Solved

comparing shell output to EAX active sync information

Posted on 2015-02-16
4
68 Views
Last Modified: 2015-03-18
I have run the following shell command get-mobiledevicepolicy | fl

which returns a mass of data about the AS policy.

In EAC under mobile > mobile device policy, if you select a policy, on the right it lists key settings such as :

allow/block devices that dont fully support policies to synchornise
password
mobile device settings

My question is, how do I map those settings shown in EAC to those listed in the output of shell command?
0
Comment
Question by:pma111
  • 2
  • 2
4 Comments
 
LVL 13

Expert Comment

by:Guy Lidbetter
ID: 40612051
Hi pma111

Are you trying to match up what you see in the console with the policy output?

i.e.: allow/block devices that dont fully support policies  >  AllowNonProvisionableDevices ??

Regards

Guy
0
 
LVL 3

Author Comment

by:pma111
ID: 40614372
Hi guy yes please
0
 
LVL 3

Author Comment

by:pma111
ID: 40658377
cant close this as didnt get a solution. thanks
0
 
LVL 13

Accepted Solution

by:
Guy Lidbetter earned 500 total points
ID: 40663269
aah!!! I forgot about this post!! Sorry....

EAC > EMS field

Name > Name
This is a default policy > IsDefault
allow/block devices that dont fully support policies  >  AllowNonProvisionableDevices
Require Password > PasswordEnabled
Allow Simple Passwords > AllowSimplePassword
Require an alphanumeric password : Password must include this many character sets > MinPasswordComplexCharacters
Require encryption on device > DeviceEncryptionEnabled
Minimum Password Length > MinPasswordLength
Number of sign-in failures before device is wiped > MaxFailedPasswordAttempts
Require sign-in after the device has been inactive for (minutes) > MaxInactivityTimeLock
Enforce password lifetime (days) > PasswordExpiration
Password recycle count > PasswordHistory

Regards

Guy
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This process describes the steps required to Import and Export data from and to .pst files using Exchange 2010. We can use these steps to export data from a user to a .pst file, import data back to the same or a different user, or even import data t…
Scam emails are a huge burden for many businesses. Spotting one is not always easy. Follow our tips to identify if an email you receive is a scam.
In this video we show how to create a User Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: First we need to log into the Exchange Admin Center. Navigate to the Recipients >> Mailb…
In this video we show how to create a Resource Mailbox in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.: Navigate to the Recipients >> Resources tab.: "Recipients" is our default selection …

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now