Managing Mobile Email Access

Managing Mobile Email Access

Email Management Capabilities by Mail Server

 1-matrix.png

 

Enforcing Email Access Control

Mobile Email Access Control can be used in many ways by restricting mail from:

  • Inactive or Unmanaged Devices: Providing security and management for IT Administrators
  • Compromises or Non-encrypted Devices: Ensuring data protection of sensitive mail
  • Devices by Make/Model/OS: Preventing non-approved device types or OS versions
  • Specific Folder Sync: Controlling when calendar, contacts, tasks, and more are deployed

Best Practice: Email Access Control can also be used to drive BYOD adoption by preventing users from obtaining mail without program enrollment.

 

Enabling Email Compliance Policies

  • Navigate to Email > Compliance Policies
  • Select Email Policies
  • Edit any of the email policies
  • Create your compliance rule and Save
  • The policy is now active. You can deactivate it by selecting the icon to the left.

Note: Email Compliance requires that you have enabled one of AirWatch’s Mobile Email Management integration models

Email_Compliance_Policies.png 

 

Attachment Protection

  • Encrypt attachments using AES 256-bit encryption
  • Block email attachments based on file type
  • Open email attachments in Secure Content Locker
  • Prevent copy/paste of data from attachments to 3rd party apps
  • Wipe attachment content from compromised devices

Attachment_Protection.png 

  

Gaining Visibility into Mobile Email

Monitor all mobile email traffic from the Email Dashboard:

  • Total Allowed/Blocked Devices
  • Discovered Unmanaged Devices
  • Top Policy Violations
  • Whitelisted/Blacklisted Devices
  • Time Last Seen

Note: The Email Dashboard requires that you have enabled one of AirWatch’s Mobile Email Management integration models

Have more questions? Submit a request

0 Comments

Article is closed for comments.