Consider the following scenario:
- You implement journaling in a Microsoft Exchange Server 2010 environment.
- You create a journal rule to enable journaling for the email messages that are sent to a journal recipient. The rule sends journal reports to an external contact.
- You enable journal report decryption so that an Information Rights Management (IRM)-protected message and a decrypted copy of the IRM-protected message are attached to the journal report.
- An IRM-protected message is sent to the journal recipient. The journal report is created and sent to the external contact.