Blackberry PRD-10459-003 Administration Guide - Page 4

Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration - file

Page 4 highlights

Option 2: Applying multiple IT policies to each user account 45 View the resolved IT policy rules that are assigned to a user account 48 Deactivating BlackBerry devices that do not have IT policies applied 48 Deactivate BlackBerry devices that do not have IT policies applied 48 Creating new IT policy rules to control third-party applications 49 Create an IT policy rule for a third-party application 49 Change or delete IT policy rules for third-party applications 49 Export all IT policy data to a data file...50 Delete an IT policy...50 5 Configuring security options...51 Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other 51 Algorithms that the BlackBerry Enterprise Solution uses to encrypt data 51 Change the symmetric key encryption algorithm that the BlackBerry Enterprise Solution uses 51 Managing device access to the BlackBerry Enterprise Server 52 Turn on the Enterprise Service Policy...52 Configure the Enterprise Service Policy...53 Permit a user to override the Enterprise Service Policy 53 Extending messaging security to a BlackBerry device 53 Extending messaging security using PGP encryption 54 Extending messaging security using S/MIME encryption 54 Extending messaging security using IBM Lotus Notes encryption 57 Enforcing secure messaging using classifications 58 Create a message classification...58 Create a message classification based on an existing message classification 59 Order message classifications...59 Delete a message classification...60 Generating organization-specific encryption keys for PIN-message encryption 60 Generate a PIN encryption key...60 Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration Service, and BlackBerry MVS provide...61 When a BlackBerry device overwrites data in the BlackBerry device memory 61 Changing when a BlackBerry device cleans the BlackBerry device memory 62 Best practice: Configuring additional memory cleaner settings for BlackBerry devices 62 6 Configuring the BlackBerry Enterprise Server environment 63 Best practice: Running the BlackBerry Enterprise Server 63 Configuring certain BlackBerry Enterprise Server components to use proxy servers 64 Configure a BlackBerry Enterprise Server component to use a .pac file 64

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420

Option 2: Applying multiple IT policies to each user account
...................................................................
45
View the resolved IT policy rules that are assigned to a user account
......................................................
48
Deactivating BlackBerry devices that do not have IT policies applied
..............................................................
48
Deactivate BlackBerry devices that do not have IT policies applied
..........................................................
48
Creating new IT policy rules to control third-party applications
......................................................................
49
Create an IT policy rule for a third-party application
................................................................................
49
Change or delete IT policy rules for third-party applications
....................................................................
49
Export all IT policy data to a data file
................................................................................................................
50
Delete an IT policy
............................................................................................................................................
50
5
Configuring security options
.............................................................................................................................
51
Encrypting data that the BlackBerry Enterprise Server and a BlackBerry device send to each other
..............
51
Algorithms that the BlackBerry Enterprise Solution uses to encrypt data
................................................
51
Change the symmetric key encryption algorithm that the BlackBerry Enterprise Solution uses
..............
51
Managing device access to the BlackBerry Enterprise Server
..........................................................................
52
Turn on the Enterprise Service Policy
........................................................................................................
52
Configure the Enterprise Service Policy
.....................................................................................................
53
Permit a user to override the Enterprise Service Policy
............................................................................
53
Extending messaging security to a BlackBerry device
......................................................................................
53
Extending messaging security using PGP encryption
................................................................................
54
Extending messaging security using S/MIME encryption
..........................................................................
54
Extending messaging security using IBM Lotus Notes encryption
............................................................
57
Enforcing secure messaging using classifications
.............................................................................................
58
Create a message classification
.................................................................................................................
58
Create a message classification based on an existing message classification
...........................................
59
Order message classifications
....................................................................................................................
59
Delete a message classification
.................................................................................................................
60
Generating organization-specific encryption keys for PIN-message encryption
..............................................
60
Generate a PIN encryption key
..................................................................................................................
60
Turn off BlackBerry services that the BlackBerry MDS Connection Service, BlackBerry Collaboration
Service, and BlackBerry MVS provide
...............................................................................................................
61
When a BlackBerry device overwrites data in the BlackBerry device memory
................................................
61
Changing when a BlackBerry device cleans the BlackBerry device memory
.............................................
62
Best practice: Configuring additional memory cleaner settings for BlackBerry devices
...........................
62
6
Configuring the BlackBerry Enterprise Server environment
.............................................................................
63
Best practice: Running the BlackBerry Enterprise Server
.................................................................................
63
Configuring certain BlackBerry Enterprise Server components to use proxy servers
......................................
64
Configure a BlackBerry Enterprise Server component to use a .pac file
...................................................
64