Office 365 - Enforcing User Account Policy Compliance via Policy Groups (Departmental IT)
This document explains how departmental IT staff can use policy groups in Manifest to enforce technical restrictions on user accounts in Office 365, as part of an effort to achieve policy compliance.
The prevention of setting an account auto-forward from the Wisc Account Admin site
- IMPORTANT: this restriction only applies to the Wisc Account Admin site. Users may still set an account auto-forward from Outlook on the web or a desktop email client.
The prevention of enabling POP or IMAP configuration protocols once they've been disabled. This WILL NOT disable these protocols if they are currently enabled; it will only prevent users from re-enabling the protocols
To implement the policy controls described above, please contact the UW-Madison Office 365 Team (firstname.lastname@example.org), providing the name of your "affiliation group" in Manifest, and request that we implement the enforcement of your policies. The Office 365 Team will implement your technical policy controls and let you know when they are in effect for your users.
Users with policy controlled accounts will not be able to set an account auto-forward form the Wisc Account Admin site and will see the following message when viewing their account forward status:
- "Note: This account is identified within a security policy which recommends against forwarding email."