Consider the following scenario:
            - You implement journaling in a Microsoft Exchange Server 2010 environment.
 - You create a journal rule to enable journaling for the email messages that are sent to a journal recipient. The rule sends journal reports to an external contact.
 - You enable journal report decryption so that an Information Rights Management (IRM)-protected message and a decrypted copy of the IRM-protected message are attached to the journal report.
 - An IRM-protected message is sent to the journal recipient. The journal report is created and sent to the external contact.