Solved

How to block exchange active synce on personal cell phones

Posted on 2015-01-21
4
87 Views
Last Modified: 2015-04-20
Hi,
  How you do block users from using Exchange Active Sync to access e-mail on their personal cell phones but allow company owned devices to access do it?
0
Comment
Question by:masterofall
4 Comments
 
LVL 76

Accepted Solution

by:
Alan Hardisty earned 250 total points
ID: 40562685
You can achieve this using the built-in Allow/Block/Quarantine option:

http://blogs.technet.com/b/exchange/archive/2010/11/15/3411539.aspx

When a device attempts to gain access it can be quarantined until approved or denied, thus you get the ability to block and allow the devices you want.

You may have to remove all Activesync devices after setting this up so that everyone has to go through the ABQ process.

Alan
0
 
LVL 2

Assisted Solution

by:NICK S
NICK S earned 250 total points
ID: 40563236
Allow block quarantine is best option , but most simple method would be to enable active sync using below command

Set-CASMailbox -Identity: "username" -ActiveSyncAllowedDeviceIDs: "<DeviceID_1>"

this will allow only device which is in allow list , you can also add multiple device IDs if you want
0
 
LVL 6

Expert Comment

by:Minecraft_ Enderman
ID: 40563806
1. Retrieve the device ID after the user has synchronized the device with the Exchange server.

Get-ActiveSyncDeviceStatistics -Mailbox:"<EmailAlias>" |fl DeviceID

2. Prevent that device from synchronizing with Microsoft Exchange.

Set-CASMailbox -Identity: "EmailAlias"
-ActiveSyncBlockedDeviceIDs: "<DeviceID_1>","<DeviceID_2>"

3. Enable a Device for Exchange ActiveSync

Set-CASMailbox -Identity: "EmailAlias" -ActiveSyncAllowedDeviceIDs: "<DeviceID_1>","<DeviceID_2>"
0
 
LVL 1

Author Closing Comment

by:masterofall
ID: 40733210
Kiss
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Read this checklist to learn more about the 15 things you should never include in an email signature.
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
To show how to create a transport rule in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Mail Flow >> Rules tab.:  To cr…

930 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now