Smartphones control from Exchange 2010

Posted on 2012-09-13
Last Modified: 2012-10-18
I need to control who users can connect and cannot connect from yours smartphone devices, some divices arec connected using activesync but others ones are connected via POP3/IMAP.

Devices using POP/IMAP can be controled?
How can I control?
Question by:soporte_synergy
    LVL 37

    Expert Comment

    by:Jamie McKillop

    Can you please clarify exactly what you are trying to accomplish? Do you want to control which users are allowed to use a smartphone to connect to Exchange?

    You can disable ActiveSync on an account by account basis. You can't control POP/IMAP at the device level but you can disabled it on a user by user basis as well. Disabling it will prevent users from using POP/IMAP from amy device though.

    You can disable specific protocols on the Mailbox Features tab of the mailbox.


    Author Comment

    Then, If I disable ActiveSync feature from mailbox property user cannot be able connect your smartphone using POP/IMAP?
    User uses thunderbird client to download your mail, it uses POP/SMTP, what it is the impact??
    LVL 37

    Accepted Solution

    ActiveSync, POP, and IMAP are all separate protocols that can be enabled/disabled per mailbox. Disabling ActiveSync will have no impact on POP or IMAP.

    If your goal is to prevent someone from using POP or IMAP on their smartphone but allow them to use POP or IMAP from their desktop or latop, that is not possible unless you know all IPs of the clients you want users to be able to connect from. You can then setup the POP and/or IMAP connector to only allow connections from specific IPs. Typically, you could only be certain of all the IPs if all the clients are on your internal network. If you want people to be able to travel outside the office and use a POP or IMAP client, you would not be able to set this restriction unless you use a VPN.


    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    MS Access 2003 or later To MySQL Migration Project Hello All, this is my second article in the category of MS-OFFICE Automation. In internet I am not able to find any comprehensive resource on the Migration of MS Access back-end to MySQL so I fin…
    Deploying a Microsoft Access application in a Citrix environment is not difficult but takes a few steps. However, Citrix system people are often of little help, as they typically know next to nothing about Access. The script provided here will take …
    The viewer will learn how to simulate a series of sales calls dependent on a single skill level and learn how to simulate a series of sales calls dependent on two skill levels. Simulating Independent Sales Calls: Enter .75 into cell C2 – “skill leve…
    The viewer will learn how to create two correlated normally distributed random variables in Excel, use a normal distribution to simulate the return on different levels of investment in each of the two funds over a period of ten years, and, create a …

    728 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now