6 hours 59 minutes
Welcome back, Sudbury ins to the M s 3 65 Security Administration course.
I'm your starter. Gen. Daniels were all module five in mystery 65. Compliance
lesson one or kind of in a more attention,
this lesson. We're gonna go over retention and content in place.
Principal was of retention
and how new retention policies can replace older features.
If a user deletes content that is included in a retention policy,
the content is retained as a copy in a special secure location
that's not visible
to non advance
SharePoint. And one drop size is called the Preservation Hold of Ivory
E Mail. In public Voters,
you shouldn't be using public folders anymore.
if your organization is creating new public folders
that goes against the purpose of M s 3 65.
those items are kept in the exchange Recoverable Items folder.
exchange Recoverable Items folder
in a unified group.
This a conversation the Exchange Recoverable items folder if a site content
preservation hold lottery.
So these scenario that content in place allows.
This is just being very brutally honest.
If you have an employee that tries to do the whole
Hey, let's shred a bunch of documents before the feds key here.
The retention policy set up correctly
the usual thing that they got rid of him. However,
when you run the report and do the discovery,
you're not only
have access to the document
with the content
but their indie content in place items. So you know
Try to either
intentionally or unintentionally
that document or that message.
Use with that. Whatever you will.
Principles of retention
content can have multiple policies applied.
He's policy has a different action,
honey, Big bang
feigns do we have here?
gets a little predictable at times. However,
if you look at rock, paper, scissors, lizard, zbakh,
there's certain rules
right there and can assure wondering is the diagram
of what beats want in rock paper scissors was a spark.
This is much more complicated than principles of attention.
To understand how different retention policies are applied the content
you have to keep the principles of attention in mind.
Retention wins over dilation.
Suppose you have one or intention Policy has configured to delete exchange email after three years, but you have another one that retains it for five years and then devices.
Which one wins? How long does the email last?
Any content that reaches three years old will be deleted, hitting from user view
but still retained in the Recoverable Items folder until it reaches five years old.
Dennis permanently deleted
the longest retention policy wins.
Contents, subject to multiple policies
will be retained until the end off the longest period.
Explicit inclusion wins over Implicit Conclusion
What that means
for attention label with retention settings that is manually assigned user to an item like exchange email or one job document.
That retention label takes precedence
over both a policy assigned at the site
with the mailbox level.
Auto applied retention labels are considered implicit,
I'll say that again.
Auto applied retention labels are considered implicit, not explicit.
When a user manually applies a label to an item or folder that is explicit,
the shortest delish in period wins.
If content is subject to multiple policies that delete content
without a retention period,
he worked without a retention period.
The content will be delayed at the end of the shortest retention period.
So here we have at the top of bottom pretensions great and elation.
Longest retention period wins
wins over implicit conclusion
and the shortest delusion period wins.
Let's look at a mailbox that has a five year retention policy automatically apply.
We have two messages. Message. One message to
the user applies a six month retention tag to message to
The automatic policy being applied for the five year
no marks. Retention is
It's a message. One, because it wasn't explicitly tagged by the user,
has a five euro retention policy. Avoid
because explicit beats out implicit message to be retained for six months.
Kermit wants to know
according to the principles of retention and implicit inclusion overrides an explicit inclusion.
We just talked about this. What do you think?
The answer is false.
explicit of arrives. Implicit,
explicit. Think of the comes in the after bit before the I explicit first, then implicit
some of the new rescission policies because they are more universal and they cover a greater death
of actions than the old ones.
Actually make old technology useless.
Part of the part of technology in general, out with the old in with the new
in mystery C C five retention policies can apply across your entire organization.
Other data retention in question features work alongside
with those policies and labels.
It's recommended to use retention policies and labels to duly content within an S 3 65.
Some of the older features
e discovery hold
and place in litigation Hold
in more in We just don't know messaging records management.
Those are all exchanging on features
that being new retention labels and policies
within SharePoint. One. Drop you discovery. Hold
document delusion policies
in place. Records management.
You can actually accomplish everything
those three technologies did with
the new retention policies Tags label was and so on and so forth.
Here's an example of a unified retention policy
and E. M s 3 65 Compliance Center.
This is very similar to unify labeling, except it explicitly deals with retention policies
today's lesson. If a user deletes content that's included in retention, policy
content is retained as a copy in a special secured location, their non visible to not admits
invest. 3 65 Retention policies can apply across the entire organization.
Content can have multiple policies applied.
Each policy can have a different action.
That's where we look at the order of attention.
Thank you for joining me on this lesson. I did. You see, For the next one, take care.
Microsoft 365 Fundamentals [MS-900]
Microsoft 365 Fundamentals is a course designed to help both those looking for more information ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
AZ-500: Microsoft Azure Security Technologies
In this Microsoft Azure Security Technologies (AZ-500) training, students will learn the skills that are ...
9 CEU/CPE Hours Available
Certificate of Completion Offered