Office 365 - Enforcing User Account Policy Compliance via Policy Groups (Departmental IT)
This document explains how departmental IT staff can use policy groups in Manifest to enforce technical restrictions on user accounts in Office 365, as part of an effort to achieve policy compliance.
The prevention of setting an account auto-forward from the Wisc Account Admin site
- IMPORTANT: this restriction only applies to the Wisc Account Admin site and Outlook on the web. Users may still set an account auto-forward from a desktop email client.
The prevention of enabling POP or IMAP configuration protocols once they've been disabled. This WILL NOT disable these protocols if they are currently enabled; it will only prevent users from re-enabling the protocols
To implement the policy controls described above, please contact the DoIT Help Desk, providing the name of your "affiliation group" in Manifest, and ask that your policy groups request be sent to UW-Madison's Office 365 Team, so they may implement the enforcement of your policies. The Office 365 Team will contact you to confirm the implementation of your technical policy controls and let you know when they are in effect for your users.
Users with policy controlled accounts will not be able to set an account auto-forward form the Wisc Account Admin site and will see the following message when viewing their account forward status:
- "Note: This account is identified within a security policy which recommends against forwarding email."