Share via


Perimeter Security

Perimeter security is a set of physical security and programmatic security policies that provide levels of protection against remote malicious activity. Perimeter security is enforced in the following areas:

  • Physical Access Control. The security devices and policies that are enforced for physical access control prevent the spread of viruses through portable storage devices, protect data on the phone, and protect the Subscriber Identity Module (SIM) card. For more information, see Physical Access Control.
  • .cab Signing. .cab file signing provides a more secure method of packaging and delivering applications in Smarphone. By signing the .cab files for downloads Microsoft® Windows® Mobile-based Smartphone can verify the source and integrity of the file. For more information, see Effect of .cab Signing Policies on the .cab File Installation Process.
  • Device Management. The security policies that are enforced for device management help to protect the device from threats that may originate from over-the-air (OTA) downloads or push messages. For more information, see Effect of Device Management Policies on the OTA Process.
  • Microsoft® ActiveSync®. The RAPI policy that is enforced for ActiveSync operations helps to protect against application-level threats.

See Also

Security for Windows Mobile Devices

Send feedback on this topic to the authors.

© 2005 Microsoft Corporation. All rights reserved.