Übersicht der default IT-Policy

Tipp: Praktisch um nach einem Begriff zu suchen und zu wissen wo er sich befindet (Ich wünsche mir bis heute eine integrierte Suchfunktion in der IT-Policy von RIM).

Application Center policy group
Disable Application Center IT policy rule
Disable Carrier Directory IT policy rule

BlackBerry MDS Integration Service policy group
Disable Activation With Public BlackBerry MDS Integration Service IT policy rule
Disable MDS Runtime IT policy rule
Disable User-Initiated Activation With Public BlackBerry MDS Integration Service IT policy rule
Lowest BlackBerry MDS Integration Service Security Version Allowed IT policy rule
Verify BlackBerry MDS Integration Service Certificate IT policy rule

BlackBerry Messenger policy group
Disable BlackBerry Messenger IT policy rule
Disallow Forwarding Of Contacts IT policy rule
Messenger Audit Email Address IT policy rule
Messenger Audit Max Report Interval IT policy rule
Messenger Audit Report Interval IT policy rule
Messenger Audit UID IT policy rule

BlackBerry Smart Card Reader policy group
Disable Auto Reconnect To BlackBerry Smart Card Reader IT policy rule
Force Erase All Keys on BlackBerry Disconnect Timeout IT policy rule
Force Erase Key on PC Standby IT policy rule
Maximum BlackBerry Disconnected Timeout IT policy rule
Maximum BlackBerry Bluetooth Traffic Inactivity Timeout IT policy rule
Maximum BlackBerry Long Term Timeout IT policy rule
Maximum Bluetooth Encryption Key Regeneration Period IT policy rule
Maximum Bluetooth Range IT policy rule
Maximum Connection Heartbeat Period IT policy rule
Maximum Number of BlackBerry Transactions IT policy rule
Maximum Number of PC Pairings IT policy rule
Maximum PC Bluetooth Traffic Inactivity Timeout IT policy rule
Maximum Number of PC Transactions IT policy rule
Maximum PC Disconnected Timeout IT policy rule
Maximum PC Long Term Timeout IT policy rule
Maximum Smart Card Not Present Timeout IT policy rule

BlackBerry Unite! policy group
Disable Download Manager IT policy rule
Disable Unite! Applications IT policy rule

Bluetooth policy group
Allow Outgoing Calls IT policy rule
Disable Address Book Transfer IT policy rule
Disable Advanced Audio Distribution Profile IT policy rule
Disable Audio/Video Remote Control Profile IT policy rule
Disable Bluetooth IT policy rule
Disable Desktop Connectivity IT policy rule
Disable Dial-Up Networking IT policy rule
Disable Discoverable Mode IT policy rule
Disable File Transfer IT policy rule
Disable Handsfree Profile IT policy rule
Disable Headset Profile IT policy rule
Disable Pairing IT policy rule
Disable Serial Port Profile IT policy rule
Disable SIM Access Profile IT policy rule
Disable Wireless Bypass IT policy rule
Force CHAP Authentication on Bluetooth Link IT Policy rule
Limit Discoverable Time IT policy rule
Minimum Encryption Key Length IT policy rule
Require Encryption IT policy rule
Require LED Connection Indicator IT policy rule
Require Password for Discoverable Mode IT policy rule
Require Password for Enabling Bluetooth Support IT policy rule

Browser policy group
Allow Application Download Services IT policy rule
Allow Hotspot Browser IT policy rule
Allow IBS Browser IT policy rule
Disable Auto Synchronization in Browser IT policy rule
Disable JavaScript in Browser IT policy rule
Download Images URL IT policy rule
Download Themes URL IT policy rule
Download Tunes URL IT policy rule
MDS Browser BSM Enabled IT policy rule
MDS Browser Domains IT policy rule
MDS Browser HTML Tables Enabled IT policy rule
MDS Browser JavaScript Enabled IT policy rule
MDS Browser Style Sheets Enabled IT policy rule
MDS Browser Title IT policy rule
MDS Browser Use Separate Icon IT policy rule

Camera policy group
Disable Photo Camera IT policy rule
Disable Video Camera IT policy rule

Certificate Synchronization policy group
Random Source URL IT policy rule
User Can Disable Automatic RNG Initialization IT policy rule

Common policy group
BlackBerry Server Version IT policy rule
Confirm On Send IT policy rule
Disable Kodiak PTT IT policy rule
Disable MMS IT policy rule
Disable Voice-Activated Dialing IT policy rule
Disable Voice Note Recording IT policy rule
IT Policy Notification IT policy rule
Lock Owner Info IT policy rule
Set Owner Info IT policy rule
Set Owner Name IT policy rule

Desktop Only items
Auto Backup Enabled IT policy rule
Auto Backup Exclude Messages IT policy rule
Auto Backup Exclude Sync IT policy rule
Auto Backup Frequency IT policy rule
Auto Backup Include All IT policy rule
Disable Wireless Calendar IT policy rule
Do Not Save Sent Messages IT policy rule
Force Load Count IT policy rule
Force Load Message IT policy rule
Forward Messages In Cradle IT policy rule
Message Conflict Mailbox Wins IT policy rule
Message Prompt IT policy rule
Show Application Loader IT policy rule
Show Web Link IT policy rule
Synchronize Messages Instead Of Importing IT policy rule
Web Link Label IT policy rule
Web Link URL IT policy rule

Desktop policy group
Desktop Allow Desktop Add-ins IT policy rule
Desktop Allow Device Switch IT policy rule
Desktop Password Cache Timeout IT policy rule
Disable Check For Updates Link IT policy rule
Disable Media Manager IT policy rule
Override Check For Updates URL IT policy rule

Device IOT Application policy group
Device Diagnostic App Disable IT policy rule
Set Diagnostic Report Email Address IT policy rule
Set Diagnostic Report PIN Address IT policy rule

Device Only Items
Allow BCC Recipients IT policy rule
Allow Peer-to-Peer Messages IT policy rule
Allow SMS IT policy rule
Default Browser Config UID IT policy rule
Enable Long-Term Timeout IT policy rule
Enable WAP Config IT policy rule
Home Page Address IT policy rule
Maximum Password Age IT policy rule
Home Page Address Is Read-Only IT policy rule
Maximum Security Timeout IT policy rule
Minimum Password Length IT policy rule
Password Pattern Checks IT policy rule
Password Required IT policy rule
User Can Change Timeout IT policy rule
User Can Disable Password IT policy rule

Documents To Go policy group
Disable Documents To Go IT policy rule
Hide Documents To Go Communication Menus IT policy rule
Hide Documents To Go Premium Feature Menus IT policy rule

Email Messaging policy group
Allow Auto Attachment Download IT policy rule
Attachment Viewing IT policy rule
Disable Form Submission IT policy rule
Disable Manual Download of External Images IT policy rule
Disable Notes Native Encryption Forward And Reply IT policy rule
Disable Rich Content Email IT policy rule
Enable Wireless Message Reconciliation IT policy rule
Inline Content Requests IT policy rule
Keep Message Duration IT policy rule
Keep Saved Message Duration IT policy rule
Maximum Native Attachment MFH attachment size IT policy rule
Maximum Native Attachment MFH total attachment size IT policy rule
Notes Native Encryption Password Timeout IT policy rule
Prepend Disclaimer IT policy rule
Maximum Native Attachment MTH attachment size

Enterprise Voice Client policy group
Disable DTMF Fallback IT policy rule
Disable Enterprise Voice Client IT policy rule
Lock Outgoing Line IT policy rules
Reject Non-Enterprise Voice Calls IT policy rule

Firewall policy group
Restrict Incoming Cellular Calls IT policy rule
Restrict Outgoing Cellular Calls IT policy rule

Global items
Allow Browser IT policy rule
Allow Phone IT policy rule
Auto Signature IT policy rule

Instant Messaging policy group
Disallow File Transfer Types IT policy rule
Disable Emailing Conversation IT policy rule
Disable Saving Conversation IT policy rule

Location Based Services policy group
Disable BlackBerry Maps IT policy rule
Enable Enterprise Location Tracking IT policy rule
Enterprise Location Tracking User Prompt Message IT policy rule
Enterprise Location Tracking Interval IT policy rule

Memory Cleaner policy group
Force Memory Clean When Holstered IT policy rule
Force Memory Clean When Idle IT policy rule
Memory Cleaner Maximum Idle Time IT policy rule

On-Device Help policy group
On-Device Help Links IT policy rule
On-Device Help Group Label IT policy rule

Password policy group
Duress Notification Address IT policy rule
Forbidden Passwords IT policy rule
Maximum Password History IT policy rule
Periodic Challenge Time IT policy rule
Set Maximum Password Attempts IT policy rule
Set Password Timeout IT policy rule
Suppress Password Echo IT policy rule

PIM Synchronization policy group
Disable Address Wireless Synchronization IT policy rule
Disable All Wireless Synchronization IT policy rule
Disable Calendar Wireless Synchronization IT policy rule
Disable Enterprise Activation Progress IT policy rule
Disable Memopad Wireless Sync IT policy rule
Disable Phone Call Log Wireless Synchronization IT policy rule
Disable PIN Messages Wireless Synchronization IT policy rule
Disable SMS Messages Wireless Sync IT policy rule
Disable Task Wireless Sync IT policy rule
Disable Wireless Bulk Loads IT policy rule

PGP Application policy group
PGP Allowed Content Ciphers IT policy rule
PGP Allowed Encrypted Attachment Mode
PGP Allowed Encryption Type IT policy rule
PGP Blind Copy Address IT policy rule
PGP Force Digital Signature IT policy rule
PGP Force Encrypted Messages IT policy rule
PGP Minimum Strong DH Key Length IT policy rule
PGP Minimum Strong DSA Key Length IT policy rule
PGP Minimum Strong RSA Key Length IT policy rule
PGP Universal Enrollment Method IT policy rule
PGP Universal Policy Cache Timeout IT policy rule
PGP Universal Server Address IT policy rule

RIM Value-Added Applications policy group
Disable BlackBerry Wallet IT policy rule
Disable Ecommerce Content Optimization Engine IT policy rule
Disable Lotus Connections IT policy rule
Lotus Connections Activities Server IT policy rule
Lotus Connections Blogs Server IT policy rule
Lotus Connections Communities Server IT policy rule
Lotus Connections Dogear Server IT policy rule
Lotus Connections Profiles Server IT policy rule

S/MIME Application policy group
Entrust Messaging Server (EMS) Email Address IT policy rule
S/MIME Allowed Content Ciphers IT policy rule
S/MIME Allowed Encrypted Attachment Mode IT policy rule
S/MIME Allowed Encryption Types IT policy rule
S/MIME Blind Copy Address IT policy rule
S/MIME Force Digital Signature IT policy rule
S/MIME Force Encrypted Messages IT policy rule
S/MIME Force Smartcard Use IT policy rule
S/MIME Minimum Strong DH Key Length IT policy rule
S/MIME Minimum Strong ECC Key Length IT policy rule
S/MIME Minimum Strong DSA Key Length IT policy rule
S/MIME Minimum Strong RSA Key Length IT policy rule

Secure Email policy group
Canonical Certificate Domain Name IT policy rule
Disable Certificate Address Checks IT policy rule

Security policy group
Allow External Connections IT policy rule
Allow Internal Connections IT policy rule
Allow Outgoing Call When Locked IT policy rule
Allow Resetting of Idle Timer IT policy rule
Allow Screen Shot Capture IT policy rule
Allow Smart Card Password Caching IT policy rule
Allow Split-Pipe Connections IT policy rule
Allow Third Party Apps to Use Persistent Store IT policy rule
Allow Third Party Apps to Use Serial Port IT policy rule
Certificate Status Maximum Expiry Time IT policy rule
Content Protection Strength IT policy rule
Desktop Backup IT policy rule
Disable DES Transport Crypto IT policy rule
Disable Cut/Copy/Paste IT policy rule
Disable External Memory IT policy rule
Disable Forwarding Between Services IT policy rule
Disable Geo-Tagging of Photos IT policy rule
Disable GPS IT policy rule
Disable Invalid Certificate Use IT policy rule
Disable IP Modem IT policy rule
Disable Key Store Backup IT policy rule
Disable Key Store Low Security IT policy rule
Disable Media Manager FTP Access
Disable Message Normal Send IT policy rule
Disable Peer-to-Peer Normal Send IT policy rule
Disable Persisted Plain Text IT policy rule
Disable Public Photo Sharing Applications IT policy rule
Disable Public Social Networking Applications IT policy rule
Disable Radio When Cradled IT policy rule
Disable Revoked Certificate Use IT policy rule
Disable Smart Password Entry IT policy rule
Disable Stale Certificate Status Checks IT policy rule
Disable Stale Status Use IT policy rule
Disable Untrusted Certificate Use IT policy rule
Disable Unverified Certificate Use IT policy rule
Disable Unverified CRLs IT policy rule
Disable USB Mass Storage IT policy rule
Disable Weak Certificate Use IT policy rule
Disallow Third Party Application Downloads IT policy rule
External File System Encryption Level IT policy rule
FIPS Level IT policy rule
Firewall Block Incoming Messages IT policy rule
Firewall Whitelist Addresses IT policy rule
Force Content Protection Of Master Keys IT policy rule
Force Include Address Book In Content Protection IT policy rule
Force LED Blinking When Microphone Is On IT policy rule
Force Lock When Holstered IT policy rule
Force Smart Card Two Factor Authentication IT policy rule
Force Smart Card Two Factor Challenge Response IT policy rule
Key Store Password Maximum Timeout IT policy rule
Lock on Smart Card Removal IT policy rule
Maximum Smart Card User Authenticator Certificate Status Check Period IT policy rule
Message Classification IT policy rule
Message Classification Title IT policy rule
Minimal Encryption Key Store Security Level IT policy rule
Minimal Signing Key Store Security Level IT policy rule
Password Required for Application Download IT policy rule
Required Password Pattern IT policy rule
Remote Wipe Reset to Factory Defaults IT policy rule
Require Secure APB Messages IT policy rule
Secure Wipe Delay After IT Policy Received IT policy rule
Secure Wipe Delay After Lock IT policy rule
Secure Wipe if Low Battery IT policy rule
Security Service Colors IT policy rule
Security Transcoder Cod File Hashes IT policy rule
Trusted Certificate Thumbprints IT policy rule
Weak Digest Algorithms IT policy rule

Service Exclusivity policy group
Allow Other Browser Services IT policy rule
Allow Other Calendar Services IT policy rule
Allow Other Message Services IT policy rule
Allow Public AIM Services IT policy rule
Allow Public Google Talk Services IT policy rule
Allow Public ICQ Services IT policy rule
Allow Public IM Services IT policy rule
Allow Public WLM Services IT policy rule
Allow Public Yahoo! Messenger Services IT policy rule

SIM Application Toolkit policy group
Disable Network Location Query IT policy rule
Disable SIM Call Control IT policy rule
Disable SIM Originated Calls IT policy rule

Smart Dialing policy group
Enable Smart Dialing Policy IT policy rule
Set Local Area Code IT policy rule
Set Local Country Code IT policy rule
Set National Number Length IT policy rule
Smart Dialing Allow Device Changes IT policy rule

TCP policy group
TCP APN IT policy rule
TCP Password IT policy rule
TCP Username IT policy rule

TLS policy group
TLS Device Side Only IT policy rule
TLS Disable Invalid Connection IT policy rule
TLS Disable Untrusted Connection IT policy rule
TLS Disable Weak Ciphers IT policy rule
TLS Minimum Strong DH Key Length IT policy rule
TLS Minimum Strong DSA Key Length IT policy rule
TLS Minimum Strong ECC Key Length IT policy rule
TLS Minimum Strong RSA Key Length IT policy rule
TLS Restrict FIPS Ciphers IT policy rule

Wireless Software Upgrades policy group
Allow Non Enterprise Upgrade IT policy rule
Disallow Device User Requested Rollback IT policy rule
Disallow Device User Requested Upgrade
Disallow Patch Download Over International Roaming WAN IT policy rule
Disallow Patch Download Over Roaming WAN IT policy rule
Disallow Patch Download Over WAN IT policy rule
Disallow Patch Download Over WiFi IT policy rule

WTLS policy group
WTLS Disable Invalid Connection IT policy rule
WTLS Disable Untrusted Connection IT policy rule
WTLS Disable Weak Ciphers IT policy rule
WTLS Minimum Strong DH Key Length IT policy rule
WTLS Minimum Strong ECC Key Length IT policy rule
WTLS Minimum Strong RSA Key Length IT policy rule
WTLS Restrict FIPS Ciphers IT policy rule

[Policy Reference Guide / BlackBerry Enterprise Server Policy Reference Guide / Version 33]
Version: 4.1 | Service Pack: 6]

Martin Cygan

Martin ist Gründer des Blogs und berät Unternehmen im Umfeld der mobilen Lösungen. Seine Spezialthemen sind iOS, Mobile Device Management und Enterprise Mobility, sowie Apps.

40 Gedanken zu „Übersicht der default IT-Policy

  1. Mh, in einer PDF Datei kann man doch suchen!? Ebenso gibt es auch eine schicke Exceltabelle ab BES 5.0 . Also genug Formate wo man suchen kann :D .

  2. Natürlich gibt es eine PDF und eine XLS. Ich bin jedoch sehr Oft bei Kunden, wo ich nur Zugriff auf den BlackBerry-Server habe und dort kein PDF-Reader oder Excel installiert ist. Ein Brwoser ist jedoch auf jedem Rechner/Server. ;)

  3. This weblog is superior it has received the entire points i sought right after to speak about, it has fulfilled my wisdom, i just appreciated this weblog and that i wish to subscribe so are you able to please inform even though your blog will get up to date and what?s the procedure to subscribe in details.

  4. You can use subdomains and they should and can work. If you can and you discover you have a great program working it would be better to buy a area and actually put some work into marketing to your new domain.

  5. It is excellent every time i stumble on a really good publish like this. Acquiring a bit worned out with the poor top quality posts a couple of bloggers be able to write on their blogs. Retain it up. You now have a normal visitor now!

  6. With the proper equipment and ingredients, you can make homemade
    pizza that tastes a thousand times better than what you’ll find at your favorite restaurant. Never try to remove a pizza stone from the oven until it is completely cooled. The stone is easily cleaned with warm water, scraping off any pizza remnants with a spatula.

  7. Useful info. Lucky me I discovered your website accidentally, and I’m shocked why this twist of fate didn’t took place in advance!

    I bookmarked it.

  8. Good day! This is my 1st comment here so I just wanted to give a quick shout out and say I truly enjoy reading through your posts.
    Can you recommend any other blogs/websites/forums that cover the
    same subjects? Appreciate it!

  9. Write more, thats all I have to say. Literally, it
    seems as though you relied on the video to make your point.
    You clearly know what youre talking about, why waste your
    intelligence on just posting videos to your
    site when you could be giving us something enlightening to read?

    Here is my web-site … company of heroes
    2 key generator key generator (Bernd)

  10. Howdy! I know this is kind of off topic but I was wondering if you knew where I could find
    a captcha plugin for my comment form? I’m using the same
    blog platform as yours and I’m having trouble finding one?
    Thanks a lot!

  11. It’s the best time to make some plans for the future and it’s time to be
    happy. I have read this post and if I could I wish to suggest you some interesting things or tips.
    Perhaps you could write next articles referring to this article.
    I want to read more things about it!

  12. When you go with selecting a properly credited relocation firm, make no mistake – they’re going to
    be following correct practices as well as safe guards to make sure your personal possessions show up safely and
    in good condition. You can either call their customer service
    or visit official websites to ask for the estimates.
    This could help in simplifying the moving process and keep your company so
    much cash in order to stop unnecessary financial waste.

    my homepage … storage units near ithaca ny

  13. It must have been a truly exciting spectacle to behold;
    slightly naughty and thouroughly entertaining. Good real estate investment analysis software will invariably include
    an encyclopedia to help you out with this. Also, project sites with difficult
    access maybe be considered complex, as well. There are office buildings, ranging from small ones to
    massive high rise units that can house hundreds of offices.

    So the rent guaranty by the single-entity LLC does not mean much since it does not have
    much assets. Assisted Hearing Devices Available for Hearing Impaired.
    The previous has a greater influence on the freehold ground
    rent expense value, except if the lease is extremely short certainly.
    Parties are often offended by legalese set forth in well-drafted letters of intent.
    Character Rigging, 3d architectural rendering, Architectural Visualization, 3d
    Product Modelling, 3D Furnisher design. There’s no reason you can’t also build massive, passive cash flow; spread your investment risks;
    use leverage effectively; and build substantial
    equity.

    Stop by my webpage nnnet

  14. Year after year, businesses continue to compete so they are in the hunt
    for what would make them stand out and the
    methods and tools that will give them the advantage over others.

    For that reason, people will not feel put off about it.
    This involves figuring out where your target customers are networking online and making certain that your organization has a
    presence in the social media outlets that they are participating in. Social networks virtually never sleep and are up 24X7.

    Publicity and promotion is making a shift out of traditional media shops and there are new and unique ways of
    targeting audiences for events through social media.
    I have to confess that I was a little hesitant when I found out that they were using a Manager themselves because.

    You should definitely think twice before you hire out a company
    dealing specifically in social media marketing. The most appropriate set of
    keywords must then be identified to ensure
    optimal website content that is designed for those specific keywords.
    4) ADD FRIENDS: Pick one of the groups each day and add between 10-30 new friends a
    day. The internet-marketing services are very necessary for the creation of your brand identity and for achieving recognition among
    prospects.

    My webpage delray beach social media marketing experts

  15. One thing is certain: perhaps Samson’s strength was in the
    hair, but remember it is a myth. LEIMO’s natural ingredients are of the purest and
    highest grade essential oils to deliver the cost
    effective results our clients demand. Caution: Too much Vitamin A can cause hair loss
    keep your intake less than 100,000 IU daily.

    Feel free to visit my page: keyword tags: credit

  16. Hi there everyone, it’s my first go to see at this web page,
    and piece of writing is actually fruitful designed ffor me, keep
    up posting such articles or reviews.

  17. hi!,I really like your writing very so much! percentage we keep in touch extra
    approximately your post on AOL? I need an expert in this area to solve my problem.
    Maybe that’s you! Taking a look ahead to look you.

    My web page :: beach towels uk

  18. Moisture may freeze at the expansion valve, giving some of the indication of under charging.
    Velocity boaters like finding around at a quickly pace even though most fishermen want a boat to get
    to the fish so they usually shift at a slower pace. With so many options available, you should be
    able to find and ship models according to your individual
    needs without much trouble.

    my site :: marine refrigerator with danfoss compressor

  19. I take pleasure in, lead to I found just what I used to be taking
    a look for. You’ve ended my four day lengthy hunt! God Bless you man. Have a nice day.

    Bye

    Look at my blog; Google

  20. Hello i am kavin, its my first time to commenting anyplace,
    when i read this paragraph i thought i could also create comment due
    to this brilliant piece of writing.

  21. Wonderful website you have here but I was wondering if you knew of any
    discussion boards that cover the same topics discussed in this article?
    I’d really like to be a part of online community where I can get comments from other experienced people that share the same interest.
    If you have any recommendations, please let me know.
    Kudos!

    Feel free to visit my blog … Uk Business

  22. The wedding day is always one of the most important
    days and while the bride glows, she makes sure
    that she looks her best so that her groom can make a memory of how
    beautiful she looked on the day they started their married
    life together for the rest of their lives. The latest celebrity fashion brings dogs which are a high
    fashion commodity being traded in of recent. All it will
    take is a little quality time to yourself, to redefine
    your wardrobe on your own.

    My blog: boutique dress websites

  23. Hi there! This post couldn’t be written any better!
    Reading this post reminds me of my previous room mate!

    He always kept chatting about this. I will forward this page
    to him. Fairly certain he will have a good read. Thank youu for sharing!

  24. Howdy just wanted to give you a quick heads up and let you know a few of
    the images aren’t loading properly. I’m not sure why
    but I think its a linking issue. I’ve tried it in two different web browsers
    and both show the same outcome.

    My page webpage (Mohammed)

  25. Hi there, just became aware of your blog
    through Google, and found that it’s really informative.
    I am gonna watch out for brussels. I will
    be grateful if you continue this in future. Many people will
    be benefited from your writing. Cheers!

  26. This design is incredible! You obviously know how to keep
    a reader amused. Between your wit and your videos, I was almost moved to
    start my own blog (well, almost…HaHa!) Fantastic job.
    I really loved what you had to say, and more than that,
    how you presented it. Too cool!

  27. What’s Taking place i am new to this, I
    stumbled upon this I’ve found It absolutely useful and it has aided me out loads.
    I am hoping to give a contribution & assist different
    users like its aided me. Good job.

  28. Link exchange is nothing else however it is simply placing the other person’s website link on your
    page at suitable place and other person will also do same in support of you.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert