Solved

Blackberry 10 Server, how to restrict internet access on handset policy ?

Posted on 2013-12-10
5
90 Views
Last Modified: 2016-07-13
Have purchased BES10 Cals and installed BES10 (for exchange) on a 2008 server, there is no browser control options in the policy settings.

I have a couple of users the company wants all web browsing blocked

can someone please explain how the larger corps are controlling white listing on BB handsets.
0
Comment
Question by:Novahux
  • 2
5 Comments
 
LVL 12

Expert Comment

by:duttcom
ID: 39710553
As far as I have ever experienced, web browsing on a BB is provided and controlled by the phone service provider and not the BES. BES is embedded in my MDaemon mail server and like the version for exchange, I have no control over anything but the functionality that links the BB to the server, i.e. email, contacts and calendar, and of course the device itself.

I note that there is now Blackberry Balance functionality which appears to provide control over work/personal activities, but from what I can tell, it also only affects those BB services that are provided by the BES. I haven't used that functionality but I suspect it would only add an extra level of annoyance, not of control.
0
 
LVL 63

Accepted Solution

by:
Simon Butler (Sembee) earned 500 total points
ID: 39711161
The control is being done at the network level, not the device level.
What that means is putting the device in to Work Mode only, which means all traffic goes through the BES network, and using a proxy to allow the traffic.

Simon.
0
 
LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 41704136
Object.
My answer ID: 39711161 provides the solution that is available.
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the most frustrating experiences a help desk technician will ever encounter is when a customer comes to them with a solution of their own invention and expects the tech to implement it. This often happens when people with a little bit of tech…
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
In this video we show how to create an email address policy in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Mail Flow…
To show how to generate a certificate request in Exchange 2013. We show this process by using the Exchange Admin Center. Log into Exchange Admin Center.:  First we need to log into the Exchange Admin Center. Navigate to the Servers >> Certificates…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question