Office365 Exchange Online Restrict Access

From Michael's Information Zone
Revision as of 14:20, 22 February 2018 by Michael.mast (talk | contribs) (Created page with "==Purpose== To restrict access to email to specific applications, locations, and users. ==Notes== *Want to use email containerization for devices outside the LAN. Internal us...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Purpose

To restrict access to email to specific applications, locations, and users.

Notes

  • Want to use email containerization for devices outside the LAN. Internal users can access from terminal servers or virtual desktops.
  • Client access rules can be used to restrict access to just the datacenter using IP whitelisting.[1][2]
  • Conditional access could be used, but appears to not support all email clients[3][4]
  • Activesync device access might be ideal if you can restrict based on application family. For example; Sophos Secure Email containers show up starting with "SecurePIM" in the name. If you could only allow devices that fall within this family, and no other mail client uses this family, then you would have restricted access.[5][6]
  • https://technet.microsoft.com/en-us/library/mt842508
  • https://technet.microsoft.com/en-us/library/mt842507(v=exchg.150).aspx
  • https://core.co.uk/blog/restricting-access-office-365/
  • https://docs.microsoft.com/en-us/azure/active-directory/active-directory-conditional-access-mam
  • https://blogs.technet.microsoft.com/exchange/2010/11/15/controlling-exchange-activesync-device-access-using-the-allowblockquarantine-list/
  • https://social.technet.microsoft.com/Forums/msonline/en-US/6559babe-7d09-4f91-a2d7-fc0b58d3cb4f/office-365-device-access-rules?forum=onlineservicesexchange