[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Remove icons Blackberry using BES 4.1.6

Posted on 2009-05-18
2
Medium Priority
?
795 Views
Last Modified: 2012-05-07
I am running AD 2003 with a member server 2008 x64 with Exchange 2007, Blackberry Enterprise Server 4.1.6.10 running on 2003 SP2 Member Server.

Can I through the BES remove applications (or icons) from the Blackberry such as BrickBreaker, Password Keeper, Video Camera and other pre-installed applications on the blackberry.

I am also wondering if it is possible to push an image to the blackberry and set it as the Home Screen Image, and disable changing the Home Screen Image. (If this needs to be asked as a seperate question please indicate and I will repost.)

Thanks
0
Comment
Question by:hpeet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 19

Accepted Solution

by:
-jonny- earned 2000 total points
ID: 24419730
You can remove applications that aren't native to the device (e.g. Brick Breaker, Password Keeper etc) by creating a software config policy, specifying the path of the application and have it disabled. It can be a bit hit and miss though, and requires a great deal of effort as every version of the application for each device needs to be specified (this changes with BES 5.0 and is much easier).

You can disable the application through IT policy, if one exists for it, although this will still leave the icon on the device. When the user clicks on it, they'll get a message saying the application has been disabled. Be aware that there aren't policies for every application though (there's none for BrickBreaker).

Currently you can't customise the home screen image - it's only user-defined. Nor can you disable changing it.
0
 

Author Closing Comment

by:hpeet
ID: 31582645
Thanks for the information.

Harold
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I felt secure communicating on the BBM... Till some time back!! It was probably the fact that the BBM messages do not travel over the internet was making me feel 'secure' about it, or was it the fact that BBM only works on a BlackBerry Devices a…
Last night I received a weird phone call, from a number I didn’t recognized.  I answered it and no one responded back so I hung up.   Didn’t look at my phone until my husband said “Your phone is doing something weird”.   I had what I’ll consider the…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question