Pavel Losevsky - Fotolia
In some cases, the Microsoft Office 365 Clutter feature could have data retention implications. It depends on an organization's data retention requirements.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
As the name implies, Office 365 Clutter is designed to reduce inbox clutter. Users receive a variety of mail: Some of it is important -- a message from your boss -- while some is spam, which can be safely deleted. However, there are messages that fall somewhere in between. This is clutter.
An example of clutter might be a newsletter a user subscribes to or a group email blast about an upcoming company picnic. Microsoft Office 365 tries to place these types of messages into the Clutter folder so that only the most important ones appear in a user's inbox.
However, the Office 365 Clutter feature is not perfect. As with any spam-like filter, messages are occasionally categorized as clutter when they shouldn't be. These messages are then subjected to the retention requirements of a user's Clutter folder rather than the inbox.
You can overcome this problem by taking advantage of retention policies and retention tags. A retention policy is an Exchange Server container that stores a collection of retention tags. A retention tag is essentially a retention requirement, such as two years. Retention policies are applied to user mailboxes, and the tags within those retention policies can be applied to individual folders. Applying the appropriate retention tag to the Clutter folder can help solve the Office 365 Clutter retention issue.
The pros and cons of Office 365 security features
Collaboration key to overcoming new Microsoft Office 365 policies
Some users skeptical about Office Clutter feature
Dig Deeper on Data backup security
Related Q&A from Brien Posey
Edge computing is finding its place in the enterprise to handle data growth. IT may use that same advantage to help address problems in a VDI ...continue reading
A ghost image can be used to copy the contents of one server to another for backup, but the process of creating ghost images may not be as simple as ...continue reading
Backup and recovery trends, such as hybrid cloud data protection, are gaining popularity in the IT industry. Are these three major trends part of ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.