User guide
Using IT policy rules to manage BlackBerry Enterprise Solution security....................................................................... 33
Sending an IT policy over the wireless network.................................................................................................................. 34
Using IT administration commands to protect a lost or stolen BlackBerry device................................................................. 34
Process flow: Sending the Specify new device password and lock device IT administration command when content
protection is turned on.......................................................................................................................................................... 35
Managing BlackBerry device access to the BlackBerry Enterprise Server............................................................................... 36
Using a segmented network architecture to prevent the spread of malware......................................................................... 37
Moving a BlackBerry device to a BlackBerry Enterprise Server that uses a different BlackBerry Configuration Database
........................................................................................................................................................................................................... 37
Best practice: Controlling which applications can use the GPS feature on a BlackBerry device......................................... 37
6 BlackBerry device memory......................................................................................................................................................... 39
Changing when a BlackBerry device cleans the BlackBerry device memory.......................................................................... 39
When a BlackBerry device overwrites data in the BlackBerry device memory........................................................................ 40
Deleting all device data from the BlackBerry device memory................................................................................................... 41
When a BlackBerry device deletes device data................................................................................................................... 41
Using IT policy rules to specify when a BlackBerry device must delete device data..................................................... 42
Resetting a BlackBerry device to factory default settings................................................................................................. 42
Process flow: Deleting all device data from a BlackBerry device..................................................................................... 43
Scrubbing the memory of a BlackBerry device when deleting all BlackBerry device data.................................................... 43
Scrubbing the BlackBerry device heap in RAM when deleting all BlackBerry device data........................................... 44
Scrubbing the flash memory on a BlackBerry device when deleting all BlackBerry device data................................. 44
Scrubbing the user files on a BlackBerry device when deleting all BlackBerry device data......................................... 45
7 Protecting data on a BlackBerry device................................................................................................................................... 46
Encrypting user data on a locked BlackBerry device.................................................................................................................. 46
Configuring the encryption of BlackBerry device data on a locked BlackBerry device................................................. 46
Process flow: Encrypting user data on a locked BlackBerry device.................................................................................. 47
Process flow: Decrypting user data on an unlocked BlackBerry device.......................................................................... 47
Encrypting the device transport key on a locked BlackBerry device........................................................................................ 48
What happens when a user resets a BlackBerry device after you turn on content protection for the device transport
key............................................................................................................................................................................................ 48
Resetting a BlackBerry device password when content protection is turned on.................................................................... 49
Process flow: Resetting a BlackBerry device password when content protection is turned on.................................... 49
Protecting passwords that a BlackBerry device stores............................................................................................................... 50
Protecting data that a BlackBerry device stores on a media card............................................................................................ 51