Enterprise Vault™ Setting up Exchange Server and Office 365 for SMTP Archiving
- Configuring Exchange Server for an Enterprise Vault SMTP Archiving solution
- About using Enterprise Vault SMTP Archiving for Exchange Server journaling
- Summary of steps
- Creating a remote domain using the Exchange Management shell
- Creating a recipient mail contact in the remote domain
- Creating a Send Connector for the remote domain
- Setting up Exchange Server journaling
- Points to note when setting up Enterprise Vault SMTP Archiving servers
- Configuring Office 365 for Enterprise Vault SMTP Archiving
- Configuring the Azure RMS Decryption feature for Office 365 email encryption support
- About configuring the Azure RMS Decryption feature for Office 365 email encryption support
- Summary of steps
- Configuring IRM settings for journal report decryption in your organization
- Getting the Rights Management configuration details of your Azure tenant
- Creating a new service principal that represents your tenant to external applications
- Adding the service principal to the list of superusers for your organization
- Installing Microsoft Right Management Services Client 2.1
- Configuring the decryption of RMS-protected messages in Enterprise Vault
- Configuring decryption of MPIP-protected Office 365 emails archived in Enterprise Vault
- About configuring the MPIP decryption feature in Enterprise Vault
- Summary of steps
- Disable decryption of journal report in your organization
- Register an application with the Azure Active Directory
- Assign the required permissions to an application
- Upload certificates
- Configure decryption of MPIP-protected emails in Enterprise Vault
Configure decryption of MPIP-protected emails in Enterprise Vault
Perform the following steps to configure decryption of Microsoft Purview Information Protection (MPIP) protected emails in Enterprise Vault:
On the left navigation pane of the Administration Console, expand the hierarchy until the name of the site is visible.
Right-click on the name of the site, and click .
The site properties are displayed.
Click on the tab.
Click on .
Enter the and on the UI.
The and details were retrieved during Register an application with the Azure Active Directory.
Choose an appropriate authentication method in .
Common certificate installed on all the Enterprise Vault storage servers
Choose this option, in case you have to use a single certificate for authentication then install that certificate in of all the Enterprise Vault storage servers.
Common PFX certificate file for all the Enterprise Vault storage servers
Choose this option, in case you have to upload a PFX file to Enterprise Vault and use those details for authentication. Enterprise Vault stores PFX file contents in the database and the password to open the PFX file is stored in an encrypted format.
Specific certificate installed on each Enterprise Vault storage server
Choose this option, in case you have to use a separate certificate for authentication on Enterprise Vault storage. Each storage server should have that certificate installed in .
Note:
In any of above option the public key of X509 certificate must be uploaded to the Azure AD as mentioned in Upload certificates.
Authentication with Azure AD using Common certificate installed on all Enterprise Vault storage servers.
Upload the public key of the X509 certificate to Azure AD as mentioned in Upload certificates.
Obtain the Thumbprint of X509 certificate as mentioned in step 3 in Upload certificates.
Enter the above Thumbprint in the field on above UI.
You must install that certificate in on all Enterprise Vault storage servers.
Authentication with Azure AD using Common PFX certificate file for all Enterprise Vault storage servers.
Upload the public key of X509 certificate to Azure AD as mentioned in Upload certificates.
• Upload the PFX file (X509 certificate having both public and private keys) in the field in the above UI.
Enter the password to open the certificate PFX file in the field in the above UI.
Authentication with Azure AD using a Specific certificate installed on each Enterprise Vault storage server.
Upload the public key of X509 certificate of each Enterprise Vault storage server to Azure AD as mentioned in Upload certificates.
Obtain the Thumbprint of X509 certificate of all storage server specific certificates as mentioned in step 3 in Upload certificates.
• Enter the thumbprint of the certificate corresponding to that Enterprise Vault storage server in the Certificate Thumbprint field in the above UI.
You must have a certificate installed in on that Enterprise Vault storage server.
Once you enter all the required details, click to validate configuration details. This ensures that all Enterprise Vault storage servers can authenticate with Azure AD and will be able to decrypt MPIP-protected emails during archiving.
In case there are any errors, please see event logs of particular storage server and resolve those errors.
On validation, the UI notifies you whether the MPIP configuration test has been successful or not.
Click .
Click to close the site properties and save the details in Enterprise Vault.
On the left pane of the Administration Console, expand the hierarchy until is visible. Expand and click .
On the right-hand pane, double-click the name of the policy that is used for SMTP archiving. The policy's properties are displayed.
Click the tab.
Set to .
Set .
Restart the SMTP archiving task and the associated Storage service to apply the changes. If that is not known better to restart all SMTP archiving tasks and Storage service on all Enterprise Vault storage servers on the site.