Configure access control to provide secure access to your email infrastructure.
Email Compliance Policies
Once email has been deployed, you can further protect your mobile email by adding access control. The access control feature allows only secure and compliant devices to access your mail infrastructure. The access control is enforced with the help of email compliance policies.
Email compliance policies enhance security by restricting email access to non-compliant, unencrypted, inactive, or unmanaged devices. These policies allow you to provide email access to only the required and approved devices. Email policies also restrict email access based on the device model and the operating systems.
These policies are categorized as General Email Policies, Managed Device Policies, and Email Security Policies. The different policies that fall under each category and the deployments to which they are applicable are listed in the table.
The following table lists the supported email compliance policies.
|SEG(Exchange, IBM Traveler, G Suite)||PowerShell (Exchange)|
|General Email Policies|
|EAS Device Type||Y||Y|
|Managed Device Policies|
|Require ActiveSync Profile||Y||Y|
|Email Security Policies|
|Email Security Classification||Y||N|
|Attachments (managed devices)||Y||N|
|Attachments (unmanaged devices)||Y||N|