Preconfigured IT policy
Description
Medium Security with No 3rd Party
Applications
Similar to the Medium Password Security, this policy requires a complex
password that a user must change frequently, a security timeout, and a
maximum password history. This policy prevents users from making their
devices discoverable by other Bluetooth enabled devices and prevents devices
from downloading third-party applications.
Advanced Security
Similar to the Default IT policy, this IT policy also requires a complex password
that users must change frequently, a password timeout that locks devices, and a
maximum password history. This policy restricts Bluetooth technology on
devices, turns on strong content protection, turns off USB mass storage, and
requires devices to encrypt external file systems.
Advanced Security with No 3rd Party
Applications
Similar to the Advanced Security IT policy, this IT policy requires a complex
password that users must change frequently, a password timeout that locks
devices, and a maximum password history. This policy restricts Bluetooth
technology on devices, turns on strong content protection, turns off USB mass
storage, requires devices to encrypt external file systems, and prevents devices
from downloading third-party applications.
Default values for preconfigured IT policies
You can configure additional IT policy rules in the preconfigured IT policies or change any of the following values:
IT policy rule
Default IT
policy
Individual-
Liable
Device IT
policy
Basic
Password
Security IT
policy
Medium
Password
Security IT
policy
Medium
Password
Security
with No 3rd
Party
Applications
IT policy
Advanced
Security IT
policy
Advanced
Security
with No 3rd
Party
Applications
IT policy
Device-Only Items
Enable Long-
Term Timeout
—
—
—
Yes
Yes
Yes
Yes
Maximum
Security Timeout
—
—
30 minutes
10 minutes
10 minutes
10 minutes
10 minutes
Maximum
Password Age
—
—
60 days
30 days
30 days
30 days
30 days
Password
Pattern Checks
no restriction —
no restriction at least 1
alpha and 1
at least 1
alpha and 1
at least 1
alpha and 1
at least 1
alpha and 1
Administration Guide
Using an IT policy to manage BlackBerry Enterprise Solution security
41