Defining Measures To Protect Blackberry Devices From Unauthorized Use; Defining The Encryption Strength That The Blackberry Device Uses To Protect Data - Blackberry Infinity B1367WD User Manual

Table of Contents

Advertisement

Policy Reference Guide

Defining measures to protect BlackBerry devices from unauthorized use

Scenario
Extend your organization's password policy to
BlackBerry® devices. Lock the BlackBerry device
automatically, regardless of user activity.
Prompt the user to type a password, whether the
BlackBerry device is idle or in use.
Lock the BlackBerry device automatically when a
user inserts it in the holster.
Lock the BlackBerry device automatically after a
period of user inactivity.
Defining the encryption strength that the BlackBerry device uses to protect
data
Scenario
Protect user and application data on the
BlackBerry® device.
Protect the device transport key on a
locked BlackBerry device.
Specify the level of FIPS compliance on
the BlackBerry device.
Specify the algorithms that the
BlackBerry device uses to encrypt and
decrypt PGP® messages.
Specify the algorithms that the
BlackBerry device uses to encrypt and
decrypt S/MIME messages.
Defining measures to protect BlackBerry devices from unauthorized use
Example IT policy rule
Enable Long-Term Timeout
Periodic Challenge Time
Force Lock When Holstered
Maximum Security Timeout
Example IT policy rule
Content Protection Strength
Force Content Protection of Master Key Yes
FIPS Level
PGP Allowed Content Ciphers
S/MIME Allowed Content Ciphers
Example value
Yes
60 (minutes that can elapse
before the user must type a
password)
Yes
10 (minutes of idle time that is
permitted before the BlackBerry
device locks)
Example value
Yes
2
AES (256-bit), AES (192-bit), AES (128-
bit), and Triple DES
AES (256-bit), AES (192-bit), AES (128-
bit), and Triple DES
329

Advertisement

Table of Contents
loading

This manual is also suitable for:

Enterprise server 5.0 sp2

Table of Contents