More

    How to Secure Email and Exchange Settings on BYO Devices using Scalefusion MDM?

    Share On

    Secure Work Emails
    Secure Work Emails

    Checking what’s happening with your project while on vacation. Replying to that customer mail on the way to work. Sending updates to your team on a weekend, if there are one thing employees can’t stay away from, is accessing work emails on their phones.

    While this is excellent for accelerating business growth and decreasing the turn-around time for client queries, it possess a threat of potential breach of critical business data that is exchanged over emails. Business emails contain sensitive business information, project road-maps, financial details as well as client and customer specific information that needs to be maintained with discretion at all times.  Allowing work email on BYOD exposes the business data to misuse, unauthorized access as well as susceptible to attacks from hackers through the apps sitting on the employee’s personal devices. 

    It is hence crucial to secure email and exchange on employee-owned devices. The easiest and the most recommended way to do so is by enrolling these devices into Scalefusion MDM.

    Scalefusion MDM supports the management of BYOD and offers an array of capabilities and features to customize and secure business data on employee-owned devices. Available for Android, iOS as well as macOS BYO devices, Scalefusion can help you secure email and exchange on employee-owned devices in a few simple steps.

    With Scalefusion, you can configure following security features on BYO devices:

    1. Restrict moving data from email to personal apps for Android devices
    2. Configure account type, STMP, incoming and outgoing servers
    3. Remotely wipe-off email settings from devices of employees who are no longer associated with your company
    4. Secure business data by restricting screenshots on work emails for Android devices
    5. Restrict address sync on iOS devices 

    Getting Started:

    Sign up on Scalefusion. Make sure you use an account that is not G-Suite enabled to sign up. Once you create an account, confirm your email address. You can now start enrolling your BYO devices on the Scalefusion dashboard and apply company-specific policies. 

    How to secure email and exchange settings on BYO devices using Scalefusion MDM

    Configuring Email Settings:

    Navigate to the Email Utility section on the Scalefusion dashboard. Here, you can configure and manage email settings for your managed devices.

    Click on Add New settings.

    Add the following details:

    1. Account Name
    2. Account Type (Email/Visual Voice Mail)
    3. Service Type ( IMAP/POP3)
    4. Domain Name
    5. User Name
    6. Password
    7. Display Name
    8. Email Reply Address
    Secure Work Emails

    Then proceed to add the incoming and outgoing mail settings. You can also choose the mail sync frequency and the frequency for mail history.

    The next bunch of settings are used for configuring email on iOS and macOS devices. Here you can choose to configure the following settings to protect business data on BYO devices:

    1. Prevent user to move messages: This will restrict the user from moving messages from work email to personal apps
    2. Allow recent address to be synched
    3. Allow mail drop
    4. Use only in mail

    You can configure incoming and outgoing email servers.

    Secure Work Emails

    Now, proceed to configure the SMTP settings for the email. 

    Secure Work Emails

     Your email settings are now configured, you can publish the email settings on desired profiles. 

    Configuring Exchange Settings

    To configure exchange settings on BYO devices, navigate to the Email Utilities section on the Scalefusion dashboard.  

    Click on the Add New section. Add the following details:

    1. Account Name
    2. Account Type (Email/Visual Voice Mail)
    3. Service Type ( IMAP/POP3)
    4. Domain Name
    5. User Name
    6. Password
    7. Display Name
    8. Email Reply Address
    Secure Email and exchange settings

    Configure Advanced settings such as:

    1. Content to Sync: Email, Contacts, Calendar and Tasks
    2. Syn Frequency
    3. Sync Email History
    Secure Work Emails

    Push the exchange settings on your desired profile.

    Secure Email and exchange settings

    Once your Email and Exchange Settings are configured, you can start configuring the security settings for BYO devices.

    For this, start by navigating to Profile Section in the Device Management section of the dashboard.

    Let us have a look at how to secure email and exchange settings on BYO devices for different operating systems.

    For Android BYO Devices:

    Move to the Restrictions section on the Device Profile section.

    Secure Email and exchange settings

    Choose your pre-configured Exchange settings from the drop down and push to the profile.All devices with the specified profile will have these set of exchange settings.

    For iOS BYOD Profile

    Navigate to the Restrictions section on the Device Profile section of your chosen iOS BYOD profile. Select your pre-configured Email settings from the drop down and push to the profile.

    Secure BYOD

    Similarly, choose your configured Exchange settings. 

    Secure BYOD

    You can push these settings to the profile.

    For macOS BYOD profiles:

    For macOS BYOD profiles, choose the Email and Exchange settings from the dropdown. Push the settings on the managed BYO devices.

    Secure BYOD

    With Scalefusion securing Email and Exchange settings on BYO devices is simplified. 

    Protect your critical business data shared through email on employee-owned devices while enabling your employees to work from anywhere by using Scalefusion BYOD solution.

    Renuka Shahane
    Renuka Shahane
    Renuka Shahane is an avid reader who loves writing about technology. She is an engineering graduate with 10+ years of experience in content creation, content strategy and PR for web-based startups.

    Latest Articles

    Why Identity and Access Management (IAM) Is No Longer Optional: SEBI’s Mandate and Best Practices

    Imagine your organization undergoes a Securities and Exchange Board of India (SEBI) audit and discovers critical non-compliance with IAM requirements:  Privileged users lack multi-factor authentication...

    How To Secure Macs in the Enterprise Environment

    The choice of device is as much about performance as it is about security. Macs have carved out a reputation for themselves, often perceived...

    Conditional Access Unplugged: Tapping into the Power of Human Experience

    Organizations face unprecedented challenges as cyber threats become increasingly sophisticated, enabling sensitive data protection more critical than ever. Conditional access is at the helm...

    Latest From Author

    How To Improve Industrial Equipment Lifecycle Management with MDM

    Managing the lifecycle of industrial equipment is exhausting. Be it paperwork or keeping a log of maintenance schedules. Thankfully, with digitization, mobile devices have...

    How to Turn Off Automatic Updates on Windows 10?

    The popularity of Windows 10 devices is undeniable. With a market share of more than 75% in the desktop and laptop space, as reported...

    Transforming Military Operations with MDM: Enhancing Security and Efficiency

    Mobile devices are not new to military services. Military personnel often use various rugged devices, vehicle-mounted devices, and tablets to execute mission-critical tasks.  According...

    More from the blog

    Understanding Modern Management: The Next Era of Windows Device...

    The way we work and the tools we use have transformed over the past few decades. Not long ago,...

    Windows Defender Application Control (WDAC)? Benefits and Key Features 

    Application Control is a security practice that ensures only trusted and authorized software is allowed to execute. It is...

    Scalefusion UEM Features for ChromeOS Device Management

    With ChromeOS becoming the go-to operating system for modern workplaces, educational institutions, and businesses looking for simplicity and security,...