System Center Mobile Device Manager 2008

  1. This policy setting allows you to determine whether software certificates can be used to sign outgoing messages. You can ...
  2. This policy setting allows you to determine whether software certificates can be used to sign outgoing messages. You can ...
  3. This policy setting allows you to enable the encryption of removable media and disable the user's ability to change this ...
  4. This policy setting allows you to enable the encryption of removable media and disable the user's ability to change this ...
  5. This policy setting allows you to enable the encryption of removable media and disable the user's ability to change this ...
  6. This policy setting allows you to enable the encryption of removable media and disable the user's ability to change this ...
  7. This policy setting allows you to help the user automatically establish an Exchange partnership by specifying the Exchange ...
  8. This policy setting allows you to help the user automatically establish an Exchange partnership by specifying the Exchange ...
  9. This policy setting allows you to limit the amount of calendar history that is synchronized with the device. On the device, ...
  10. This policy setting allows you to limit the amount of calendar history that is synchronized with the device. On the device, ...
  11. This policy setting allows you to limit the amount of e-mail history that is synchronized with the device. On the device, ...
  12. This policy setting allows you to limit the amount of e-mail history that is synchronized with the device. On the device, ...
  13. This policy setting allows you to prevent the user from synchronizing e-mail, contact, calendar, and task items with a desktop ...
  14. This policy setting allows you to prevent the user from synchronizing e-mail, contact, calendar, and task items with a desktop ...
  15. This policy setting allows you to prevent users from resetting their password to one of their previously set passwords. This ...
  16. This policy setting allows you to prevent users from resetting their password to one of their previously set passwords. This ...
  17. This policy setting allows you to remove all Certificates in the Privileged certificate store. The certificates in the Privileged ...
  18. This policy setting allows you to remove all Certificates in the Privileged certificate store. The certificates in the Privileged ...
  19. This policy setting allows you to remove all certificates in the Software Publishing Certificate (SPC) store. The certificates ...
  20. This policy setting allows you to remove all certificates in the Software Publishing Certificate (SPC) store. The certificates ...
  21. This policy setting allows you to remove all Intermediate store certificates. The certificates in the Intermediate certificate ...
  22. This policy setting allows you to remove all Intermediate store certificates. The certificates in the Intermediate certificate ...
  23. This policy setting allows you to remove all Normal certificates. The Normal certificates control application execution for ...
  24. This policy setting allows you to remove all Normal certificates. The Normal certificates control application execution for ...
  25. This policy setting allows you to remove all Root store certificates. The certificates in the Root certificate store are ...
  26. This policy setting allows you to remove all Root store certificates. The certificates in the Root certificate store are ...
  27. This policy setting allows you to require that the device password be at least a specified length. The Require Password policy ...
  28. This policy setting allows you to require that the device password be at least a specified length. The Require Password policy ...
  29. This policy setting allows you to require users to set a password on the device. If you enable this policy setting, users ...
  30. This policy setting allows you to require users to set a password on the device. If you enable this policy setting, users ...
  31. This policy setting allows you to restrict remote applications that are using Remote API (RAPI) to implement ActiveSync operations ...
  32. This policy setting allows you to restrict remote applications that are using Remote API (RAPI) to implement ActiveSync operations ...
  33. This policy setting allows you to select which days of the week are considered peak days for scheduling Exchange ActiveSync ...
  34. This policy setting allows you to select which days of the week are considered peak days for scheduling Exchange ActiveSync ...
  35. This policy setting allows you to send keepalive packets associated with the Mobile VPN while roaming. The Mobile VPN application ...
  36. This policy setting allows you to send keepalive packets associated with the Mobile VPN while roaming. The Mobile VPN application ...
  37. This policy setting allows you to set the maximum amount of idle time after which the devices will automatically lock with ...
  38. This policy setting allows you to set the maximum amount of idle time after which the devices will automatically lock with ...
  39. This policy setting allows you to specify additional files that should be encrypted when device encryption is turned on. ...
  40. This policy setting allows you to specify additional files that should be encrypted when device encryption is turned on. ...
  41. This policy setting allows you to specify files that should not be encrypted when device encryption is turned on. If you ...
  42. This policy setting allows you to specify files that should not be encrypted when device encryption is turned on. If you ...
  43. This policy setting allows you to specify how many times a user may enter an incorrect device lock password before being ...
  44. This policy setting allows you to specify how many times a user may enter an incorrect device lock password before being ...
  45. This policy setting allows you to specify if RAM-installed unsigned applications are allowed to run as normal applications ...
  46. This policy setting allows you to specify if RAM-installed unsigned applications are allowed to run as normal applications ...
  47. This policy setting allows you to specify if RAM-installed unsigned applications are allowed to run as privileged applications ...
  48. This policy setting allows you to specify if RAM-installed unsigned applications are allowed to run as privileged applications ...
  49. This policy setting allows you to specify if the AES cipher can be used to encrypt data sent over the Mobile VPN. If you ...
  50. This policy setting allows you to specify if the AES cipher can be used to encrypt data sent over the Mobile VPN. If you ...
  51. This policy setting allows you to specify if the Diffie-Hellman Group 14 protocol can be used by the Internet Key Exchange ...
  52. This policy setting allows you to specify if the Diffie-Hellman Group 14 protocol can be used by the Internet Key Exchange ...
  53. This policy setting allows you to specify if the Diffie-Hellman Group 2 protocol can be used by the Internet Key Exchange ...
  54. This policy setting allows you to specify if the Diffie-Hellman Group 2 protocol can be used by the Internet Key Exchange ...
  55. This policy setting allows you to specify if the Diffie-Hellman Group 5 protocol can be used by the Internet Key Exchange ...
  56. This policy setting allows you to specify if the Diffie-Hellman Group 5 protocol can be used by the Internet Key Exchange ...
  57. This policy setting allows you to specify if the Triple DES (3DES) cipher can be used to encrypt data sent over the Mobile ...
  58. This policy setting allows you to specify if the Triple DES (3DES) cipher can be used to encrypt data sent over the Mobile ...
  59. This policy setting allows you to specify if the user can send and receive SMS and MMS text messages. Note that this policy ...
  60. This policy setting allows you to specify if the user can send and receive SMS and MMS text messages. Note that this policy ...
  61. This policy setting allows you to specify if the user can use a camera on the device. Note that this policy setting affects ...
  62. This policy setting allows you to specify if the user can use a camera on the device. Note that this policy setting affects ...
  63. This policy setting allows you to specify if the user can use Bluetooth on the device. Note that this policy setting affects ...
  64. This policy setting allows you to specify if the user can use Bluetooth on the device. Note that this policy setting affects ...
  65. This policy setting allows you to specify if the user can use Infrared (IrDA) communications on the device. Note that this ...
  66. This policy setting allows you to specify if the user can use Infrared (IrDA) communications on the device. Note that this ...
  67. This policy setting allows you to specify if the user can use Wireless LANs (WiFi) with the device. When you change this ...
  68. This policy setting allows you to specify if the user can use Wireless LANs (WiFi) with the device. When you change this ...
  69. This policy setting allows you to specify if the user is able to use IMAP4 and POP3 e-mail accounts. Note that this policy ...
  70. This policy setting allows you to specify if the user is able to use IMAP4 and POP3 e-mail accounts. Note that this policy ...
  71. This policy setting allows you to specify if user can use removable storage on the device. If you enable this policy setting, ...
  72. This policy setting allows you to specify if user can use removable storage on the device. If you enable this policy setting, ...
  73. This policy setting allows you to specify the Bluetooth profiles that the user can use on the device. The Bluetooth profiles ...
  74. This policy setting allows you to specify the Bluetooth profiles that the user can use on the device. The Bluetooth profiles ...
  75. This policy setting allows you to specify the fully qualified name or IP address for the proxy server used for Internet access ...