Share via


Security for Windows Mobile Devices

Windows Mobile-based Smartphone and Pocket PC provide the flexibility to adapt to an operator's security requirements.

Windows Mobile-based device security restricts the installation and execution of applications and access to system resources. It includes services such as role-based access control, authentication protocols, cryptographic support, certificate management, and, for Windows Mobile-based Smartphone, trustworthy application verification.

In This Section

  • Security Overview
    Explains the security models used for Windows Mobile-based devices.
  • Security Policies and Roles
    Provides detailed information about the policies used to configure security for Windows Mobile-based devices and defines the security roles that can be assigned to WAP push messages.
  • Certificates
    Provides information about how certificates are used to verify the authenticity and integrity of files and applications.
  • Application Security
    Discusses the one and two tier security model for Pocket PC and Smartphone, including application trust models.
  • Perimeter Security
    Provides information about the methods employed to prevent access to Windows Mobile-based devices by unauthorized users and to the prevent the unauthorized download and/or installation of files.
  • Authentication Protocols
    Provides information about the authentication protocols used in Windows Mobile-based devices.
  • Cryptography
    Provides information about the cryptographic services provided on Windows Mobile-based devices.

Send feedback on this topic to the authors.

© 2005 Microsoft Corporation. All rights reserved.