Pavel Losevsky - Fotolia
In some cases, the Microsoft Office 365 Clutter feature could have data retention implications. It depends on an organization's data retention requirements.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
As the name implies, Office 365 Clutter is designed to reduce inbox clutter. Users receive a variety of mail: Some of it is important -- a message from your boss -- while some is spam, which can be safely deleted. However, there are messages that fall somewhere in between. This is clutter.
An example of clutter might be a newsletter a user subscribes to or a group email blast about an upcoming company picnic. Microsoft Office 365 tries to place these types of messages into the Clutter folder so that only the most important ones appear in a user's inbox.
However, the Office 365 Clutter feature is not perfect. As with any spam-like filter, messages are occasionally categorized as clutter when they shouldn't be. These messages are then subjected to the retention requirements of a user's Clutter folder rather than the inbox.
You can overcome this problem by taking advantage of retention policies and retention tags. A retention policy is an Exchange Server container that stores a collection of retention tags. A retention tag is essentially a retention requirement, such as two years. Retention policies are applied to user mailboxes, and the tags within those retention policies can be applied to individual folders. Applying the appropriate retention tag to the Clutter folder can help solve the Office 365 Clutter retention issue.
The pros and cons of Office 365 security features
Collaboration key to overcoming new Microsoft Office 365 policies
Some users skeptical about Office Clutter feature
Dig Deeper on Data backup security
Related Q&A from Brien Posey
When companies choose a private cloud storage provider, it's important that they understand what the internal IT department is responsible for, as ...continue reading
It might be effective, but Windows Firewall is not the be-all and end-all of security. In some cases, third-party firewalls add the extra layer of ...continue reading
Don't overlook the advantages of private cloud when choosing a cloud storage implementation. Security, cost and ease of transition make it a viable ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.