Solved

ActiveSync policies set in various places in various management consoles

Posted on 2016-08-01
2
35 Views
Last Modified: 2016-08-26
We are  doing a risk assessment of certain security settings on a number of our key systems, including 3 internal 2010 exchange servers. on each server, we can go to the exchange management console and view the active sync policies within organization configuration > client access > exchange ActiveSync mailbox policies. There are some concerns about the active sync policies set here. However, the admin has shown some completely contradictory AS policies set in some sort of web admin console (exchange control panel? > phone & video > ActiveSync access?). How can we tell which policies are taking effect, or whether both are valid. Or can policies set via either management console, if so which takes precedent and overrules the other?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 37

Accepted Solution

by:
Jian An Lim earned 500 total points (awarded by participants)
ID: 41745935
Activesync policy is policies defined by administrator
you can have multiple active sync policy

then administrator then apply one activesync policy to a mailbox. you cannoy apply more than one policy to a user

So your console shows every activesync policy, where the websites shows the users end (and how many device they owns)

i usually prefer powershell as it can be use in other form

https://technet.microsoft.com/en-us/library/bb123994%28v=exchg.141%29.aspx?f=255&MSPPError=-2147217396



what exactly you want to do probably will help me to guide you on your journey.
0
 
LVL 37

Expert Comment

by:Jian An Lim
ID: 41771432
provided an overview for the answer
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Maintaining a PST file separate from Outlook/Exchange 7 95
Exchange 2010 - SAN cert renewal 5 50
exchange, owa 4 49
Outlook 2016 6 61
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question