Security and Privacy for Email Profiles in Configuration Manager
Updated: May 14, 2015
Applies To: System Center 2012 Configuration Manager SP2, System Center 2012 R2 Configuration Manager, System Center 2012 R2 Configuration Manager SP1
Note
This topic appears in the Assets and Compliance in System Center 2012 Configuration Manager guide and in the Security and Privacy for System Center 2012 Configuration Manager guide.
Note
The information in this topic applies only to System Center 2012 R2 Configuration Manager versions only.
This topic contains security and privacy information for email profiles in System Center 2012 Configuration Manager.
Security Best Practices for Email Profiles
Use the following security best practices when you manage email profiles for devices.
Security best practice |
More information |
---|---|
Whenever possible, choose the most secure options that your email infrastructure and client operating systems can support. |
Email profiles provide a convenient method to centrally distribute and manage email settings that your devices already support. Configuration Manager does not add email functionality. Identify, implement, and follow any security best practices that have been recommended for your devices and email infrastructure. |
Privacy Information for Email Profiles
By default, devices do not evaluate email profiles. In addition, you must configure the email profiles, and then deploy them to users.
Before you configure email profiles, consider your privacy requirements.