Blackberry PRD-10459-016 Administration Guide - Page 4

Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration - file

Page 4 highlights

Option 2: Applying multiple IT policies to each user account 45 View the resolved IT policy rules that are assigned to a user account 48 Deactivating BlackBerry devices that do not have IT policies applied 48 Deactivate BlackBerry devices that do not have IT policies applied 48 Creating new IT policy rules to control third-party applications 49 Create an IT policy rule for a third-party application 49 Change or delete IT policy rules for third-party applications 49 Export all IT policy data to a data file...50 Delete an IT policy...50 5 Configuring security options...51 Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other 51 Algorithms that the BlackBerry Enterprise Solution uses to encrypt data 51 Change the symmetric key encryption algorithm that the BlackBerry Enterprise Solution uses 51 Managing device access to the BlackBerry Enterprise Server 52 Turn on the Enterprise Service Policy...52 Configure the Enterprise Service Policy...53 Permit a user to override the Enterprise Service Policy 53 Extending messaging security to a BlackBerry device 53 Extending messaging security using PGP encryption 54 Extending messaging security using S/MIME encryption 54 Enforcing secure messaging using classifications 57 Create a message classification...57 Create a message classification based on an existing message classification 58 Order message classifications...58 Delete a message classification...58 Generating organization-specific encryption keys for PIN-message encryption 59 Generate a PIN encryption key...59 Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration Service, and BlackBerry MVS provide...59 When a BlackBerry device overwrites data in the BlackBerry device memory 60 Changing when a BlackBerry device cleans the BlackBerry device memory 60 Best practice: Configuring additional memory cleaner settings for BlackBerry devices 61 6 Configuring the BlackBerry Enterprise Server environment 62 Best practice: Running the BlackBerry Enterprise Server 62 Configuring certain BlackBerry Enterprise Server components to use proxy servers 62 Configure a BlackBerry Enterprise Server component to use a .pac file 63 Configure a BlackBerry Enterprise Server component to use a proxy server 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432

Option 2: Applying multiple IT policies to each user account
...................................................................
45
View the resolved IT policy rules that are assigned to a user account
......................................................
48
Deactivating BlackBerry devices that do not have IT policies applied
..............................................................
48
Deactivate BlackBerry devices that do not have IT policies applied
..........................................................
48
Creating new IT policy rules to control third-party applications
......................................................................
49
Create an IT policy rule for a third-party application
................................................................................
49
Change or delete IT policy rules for third-party applications
....................................................................
49
Export all IT policy data to a data file
................................................................................................................
50
Delete an IT policy
............................................................................................................................................
50
5
Configuring security options
.............................................................................................................................
51
Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other
..............
51
Algorithms that the BlackBerry Enterprise Solution uses to encrypt data
................................................
51
Change the symmetric key encryption algorithm that the BlackBerry Enterprise Solution uses
..............
51
Managing device access to the BlackBerry Enterprise Server
..........................................................................
52
Turn on the Enterprise Service Policy
........................................................................................................
52
Configure the Enterprise Service Policy
.....................................................................................................
53
Permit a user to override the Enterprise Service Policy
............................................................................
53
Extending messaging security to a BlackBerry device
......................................................................................
53
Extending messaging security using PGP encryption
................................................................................
54
Extending messaging security using S/MIME encryption
..........................................................................
54
Enforcing secure messaging using classifications
.............................................................................................
57
Create a message classification
.................................................................................................................
57
Create a message classification based on an existing message classification
...........................................
58
Order message classifications
....................................................................................................................
58
Delete a message classification
.................................................................................................................
58
Generating organization-specific encryption keys for PIN-message encryption
..............................................
59
Generate a PIN encryption key
..................................................................................................................
59
Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration
Service, and BlackBerry MVS provide
...............................................................................................................
59
When a BlackBerry device overwrites data in the BlackBerry device memory
................................................
60
Changing when a BlackBerry device cleans the BlackBerry device memory
.............................................
60
Best practice: Configuring additional memory cleaner settings for BlackBerry devices
...........................
61
6
Configuring the BlackBerry Enterprise Server environment
.............................................................................
62
Best practice: Running the BlackBerry Enterprise Server
.................................................................................
62
Configuring certain BlackBerry Enterprise Server components to use proxy servers
......................................
62
Configure a BlackBerry Enterprise Server component to use a .pac file
...................................................
63
Configure a BlackBerry Enterprise Server component to use a proxy server
............................................
63