Exchange ActiveSync allows cell phone users to access and work with e-mail, calendar, contacts and tasks without an Internet connection.
Standard encryption services enhance the security of data exchange between the mobile device and the server. You can configure Exchange ActiveSync to use SSL encryption when transferring data between the Exchange server and the client mobile device.
Exchange ActiveSync has the following features:
- HTML messaging support;
- Execution mark support;
- Grouping e-mail messages by conversation
- the ability to synchronize or not synchronize an entire conversation;
- synchronization of SMS with the user’s Exchange mailbox;
- support for viewing message reply status
- support for quick message retrieval;
- meeting attendee information;
- Enhanced Exchange search
- PIN reset
- enhanced device security using password policies;
- autodiscovery for service over a wireless network;
- Support for setting auto-replies in case of user absence, vacation or business trip
- Support task synchronization
- Direct Push.
- Support for availability information for contacts;
Exchange ActiveSync protocol management
The Exchange ActiveSync protocol is enabled by default. All users who have an Exchange mailbox can synchronize their mobile device with the Microsoft Exchange server.
The following Exchange ActiveSync tasks can be performed:
- enabling and disabling Exchange ActiveSync for users;
- setting policies such as minimum password length, device lockout, and maximum number of incorrect password attempts;
- Run remote wipe to wipe all data from a lost or stolen cell phone;
- Running various reports to view or export in different formats
- Control which types of mobile devices can sync with the organization through device access rules
Control mobile device access in Exchange ActiveSync
You can control which mobile devices can synchronize with Exchange Server. This is done by tracking new mobile devices that connect to the organization or by configuring rules that define the allowed types of mobile devices. Regardless of the method you choose, you can allow or deny access for all specified mobile devices of a particular user at any time.