Configuring a Mail Server for Email Archive
You will need to configure your mail server to work with email archive. Follow the instructions for your specific mail server.
Configuring Office 365 to Route Emails
Configure Office 365 to route messages to a specific mailbox. You can route incoming or outgoing emails with transport rules.
Routing Emails to the Laserfiche Email Archive Service
For more information about creating rules in Office 365 see Microsoft’s online help.
- Sign in to the Office 365 Home Page.
- Click the Admin app using the app launcher icon in the top left.
- From the left menu, expand Admin centers.
- Select Exchange.
- From the left menu, click mail flow.
- Select rules, and click the plus button +.
- Select Create a new rule...
- In the new rule dialog box, configure the following:
- Under Name, provide a descriptive name for the rule.
- Under Apply this rule if..., specify when to archive emails to Laserfiche.
- Under Do the following..., select Bcc the message to... and enter the email address associated with the mailbox Email Archive is monitoring.
- Click Save.
Configuring Microsoft Azure for Email Archive
The following steps provide guidelines for granting Email Archive access to Microsoft 365 mailboxes.
- Registering an application in Microsoft Azure
- Configuring role based access control for the application in Exchange Online
- Configuring the Email Archive profile
1) Registering an application in Microsoft Azure
- Go to https://portal.azure.com/#home.
- Navigate to App registrations (you may want to search for it), and then select New registration.
- Provide an application name.
- Under Supported account types, choose who can use the application. Microsoft recommends that organizations select the Accounts in this organizational directory only option for most applications.
- Select Register to complete the app registration. Azure AD will assign a unique application (client) ID to your app, and then take you to your application's Overview page. Record the Application (client) ID and Directory (tenant) IDfor use in the Email Archive profile configuration process.
- Select Certificates & secrets > Client secrets > New client secret.
- Provide a description and an expiration time period, and click Add.
- On the App registrations page, click the app you just created, and then select Authentication.
- Click Add a platform, and select Mobile and desktop applications.
- Select https://login.microsoftonline.com/common/oauth2/nativeclient and https://login.live.com/oauth20_desktop.srf (LiveSDK). Then, click Configure.
- Navigate to Enterprise applications (you may want to search for it). Record the Application ID and Object ID. It will be used when configuring Role Based Access Control for Applications in Exchange Online.
Important: Keep a record of your client secret value because it will be hidden next time you view it.
2) Configuring Role Based Access Control for Applications in Exchange Online
Grant permissions to an application that needs to access data in Exchange Online. Use a resource scope to specify which mailboxes an app can access. Microsoft documents two options for defining a resource scope, using either management scopes or administrative units. You can create management scopes through an Exchange PowerShell cmdlet. You can create administrative units with the Microsoft Entra admin center user interface.
The general process for how to create Application RBAC assignments:
- Create a new resource scope. Choose between Administrative Units or Management Scopes.
- Create a pointer to a Microsoft Entra service principal
- Take note of the appropriate application role for the service principal. Email Archive requires the Mail.Read and Mail.ReadWrite roles.
- Create a new role assignment where the Mail.Read and Mail.ReadWrite roles are assigned to the resource scope.
- Test the new service principal
Option 1: Creating a role assignment using administrative units
- Follow the steps outlined in Create an administrative unit to create a new administrative unit.
- Follow the steps outlined in Add users, groups, or devices to an administrative unit to add users/mailboxes to the administrative unit. These are the mailboxes that you want Email Archive to access.
- Record the Object ID of the administrative unit. It will be used in Create a New Role assignment section.
- Connect to the Exchange Online PowerShell module. The following sample PowerShell commands demonstrate the process.
Install-Module -Name ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement
Connect-ExchangeOnline -Organization <TENANT_ID>
- Create a pointer to a Microsoft Entra service principal. The following sample PowerShell command demonstrates the process. Replace <APPLICATION_ID> and <Object_ID> with the Application ID and the Object ID values recorded in step 11 when registering an application in Azure.
New-ServicePrincipal -AppId <APPLICATION_ID> -ObjectId <OBJECT_ID> -DisplayName <name>
- Create a new role assignment that grants the Mail.Read and Mail.ReadWrite permissions to the administrative unit. The following sample PowerShell commands demonstrate the process. Replace <APPLICATION_ID> with the Application ID of the registered Azure application and <ADMIN_UNIT_OBJECTID> with the Object ID recorded when creating the administrative unit.
New-ManagementRoleAssignment -Name <name> -Role "Application Mail.Read" -App <APPLICATION_ID> -RecipientAdministrativeUnitScope <ADMIN_UNIT_OBJECTID>
New-ManagementRoleAssignment -Name <name> -Role "Application Mail.ReadWrite" -App <APPLICATION_ID> -RecipientAdministrativeUnitScope <ADMIN_UNIT_OBJECTID>
- Optional: Testing the new role assignment for the service principal. The following sample PowerShell command demonstrates using the Test-ServicePrincipalAuthorization cmdlet. Replace <APPLICATION_ID> with the Application ID of the registered Azure application and <MAILBOXADDRESS> with the email address you want Email Archive to access.
Test-ServicePrincipalAuthorization -Identity <APPLICATION_ID> -Resource <MailBoxAddress>
Option 2: Creating a role assignment using management scopes
Use the New-ManagementScope cmdlet to create a management scope.
- Connect to the Exchange Online PowerShell module. The following sample PowerShell commands demonstrate the process.
Install-Module -Name ExchangeOnlineManagement
Import-Module ExchangeOnlineManagement
Connect-ExchangeOnline -Organization <TENANT_ID>
- Run the following command in Windows PowerShell to create a management scope. Replace <MANAGEMENT_SCOPE_NAME> with a name for the management scope. This name will then be used in a following step when creating a role assignment. Replace <USER_PRINCIPAL_NAME> with the email address you want Email Archive to access. See Microsoft's documentation for additional details on the RecipientFilter paramater.
New-ManagementScope -Name "<MANAGEMENT_SCOPE_NAME>" -RecipientRestrictionFilter "UserPrincipalName -eq '<USER_PRINCIPAL_NAME>'"
- Create a pointer to a Microsoft Entra service principal. The following sample PowerShell command demonstrates the process. Replace <APPLICATION_ID> and <Object_ID> with the Application ID and the Object ID values recorded in step 11 when registering an application in Azure.
New-ServicePrincipal -AppId <APPLICATION_ID> -ObjectId <OBJECT_ID> -DisplayName <name>
- Create a new role assignment that grants the Mail.Read and Mail.ReadWrite permissions to the management scope. The following sample PowerShell commands demonstrate the process. Replace <APPLICATION_ID> with the Application ID of the registered Azure application and <Management Scope> with the name of the management scope.
New-ManagementRoleAssignment -Name <name> -Role "Application Mail.Read" -App <APPLICATION_ID> -CustomResourceScope <Management Scope>
New-ManagementRoleAssignment -Name <name> -Role "Application Mail.ReadWrite" -App <APPLICATION_ID> -CustomResourceScope <Management Scope>
- Optional: Testing the new role assignment for the service principal. The following sample PowerShell command demonstrates using the Test-ServicePrincipalAuthorization cmdlet. Replace <APPLICATION_ID> with the Application ID of the registered Azure application and <MAILBOXADDRESS> with the email address you want Email Archive to access.
Test-ServicePrincipalAuthorization -Identity <APPLICATION_ID> -Resource <MailBoxAddress>
For more information, see Microsoft's documentation on Role Based Access Control for Applications in Exchange Online.
3) Configuring an Email Archive Profile
When configuring an Email Archive profile, for the Microsoft 365 server type, type in the Application (client) ID, client secret, and Tenant ID recorded during the Azure application registration.
For more information on creating an Email Archive profile, see the profile configuration documentation.
Configuring Exchange Server 2016 or 2019 to Route Emails
Configure Exchange Server 2016 or 2019 to route messages to a specific mailbox. You can route incoming or outgoing emails with transport rules.
Creating a Transport Rule
- Open the Exchange Management Console.
- Navigate to Mail flow -> Rules.
- Click the Add button, and select Create a new rule.
- Provide a descriptive name for the rule.
- Under Apply this rule if, configure the condition that must be met to route an email to the mailbox Email Archive is monitoring.
- Under Do the following, select Bcc message to, and select the email address associated with the mailbox Email Archive is monitoring. Click OK.
- Click Save.
Configuring Exchange Server 2010 to Route Emails
Configure Exchange Server 2010 to route messages to a specific mailbox. You can route incoming or outgoing emails with transport rules.
Creating a Transport Rule
- Click the Transport Rules tab in the middle Hub Transport pane.
- Select New Transport Rule in the right pane.
- On the Introduction page, provide a descriptive name for the rule and add any comments needed. Click Next.
- On the Condition page, configure conditions. Only email matching these conditions will be routed to Laserfiche.
- On the Actions page, select Blind carbon copy (Bcc) the message to addresses. Then click the addresses hyperlink.
- In the Specify recipients dialog box, click the arrow next to Add, and select External E-mail Address.
- Specify the email address associated with the mailbox Email Archive is monitoring. Click OK. Then click OK again and Next.
- On the Exception page, define any exceptions for when you don’t want the rule to run, and click Next.
- On the Create Rule page, review the configuration summary, and click New.
- On the Completion page, click Finish.