{"id":7821,"date":"2010-10-15T00:09:46","date_gmt":"2010-10-14T18:39:46","guid":{"rendered":"http:\/\/live-42gears-site.pantheonsite.io\/blog\/?p=463"},"modified":"2023-01-13T06:16:18","modified_gmt":"2023-01-13T06:16:18","slug":"understanding-windows-mobile-application-security-policies","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/understanding-windows-mobile-application-security-policies\/","title":{"rendered":"Understanding Windows Mobile Application Security Policies"},"content":{"rendered":"<p>Execution of programs on Windows Mobile devices depends on the application signatures and their permission levels. Devices can be configured to the following security settings.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Security off<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Unsigned applications are allowed to run without any prompt and they can access privileged APIs, or protected areas of the registry and file system.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>One-tier prompt<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The device prompts the user before executing unsigned applications. Once the user allows the execution, application has no restriction on permissions. This is usually safe if you trust the application developer or vendor.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Two-tier prompt<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>The device prompts the user before executing unsigned applications. If the user allows an unsigned application to execute, the application executes with normal permissions but cannot access privileged APIs, or protected areas of the registry and file system. Even the signed applications cannot access the privileged resources unless they are signed with a certificate in the privileged certificate store.<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Mobile2Market locked<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Only signed applications are allowed to execute. Unsigned applications don&#8217;t prompt the user when executed. Permissions given to signed applications depend on the certificate with which they were signed i.e. signed with certificate from the privileged certificate store or the normal certificate store.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Execution of programs on Windows Mobile devices depends on the application signatures and their permission levels. Devices can be configured to the following security settings. Security off Unsigned applications are allowed to run without any prompt and they can access privileged APIs, or protected areas of the registry and file system. One-tier prompt The device&hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,65,31],"tags":[64,47],"class_list":["post-7821","post","type-post","status-publish","format-standard","hentry","category-general","category-surecop","category-windows-mobile","tag-security","tag-windows-mobile"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Windows Mobile Application Security Policies | 42Gears<\/title>\n<meta name=\"description\" content=\"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Windows Mobile Application Security Policies\" \/>\n<meta property=\"og:description\" content=\"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-14T18:39:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-13T06:16:18+00:00\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Understanding Windows Mobile Application Security Policies\",\"datePublished\":\"2010-10-14T18:39:46+00:00\",\"dateModified\":\"2023-01-13T06:16:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\"},\"wordCount\":201,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"keywords\":[\"Security\",\"Windows Mobile\"],\"articleSection\":[\"General\",\"SureCop\",\"Windows Mobile\"],\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\",\"url\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\",\"name\":\"Understanding Windows Mobile Application Security Policies | 42Gears\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"datePublished\":\"2010-10-14T18:39:46+00:00\",\"dateModified\":\"2023-01-13T06:16:18+00:00\",\"description\":\"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Windows Mobile Application Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Windows Mobile Application Security Policies | 42Gears","description":"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/","og_locale":"nl_NL","og_type":"article","og_title":"Understanding Windows Mobile Application Security Policies","og_description":"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies","og_url":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2010-10-14T18:39:46+00:00","article_modified_time":"2023-01-13T06:16:18+00:00","author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Understanding Windows Mobile Application Security Policies","datePublished":"2010-10-14T18:39:46+00:00","dateModified":"2023-01-13T06:16:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/"},"wordCount":201,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"keywords":["Security","Windows Mobile"],"articleSection":["General","SureCop","Windows Mobile"],"inLanguage":"nl","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/","url":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/","name":"Understanding Windows Mobile Application Security Policies | 42Gears","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"datePublished":"2010-10-14T18:39:46+00:00","dateModified":"2023-01-13T06:16:18+00:00","description":"42Gears\u2019 blog has everything you need to future-proof your business. Understand the diffirent Windows Mobile Application security policies","breadcrumb":{"@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/blog\/understanding-windows-mobile-application-security-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Understanding Windows Mobile Application Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/7821","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=7821"}],"version-history":[{"count":3,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/7821\/revisions"}],"predecessor-version":[{"id":43538,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/7821\/revisions\/43538"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=7821"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=7821"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=7821"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}