Solved

Blackberry policy to auto unlock blackberries after a time period?

Posted on 2011-09-26
11
532 Views
Last Modified: 2012-08-13
I'm loking to setup a new blackberry policy for user password lockout. What I would like is for the unit to be locked after 5 unsuccessful attempts. This part is easy to setup.
Besides this, I would like to configure it so the unit is auto unlocked again an hour later. This is to save on administration, where I can just tell users to wait an hour if they lock it.
I'm using BES express.
0
Comment
Question by:sherryfitzgroup
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
11 Comments
 
LVL 25

Accepted Solution

by:
RobMobility earned 300 total points
ID: 36599253
Hi,

I believe the default behaviour is to wipe a device after the prescribed number of incorrect logins, not lock it?

I don't believe it's possible to do what you are requesting - why would you want this anyway? A device is easily lost and if a thief or other party interested in your companies data obtained a device, then they can continue to brute force the passwords until they can get in?

OTA wipe would only work if device is in coverage - if the SIM is removed, you can't kill it.

Regards,


RobMobility.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 36890837
Sorry Rob, I phrased that completely wrong.
What I want is for the password attempts to reset back to 10 after an hour of waiting.
So, a user tries the wrong password 9 times, then they are warnded that the next one will wipe it. Then they wait 1 hour, and the attempts goes back to 10.
Our vpn cryptocards are set this way, and it cuts down administration. If someone locks it, we tell them to wait the hour.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37238084
I've requested that this question be closed as follows:

Accepted answer: 0 points for sherryfitzgroup's comment http:/Q_27327421.html#36890837
Assisted answer: 300 points for RobMobility's comment http:/Q_27327421.html#36599253

for the following reason:

t
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 25

Expert Comment

by:RobMobility
ID: 37238077
Hi,

You cannot do this in the BlackBerry IT Policy - you can set a prescribed number of failures before the device wipes as per my original post.

See page 118 of the following IT Policy Guide:

http://docs.blackberry.com/en/admin/deliverables/25764/BlackBerry_Enterprise_Server-Policy_Reference_Guide-T323212-1293421-0307065708-001-5.0.3-US.pdf

Moderator - my original response is factually accurate.

Regards,


RobMobility.
0
 
LVL 25

Expert Comment

by:RobMobility
ID: 37238085
Hi,

Please see above.

RobMobility.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37254971
Sorry, I was just trying to close it and give the points to Rob, which I thought I did
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37290731
Can yuo close this question please
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With mobile becoming increasingly important to the business world, it is in your best interest to make sure that your email signature looks great across all types of devices. Find out how to create a mobile email signature with this guide.
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question