ENTERPRISE

Designing and Implementing Mobility in Exchange Server 2010 : Working with ActiveSync Policies

2/23/2011 9:04:40 AM
ActiveSync in Exchange Server 2010 allows for an unprecedented level of control over the security and management of devices. It allows an administrator to create ActiveSync mailbox policies that force devices to comply with specific restrictions, such as requiring a complex password, or requiring file encryption.

In addition, Exchange Server 2010 ActiveSync now allows an administrator to create multiple policies in an organization. This enables specific types of users to have more restrictive policies placed on their handheld devices, whereas other users are not as restricted. For example, a hospital could stipulate that all the devices that have confidential patient data on them be forced to be encrypted and password protected, while other users are not forced to the same standards.

Creating ActiveSync Mailbox Policies

Creating a new ActiveSync mailbox policy in Exchange Server 2010 is not a complex task. To do so, follow this procedure:

1.
From Exchange Management Console, expand Organization Configuration in the console pane, and click Client Access.

2.
In the tasks pane, click the New Exchange ActiveSync Mailbox Policy link.

3.
Enter a descriptive name for the policy, such as Manager’s ActiveSync Mailbox Policy. Set password settings, such as that shown in Figure 1, and click New.

Figure 1. Creating an ActiveSync mailbox policy.

4.
Click Finish.

Applying Mailbox Policies to Users

After a specific policy has been created, it can be added to mailboxes, either during the provisioning process or after the mailbox has already been created. For existing mailboxes, perform the following steps:

1.
From the Exchange Management Console, expand Recipient Configuration, and then click Mailbox.

2.
Right-click on the mailbox to be added, and click Properties.

3.
Select the Mailbox Features tab, click Exchange ActiveSync, and then click the Properties button.

4.
Check the Apply an Exchange ActiveSync Mailbox Policy check box, and then click the Browse button.

5.
Select the policy from the list, such as that shown in Figure 2, and then click OK.

Figure 2. Applying an ActiveSync mailbox policy to a mailbox.

6.
Click OK two more times to save the changes.

Adding multiple mailboxes to a specific mailbox policy is best done from the PowerShell console.

Wiping and Resetting ActiveSync Devices

One of the advantages to Exchange Server 2010’s ActiveSync is the optimized management capabilities available. With ActiveSync and the proper Windows Mobile devices, passwords can be reset remotely, and devices can be wiped clean of data in the event that they are lost or stolen. This concept—combined with the encryption capabilities of the Messaging Security Feature Pack—allows an organization to deploy ActiveSync without fear of data compromise.

Invoking this function is as simple as right-clicking on a mailbox user under the Mailbox area of the Recipient Configuration node and choosing Manage Mobile Device. In addition, users can remotely wipe their own devices via Outlook Web App.

Other  
  •  Designing and Implementing Mobility in Exchange Server 2010 : Securing Access to ActiveSync Using Internet Security and Acceleration (ISA) Server 2006
  •  Monitoring a SharePoint 2010 Environment : Understanding Timer Jobs for SharePoint 2010
  •  Monitoring a SharePoint 2010 Environment : Using SharePoint’s Native Reporting Capabilities
  •  Designing and Implementing Mobility in Exchange Server 2010: Securing Access to ActiveSync with Secure Sockets Layer Encryption
  •  Enabling ActiveSync in Exchange Server 2010
  •  Understanding Mobility Enhancements in Exchange Server 2010
  •  Monitoring a SharePoint 2010 Environment : Using the SharePoint Health Analyzer
  •  Using SharePoint 2010 Management PowerShell for Backup and Restore
  •  Restoring SharePoint Using SharePoint Central Administration
  •  Windows Azure : Static reference data (part 2) - Performance disadvantages of a chatty interface & Caching static data
  •  Windows Azure : Static reference data (part 1) - Representing simple static data in SQL Azure & Representing simple static data in the Table service
  •  Performing Granular Backup Using the SharePoint Central Administration
  •  Using SharePoint Central Administration for Backup and Restore
  •  Backing Up and Restoring a SharePoint Environment : Using the Recycle Bin for Recovery
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Understanding Other Non-Windows Client Access Methods
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Remote Desktop Connection Client for Mac
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Configuring and Implementing Entourage for the Mac
  •  Using Non-Windows Systems to Access Exchange Server 2010 : Mac Mail, iCal, and Address Book
  •  Parallel Programming with Microsoft .Net : Futures - Variations
  •  Parallel Programming with Microsoft .Net : Futures - Example: The Adatum Financial Dashboard
  •  
    Video
    Top 10
    Windows Server 2003 : Domain Name System - Command-Line Utilities
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 2)
    Microsoft .NET : Design Principles and Patterns - From Principles to Patterns (part 1)
    Brother MFC-J4510DW - An Innovative All-In-One A3 Printer
    Computer Planet I7 Extreme Gaming PC
    All We Need To Know About Green Computing (Part 4)
    All We Need To Know About Green Computing (Part 3)
    All We Need To Know About Green Computing (Part 2)
    All We Need To Know About Green Computing (Part 1)
    Master Black-White Copying
    Most View
    Microsoft Tries To Flatten Competition With Surface (Part 3) - Dropbox drops Public Folders, SSD Prices Way Down, AMD Adopts Arm for Armor
    SQL Server 2008 R2 : Dropping Indexes, Online Indexing Operations, Indexes on Views
    NZXT Source 210 Elite - Finest Cases For Frugal Gamers
    OLED Me Be the One
    Toshiba Tecra R850
    Windows 8's Unexpected Features (Part 1)
    Computing Yourself Fit (Part 4)
    Crucial Ballistix Tactical LP 16GB Kit
    100 Windows Speed-Up Tips (Part 1) - Clean up your hard drive & Defrag your computer
    Organize Windows With Virtual Desktops
    Developing Applications for the Cloud on the Microsoft Windows Azure Platform : DNS Names, Certificates, and SSL in the Surveys Application
    Improve Your Mac (Part 2) - Add Music To You Movies
    LG Optimus L3 E400 Review (Part 1)
    Roku 2 XS
    Get An Awesome Satnav For Free
    Windows 7 : Syncing with Network Files (part 2) - Dealing with Conflict
    KWA 150 SE – The Most Expensive Amplifier Of ModWright
    Kindle Fire - The Second Coming (Part 1)
    Essential Wedding Kit (Part 3) - Shoot-saving kit
    Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking