Solved

Blackberry 10 Server, how to restrict internet access on handset policy ?

Posted on 2013-12-10
5
95 Views
Last Modified: 2016-07-13
Have purchased BES10 Cals and installed BES10 (for exchange) on a 2008 server, there is no browser control options in the policy settings.

I have a couple of users the company wants all web browsing blocked

can someone please explain how the larger corps are controlling white listing on BB handsets.
0
Comment
Question by:Novahux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 12

Expert Comment

by:duttcom
ID: 39710553
As far as I have ever experienced, web browsing on a BB is provided and controlled by the phone service provider and not the BES. BES is embedded in my MDaemon mail server and like the version for exchange, I have no control over anything but the functionality that links the BB to the server, i.e. email, contacts and calendar, and of course the device itself.

I note that there is now Blackberry Balance functionality which appears to provide control over work/personal activities, but from what I can tell, it also only affects those BB services that are provided by the BES. I haven't used that functionality but I suspect it would only add an extra level of annoyance, not of control.
0
 
LVL 63

Accepted Solution

by:
Simon Butler (Sembee) earned 500 total points
ID: 39711161
The control is being done at the network level, not the device level.
What that means is putting the device in to Work Mode only, which means all traffic goes through the BES network, and using a proxy to allow the traffic.

Simon.
0
 
LVL 63

Expert Comment

by:Simon Butler (Sembee)
ID: 41704136
Object.
My answer ID: 39711161 provides the solution that is available.
0

Featured Post

Resolve Critical IT Incidents Fast

If your data, services or processes become compromised, your organization can suffer damage in just minutes and how fast you communicate during a major IT incident is everything. Learn how to immediately identify incidents & best practices to resolve them quickly and effectively.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
IT certifications are a concrete representation of continual learning on the part of the candidate.  Continual learning is necessary for the long term success of an IT professional, but are IT certifications the right path for you?
The basic steps you have just learned will be implemented in this video. The basic steps are shown to configure an Exchange DAG in a live working Exchange Server Environment and manage the same (Exchange Server 2010 Software is used in a Windows Ser…
This video demonstrates how to sync Microsoft Exchange Public Folders with smartphones using CodeTwo Exchange Sync and Exchange ActiveSync. To learn more about CodeTwo Exchange Sync and download the free trial, go to: http://www.codetwo.com/excha…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question