Educating Users About How To Protect Their Bluetooth Enabled Blackberry Devices - Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL Overview

Security technical overview
Table of Contents

Advertisement

Security Technical Overview
The BlackBerry device uses this IT policy rule only if the Password Required IT policy rule is set to True.
Minimum requirements
Java® based BlackBerry device
BlackBerry® Device Software Version 4.1
BlackBerry® Enterprise Server Version 4.0 SP3

Educating users about how to protect their Bluetooth enabled BlackBerry devices

You can educate users in your organization about how to use Bluetooth® technology on their BlackBerry® devices safely. To
help users protect their devices against Bluetooth based attacks, instruct them to perform the following actions:
Leave the Discoverable option on the BlackBerry device set to No.
If the Discoverable option on the BlackBerry device is set to Yes, deny requests to pair with unknown Bluetooth enabled
devices.
When pairing a BlackBerry device with another Bluetooth enabled device, set the Discoverable option to 2 Minutes. The
BlackBerry device is discoverable for two minutes, as long as it should take to complete the pairing.
Complete device pairings in private, uncrowded areas only.
Choose to encrypt Bluetooth data traffic both to and from the BlackBerry device. The BlackBerry® Enterprise
Solution uses the Bluetooth passkey to generate encryption keys. BlackBerry devices use Bluetooth Security Mode 3
and the highest encryption key length that is available on the paired device (minimum = 8 bits, maximum = 128 bits).
Protect the assigned name of a BlackBerry device. If a user with malicious intent knows the name of the BlackBerry
device, the device is vulnerable to an attack, even when it is not discoverable.
20
Managing Bluetooth enabled BlackBerry devices

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise solution devices te

Table of Contents