Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Software Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL herunter. Blackberry ENTERPRISE SOLUTION SECURITY - SECURITY FOR DEVICES WITH BLUETOOTH WIRELESS TECHNOLOGY - TECHNICAL User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 189
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Overview

BlackBerry Enterprise Server for Microsoft ExchangeVersion: 5.0Service Pack: 4Security Technical Overview

Seite 2 - SWD-20140117135425071

New in this releaseThe table lists the updated security features for the BlackBerry Enterprise Server 5.0 SP4 that are described in this document.Feat

Seite 3 - Contents

Kerberos services. The Kerberos keys permit the BlackBerry Administration Service to verify the Kerberos service tickets that browsers send during sin

Seite 4

3. The browser retrieves the TGT of the administrator or user from the ticket cache on the computer that the administrator or user is using.The browse

Seite 5

Activating a deviceWhen a user activates a BlackBerry device, the BlackBerry Enterprise Solution authenticates the user and associates the device with

Seite 6

Data flow: Activating a device over the wireless network1. A user opens the activation application on the BlackBerry device, and types the appropriate

Seite 7

Managing certificates on a devicePurpose of certificates on a deviceA certificate is a digital document that binds the identity and public key of a ce

Seite 8

Configuring BlackBerry devices to enroll certificates over the wireless networkYou can configure the BlackBerry Enterprise Server to permit BlackBerry

Seite 9

• Custom Microsoft Certificate Authority Certificate Template• Distinguished Name Components• Key Algorithm• Key Length• Microsoft Certificate Authori

Seite 10 - New in this release

Data flow: Enrolling a certificate when the certification authority approves certificate requests automaticallyAfter a BlackBerry device receives an I

Seite 11

a verifies the certificate by checking whether the public key matches the public key that is stored in the BlackBerry Configuration Databaseb sends th

Seite 12 - Enterprise Solution

b after the certification authority administrator approves the certificate request, issues the certificate, and sends the certificate to the user in a

Seite 13 - Solution

OverviewBlackBerry Enterprise Solution securityThe BlackBerry Enterprise Solution consists of various products and components that are designed to ext

Seite 14

9. The BlackBerry MDS Connection Service sends a status update to the device and sends the certificate request to the certification authority that is

Seite 15

Protecting BlackBerry Device Software updatesProtecting BlackBerry Device Software updates over the wireless networkYou can update the BlackBerry Devi

Seite 16

How the BlackBerry Enterprise Solution protects BlackBerry Device Software updates over the wireless network using IT policies and content protectionT

Seite 17

How a device validates a BlackBerry Device Software update over the wireless networkWhen a BlackBerry device receives a BlackBerry Device Software upd

Seite 18 - Keys on a device

computer. To protect the cryptographic services data, the device encrypts the cryptographic services data using a BlackBerry services key.The device s

Seite 19

Data flow: Backing up cryptographic services data using the BlackBerry Desktop Manager1. A user connects a BlackBerry device to the BlackBerry Desktop

Seite 20

Extending messaging security to a deviceIf your organization's messaging environment supports highly secure messaging technology such as PGP encr

Seite 21

PGP public keys and PGP private keysThe PGP Support Package for BlackBerry smartphones uses public key cryptography with PGP public keys and PGP priva

Seite 22 - IBM Domino environment

Encryption algorithms that the device supports for PGP encryptionWhen you turn on PGP encryption, the default value of the PGP Allowed Content Ciphers

Seite 23

d sends the message that is encrypted using BlackBerry transport layer encryption and PGP encryption to the BlackBerry Enterprise Server2. The BlackBe

Seite 24 - Message keys

Security features of the BlackBerry Enterprise SolutionFeature Descriptiondata protection The BlackBerry Enterprise Solution is designed to protect da

Seite 25 - Enterprise Server

Extending messaging security using S/MIME encryptionYou can extend messaging security for the BlackBerry Enterprise Solution and permit a BlackBerry d

Seite 26 - Content protection keys

Item DescriptionS/MIME certificate When a user sends an email message or PIN message from a BlackBerry device, the device uses the S/MIME certificate

Seite 27 - BlackBerry Enterprise Server

• An S/MIME-enabled application did not use a weak algorithm to generate the digital signatures on the email messages that the device receives.• The c

Seite 28

3. The recipient decrypts the S/MIME-encrypted message using the S/MIME private key or a password that the sender provides.Data flow: Receiving an S/M

Seite 29 - PIN encryption keys

Extending messaging security using IBM Notes encryptionBy default, if your organization's environment includes IBM Notes API version 7.0 or later

Seite 30

How the BlackBerry Messaging Agent protects the password for an IBM Notes .id fileAfter a user imports an IBM Notes .id file and the password for the

Seite 31 - Encrypting data that the

4. The BlackBerry Messaging Agent on the BlackBerry Enterprise Server decrypts the cached password for the Notes .id file and validates the password t

Seite 32

Extending messaging security for attachmentsThe BlackBerry Enterprise Server supports attachments in PGP protected messages and S/MIME-protected messa

Seite 33 - DES to encrypt data

Data flow: Viewing an attachment that is encrypted using S/MIME encryption, PGP/MIME encryption, or OpenPGP encryption1. The BlackBerry device sends t

Seite 34

c Sends the email message to the BlackBerry Enterprise Server3. The BlackBerry Enterprise Server sends the email to the recipient's inbox.Data fl

Seite 35

Architecture: BlackBerry Enterprise SolutionThe BlackBerry Enterprise Solution consists of various components that permit you to extend your organizat

Seite 36 - Enterprise Solution security

c Appends all of the attachments from the original message, any new message attachments, and the original message body to the new messaged If the user

Seite 37

Configuring two-factor authentication and protecting Bluetooth connectionsBlackBerry Smart Card ReaderThe BlackBerry Smart Card Reader is an accessory

Seite 38 - Solution security

• unlock the BlackBerry device and access BlackBerry services and PKI applications using two-factor authentication• digitally sign and encrypt email m

Seite 39

If the device is running BlackBerry Device Software version 3.6, the smart card information that the device displays when it prompts the user to inser

Seite 40

The User Authenticator API permits a developer to add a field to the password dialog box on the BlackBerry device for the authentication method. You c

Seite 41

d stores the encrypted content protection key and encrypted ECC private keys in the device memorye generates a 256-bit pseudorandom numberf computes t

Seite 42

Protecting Bluetooth connections on a deviceBluetooth wireless technology permits a Bluetooth enabled BlackBerry device to open a wireless connection

Seite 43

Wi-Fi enabled devicesWi-Fi enabled BlackBerry devices permit users with qualifying data plans to access BlackBerry services over a mobile network, Wi-

Seite 44

Type Descriptionpermit VPN connections through the firewall. You can configure a home Wi-Fi network with layer 2 security and password authentication.

Seite 45 - Configuration Database

Feature DescriptionYou can verify with your organization's wireless service provider that your organization's service plan supports access t

Seite 46

Component DescriptionBlackBerry Administration Service The BlackBerry Administration Service is a BlackBerry Enterprise Server component that connects

Seite 47 - Device storage space

Protecting a connection between a Wi-Fi enabled device and an enterprise Wi-Fi networkA Wi-Fi enabled BlackBerry device is designed to connect to ente

Seite 48

How an SSL connection between a Wi-Fi enabled device and the BlackBerry Infrastructure protects dataAn SSL connection between a Wi-Fi enabled BlackBer

Seite 49

• SSL_DHE_RSA_WITH_DES_CBC_SHA• SSL_DH_anon_WITH_RC4_128_MD5• SSL_DHE_DSS_WITH_DES_CBC_SHA• SSL_RSA_WITH_DES_CBC_SHA• SSL_DH_anon_WITH_3DES_EDE_CBC_SH

Seite 50

• TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA• TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA• TLS_RSA_EXPORT_WITH_DES40_CBC_SHA• TLS_DH_anon_WITH_DES_CBC_SHA• TLS_D

Seite 51

Using a VPN with a deviceIf your organization’s environment includes VPNs, such as an IPSec VPN, you can configure a Wi-Fi enabled BlackBerry device t

Seite 52

Using a segmented network to reduce the spread of malware on an enterprise Wi-Fi network that uses a VPNWhen a Wi-Fi enabled BlackBerry device connect

Seite 53

UI settingVPN-1 PowerCisco VPN 3000 Series ConcentratorVPN Firewall BrickNetScreenNortel Networks ContivitySecure Computing SidewinderSymantec Raptor

Seite 54 - Securing devices in your

Supported configurations for the Cisco VPN 3000 Series ConcentratorThe following table describes the configurations that BlackBerry 7.1 supports for t

Seite 55

Configuration setting Configuration 1 Configuration 2 Configuration 3 Configuration 4Gateway Credential (PSK): Password (Group Password)X XXAuth Crede

Seite 56

Configuration setting Configuration 1 Configuration 2Gateway Credential (PSK): Password (Group Password) X XXAuth Credential (PSK): Username XXAuth Cr

Seite 57

Component DescriptionBlackBerry Attachment Service The BlackBerry Attachment Service is a BlackBerry Enterprise Server component that converts support

Seite 58

Configuration setting Configuration 1IKE: Cipher 3DESIKE: Hash HMAC MD5IPSec: Crypto and Hash Suite 3DES-MD5NAT timeout DefaultSupported configuration

Seite 59

Wi-Fi network or Wi-Fi hotspot. After the BlackBerry device connects to the enterprise Wi-Fi network or Wi-Fi hotspot, the user can browse to an HTML

Seite 60

Data flow: Generating a token code for a software token1. An RSA administrator uses the RSA Authentication Manager to import a seed as a soft token fi

Seite 61

Layer 2 security methods that a device supportsYou can configure a Wi-Fi enabled BlackBerry device to use security methods for layer 2 (also known as

Seite 62

For more information about configuring WEP encryption, see the BlackBerry Enterprise Server Administration Guide.WPA authenticationThe IEEE 802.1X sta

Seite 63

IEEE 802.1X standardThe IEEE 802.1X standard defines a generic authentication framework that a Wi-Fi enabled BlackBerry device and an enterprise Wi-Fi

Seite 64 - Protecting data on a device

Data flow: Authenticating a Wi-Fi enabled device with a work Wi-Fi network using the IEEE 802.1X standardIf you configured a wireless access point to

Seite 65

EAP authentication methods that a Wi-Fi enabled device supportsLEAP authenticationLEAP authentication is designed to improve WEP authentication. You c

Seite 66

The device supports EAP-TLS authentication when the authentication server and client use certificates that meet specific requirements for authenticati

Seite 67

Encryption keys that a Wi-Fi enabled device supports for use with layer 2 security methodsA Wi-Fi enabled BlackBerry device supports AES-CCMP encrypti

Seite 68

Component DescriptionBlackBerry Enterprise Server uses the connection to send email messages inside your organization's firewall.BlackBerry Infra

Seite 69

Using certificates with PEAP authentication, EAP-TLS authentication, or EAP-TTLS authenticationIf your organization uses PEAP authentication, EAP-TLS

Seite 70

Controlling applications on a deviceCreating an application for a smartphoneAn application developer can create an application for BlackBerry smartpho

Seite 71

For more information about using IT policy rules, visit www.blackberry.com/go/serverdocs to see the BlackBerry Enterprise Server Policy Reference Guid

Seite 72 - Protecting the data that the

"Not permitted", a game that is installed on a smartphone may not be able to send high scores back to a central server since the game is not

Seite 73 - Database stores

Permission Category Default setting Description• Prompt (BlackBerry Device Software 6.0 and earlier)Internet Connections• Allow (BlackBerry 7 and late

Seite 74

Permission Category Default setting DescriptionRecording Interactions Prompt A user can set whether applications can take screen shots of the smartpho

Seite 75

Application permissions for applications that users install as trusted applications on a smartphoneSome applications that a user installs on a BlackBe

Seite 76

Permitting an application to encode data on a smartphoneA developer can use the Transcoder API to create an encoding scheme for data that a BlackBerry

Seite 77

Removing add-on applications from a deviceYou can create a software configuration to remove all add-on applications that are preloaded on a BlackBerry

Seite 78

• Prompt user: the device displays a message that provides the user with the option to Allow or Deny the application's request to access NFC feat

Seite 79

Component DescriptionBlackBerry Router The BlackBerry Router is a BlackBerry Enterprise Server component that connects to the wireless network to send

Seite 80

RIM Cryptographic APIThe RIM Cryptographic API that is on a BlackBerry device and in the BlackBerry Java Development Environment consists of a Java in

Seite 81

Algorithm Key length (bits)RC5 0 to 2040Skipjack 80Triple DES 112 and 168Stream encryption algorithms that the RIM Cryptographic API supportsThe RIM C

Seite 82

Algorithm Key length (bits) TypeECDH 160 to 571 (Elliptic Curve) discrete logarithmECMQV 160 to 571 (Elliptic Curve) discrete logarithmKEA 1024 discre

Seite 83

Message authentication codes that the RIM Cryptographic API supportsCode Key length (bits)CBC-MAC variable (block cipher key length)HMAC variableMessa

Seite 84

Cipher suites for the key establishment algorithm that the RIM Cryptographic API supportsDirect mode SSL Direct mode TLS WTLSDH_anon DH_anon RSA _768,

Seite 85

Hash algorithms that the RIM Cryptographic API supportsDirect mode SSL Direct mode TLS WTLSMD5 MD5 SHASHA-1 SHA-1 SHA-40, SHA-80, MD5, MD5-40, MD5-80L

Seite 86

Related resourcesResource InformationBlackBerry Enterprise Server Feature and Technical Overview • understanding BlackBerry Enterprise Server architec

Seite 87 - WAP gateway

Resource InformationBlackBerry Java Development Environment Development Guide • using controlled APIs• using code signaturesBlackBerry Smart Card Read

Seite 88

Resource Information• risks of using Bluetooth wireless technology on mobile deviceswww.blackberry.com/security• understanding BlackBerry Enterprise S

Seite 89 - Protecting communications in

Glossary3GPP Third Generation Partnership ProjectAdvanced Security SD cardAn Advanced Security SD card is a media card that complies with the Advanced

Seite 90

Keys on a deviceThe BlackBerry Enterprise Solution generates keys that are designed to protect the data that is stored on a BlackBerry device and the

Seite 91

BlackBerry MVS BlackBerry Mobile Voice SystemBlackBerry transport layer encryptionBlackBerry transport layer encryption (formerly known as standard Bl

Seite 92

DRBG deterministic random bit generatorDSA Digital Signature AlgorithmDSML Directory Service Markup LanguageDSML-enabled serverA BlackBerry device use

Seite 93

flash memory The flash memory is an internal file system on a BlackBerry device that stores application data and user data.GAN generic access networkG

Seite 94

IT policy public key The IT policy public key is a key that a BlackBerry device uses to authenticate the IT policy that the BlackBerry Enterprise Serv

Seite 95

OAEP Optimal Asymmetric Encryption PaddingOCSP Online Certificate Status ProtocolOFB output feedbackPAC proxy auto-configurationPBX Private Branch Exc

Seite 96

S/MIME Secure Multipurpose Internet Mail ExtensionsSEMA Simple Electromagnetic AnalysisSHA Secure Hash AlgorithmSIM Subscriber Identity ModuleSMS Shor

Seite 97

WTLS Wireless Transport Layer SecuritySecurity Technical Overview Glossary186

Seite 98

Legal notice©2014 BlackBerry. All rights reserved. BlackBerry® and related trademarks, names, and logos are the property of BlackBerry Limited and are

Seite 99 - Kerberos authentication

QUALITY, NON-INFRINGEMENT, SATISFACTORY QUALITY, OR TITLE, OR ARISING FROM A STATUTE OR CUSTOM OR A COURSE OF DEALING OR USAGE OF TRADE, OR RELATED TO

Seite 100

Products and Services and if any third party licenses are required to do so. If required you are responsible for acquiring them. You should not instal

Seite 101

Key Descriptioncontent protection key The content protection key encrypts user data on the device when the device is locked.device transport key The d

Seite 102 - Activating a device

Published: 2014-01-17SWD-20140117135425071

Seite 103

Device transport keysThe device transport key encrypts the message keys that help protect the data sent between a BlackBerry Enterprise Server and Bla

Seite 104 - Managing certificates on a

State DescriptionThe messaging server and BlackBerry Configuration Database store the previous device transport key that the BlackBerry Enterprise Ser

Seite 105

• device transport keys in binary form with tags that indicate whether the status of the device transport keys is pending (0x6002 tag), current (0x600

Seite 106

Characteristics Descriptionlong-term public keys exchanged The wireless activation process verifies that the BlackBerry Enterprise Server and device c

Seite 107

A user can also generate a device transport key using the BlackBerry Desktop Manager. By default, the BlackBerry Enterprise Server sends a request to

Seite 108

Each message key consists of random data that is designed to make it difficult for a third party to decrypt, re-create, or duplicate the message key.T

Seite 109 - RSA certification authority

1. Retrieves random data from multiple sources to generate the seed using a technique that the device derives from the initialization function of the

Seite 110

Data flow: Turning on content protection using a BlackBerry Enterprise ServerYou can turn on content protection using a BlackBerry Enterprise Server w

Seite 111 - Software updates

3. Prompts the user to type the device password4. Derives an ephemeral 256-bit AES encryption key from the device password, using PKCS #55. Uses the e

Seite 112

Principal encryption keysWhen you or a user turns on content protection for device transport keys, a BlackBerry device generates a principal encryptio

Seite 113

Contents1 New in this release...

Seite 114

A device that has a PIN encryption key that is specific to your organization can perform the following actions:• can only encrypt PIN messages sent to

Seite 115 - Application Web Loader

Encrypting data that the BlackBerry Enterprise Server and a device send to each otherTo encrypt data that is in transit between the BlackBerry Enterpr

Seite 116 - Extending messaging security

How the BlackBerry Enterprise Solution uses AES to encrypt dataBy default, when a BlackBerry device supports AES, the BlackBerry Enterprise Solution u

Seite 117 - LDAP servers

Data flow: Running a masking operation during subsequent AES calculations when content protection is turned onA BlackBerry device performs the followi

Seite 118

All versions of the BlackBerry Enterprise Server, BlackBerry Device Software, and BlackBerry Desktop Software support Triple DES.For more information

Seite 119

Data flow: Sending an email message from a device using BlackBerry transport layer encryption 1. A sender sends an email message from a BlackBerry de

Seite 120

Managing BlackBerry Enterprise Solution securityUsing an IT policy to manage BlackBerry Enterprise Solution securityYou can use an IT policy to contro

Seite 121 - S/MIME encryption algorithms

Preconfigured IT policy DescriptionDefault This policy includes all the standard IT policy rules that are set on the BlackBerry Enterprise Server.Indi

Seite 122

Using IT policy rules to manage BlackBerry Enterprise Solution securityYou can use IT policy rules to customize and control the actions that the Black

Seite 123

Method DescriptionApply one IT policy to the user account The BlackBerry Enterprise Server applies one of the group IT policies to the user account. Y

Seite 124 - Notes encryption

Using IT administration commands to protect a lost or stolen device...

Seite 125 - Notes .id file

Scenario RuleA user account belongs to multiple groups. You assign multiple IT policies to the groups but do not assign an IT policy to the user accou

Seite 126

Scenario Rulerule as blank (which means that it uses the default value of Yes). You assign the second group IT policy B, which has the Allow Browser I

Seite 127

Best practice Descriptionnotify the user that you turned on the ability of the device to report its location to the BlackBerry Enterprise Server.Using

Seite 128

IT administration command DescriptionYou can send this command to a device that you want to distribute to another user in your organization, or to a d

Seite 129

f permanently deletes K 5. The device performs the following actions:a selects d randomlyb calculates D = dPc stores D in flash memoryd calculates K =

Seite 130

Using a segmented network to help prevent the spread of malwareTo help prevent the spread of malware in your organization’s network, you can use firew

Seite 131 - Bluetooth connections

Configuring the IT Policy Viewer icon on a deviceThe IT policy viewer permits a BlackBerry device user to view IT policy rules that were configured fo

Seite 132 - Two-factor authentication

Device storage spaceThe BlackBerry device storage space consists of various sections that store BlackBerry device user data and sensitive information

Seite 133

Changing when a device cleans the device memoryBy default, the memory cleaner application runs on a BlackBerry device when the device is inactive for

Seite 134 - Two-factor content protection

When a device overwrites data in the device memoryA BlackBerry device continually runs the memory cleaner application during the based garbage collect

Seite 135

Encrypting the device transport key on a locked device...

Seite 136

• if you reset the device to the factory default settings, the IT policy that is stored on the device• if a user selects the Include third party appli

Seite 137 - Wi-Fi enabled devices

IT policy rule DescriptionSecure Wipe Delay After IT Policy ReceivedThis rule specifies the length of time (in hours) after a device receives an IT po

Seite 138

The device can bind to another BlackBerry Enterprise Server at a later time. The device does not use the memory-scrub process to overwrite the IT poli

Seite 139

3. writes 0xCC to each byte (1100 11002)4. writes all bytes to 0x00 (0000 00002)5. writes 0x55 to each byte (0101 01012)6. writes all bytes to 0x00 (0

Seite 140

Securing devices in your organization’s environment for personal use and work useYour organization might want to permit BlackBerry device users to use

Seite 141

data, you must configure the "Is access to the corporate data API allowed" application control policy rule. The device checks this rule to d

Seite 142

Data and applications that a device classifies for personal useA BlackBerry device classifies the following data and applications for personal use:• e

Seite 143

Preventing a user from pasting work data into a personal applicationTo help prevent a BlackBerry device user from pasting work data into a personal ap

Seite 144 - Using a VPN with a device

Prevent a user from using the work contact list in personal email accounts and personal calendarsBy default, a BlackBerry device does not prevent a Bl

Seite 145

data and personal data on a computer using the BlackBerry Desktop Software and BlackBerry Web Desktop Manager. The user can restore the data to the de

Seite 146

How a BlackBerry Enterprise Server and the BlackBerry Infrastructure authenticate with each other...89What happens whe

Seite 147

require that a personal device remove only work data when the device receives the Delete only the organization data and remove device IT administrativ

Seite 148

Data flow: Deleting only work data from a deviceWhen you delete only work data from a BlackBerry device using the Delete all organizational device dat

Seite 149

Managing third-party applications on a smartphone that a user uses for personal purposesBy default, a BlackBerry smartphone classifies all application

Seite 150

prevent add-on applications such as Facebook for BlackBerry smartphones and MySpace for BlackBerry smartphones from accessing the work calendar and wo

Seite 151

Protecting data on a deviceEncrypting user data on a locked deviceIf you or a BlackBerry device user turns on content protection, you or the user can

Seite 152

To make content protection optional or to prevent an administrator or a user from turning on content protection for a device that is running BlackBerr

Seite 153 - WEP encryption

device locks. If the device does not complete the re-encryption process before the user unlocks the device, the device resumes re-encryption when it l

Seite 154 - WPA authentication

• connects to the BlackBerry Infrastructure• resumes serial bypass connections• receives data from the BlackBerry Enterprise ServerResetting a device

Seite 155 - IEEE 802.1X standard

Cryptosystem parameters that the remote password reset cryptographic protocol usesThe BlackBerry Enterprise Server and BlackBerry device are designed

Seite 156

The first time that the user opens the password keeper on the device, the user must create the password keeper password. The password keeper encrypts

Seite 157 - EAP-TLS authentication

Battery power requirements for BlackBerry Device Software updates over the wireless network ...112Data flow: Preparing t

Seite 158 - EAP-SIM authentication

To generate an encryption key, the BlackBerry device performs the following actions:1. generates an AES-256 encryption key2. stores the encryption key

Seite 159

How a device protects its operating system and the BlackBerry Device SoftwareEach time a user turns on a BlackBerry device, specific components on the

Seite 160

Protecting the data that the BlackBerry Enterprise Server stores in your organization's environmentWhere the BlackBerry Enterprise Server stores

Seite 161

Messaging environment Storage locationMicrosoft Exchange The BlackBerry Enterprise Server stores user data in hidden folders in the Microsoft Exchange

Seite 162

Best practice Description• At a minimum, write failed connection attempts to the Microsoft SQL Server log file and review the log file regularly.• Whe

Seite 163

Best practice Description• Use NTFS for the Microsoft SQL Server because it is more stable and recoverable than FAT file systems, and NTFS permits sec

Seite 164

A device stores the digitally signed IT policy and the IT policy public key in the NV store in flash memory. When the device stores the IT policy and

Seite 165

Protecting communication with a deviceOpening a direct connection between a device and a BlackBerry RouterA BlackBerry device can use the BlackBerry R

Seite 166

• A device can provide all email messaging services and data services using the BlackBerry Router protocol except for activation over the wireless net

Seite 167

To perform either of these impersonation attacks, the potentially malicious user must send the device transport key value (also known as s) to the Bla

Seite 168 - NFC features on a device

Data flow: Turning on two-factor content protection...

Seite 169

c sends RD and KeyID to the BlackBerry Enterprise Server4. The BlackBerry Enterprise Server performs the following actions:a calculates that as RD app

Seite 170 - RIM Cryptographic API

yBP + eBRB ≠ hP• The BlackBerry Router does not accept the connection request if the BlackBerry Router calculates the following:yBP + eBRB ≠ yDP + eDR

Seite 171

4. The BlackBerry Router performs one of the following actions:• The BlackBerry Router closes the authenticated connection to the BlackBerry device on

Seite 172 - API supports

Best practice: Protecting plain text messages that a device sends over the wireless networkPlain text messages include SMS text messages, MMS messages

Seite 173

Best practice DescriptionTo apply this best practice, you can use the Firewall Block Incoming Messages IT policy rule.Require a user to verify whether

Seite 174

Protecting HTTP connections from a device to content servers and application servers using HTTPSIf a third-party application on a BlackBerry device ca

Seite 175

Warning message DescriptionWeak Crypto Algorithm Your organization considers the algorithm that is used in the certificate chain to be weak.Permitting

Seite 176 - Related resources

• Stop: the user should select this option if the user wants to close the connection between the device and the website.• Details: the user should sel

Seite 177

BlackBerry Enterprise Server. When the BlackBerry Infrastructure becomes available again, the BlackBerry Enterprise Server resends messages that it di

Seite 178 - Resource Information

Protecting communications in your organization's environmentHow a BlackBerry Enterprise Server and the BlackBerry Infrastructure authenticate wit

Seite 179 - Glossary

Specifying the resources that applications can access on a device...1

Seite 180

What happens when a BlackBerry Enterprise Server and the BlackBerry Infrastructure open an initial connectionAfter a BlackBerry Enterprise Server and

Seite 181

Data flow: Authenticating a BlackBerry Enterprise Server with the BlackBerry Infrastructure1. The BlackBerry Enterprise Server sends a data packet tha

Seite 182

Messaging server DescriptionA user who activates a BlackBerry device when the device is connected to a computer can encrypt data that is in transit be

Seite 183

Synchronization Service, and BlackBerry MVS share a communication password. The BlackBerry Messaging Agent and BlackBerry Dispatcher share a different

Seite 184

a uses a shared secret password (also known as the communication password) and the ECDH protocol with a 521-bit curve to create a device transport key

Seite 185

environment and authenticate and authorize users. The Kerberos protocol is designed to permit the BlackBerry MDS Connection Service to verify user acc

Seite 186

How the BlackBerry MDS Connection Service uses Kerberos to help protect your organization's resourcesBlackBerry MDS Connection Service integrated

Seite 187 - Legal notice

1. The BlackBerry device user navigates to a resource on your organization’s intranet or on a file share (for example, a web page or shared file) usi

Seite 188

Protecting your organization’s resources when you configure BlackBerry Administration Service single sign-onYou can configure the BlackBerry Administr

Seite 189

Component DescriptionBlackBerry Administration Service The BlackBerry Administration Service permits you to manage the BlackBerry Domain, which includ

Kommentare zu diesen Handbüchern

Keine Kommentare