Security and Privacy for Email Profiles in Configuration Manager
Updated: January 1, 2014
Applies To: System Center 2012 R2 Configuration Manager
|This topic appears in the Assets and Compliance in System Center 2012 Configuration Manager guide and in the Security and Privacy for System Center 2012 Configuration Manager guide.|
|The information in this topic applies only to System Center 2012 R2 Configuration Manager.|
This topic contains security and privacy information for email profiles in System Center 2012 Configuration Manager.
Use the following security best practices when you manage email profiles for devices.
|Security best practice||More information|
Whenever possible, choose the most secure options that your email infrastructure and client operating systems can support.
Email profiles provide a convenient method to centrally distribute and manage email settings that your devices already support. Configuration Manager does not add email functionality.
Identify, implement, and follow any security best practices that have been recommended for your devices and email infrastructure.
By default, devices do not evaluate email profiles. In addition, you must configure the email profiles, and then deploy them to users.
Before you configure email profiles, consider your privacy requirements.
For additional resources, see Information and Support for Configuration Manager.
Tip: Use this query to find online documentation in the TechNet Library for System Center 2012 Configuration Manager. For instructions and examples, see Search the Configuration Manager Documentation Library.