Office 365 to get MDM capabilities baked in

Native MDM controls coming to Office 365 in 2015

Microsoft is building mobile device management (MDM) capabilities into Office 365, which will allow admins to set policies to control data usage across Android, iOS and Windows Phone devices.

MDM capabilities will roll out in Q1 2015, enabling policies to be set directly from the Office 365 administration panel. These will include the ability to require the use of a passcode, restrict copying/pasting of confidential Office 365 data to unauthorised applications on popular devices such as an iPad. 

Advertisement - Article continues below

Admins will also be able to lockdown devices if they are lost or stolen and selectively wipe any business data from them.

"Users want access to all their important information, particularly email and office documents so they can be productivity everywhere," Julia White, general manager of Office 365 told delegates at TechEd Europe 2014.

"Since we've shipped the Office for iPad apps, we had a lot of feedback asking for people to be able to manage those apps and I'm thrilled that Intune will be uniquely able to manage [them].

"Using [Office 365] management you can set policies for how [iPad] apps can interact with corporate data."

White demonstrated how users will only be able to paste content into managed apps - but there aren't  any failsafes preventing rogue employees from taking screenshots or photos of sensitive information, so trust between employer and employees remains paramount.

Advertisement
Advertisement - Article continues below

Another key security feature White was keen to highlight was the expansion of Microsoft Data Loss Prevention software to Office 365.

Advertisement - Article continues below

IT admins will be able to see policy reports and provide additional security if necessary. For example, if credit card information is being shared via email, an employee will get a prompt warning them confidential information is about to be sent. Should they choose to continue with the message, rights protection can come into force and prevent the recipient from forwarding the message or printing it out.

Featured Resources

Top 5 challenges of migrating applications to the cloud

Explore how VMware Cloud on AWS helps to address common cloud migration challenges

Download now

3 reasons why now is the time to rethink your network

Changing requirements call for new solutions

Download now

All-flash buyer’s guide

Tips for evaluating Solid-State Arrays

Download now

Enabling enterprise machine and deep learning with intelligent storage

The power of AI can only be realised through efficient and performant delivery of data

Download now
Advertisement

Recommended

Visit/cloud-security/34141/office-365-ban-in-german-schools-temporarily-lifted
cloud security

German schools Office 365 ban 'temporarily' lifted

2 Aug 2019
Visit/business/business-operations/355147/amazon-and-microsoft-join-nhs-project-battling-pandemic
Business operations

Amazon and Microsoft join NHS project battling pandemic

27 Mar 2020
Visit/operating-systems/microsoft-windows/355105/microsoft-puts-windows-development-on-lockdown
Microsoft Windows

Microsoft puts Windows development on lockdown

25 Mar 2020
Visit/software/backup-software/355104/windows-file-history-and-backup-review-useful-but-limited
backup software

Windows File History and Backup review: Useful but limited

25 Mar 2020

Most Popular

Visit/infrastructure/server-storage/355118/hpe-warns-of-critical-bug-that-destroys-ssds-after-40000-hours
Server & storage

HPE warns of 'critical' bug that destroys SSDs after 40,000 hours

26 Mar 2020
Visit/software/video-conferencing/355138/zoom-beaming-ios-user-data-to-facebook-for-targeted-ads
video conferencing

Zoom beams iOS user data to Facebook for targeted ads

27 Mar 2020
Visit/software/355113/companies-offering-free-software-to-fight-covid-19
Software

These are the companies offering free software during the coronavirus crisis

25 Mar 2020
Visit/security/phishing/355120/hackers-pose-as-three-to-exploit-high-data-demand
phishing

Hackers target Three customers with "sophisticated" phishing scam

26 Mar 2020