Solved

What permissions needed on a Mobile device to use Exchange policies like Remote Wipe?

Posted on 2015-01-10
2
162 Views
Last Modified: 2015-01-15
I'm reading into Microsoft Exchange and Client Policies that can apply to Mobile devices, including Android.

My question is, how is it possible for ActiveSync policies to issue a Remote Wipe against a mobile device?
Does the mobile device have to be on the domain for Exchange to have Administrative Access to the system?
Or is there some type of root access that is granted to Exchange once an ActiveSync mailbox is setup on the mobile device?
0
Comment
Question by:garryshape
2 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 250 total points
ID: 40542312
As long as the policies are configured to (as a minimum) force a PIN as a password, then with that enabled and the device configured with that Policy, then Remote Wipe is able to be performed if the device is lost or stolen.

Also make sure you enable a refresh interval in the Activesync Policies so that the devices check in for Policy Changes once in a while, or they never will.

The Remote Wipe will factory reset the device - so beware of any data / apps that might be lost in the process / warn users if they use their own mobiles that they face losing everything if the device is wiped.

Alan
0
 
LVL 7

Assisted Solution

by:Network Zero
Network Zero earned 250 total points
ID: 40542337
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Lotus Notes – formerly IBM Notes – is an email client application, while IBM Domino (earlier Lotus Domino) is an email server. The client possesses a set of features that are even more advanced as compared to that of Outlook. Likewise, IBM Domino is…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
In this video we show how to create a Contact in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Contact ta…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question