Blackberry PlayBook Tablet Przegląd techniczny zabezpieczeń - Strona 18

Przeglądaj online lub pobierz pdf Przegląd techniczny zabezpieczeń dla Tablet Blackberry PlayBook Tablet. Blackberry PlayBook Tablet 46 stron. Tablet
Również dla Blackberry PlayBook Tablet: Specyfikacje (21 strony), Specyfikacje (21 strony), Podręcznik użytkownika (48 strony), Bezpieczeństwo i informacje o produkcie (19 strony), Podręcznik użytkownika (42 strony), Skrócona instrukcja obsługi (2 strony), Ui Manuallines (39 strony), Podręcznik użytkownika (34 strony)

Blackberry PlayBook Tablet Przegląd techniczny zabezpieczeń
Security Technical Overview
Action
Setting the discoverable mode option to have no
time limit
Using the Bluetooth profiles that tablet and
smartphone support
Using wireless bypass over a Bluetooth connection •
Exchanging files with supported Bluetooth OBEX
devices
Sending or receiving address book information
over a Bluetooth connection
Making calls over a Bluetooth connection
Using Bluetooth encryption on all Bluetooth
connections
Flashing the LED light when the smartphone is
connected to another Bluetooth enabled device
Prompting users to type their smartphone
passwords to turn on Bluetooth support
Prompting users to type their smartphone
passwords to turn on discoverable mode
Specifying Bluetooth connections that third-party
applications can access
You can use application control policy rules to limit the use of Bluetooth technology and the Bluetooth profiles to
specific, permitted third-party applications. You can use the BlackBerry Enterprise Server to configure application
control policy rules to control which applications can access resources on the BlackBerry smartphone. For
example, you can use application control policy rules to make all Bluetooth profiles unavailable for applications by
default and to turn on the Bluetooth Serial Port Profile for the BlackBerry PlayBook tablet driver only. If you
configure these settings, only specific applications are allowed to use the tablet driver.
The following table lists the application control policy rules and the result that you can achieve by configuring
them.
16

Specifying Bluetooth connections that third-party applications can access

IT policy rule
Limit Discoverable Time
Disable Advanced Audio Distribution Profile
Disable Audio/Video Remote Control Profile
Disable Dial-Up Networking
Disable Handsfree Profile
Disable Headset Profile
Disable Message Access Profile
Disable Serial Port Profile
Disable SIM Access Profile
Disable Wireless Bypass
Disable File Transfer
Disable Address Book Transfer
Allow Outgoing Calls
Require Encryption
Require LED Connection Indicator
Require Password for Enabling Bluetooth Support
Require Password for Discoverable Mode