After last week’s really great “discussion” about Apple, I have decided to turn back to a more technical topic for tonight’s post. Email signatures… we all know that people try their hardest to make their personal signature as creative and zingy as possible. Don’t believe me, just look at some examples on this posting: http://www.sitepoint.com/blogs/2009/09/18/personalities-of-poor-email-signatures/
Unfortunately, in a corporate environment the powers that be tend to like standardization in how their employees represent the “brand”. After all, a good email signature can help a business be perceived as more professional and can also double as free advertising. Therefore, do not be surprised if someone from above comes to you, the person in the trenches, and asks if you can force everyone in the organization to have the same standardized signature. However, have no fear, like disclaimers the ability to force a standardized signature via a transport rule was first introduced in Exchange Server 2007 and made easier in Exchange Server 2010.
The first step to enforcing a signature is to design the layout for how the signature should look. After all, isn’t the whole point of this exercise to make something that looks nice? Luckily, if you want, you can use HTML to define the signature layout. Furthermore, you can also use information from Active Directory attributes to make up the signature information. Therefore, provided that you took the time to standardize your Active Directory user data, you can make the signatures dynamic and relevant to each user’s current location, name, phone number, etc. For example:
<div style="font-size:9pt; font-family: ''Calibri'',sans-serif;">
%%city%%, %%state%% %%zipcode%%</br>
<div><img alt="companyabc.com" src="http://companyabc.com/logo.png"></div>
Seems pretty simple… my only suggestion from a design perspective would be as follows:
Lastly, there really isn’t any reason to include virus scanning status information.
Once you have the signature designed, the next step is to create the transport rule that will apply the “enforced” signature. To do this, use the New-TransportRule cmdlet. For example:
New-TransportRule -Name 'StandardSignature' -Enabled $true -Comments 'Standard Corporate Signature' -FromMemberOf 'Email Users' -ApplyHtmlDisclaimerLocation 'Append' -ApplyHtmlDisclaimerText '<div style="font-size:9pt; font-family: ''Calibri'',sans-serif;">========================================================</br>%%displayname%%</br>%%title%%</br>%%company%%</br>%%street%%</br>%%city%%, %%state%% %%zipcode%%</br><div><img alt="companyabc.com" src="http://companyabc.com/logo.png"></div>========================================================</div>' -ApplyHtmlDisclaimerFallbackAction Wrap -Priority '0'
Once executed, a new transport rule is created that appends an HTML based “disclaimer/signature” to all emails that are sent from users in the “Email Users” group (a group supposedly populated with living email users vs. mail enabled service accounts). However, I could have also used the FromScope parameter defined as InOrganization. This would have applied the “disclaimer/signature” to all emails coming from mail enabled accounts within the organization. But, for this example, I choose to limit the scope.
In addition, you will notice that I’m using variables such as %%company%% or %%zipcode%%. These are actually called transport rule predicates. The predicates that are being used refer to attributes in Active Directory. For a list of supported predicates please use the following URL: http://technet.microsoft.com/en-us/library/dd638183.aspx#PropertyTypes
Well… that’s it, hopefully you find this helpful.
If you like this, check out some other posts from Tyson:
Or if you want, you can also check out some of Tyson's latest publications:
With more than ten years of experience in IT, Tyson Kopczynski has become a specialist in Active Directory, Information Assurance, Windows automation, PKI, and IT security practices. Tyson is also the founding author of the Windows PowerShell Unleashed series and has been a contributing author for such books as Microsoft Internet Security and Acceleration (ISA) Server 2006 Unleashed and Microsoft Windows Server 2008 R2 Unleashed. He has also written many detailed technical papers and guides covering various technologies. As a consultant at Convergent Computing, Tyson works with and provides feedback for next generation Microsoft technologies since their inception and has also played a key role in expanding the automation and security practices at CCO. Tyson also holds such certifications as the Certified Information Systems Security Professional (CISSP), the SANS Security Essentials Certification (GSEC) and SANS Certified Incident Handler (GCIH), and the MCTS (Application Platform, Active Directory, and Network Infrastructure).