Security Technical Overview
The BlackBerry device uses this IT policy rule only if the Password Required IT policy rule is set to True.
Minimum requirements
•
Java® based BlackBerry device
•
BlackBerry® Device Software Version 4.1
•
BlackBerry® Enterprise Server Version 4.0 SP3
Educating users about how to protect their Bluetooth enabled BlackBerry devices
You can educate users in your organization about how to use Bluetooth® technology on their BlackBerry® devices safely. To
help users protect their devices against Bluetooth based attacks, instruct them to perform the following actions:
•
Leave the Discoverable option on the BlackBerry device set to No.
•
If the Discoverable option on the BlackBerry device is set to Yes, deny requests to pair with unknown Bluetooth enabled
devices.
•
When pairing a BlackBerry device with another Bluetooth enabled device, set the Discoverable option to 2 Minutes. The
BlackBerry device is discoverable for two minutes, as long as it should take to complete the pairing.
•
Complete device pairings in private, uncrowded areas only.
•
Choose to encrypt Bluetooth data traffic both to and from the BlackBerry device. The BlackBerry® Enterprise
Solution uses the Bluetooth passkey to generate encryption keys. BlackBerry devices use Bluetooth Security Mode 3
and the highest encryption key length that is available on the paired device (minimum = 8 bits, maximum = 128 bits).
•
Protect the assigned name of a BlackBerry device. If a user with malicious intent knows the name of the BlackBerry
device, the device is vulnerable to an attack, even when it is not discoverable.
20
Managing Bluetooth enabled BlackBerry devices