TLS Disable Weak Ciphers IT policy rule.............................................................................................................................. 166
TLS Minimum Strong DH Key Length IT policy rule........................................................................................................... 166
TLS Minimum Strong DSA Key Length IT policy rule......................................................................................................... 167
TLS Minimum Strong ECC Key Length IT policy rule......................................................................................................... 168
TLS Minimum Strong RSA Key Length IT policy rule......................................................................................................... 168
TLS Restrict FIPS Ciphers IT policy rule............................................................................................................................... 169
Wireless Software Upgrades policy group............................................................................................................................... 169
Allow Non Enterprise Upgrade IT policy rule..................................................................................................................... 169
Disallow Device User Requested Rollback IT policy rule.................................................................................................. 170
Disallow Device User Requested Upgrade......................................................................................................................... 170
Disallow Patch Download Over International Roaming WAN IT policy rule................................................................. 170
Disallow Patch Download Over Roaming WAN IT policy rule..........................................................................................
171
Disallow Patch Download Over WAN IT policy rule...........................................................................................................
171
Disallow Patch Download Over WiFi IT policy rule............................................................................................................
171
WTLS policy group....................................................................................................................................................................... 172
WTLS Disable Invalid Connection IT policy rule................................................................................................................. 172
WTLS Disable Untrusted Connection IT policy rule........................................................................................................... 172
WTLS Disable Weak Ciphers IT policy rule........................................................................................................................... 173
WTLS Minimum Strong DH Key Length IT policy rule....................................................................................................... 173
WTLS Minimum Strong ECC Key Length IT policy rule...................................................................................................... 174
WTLS Minimum Strong RSA Key Length IT policy rule...................................................................................................... 175
WTLS Restrict FIPS Ciphers IT policy rule............................................................................................................................ 175
3 Application control policy rules....................................................................................................................................... 177
Understanding application control policies............................................................................................................................
177
Setting application control policy rules...................................................................................................................................
177
4 Descriptions of application control policy rules.......................................................................................................... 179
Security Data application control policy rule.......................................................................................................................... 179
BlackBerry Device Keystore Medium Security application control policy rule.................................................................. 179
Bluetooth Serial Profile application control policy rule......................................................................................................... 180
Browser Filter Domains application control policy rule........................................................................................................ 180
Browser Filters application control policy rule....................................................................................................................... 180
Device GPS application control policy rule.............................................................................................................................
181
Disposition application control policy rule..............................................................................................................................
181
Event Injection application control policy rule.......................................................................................................................
181