Managing IT policies and IT policy rules 4

List the IT policy rules in an IT policy

1. To open the command window for the BlackBerry® Enterprise Server User Administration Tool, on the computer that hosts
the tool, on the taskbar, click Start > Programs > BlackBerry Enterprise Server Resource Kit > BlackBerry Enterprise
Server User Administration Tool > BlackBerry Enterprise Server User Administration Tool.
2. Type besuseradminclient <credentials> -list -it_policy_rules and the following parameter:
-it_policy <policy_name>
Example: Listing the IT policy rules and displaying them in an output file
besuseradminclient -username admin -password password -list -it_policy_rules -it_policy "Advanced Security" -o
AdvancedSecurity.csv
Example output
Policy Name, Policy Group, Rule Name, Rule Value, Rule Type
Advanced Security, Device only, User Can Disable Password, No, BOOLEAN
Advanced Security, Bluetooth, Disable Serial Port Profile, Yes, BOOLEAN
Advanced Security, Security, Force Lock When Holstered, Yes, BOOLEAN
Advanced Security, Password, Maximum Password History, 6, INTEGER
Advanced Security, Device only, Password Pattern Checks, At least 1 alpha and 1 numeric character, ENUMERATION: 0|No
restriction|1|At least 1 alpha and 1 numeric character|2|At least 1 alpha, 1 numeric, and 1 special character|3|At least 1 upper-case
alpha, 1 lower-case alpha, 1 numeric, and 1 special character
Advanced Security, Bluetooth, Disable File Transfer, Yes, BOOLEAN
Advanced Security, Bluetooth, Disable Discoverable Mode, Yes, BOOLEAN
Advanced Security, Bluetooth, Require LED Connection Indicator, Yes, BOOLEAN
Advanced Security, Device only, Enable Long-Term Timeout, Yes, BOOLEAN
Advanced Security, Policy Information, IT Policy Name, Advanced Security, STRING
Advanced Security, Security, Disable USB Mass Storage, Yes, BOOLEAN
Advanced Security, Security, Content Protection Strength, Strong, ENUMERATION: 0|Strong|1|Stronger|2|Strongest
Advanced Security, Device only, User Can Change Timeout, Yes, BOOLEAN
Administration Guide Managing IT policies and IT policy rules
25