019 Warning LogPeriodi Service <service>. Unable to save progress for <service> on
c database <database>. (The assistant was unable to save
where it stopped so that it could resume there when it
restarts.) The following exception caused the failure:
<exception>
9020 Warning LogAlways Service <service>. <assistant name> failed to start for
database <database>. The following exception caused the
failure: <exception>
9021 Informatio LogAlways Service <service>. <service> for database <database> is
n processing an on-demand request. There are <number>
mailboxes to process.
9022 Informatio LogAlways Service <service>. <service> for database <database> has
n finished an on-demand request. <number> out of <number>
mailboxes were successfully processed. <number>
mailboxes were skipped due to errors.
9023 Warning LogAlways Service <service>. <service> failed to start time window
processing on database <database>. The following
exception caused the failure: <exception>
9025 Informatio LogAlways Service <service>. <service> skipped <number> mailboxes on
Subtopic H3
<Text for the subtopic>.
Subtopic H4
<Text for the subtopic>.
Subtopic H5
<Text for the subtopic>.
Subtopic H6
<Text for the subtopic>.
The optional criteria, described in greater detail following, use the following syntax:
<scope name>:<value>
<file kind>:<value>
<property name>:<value>
Suppose a user wants to search for a document containing the phase "last quarter,"
created by John or Joanne, and that the user saved to the folder mydocuments. The query
may look like this:
"last quarter" author:(john OR joanne) foldername:mydocuments
If you have a protocol handler in place to crawl custom stores, like Lotus Notes, you can
use the name of the store or protocol handler for the store. For example, if you
implemented a protocol handler to include a Lotus Notes data store as "notes," the query
syntax would be store:notes.
Boolean Operators
Search keywords and file properties can be combined to broaden or narrow a search with
operators. The following table explains common operators used in a search query.
Table 63: Boolean Operators
Boolean Properties
Some file types let users search for files using Boolean properties, as described in the
following table.
Table 64: Boolean Properties
Dates
In addition to searching on specific dates and date ranges using the operators described
earlier, AQS allows relative date values (like today, tomorrow, or next week) and day
(like Tuesday or Monday..Wednesday) and month (February) values.
Table 65: Dates
where <property> is a property listed below and <value> is the user-specified search
term.
Table 66: File Kind Everything
Attachment
These are properties common to attachments. To limit the search to attachments only,
the syntax is:
kind:attachment <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 67: File Kind Attachment
Contacts
These are properties common to contacts. To limit the search to contacts only, the syntax
is:
kind:contacts <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 68: File Kind Contact
Phone numbers are indexed as entered. For example, if a user did not include a
Note: country or area code when entering the phone number, users will not be able
to locate a contact if searching with country or area code in the phone number.
Communications
These are properties common to communications. To limit the search to communications
only, the syntax is:
kind:communications <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 69: File Kind Communications
Calendar
These are properties common to calendars. To limit the search to calendars only, the
syntax is:
kind:calendar <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 70: File Kind Calendar
Documents
These are properties common to documents. To limit the search to documents only, the
syntax is:
kind:documents <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 71: File Kind Documents
Presentation
These are properties common to presentations. To limit the search to presentations only,
the syntax is:
where <property> is a property listed below and <value> is the user-specified search
term.
Table 72: File Kind Presentation
Music
These are properties common to music files. To limit the search to music only, the syntax
is:
kind:music <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 73: File Kind Music
Picture
These are properties common to pictures. To limit the search to pictures only, the syntax
is:
kind:picture <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 74: File Kind Picture
Video
These are properties common to videos. To limit the search to videos only, the syntax is:
kind:video <property>:<value>
where <property> is a property listed below and <value> is the user-specified search
term.
Table 75: File Kind Video