From BlackBerry Enterprise Server (version 5.x), Part 3 Security Technical Implementation Guide
Part of General BES IT Policy rule - 28
Associated with IA controls: ECSC-1
Stops a user from changing BlackBerry devices without the approval of the BlackBerry Administrator. BlackBerry security software (S/MIME, etc.) may not be installed correctly and other required provisioning steps may not be completed. BlackBerry device and system could be vulnerable to attack by hackers or malware.
Detailed Policy Requirements: Configuration management of the BlackBerry device software will be maintained. Only authorized software will be installed from a trusted source. Provisioning of the handheld will be completed under the control of the BlackBerry system administrator. *****For this check, set IT Policy rule "Desktop Allow Device Switch" (Desktop policy group) to "No". Check Procedures: This is a BES IT Policy check. Recommend all checks related to BES IT policies be reviewed using the procedure in Check WIR1400-01 (V0003545). *****Verify IT Policy rule "Desktop Allow Device Switch" (Desktop policy group) is set as required. If not set as required, this is a finding.
Configure the IT Policy rule as specified in the "Checks" block.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer