Configure access control to provide secure access to your email infrastructure.

Email Compliance Policies

Once email has been deployed, you can further protect your mobile email by adding access control. The access control feature allows only secure and compliant devices to access your mail infrastructure. The access control is enforced with the help of email compliance policies.

Email compliance policies enhance security by restricting email access to non-compliant, unencrypted, inactive, or unmanaged devices. These policies allow you to provide email access to only the required and approved devices. Email policies also restrict email access based on the device model and the operating systems.

These policies are categorized as General Email Policies, Managed Device Policies, and Email Security Policies. The different policies that fall under each category and the deployments to which they are applicable are listed in the table.

The following table lists the supported email compliance policies.

Table 1. Supported Email Compliance Policies
  SEG(Exchange, IBM Traveler, G Suite) PowerShell (Exchange)
General Email Policies
Sync Settings Y N
Managed Device Y Y
Mail Client Y Y
User Y Y
EAS Device Type Y Y
Managed Device Policies
Inactivity Y Y
Device Compromised Y Y
Encryption Y Y
Model Y Y
Operating System Y Y
Require ActiveSync Profile Y Y
Email Security Policies
Email Security Classification Y N
Attachments (managed devices) Y N
Attachments (unmanaged devices) Y N
Hyperlink Y N