exchange server remote wipe

We were tlooking into products for security of smartphone devices, and ensuring they could provide remote wipe type features, and compliance report that they have PIN's/passwords enabled and the users havent turned passwords off for convinience etc etc.

Our admin informs me exchange server 2010 itself can do a remote wipe, how can you tell if this is confgured and for what devices is this configured? and is this wiping the whole phone, or just synchronised mail? is this configured in the activesync area of exchange?
Who is Participating?

The MS article points that we talk about the device doing a restore to factory settings.

Taking into account that other company data might be on the phone (stored locally) this offers as much safety that no confidential data is lost/stolen as much as possible.

You can find more technicalities here:

It is configured using ActiveSync Policy settings on Exchange (see above on all the possible options). You can use different policies and apply them to the users.

Briefly stated, it is a restore to factory settings.

Hope this answers your query.
Yes Exchange can offer Remote Wipe and Device Policies such as PIN / Password.

When a user add their Exchange account to their device (iPhone/iPad/Android etc) the organisation (Exchange) is granted administrative rights over the device.

If you log on to your Outlook Web Access and view Options and Mobile Devices. Here you will see all the devices that are / have been configured to sync with Exchange.
From here you can either delete the device, so that it has to be re-configured to sync again or you can remotely wipe the device which will completely wipe / factory reset the device.

pma111Author Commented:
so remote wipe is not a specific policy setting within an active sync policy - if they active sync their mail to a device - you can remote wipe there device? i.e. its not something you have to configure within an active sync policy first?
By connecting their device to Exchange they accept the fact that the organisation will have control.
(There are ways "hacks" around this from a users prospective)

This is to protect the business and it's sensitive data.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.