Outlook Cognizant 365



Microsoft 365 provides powerful productivity apps that make life more creative, organized, and secure. The subscription includes premium Office apps, like Word, Excel, PowerPoint, and Outlook, 1TB of OneDrive cloud storage, advanced security features, support from Microsoft experts, and more. Microsoft 365 provides powerful productivity apps that make life more creative, organized, and secure. The subscription includes premium Office apps, like Word, Excel, PowerPoint, and Outlook, 1TB of OneDrive cloud storage, advanced security features, support from Microsoft experts, and more.

-->

A key task of any Administrator is to protect and secure an organization’s resources and data on devices in their organization. This task is device management. Users receive and send email from personal accounts, browse websites from home and from restaurants, and install apps and games. These users are also employees and students. On their devices, they want to access work and school resources, such as email and OneNote, and access them quickly. As an administrator, your goal is to protect these resources, and provide easy access for users across their many devices, all at the same time.

Device management enables organizations to protect and secure their resources and data, and from different devices.

Outlook Cognizant 365

Using a device management provider, organization can make sure that only authorized people and devices get access to proprietary information. Similarly, device users can feel at ease accessing work data from their phone, because they know their device meet their organization's security requirements. As an organization, you might ask - What should we use to protect our resources?

The answer is Microsoft Intune. Intune offers mobile device management (MDM) and mobile application management (MAM). Some key tasks of any MDM or MAM solution are to:

  • Support a diverse mobile environment and manage iOS/iPadOS, Android, Windows, and macOS devices securely.
  • Make sure devices and apps are compliant with your organization's security requirements.
  • Create policies that help keep your organization data safe on organization-owned and personal devices.
  • Use a single, unified mobile solution to enforce these policies, and help manage devices, apps, users, and groups.
  • Protect your company information by helping to control the way your workforce accesses and shares its data.

Intune is included with Microsoft Azure, Microsoft 365, and integrates with Azure Active Directory (Azure AD). Azure AD helps control who has access, and what they have access to.

Microsoft Intune

Many organizations, including Microsoft, use Intune to secure proprietary data that users access from their company-owned and personally owned devices. Intune includes device and app configuration policies, software update policies, and installation statuses (charts, tables, and reports). These resources help you secure and monitor data access.

It's common for people to have multiple devices that use different platforms. For example, an employee might use Surface Pro for work, and an Android mobile device in their personal life. And, it's common for a person to access organizational resources, such as Microsoft Outlook and SharePoint, from these multiple devices.

With Intune, you can manage multiple devices per person, and the different platforms that run on each device, including iOS/iPadOS, macOS, Android, and Windows. Intune separates policies and settings by device platform. So it's easy to manage and view devices of a specific platform.

Common scenarios is a great resource to see how Intune answers common questions when working with mobile devices. You'll find scenarios about:

  • Protecting email with on-premises Exchange
  • Accessing Microsoft 365 safely and securely
  • Using personal devices to access organizational resources

For more information about Intune, see What is Intune.

Co-management and tenant attach

Many organizations use on-premises Configuration Manager to manage devices, including desktops and servers. You can cloud-attach your on-premises Configuration Manager to Microsoft Intune. When you cloud-attach, you get the benefits of Intune and the cloud, including conditional access, running remote actions, using Windows Autopilot, and more.

Microsoft Endpoint Manager is a solution platform that unifies several services. It includes Microsoft Intune for cloud-based device management, and Configuration Manager + Intune for cloud-attach device management.

If you use Configuration Manager, and you're ready to move some tasks to the cloud, then co-management is your answer. For more information about cloud-attaching your Configuration Manager, see What is co-management.

Endpoint Manager tenant attach is also an option. You upload your devices to the Endpoint Manager admin center, without enabling automatic enrollment for co-management or switching workloads to Intune. You can see your devices, and run actions on Configuration Manager managed devices. For more information, see Microsoft Endpoint Manager tenant attach.

Integration with secure-and-protect services

A key task of any device management solution is to provide security and protection. Intune does a great job of integrating with other services to achieve this task. For example:

  • Microsoft 365 is a key component to simplifying common IT tasks. In the Microsoft 365 admin center, you create users, and manage groups. You also get access to other services, such as Intune, Azure AD, and more.

    For example, create an iOS/iPadOS devices group in Microsoft 365. Then, use Intune to push policies to the iOS/iPadOS devices group that focus on iOS/iPadOS features, such as access to the app store, using AirDrop, backing up to iCloud, using Apple's web filter, and more.

  • Windows Defender includes many security features to help protect Windows 10 devices. For example, using Intune and Windows Defender together, you can:

    • Enable Windows Defender SmartScreen to look for suspicious activity in files and apps on mobile devices.
    • Use Microsoft Defender for Endpoint) to help prevent security breaches on mobile devices. And, help limit the impact of a security breach by blocking a user from corporate resources.
  • Conditional Access is a feature of Azure Active Directory, and integrates nicely with Intune. Using Conditional Access, make sure only compliant devices are allowed access to email, SharePoint, and other apps.

Choose the device management solution that's right for you

There are a couple of ways to approach device management. First, you can manage different aspects of devices using the features built in to Intune. This approach is called Mobile device management (MDM). Users 'enroll' their devices, and use certificates to communicate with Intune. As an IT administrator, you push apps on devices, restrict devices to a specific operating system, block personal devices, and more. If a device is ever lost or stolen, you can also remove all data from the device.

In the second approach, you manage apps on devices. This approach is called Mobile application management (MAM). Users can use their personal devices to access organizational resources. When opening an app, such as email or SharePoint, users can be prompted to authenticate. If a device is ever lost or stolen, you can remove all organization data from the Intune managed applications.

You can also use a combination of MDM and MAM together.

Office 365

Simplify IT tasks using the Device Management admin center

The Microsoft Endpoint Manager admin center is a one-stop shop to manage and complete tasks for your mobile devices. This admin center includes the services used for device management, including Intune and Azure Active Directory, and to also manage client apps.

On the Device Management admin center, you can:

  • Manage software updates

Next steps

When you're ready to get started with an MDM or MAM solution, walk through the different steps to set up Intune, enroll devices, and start creating policies. The Microsoft Intune planning guide is a good resource.

Microsoft IT case study: Migrating mobile device management to Intune in the Azure portal

This guide is about accessing Cognizant email from your personal laptop’s Outlook! Yes you do not need any special VPN privileges to configure your personal outlook for accessing Cognizant email. All you need is access to Cognizant OWA (Web Access to email). By default, all permanent employees of Cognizant have web access enabled as a default option except for the contractors.

This guide provides you with step by step instructions about configuring your outlook.

Step 1:

From the Control Panel, Select Mail. This will bring a dialog box as shown below:

Click on the ‘E-Mail Accounts’ button which will take you to the Account Settings screen.

Step 2:

In the Account Settings dialog that is displayed, select the ‘E-mail’ tab if it is not selected by default. Click on the ‘New’ button. This will take you to the new email account wizard.

Outlook Cognizant Owa

Step 3:

In the ‘choose service’ dialog box, Choose ‘Email Account’ and click Next.

Outlook Cognizant 365

Step 4:

In the Add Account dialog box, select ‘Manual setup or additional server types’ and Click Next.


Step 5:

in the choose service dialog box, select ‘Microsoft Exchange Server or Compatible device’ and click Next.

Step 6:

In the server settings field, enter the following: ‘ctsinchnvcasa.cts.com’. In the username field enter ‘ctsuserid’ (e.g. cts112233).

Do not click on’ check name’ button now! You will need to make additional configurations before that.

Click on ‘More Settings’ button.

Step 7:

In the General Tab, please provide any name for this Exchange account. For e.g. ‘CTS Mail Account’

Step 8:

In the Advanced tab, select both the options under ‘Cached Exchange Mode settings’

Select ‘Use Cached Exchange mode’ check-box
Also select ‘Download Shared Folders’ check-box

Step 9:

Navigate to the Security Tab.

Outlook Email

Ensure that ‘Always prompt for logon credentials’ is selected.

Select ‘Password Authentication (NTLM)’ from the Logon Network Security drop down.

Step 10:

Enable ‘ Connect to Microsoft Exchange using HTTP’ and click on the Exchange Proxy Settings button.

Step 11:

This is the major step. Make all configurations exactly as done in the below screenshot.

Set the URL field to: mail.cognizant.com

Set the text box next to ‘connect to proxy servers having this principal name in their certificate:’ enter the following: msstd:*.cognizant.com

Sign In Cognizant Outlook

Enable all check marks and Select ‘Basic Authentication’ in the proxy authentication settings.

Now Click OK and close all the dialog boxes and open your outlook.

Provide your Cognizant Credentials when requested and there you have, Access to Cognizant email right from your personal laptop’s outlook!

Cognizant Microsoft Outlook 365

For any queries / suggestions / comments

Please write to: techmonk@outlook.com