Back

Guide to Office 365 Mobile Setup and Device Management

Mobile email access is integral to business productivity But increased access means increased security riskMobile device management MDM secures...

5 min read
Published on Nov 30, 2017
Guide to Office 365 Mobile Setup and Device Management

Mobile email access is integral to business productivity. But increased access means increased security risk.

Mobile device management (MDM) secures, manages and monitors mobile devices across an organization. With more employees accessing email, documents and company data from their mobile devices, MDM enables IT managers to control devices and security.

Below is a guide to Office 365 mobile setup, including how to set up mobile access for users, manage devices and set up MDM rules Office 365.

The IT Admin’s Office 365 Mobile Setup Guide

Since Microsoft released all Office 365 apps for free on mobile devices, it opened new productivity opportunities for businesses.

Nearly every phone and tablet can be set up with Office 365 to send email, access your calendar and contact info and share documents on OneDrive and SharePoint. Most phones and tablets can be set up for Office 365, including iPhone, iPad, Android, BlackBerry and Windows phones.

How to Set Up Mobile Access for Your Users

To start, you need to set up user access. If you’re allowing employees to access email and Office 365 on their mobile devices, you can remotely manage phone features and options.

Turning Mobile Access On Or Off

Unless your business has specific compliance requirements, users can set up their own email on their mobile device once you grant them access.

Mobile access to email is turned on by default in most devices. As an administrator, you can control access through Exchange ActiveSync.

To change the default access settings for Exchange ActiveSync and turn off or suspend access, follow these steps.

  1. In the Office 365 portal, click Admin > Exchange.
  2. In the Exchange admin center, click Mobile.
  3. Under Exchange ActiveSync Access Settings, click Edit.
  4. In the Exchange ActiveSync access settings dialog box, choose one of the following:
    • Allow access
    • Block access
    • Quarantine — This puts the device on hold so you can decide to block or allow it later. Once you’ve enabled Exchange ActiveSync, you can manage devices and set up rules on the Mobile Device Access page.

Office 365 Mobile Setup With BlackBerry Business Cloud Services

For BlackBerry devices, you’ll need to enable BlackBerry Business Cloud Services to integrate email and calendar. Only global admins can enable BlackBerry Business Cloud Services.

  1. Go to Admin > Service Settings > Mobile. Click Enable Service.

  2. In the dialogue box, select Yes, then click OK.

  3. You’re now back on the Mobile page. Select Manage to go to the BlackBerry Business Cloud Services website and set up your connection. To turn off BlackBerry Business Cloud Services, choose:

  4. Admin > Service Settings > Mobile > Remove Service

Mobile Device Management in Office 365

If you’re setting up Office 365 for the first time, you can create MDM rules in Office 365 to control mobile devices.

If your organization already has devices set up with Office 365, you’ll need to go through each device to manage access. After setting up each device with the correct access, you can set up MDM rules going forward.

Office 365 Mobile Setup for Individual Devices

Here’s how to manage access for mobile devices that already have Office 365:

  1. Log into the portal.
  2. Navigate to the Exchange Admin Center (EAC.) Office365 Mobile Device Rules-1
  3. Search for a user with a mobile device. Office 365 Mobile Device Rules-3
  4. Double click the mailbox to open properties. Then select Mailbox Features. Office 365 Mobile Device Rules-4
  5. Under Mobile Devices, click on View Details. Office 365 Mobile Device Rules-5
  6. Select the device you want to add, and click Allow. Office 365 Mobile Device Rules-6
  7. To block unwanted devices, highlight them and select Block. Office 365 Mobile Device Rules-6a

How to Set Up Mobile Access Rules in Office 365

Because email access is turned on by default in most mobile devices, you’ll need to set up rules to block or quarantine unwanted devices.

Blocking Access

Blocking rules restricts access for all device models that aren’t specifically granted access. Here’s how to create general MDM rules to block devices for Office 365 mobile setup:

  1. Log into the portal.
  2. Navigate to the Exchange Admin Center (EAC.)
  3. Select Mobile. Office 365 Mobile Setup up Blocking Rules-3
  4. Select the + under Device Access Rules. Office 365 Mobile Device Setup Blocking Rules-4
  5. Under Device Family, select Browse. Choose the mobile device, and click OK.Office 365 Mobile Setup Block Rules-5
  6. Select the device model, and click OK. Office 365 Mobile Setup Blocking Rules-6
  7. Select Block Access, and save your selection Office 365 Mobile Setup Blocking Rules-7

How to Set Up Quarantine Rules

Quarantine rules allow you to put a mobile device “on hold” and block or allow it later.

To get started:

  1. Log into the portal.
  2. Navigate to the Exchange Admin Center (EAC.)
  3. Select Mobile. Office 365 Mobile Setup Quarantine Rules-3
  4. Select the + under Device Access Rules. Office 365 Mobile Setup Quarantine Rules-4
  5. Under Device Family, select Browse. Choose the mobile device, and click OK.Office 365 Mobile Setup Quarantine Rules-5
  6. Select the device model, and click OK. Office 365 Mobile Setup Quarantine Rules-6
  7. Select Quarantine and Save. Office 365 Mobile Setup Quarantine Rules-7

You can manage the devices in the Quarantine Devices view. The rule quarantines devices connected with Exchange ActiveSync that don’t have explicit access permissions set up.

Additional Office 365 Mobile Setup Resources

Once granted access, users can set up Office 365 on their mobile devices.

Review these resources to set up Outlook for mobile:

Have more questions about Office 365 mobile setup? Schedule a call with us today.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

Implementing Cybersecurity Policies for CMMC Compliance and Managing CUI

CMMC compliance requires well-documented cybersecurity policies. Learn how to implement security controls, create an SSP and POA&M, and manage Controlled Unclassified Information (CUI).

Apr 25, 2025
7 min read
CMMC compliance for DoD contractors

CMMC Compliance Requirements for DoD Contractors and Subcontractors in the Defense Industry

CMMC compliance is mandatory for DoD contractors and subcontractors. Learn about certification levels, requirements, and the consequences of failing to meet compliance.

Apr 24, 2025
6 min read
How to prepare for a CMMC compliance audit

CMMC Compliance Audit Preparation: A Complete Checklist for Small Businesses

Preparing for a CMMC compliance audit is critical for DoD contractors. Use this checklist to perform a gap analysis, assess CMMC readiness, and prepare for a Level 2 assessment.

Apr 23, 2025
8 min read
FAR CUI vs CMMC Understanding

FAR CUI vs CMMC Understanding the Differences and Overlaps

FAR CUI and CMMC both focus on protecting sensitive federal data, but they have key differences. Learn how they work together and whether FAR CUI compliance aligns with CMMC.

Apr 15, 2025
10 min read
What Is a POAM?

What Is a POAM?

Learn how a Plan of Action and Milestones (POAM) helps meet NIST 800-171 & DFARS compliance. Understand its role in FedRAMP, security categorization, and risk mitigation.

Apr 8, 2025
8 min read
Best Cybersecurity Practices for Achieving CMMC Compliance

Best Cybersecurity Practices for Achieving CMMC Compliance

Achieving CMMC cybersecurity compliance requires strong security controls. Learn best practices for securing your IT environment, protecting CUI, and implementing MFA.

Apr 7, 2025
6 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation