Originally Posted By: K447
Not my area of expertise, but perhaps another 'policy' can be overlaid on the phone?

All the policies are merged together and the strongest security settings from the merge are applied.