Securing Mobile Devices in the Enterprise: Configuring Enterprise-level Security