The BlackBerry device uses this IT policy rule only if the Password Required IT policy rule is set to True.
Minimum requirements
•
Java® based BlackBerry device
•
BlackBerry® Device Software Version 4.1
•
BlackBerry® Enterprise Server Version 4.0 SP3
Educating users about how to protect their Bluetooth enabled BlackBerry devices
You can educate users in your organization about how to use Bluetooth® technology on their BlackBerry® devices safely. To
help users protect their devices against Bluetooth based attacks, instruct them to perform the following actions:
•
Leave the Discoverable option on the BlackBerry device set to No.
•
If the Discoverable option on the BlackBerry device is set to Yes, deny requests to pair with unknown Bluetooth enabled
devices.
•
When pairing a BlackBerry device with another Bluetooth enabled device, set the Discoverable option to 2 Minutes. The
BlackBerry device is discoverable for two minutes, as long as it should take to complete the pairing.
•
Complete device pairings in private, uncrowded areas only.
•
Choose to encrypt Bluetooth data traffic both to and from the BlackBerry device. The BlackBerry® Enterprise
Solution uses the Bluetooth passkey to generate encryption keys. BlackBerry devices use Bluetooth Security Mode 3
and the highest encryption key length that is available on the paired device (minimum = 8 bits, maximum = 128 bits).
•
Protect the assigned name of a BlackBerry device. If a user with malicious intent knows the name of the BlackBerry
device, the device is vulnerable to an attack, even when it is not discoverable.
Security Technical Overview
Managing Bluetooth enabled BlackBerry devices
20
Summary of Contents for ENTERPRISE SOLUTION DEVICES TE
Page 1: ...Security Technical Overview BlackBerry Devices with Bluetooth Technology...
Page 2: ...SWDT391201 391201 0613044539 001...
Page 4: ...Security Technical Overview BlackBerry Enterprise Solution security 2...
Page 6: ...Security Technical Overview Bluetooth technology 4...