Email Compliance Policies
Once email has been deployed, you can further protect your mobile email by adding access control. The access control feature allows only secure and compliant devices to access your mail infrastructure. The access control is enforced with the help of email compliance policies.
Email compliance policies enhance security by restricting email access to non-compliant, unencrypted, inactive, or unmanaged devices. These policies allow you to provide email access to only the required and approved devices. Email policies also restrict email access based on the device model and the operating systems.
These policies are categorized as General Email Policies, Managed Device Policies, and Email Security Policies. The different policies that fall under each category and the deployments to which they are applicable are listed in the table.
- Applicable - Not Applicable
|Direct Integration using password management||SEG proxy using password management||Direct Integration using Directory API|
|General Email Policies||Without SEG and without Password purge||Without SEG and with Password Purge|
|EAS Device Type|
|Managed Device Policies|
|Require ActiveSync Profile|
|Email Security Policies|
|Email Security Classification|
|Attachments (managed devices)|
|Attachments (unmanaged devices)|