Common Policy Parent topic

Common Policy provides the common security policies for mobile devices. To configure common security policy settings, click Policies, then click the policy name, and then click Common Policy.
In Common Policy you can also assign policies for BlackBerry mobile devices.
  • User Privileges: You can enable or disable the feature that allows users to uninstall the Mobile Device Agent. Additionally, you can select whether to allow users to configure Mobile Security device agent settings.
    The following is a list of features associated with uninstall protection:
    • turn On/Off uninstall protection from the administration console
    • password length must have a minimum of six (6) and a maximum of twelve (12) characters; password may contain numbers, characters or symbols.
    • password can be set for each group from the administration console.
    If you do not select the Allow users to configure Mobile Security client settings check box, users cannot change Mobile Device Agent settings. However, the filtering lists for Spam Prevention Policy, Call Filtering Policy and Web Threat Protection Policy are not affected when this option is selected. For more information, see Spam SMS Prevention Policies, Spam WAP-Push Prevention Policies and Web Threat Protection Policy.
  • Update Settings: You can select to have the Mobile Security server notify Mobile Device Agents when a new component is available for update. Or you can select the auto-check option to have Mobile Device Agents periodically check for any component or configuration updates on the Mobile Security server.
    When you enable the wireless connection notification option, a prompt screen displays on mobile devices before Mobile Device Agents connect to the Communication Server through a wireless connection (such as 3G or GPRS). Users can choose to accept or decline the connection request.
  • Log Settings: When Mobile Device Agents detect a security risk, such as an infected file or firewall violation, a log is generated on mobile devices. If the Encryption Module is activated, the encryption logs are also generated. You can set the mobile devices to send these logs to the Mobile Security server. Do this if you want to analyze the number of infections or pinpoint possible network attacks and take appropriate actions to prevent threats from spreading.
  • Notification/Reports Settings: Select whether to display a prompt screen on mobile devices when a mobile device agent tries to establish a connection to the Communication Server.
  • BlackBerry Settings: Enables you to configure common policy settings for BlackBerry mobile devices.
    Note
    Note
    You must configure the BlackBerry Settings in the Communication Server settings before you can configure the policy settings. Refer to the topic Configuring BlackBerry Communication Server Settings in the Installation and Deployment Guide.