Security Policy Settings
4/8/2010
The possible configuration settings for the security policies, including the policy ID, default value, and roles, are listed in the following table.
Policy ID | Policy Setting | Description |
---|---|---|
2 |
Auto Run Policy SECPOLICY_CFAUTORUN |
This setting indicates whether applications stored on a Multimedia Card (MMC) are allowed to auto-run when inserted into the device. Default value is 0 for Windows Mobile Professional. The value is not set for Windows Mobile Standard. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4097 |
RAPI Policy SECPOLICY_RAPI |
This setting restricts the access of remote applications that are using Remote API (RAPI) to implement ActiveSync operations on Windows Mobile devices. Default value is 2 for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4101 |
Unsigned CABS Policy SECPOLICY_UNSIGNEDCABS |
This setting indicates whether unsigned .cab files can be installed on the device. On Windows Mobile Standard, accepted unsigned .cab files are installed with the role mask specified by the policy value. For Windows Mobile Standard, if a signed .cab file does not have a matching root certificate in the Software Publisher Certificate (SPC) store, the file is unsigned. You should always use SECPOLICY_UNSIGNEDCABS together with SECPOLICY_UNSIGNEDAPPS. This means that when you block unsigned application from running, you should also block unsigned cab files from getting installed. > [!NOTE] > CAB Provisioning Format files — files with a .cpf extension — are processed the same as .cab files when the files are signed. However, when the .cpf file is unsigned the loader processes the .cpf files in silent mode, which means that the user will not get a prompt asking if the user wants to proceed with loading the unsigned file. In this case, the loading process fails.Default value is SECROLE_USER_AUTH for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4102 |
Unsigned Applications Policy SECPOLICY_UNSIGNEDAPPS |
This setting indicates whether unsigned applications are allowed to run on Windows Mobile devices. If a signed application does not have a matching root certificate in the Privileged Execution Trust Authorities or the Unprivileged Execution Trust Authorities certificate store, the application is unsigned. You should always use SECPOLICY_UNSIGNEDCABS together with SECPOLICY_UNSIGNEDAPPS policy. This means that when you block unsigned applications from running, you should also block unsigned cab files from getting installed on the device. Default value is 1 for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4103 |
Unsigned Themes Policy SECPOLICY_UNSIGNEDTHEMES |
This setting indicates whether theme files can be installed on the device. Theme files are used for processing home screens. Accepted unsigned theme files are installed with the role mask specified by the policy value. For Windows Mobile devices, if a signed theme file does not have a matching root certificate in the Software Publisher Certificate (SPC) store, the file is unsigned. Default value is SECROLE_USER_UNAUTH for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4104 |
Trusted Provisioning Server (TPS) Policy SECPOLICY_TPSCARRIERROLE |
This setting indicates whether mobile operators can be assigned the Trusted Provisioning Server (TPS) role. Default value is 1 for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4105 |
Message Authentication Retry Number Policy SECPOLICY_MAXAUTHENTICATIONRETRY |
This setting specifies the maximum number of times the user is allowed to try authenticating a Wireless Application Protocol (WAP) PIN-signed message. Default value is 3 for Windows Mobile. Possible values are 1 through 256. The required role to modify this policy is SECROLE_MANAGER. |
4107 |
WAP Signed Message Policy SECPOLICY_WAPSIGNEDMSG |
This policy has been deprecated. Use SECPOLICY_OMACPNETWPINMSG (4141), SECPOLICY_OMACPUSERPINMSG (4142), and SECPOLICY_OMACPUSERNETWPINMSG (4143) instead. While this policy is still supported, you cannot query for 4107 policy value. > [!NOTE] > You cannot use the new security policies (4141, 4142, 4143) and 4107 in the same provisioning document.The required role to modify this policy is SECROLE_MANAGER. |
4108 |
Service Loading (SL) Message Policy SECPOLICY_SL_MESSAGE |
This setting indicates whether SL messages are accepted. An SL message downloads new services or provisioning XML to the Windows Mobile device. You specify the security roles that can accept SL messages as a role mask. Default value is SECROLE_PPG_TRUSTED for Windows Mobile. The required role to modify this policy is SECROLE_MANAGER. |
4109 |
Service Indication (SI) Message Policy SECPOLICY_SI_MESSAGE |
This setting indicates whether SI messages are accepted. An SI message is sent to Windows Mobile Standard to notify users of new services, service updates, and provisioning services. You specify the security roles that can accept SI messages as a role mask. Default is SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED for Windows Mobile. The required role to modify this policy is SECROLE_MANAGER. |
4110 |
Unauthenticated Message Policy SECPOLICY_UNAUTHMESSAGES |
This setting indicates whether to accept unsigned WAP messages processed by the default security provider in the Security Module (Push Router), based on their origin. The message source must have one of the security roles specified by this policy. You specify the security roles that the unsigned messages will be accepted from as a role mask. Default value is SECROLE_USER_UNAUTH for Windows Mobile. The required role to modify this policy is SECROLE_MANAGER. |
4111 |
OTA Provisioning Policy SECPOLICY_OTAPROVISIONING |
This setting specifies which provisioning messages are accepted by the configuration host based on the roles assigned to the messages. This policy limits the provisioning messages that come from the push router. The default is SECROLE_OPERATOR_TPS | SECROLE_PPG_TRUSTED | SECROLE_PPG_AUTH | SECROLE_TRUSTED_PPG | SECROLE_USER_AUTH | SECROLE_OPERATOR for Windows Mobile. A specified role mask indicates system administrative privileges are given to the role mask specified. The required role to modify this policy is SECROLE_MANAGER. |
4113 |
WSP Push Policy SECPOLICY_WSPNOTIFICATIONS |
This setting indicates whether Wireless Session Protocol (WSP) notifications from the WAP stack are routed. Default value is 1 for Windows Mobile. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4119 |
Grant Manager Policy SECPOLICY_GRANTMANAGER |
This setting grants the system administrative privileges held by SECROLE_MANAGER to other security roles, without modifying metabase role assignments. The configuration manager enforces the Grant Manager policy. Default value is SECROLE_OPERATOR_TPS for Windows Mobile Professional, SECROLE_USER_AUTH for Windows Mobile Classic, and OPERATOS_TPS for Windows Mobile Standard. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4120 |
Grant User Authenticated Policy SECPOLICY_GRANTUSERAUTH |
This setting grants privileges held by SECROLE_USER_AUTH to other security roles without modifying metabase role assignments. Default value is SECROLE_USER_AUTH for Windows Mobile. The following list shows the possible values:
Configuration Manager enforces the Grant User Authenticated policy. The required role to modify this policy is SECROLE_MANAGER. |
4121 |
Trusted WAP Proxy Policy SECPOLICY_TRUSTED_WAP_PROXY |
This setting specifies the level of permissions required to create, modify, or delete a trusted proxy. WAP proxies are configured by means of the PXLOGICAL characteristic element in a WAP provisioning XML document. A WAP proxy is trusted when the TRUST parameter is specified in the PXLOGICAL characteristic element. You specify the security roles that can have Trusted WAP Proxy level permissions as a role mask. Default value is SECROLE_OPERATOR | SECROLE_OPERATOR_TPS | SECROLE_MANAGER for Windows Mobile. The required role to modify this policy is SECROLE_MANAGER. |
4122 |
Unsigned Prompt Policy SECPOLICY_UNSIGNEDPROMPT |
This setting indicates whether a user is prompted to accept or reject unsigned .cab, theme, .dll and .exe files. Default value is 0 for Windows Mobile. If the value is not set in the registry, then the behavior is the same as setting it to 0. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. |
4123 |
Privileged Applications Policy SECPOLICY_PRIVILEGEDAPPS |
This setting specifies which security model is implemented on the device. > [!NOTE] > This policy applies only to Windows Mobile Standard.Default value is 1 for Windows Mobile Professional. The default value is 0 for Windows Mobile Standard. If the value is not set in the registry, then the behavior is the same as setting it to 0. The following list shows the possible values:
The required role to modify this policy is SECROLE_MANAGER. For information about how the one-tier and two-tier security models affect applications, see Windows Mobile Device Security Model. |
4124 |
SL Security Policy SECPOLICY_SLSECUREDOWNLOAD |
This setting allows the operator to override https to use http, or wsps to use wsp. The following list shows the possible values:
Default value is 1. The required role to modify this policy is SECROLE_MANAGER. |
4125 |
Signed Mail Policy SECPOLICY_USESIGN |
This policy has been deprecated. Use SECPOLICY_SMIMESIGNING (4137) and SECPOLICY_SMIMESIGNINGALGORITHM (4139) instead. |
4126 |
Encrypted Message Policy SECPOLICY_USEENCRYPT |
This setting has been deprecated. Use SECPOLICY_SMIMEENCRYPTION (4138) and SECPOLICY_SMIMEENCRYPTIONALGORITHM (4140) instead. |
4127 |
Software Certificates Policy SECPOLICY_SOFTCERTS |
This setting determines whether an outbound message that is sent over Secure/Multipurpose Internet Mail Extensions (SMIME) can be signed with a software certificate. You can use this security policy with a tool that you create to allow people to import certificates. The following list shows the possible values:
The Default value is 1. |
4129 |
DRM Security Policy SECPOLICY_DRM_WAPRIGHTS |
This setting specifies which DRM rights messages are accepted by the DRM engine based on the role assigned to the message. Default is SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED. |
4131 |
Password Required Policy SECPOLICY_LASS_PWD_REQUIRED |
This policy indicates whether a password must be configured on the device. The following list shows the possible values:
The Default value is zero (0). The associated registry key does not exist by default. The Required role to modify this policy is SECROLE_MANAGER or SECROLE_ENTERPRISE. |
4132 |
Network PIN Prompt Policy SECPOLICY_WAP_NETWPIN_PROMPT |
This setting is used when the over the air (OTA) OMA Client Provisioning message is signed with only a network personal identification number (PIN). This setting indicates whether or not to prompt the user to accept device setting changes. The following list shows the possible values:
The Default value is 1. The Required role to modify this policy is SECROLE_MANAGER. |
4133 |
Desktop Unlock SECPOLICY_LASS_DESKTOP |
This policy has been deprecated. Use SECPOLICY_LASS_DESKTOP_QUICK_CONNECT (4146) instead. |
4134 |
Encrypt Removable Storage Policy SECPOLICY_MENCRYPT_REMOVABLE |
This setting specifies if the user is allowed to change mobile encryption settings for the removable storage media. The default setting is 1.
The required role to modify this policy is SECROLE_MANAGER or SECROLE_ENTERPRISE. |
4135 |
Bluetooth Policy SECPOLICY_BLUETOOTH |
This setting specifies if a Bluetooth enabled device allows other devices to perform a search on the device.
|
4136 |
HTML Message Policy SECPOLICY_HTML_MESSAGE |
This setting specifies whether message transports will allow HTML messages.
|
4137 |
SMIME Signing Policy SECPOLICY_SMIMESIGNING |
This setting specifies whether the Inbox application will send all messaged signed.
|
4138 |
SMIME Encryption Policy SECPOLICY_SMIMEENCRYPTION |
This setting specifies whether the Inbox application will send all messages encrypted.
|
4139 |
SMIME Signing Algorithm Policy SECPOLICY_SMIMESIGNINGALGORITHM |
This setting specifies which algorithm to use to sign a message.
|
4140 |
SMIME Encryption Algorithm Policy SECPOLICY_SMIMEENCRYPTIONALGORITHM |
This setting specifies which algorithm to use to encrypt a message.
|
4141 |
OMA CP Network PIN Policy SECPOLICY_OMACPNETWPINMSG |
This setting determines whether the OMA network PIN signed message will be accepted to be processed. The message that is accepted to be processed is still subject to network PIN signing authentication. If the authentication fails, the message will be dropped. The default is SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED | SECROLE_OPERATOR_TPS. You can also use the following security roles:
You cannot use any other role than those specified above, otherwise the request will fail. The required role to modify this policy is SECROLE_MANAGER. > [!NOTE] > You cannot use 4141 and 4107 in the same provisioning document. The old security policy 4107 is deprecated. |
4142 |
OMA CP User PIN Policy SECPOLICY_OMACPUSERPINMSG |
This setting determines whether the OMA user PIN or MAC signed message will be accepted to be processed. The message that is accepted to be processed is still subject to user PIN or MAC signing authentication. If the authentication fails, the message will be dropped. The default is SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED | SECROLE_OPERATOR_TPS You can also use the following security roles:
You cannot use any other role than those specified above, otherwise the request will fail. The required role to modify this policy is SECROLE_MANAGER. > [!NOTE] > You cannot use 4142 and 4107 in the same provisioning document. The old security policy 4107 is deprecated. |
4143 |
OMA CP User Network PIN Policy SECPOLICY_OMACPUSERNETWPINMSG |
This setting determines whether the OMA user network PIN signed message will be accepted to be processed. The message that is accepted to be processed is still subject to the user network PIN signing authentication. If the authentication fails, the message will be dropped. The default is SECROLE_PPG_AUTH | SECROLE_PPG_TRUSTED | SECROLE_OPERATOR_TPS. You can also use the following security roles:
You cannot use any other role than those specified above, otherwise the request will fail. The required role to modify this policy is SECROLE_MANAGER. > [!NOTE] > You cannot use 4143 and 4107 in the same provisioning document. The old security policy 4107 is deprecated. |
4144 |
Message Encryption Negotiation Policy SECPOLICY_SMIMEENCRYPTIONNEGOTIATION |
This setting specifies whether the Inbox application can negotiate the encryption algorithm in case a recipient's certificate does not support the specified encryption algorithm.
|
4145 |
SharePoint Access Policy SECPOLICY_SHAREPOINTUNCPROTOCOLACCESS |
This setting enables or disables Outlook Mobile SharePoint or UNC access through ActiveSync protocol to get documents.
|
4146 |
Desktop Quick Connect Authentication Policy SECPOLICY_LASS_DESKTOP_QUICK_CONNECT |
This setting specifies how device authentication is handled when connecting to the desktop..
|
See Also
Concepts
Security Roles
Security Policies
Windows Mobile Device Security Model