Preconfigured IT policy Description
Medium Security with No 3rd Party
Applications
Similar to the Medium Password Security, this policy requires a complex
password that a user must change frequently, a security timeout, and a
maximum password history. This policy prevents users from making their
devices discoverable by other Bluetooth enabled devices and prevents devices
from downloading third-party applications.
Advanced Security Similar to the Default IT policy, this IT policy also requires a complex password
that users must change frequently, a password timeout that locks devices, and a
maximum password history. This policy restricts Bluetooth technology on
devices, turns on strong content protection, turns off USB mass storage, and
requires devices to encrypt external file systems.
Advanced Security with No 3rd Party
Applications
Similar to the Advanced Security IT policy, this IT policy requires a complex
password that users must change frequently, a password timeout that locks
devices, and a maximum password history. This policy restricts Bluetooth
technology on devices, turns on strong content protection, turns off USB mass
storage, requires devices to encrypt external file systems, and prevents devices
from downloading third-party applications.
Default values for preconfigured IT policies
You can configure additional IT policy rules in the preconfigured IT policies or change any of the following values:
IT policy rule Default IT
policy Individual-
Liable
Device IT
policy
Basic
Password
Security IT
policy
Medium
Password
Security IT
policy
Medium
Password
Security
with No 3rd
Party
Applications
IT policy
Advanced
Security IT
policy
Advanced
Security
with No 3rd
Party
Applications
IT policy
Device-Only Items
Enable Long-
Term Timeout Yes Yes Yes Yes
Maximum
Security Timeout 30 minutes 10 minutes 10 minutes 10 minutes 10 minutes
Maximum
Password Age 60 days 30 days 30 days 30 days 30 days
Password
Pattern Checks no restriction no restriction at least 1
alpha and 1 at least 1
alpha and 1 at least 1
alpha and 1 at least 1
alpha and 1
Administration Guide Using an IT policy to manage BlackBerry Enterprise Solution security
41