Best Practices in Managing Devices
This section provides general best practices for managing devices. For security-specific best practices, see Security and Device Management.
- Use consistent security policies.
Security policies are used to configure security settings that are then enforced with the help of security roles and certificates. They provide the flexibility to control the level of security on the device. The policies are defined globally and enforced locally in their respective components. For more information, see Security and Device Management and Security Policies. - Use appropriate certificates.
OEMs, Mobile Operators, and ISVs use certificates to sign applications and files that run on Windows Mobile-based devices. For more information about certificates, see Certificate Management in Windows Mobile-Based Devices. - Test your provisioning XML file with Windows Mobile-based devices.
To ensure that your provisioning XML appropriately configures a device, you should test it on the type of device you want to configure. For information about the provisioning XML file, see Provisioning for Windows Mobile-Based Devices.
See Also
Managing Devices | Security and Device Management
Send Feedback on this topic to the authors