First published on CloudBlogs on Mar 04, 2016
- Device level encryption.
- Passwords characteristics such as complexity, reuse, length and finger print use – of note is that we recently introduced the ability to allow Smart Lock on Android.
- Screen captures and logging.
- Cloud backups.
- For web-browsers, pop-up blockers are allowed.
- Whether or not app stores are allowed and, if so, if a password is required to access them.
- Whether or not games or entertainment apps are allowed on the device.
- Permissions for specific hardware features like WiFi, Bluetooth, and WiFi tethering.
- If cellular functions like roaming of data and voice are allowed.
- If specified apps are allowed or not.
- There are also device-specific settings, like specifying an app to run on a device in “kiosk” mode.
Additional Resources
- More from Brad : Endpoint Zone: Office 365 Mobile Device Management
-
Watch a how-to
:
How to Configure Conditional Access to Exchange Online
- Launch the corresponding virtual lab: Conditional Access to Exchange Online
- Explore the TechNet Library: Manage e-mail access with Microsoft Intune
- Get hands-on : Enterprise Mobility Suite trial
- Download analyst insights : IDC Technology Spotlight: Securing Productivity in the Borderless Enterprise
Published Sep 08, 2018
Version 1.0Brad Anderson
Iron Contributor
Joined September 06, 2018
Security, Compliance, and Identity Blog
Follow this blog board to get notified when there's new activity