Email Compliance Policies

Once email has been deployed, you can further protect your mobile email by adding access control. The access control feature allows only secure and compliant devices to access your mail infrastructure. The access control is enforced with the help of email compliance policies.

Email compliance policies enhance security by restricting email access to non-compliant, unencrypted, inactive, or unmanaged devices. These policies allow you to provide email access to only the required and approved devices. Email policies also restrict email access based on the device model and the operating systems.

These policies are categorized as General Email Policies, Managed Device Policies, and Email Security Policies. The different policies that fall under each category and the deployments to which they are applicable are listed in the table.

Tick- Applicable NotAW - Not Applicable

  SEG PowerShell Gmail
  Direct Integration using password management SEG proxy using password management Direct Integration using Directory API
General Email Policies   Without SEG and without Password purge Without SEG and with Password Purge  
Sync Settings Tick NotAW NotAW NotAW Tick NotAW
Managed Device Tick Tick NotAW NotAW Tick Tick
Mail Client Tick Tick NotAW NotAW Tick NotAW
User Tick Tick NotAW NotAW Tick NotAW
EAS Device Type Tick Tick NotAW NotAW Tick NotAW
Managed Device Policies
Inactivity Tick Tick Tick NotAW Tick Tick
Device Compromised Tick Tick Tick NotAW Tick Tick
Encryption Tick Tick Tick NotAW Tick Tick
Model Tick Tick Tick NotAW Tick Tick
Operating System Tick Tick Tick NotAW Tick Tick
Require ActiveSync Profile Tick Tick Tick Tick Tick Tick
Email Security Policies
Email Security Classification Tick NotAW NotAW NotAW Tick NotAW
Attachments (managed devices) Tick NotAW NotAW NotAW Tick NotAW
Attachments (unmanaged devices) Tick NotAW NotAW NotAW Tick NotAW
Hyperlink Tick NotAW NotAW NotAW Tick NotAW