Planning Access

The first step in designing policies is to figure out what application needs to be protected, how users will be allowed to access it, and what type of protection is required in each scenario.

For preceding example, we will plan a deployment with the following requirements:
  1. Office365 Email
  2. Mobile clients will be allowed to access email via standard mobile email clients and the mobile Outlook Application. All other mobile access methods need to be restricted.
  3. Desktop clients will be allowed to access email through a web browser only. Outlook and other third party tools should not be allowed to connect for Mac or PCs.
  4. Both mobile and web based clients will require visible watermarking for all PDF and Word documents.
  5. Mobile clients will be required to have a lock screen.