Posts

Showing posts from May, 2022

Recover Deleted items in Exchange online (Microsoft office 365)

Image
  In Exchange online we provide 3 layers of Recovery so that messages can be recovered Deleted Items Folder Recover Deleted Items Folder Purges Folder     Deleted Items Folder When a mail is deleted(normal Delete not shift Delete) its moved to Deleted Items folder and its present there until, either we manually delete the messages from there or its deleted automatically as per the Retention Policy of the Organization(default value is 30 days)   Recover Deleted Items Folder   When a mail is Shift deleted(hard deleted), or deleted from Deleted items or removed from deleted items by the Retention policy, its moved to the Recover Deleted Items Folder and it remains there for next 14 days (can be extended to 30 days).   There are 2 folders under Recovery Deleted Items Deleted Folder(its not the normal Deleted folder in the mailbox) Purges Folder    When the mail is present in Recovery Deleted Items(Deleted folder) i

Restrict Access (View only) to org data on Windows 10 Personal device (BYOD)

Image
One of the recent need from the client was as follows :- He has 3 types of Employees working in his organization.  1. Company Employees (on-Payroll) - Company owned device 2. Outsourced Consultants - Accessing org data on Payroll org device (non client owned devices) 3. Guest users  Need -  Company employees  should have full access to org data on Company owned devices, however if they access org data from their personal device it should be View only. Consultant - They can access the Data on the device but cannot save anything on device. Guest - They should have view only access and not able to save anything on device.  This above should be applicable to Email, One Drive,  SharePoint & Teams Data.  Solution -  Step 1 -   Enable limited Access. Step 2 - Create a conditional access policy for EXO with device and browser based condition to apply app restriction policy. Step 3 - modify the Sharepoint limited access policy and add the device exception. Step 4 - Create a policy for gu

Block users from saving data on System Drive on Intune Managed Device

Image
Recently i delivered a project for Intune Deployment and came up with a requirement as follows End Users Should not be able to save data locally on C or D Drive, instead they should be allowed to save data only in One Drive for business (synced with System)  Based on the requirement i did my research and found the Following. its possible to control the Local System settings on a Azure AD joined Machine and Managed by Intune. There is no options to define exceptions in policies to allow data saving in certain folders.  Now most of us will think WIP (windows information protection) policy will help us protecting the data on device, however that's not completely true as . User can change the File Ownership to personal if the WIP policy is set to Allow Override. User can save the file locally on the system User will not be able to copy the data from work file to Personal file if policy is set to Allow override. Unenlightened apps cannot differentiate between personal and corporate data