Solved

Blackberry policy to auto unlock blackberries after a time period?

Posted on 2011-09-26
11
525 Views
Last Modified: 2012-08-13
I'm loking to setup a new blackberry policy for user password lockout. What I would like is for the unit to be locked after 5 unsuccessful attempts. This part is easy to setup.
Besides this, I would like to configure it so the unit is auto unlocked again an hour later. This is to save on administration, where I can just tell users to wait an hour if they lock it.
I'm using BES express.
0
Comment
Question by:sherryfitzgroup
  • 4
  • 3
11 Comments
 
LVL 25

Accepted Solution

by:
RobMobility earned 300 total points
ID: 36599253
Hi,

I believe the default behaviour is to wipe a device after the prescribed number of incorrect logins, not lock it?

I don't believe it's possible to do what you are requesting - why would you want this anyway? A device is easily lost and if a thief or other party interested in your companies data obtained a device, then they can continue to brute force the passwords until they can get in?

OTA wipe would only work if device is in coverage - if the SIM is removed, you can't kill it.

Regards,


RobMobility.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 36890837
Sorry Rob, I phrased that completely wrong.
What I want is for the password attempts to reset back to 10 after an hour of waiting.
So, a user tries the wrong password 9 times, then they are warnded that the next one will wipe it. Then they wait 1 hour, and the attempts goes back to 10.
Our vpn cryptocards are set this way, and it cuts down administration. If someone locks it, we tell them to wait the hour.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37238084
I've requested that this question be closed as follows:

Accepted answer: 0 points for sherryfitzgroup's comment http:/Q_27327421.html#36890837
Assisted answer: 300 points for RobMobility's comment http:/Q_27327421.html#36599253

for the following reason:

t
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 25

Expert Comment

by:RobMobility
ID: 37238077
Hi,

You cannot do this in the BlackBerry IT Policy - you can set a prescribed number of failures before the device wipes as per my original post.

See page 118 of the following IT Policy Guide:

http://docs.blackberry.com/en/admin/deliverables/25764/BlackBerry_Enterprise_Server-Policy_Reference_Guide-T323212-1293421-0307065708-001-5.0.3-US.pdf

Moderator - my original response is factually accurate.

Regards,


RobMobility.
0
 
LVL 25

Expert Comment

by:RobMobility
ID: 37238085
Hi,

Please see above.

RobMobility.
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37254971
Sorry, I was just trying to close it and give the points to Rob, which I thought I did
0
 
LVL 2

Author Comment

by:sherryfitzgroup
ID: 37290731
Can yuo close this question please
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Cloning cell phone? 3 111
Bluetooth 2 48
Audio interference 6 57
Outlook Contact Groups 2 58
A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike.
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now