Khürt Williams

Follow @khurtwilliams on Micro.blog.

@hjertnes in a zero trust environment, some IT security teams configure systems to ensure that the approved Mail User Agent (usually Outlook) are being used and block access to the Exchange/Office 365 servers if not. Some even containerise the MUA using something like AirWatch to have even more control.