Summary

In this chapter, we have examined the main management console to administer the BES. We have looked at role based administration for users and groups and their capabilities. We have also walked through the process of setting encryption and phase one of security measures to our BES environment. We have looked at the underlining principles that make the BES work, and reinforced the encryption techniques and methods that the BES uses.

In Chapter 3, Activating Devices and Users, we are going to look at creating users and activating devices, as we now have a broad understanding of how BlackBerry Enterprise Server works.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.219.71.21