View the resolved IT policy rules that are assigned to a user account

54

 

Deactivating BlackBerry devices that do not have IT policies applied

54

 

Deactivate BlackBerry devices that do not have IT policies applied

55

 

Creating new IT policy rules to control third-party applications

55

 

Create an IT policy rule for a third-party application

55

 

Change or delete IT policy rules for third-party applications

56

 

Export all IT policy data to a data file

56

 

Delete an IT policy

57

5

Configuring security options

58

 

Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other

58

 

Algorithms that the BlackBerry Enterprise Solution uses to encrypt data

58

 

Change the symmetric key encryption algorithm that the BlackBerry Enterprise Solution uses

59

 

Managing device access to the BlackBerry Enterprise Server

59

 

Turn on the Enterprise Service Policy

60

 

Configure the Enterprise Service Policy

60

 

Permit a user to override the Enterprise Service Policy

61

 

Extending messaging security to a BlackBerry device

61

 

Extending messaging security using PGP encryption

61

 

Extending messaging security using S/MIME encryption

62

 

Enforcing secure messaging using classifications

65

 

Create a message classification

65

 

Create a message classification based on an existing message classification

66

 

Order message classifications

66

 

Delete a message classification

67

 

Generating organization-specific encryption keys for PIN-message encryption

67

 

Generate a PIN encryption key

67

 

Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration Service, and

 

 

BlackBerry MVS provide

68

 

When a BlackBerry device overwrites data in the BlackBerry device memory

68

 

Changing when a BlackBerry device cleans the BlackBerry device memory

69

 

Best practice: Configuring additional memory cleaner settings for BlackBerry devices

70

6

Configuring the BlackBerry Enterprise Server environment

71

 

Best practice: Running the BlackBerry Enterprise Server

71

 

Configuring certain BlackBerry Enterprise Server components to use proxy servers

72

 

Configure a BlackBerry Enterprise Server component to use a .pac file

72

 

Configure a BlackBerry Enterprise Server component to use a proxy server

73

 

Configure a BlackBerry Enterprise Server component to authenticate to a proxy server on behalf of BlackBerry

 

 

devices

74

 

Configuring the BlackBerry Administration Service to use a proxy server

74

 

Configuring proxy selection for the BlackBerry Administration Service

75

Page 4
Image 4
Blackberry SWD-20120924140022907 manual Configuring security options