background image

Protecting confidential information

With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen.

Anti-theft can alert you if somebody changes the SIM card in your device.

If you lose your device, you can send an SMS text message to your device to locate it or lock it remotely.

After the device is locked, it can be unlocked only with the remote lock code or screen unlock pattern.

Note:

To use the remote lock, keep the device lock or screen unlock pattern of your device turned

on.

You can wipe the data in the device remotely with the remote wipe.

On Symbian and Windows Mobile devices; when you send an SMS message to wipe your device, the
product deletes all the information stored in the device memory.

On Android devices; when you send an SMS message to wipe your device, the product removes information
in the inserted SD card, SMS and MMS messages, contacts and calendar information. In addition, we
recommend that you change the password of your Google account.

Note:

As memory cards can be easily removed, store your confidential information in the device memory.

Taking Anti-Theft into use

You need to create a screen unlock pattern and a password before you can use Anti-Theft.

On Android devices, you also need to create a screen unlock pattern.

Follow these instructions to take Anti-Theft into use:

1.

In the main view, select

Settings

.

The settings selection list opens.

2.

Select

Anti-Theft

from the settings selection list.

3.

Select

Set unlock pattern

in the Anti-Theft settings view.

Skip this step if you are not using an Android device.

The unlock pattern screen opens.

4.

Draw the unlock pattern and press

Confirm

.

For more information, consult the documentation that came with your device.

Skip this step if you are not using an Android device.

5.

Select

Set password

.

The

Set password

dialog opens.

6.

Enter your password and type it again to make sure you entered it correctly.

7.

Press

OK

.

Anti-Theft is turned on automatically after you have set the unlock pattern and the password.

Turning on remote Anti-Theft

When remote Anti-Theft features are turned on, you can send SMS text message to your device to lock it or
to wipe information in it.

To set up remote Anti-Theft:

1.

In the main view, open

Anti-theft

.

2.

In the

Anti-theft

menu, select

Settings

.

18

| F-Secure Mobile Security for Business | Anti-theft

Summary of Contents for MOBILE SECURITY - QUICK GUIDE FOR BUSINESS

Page 1: ...F Secure Mobile Security for Business Getting Started...

Page 2: ......

Page 3: ...Security 13 Overview 14 Key features 14 Installation on the device 15 Activating 16 Chapter 4 Anti theft 17 Protecting confidential information 18 Taking Anti Theft into use 18 Turning on remote Anti...

Page 4: ...4 F Secure Mobile Security for Business TOC...

Page 5: ...ntroduction The product consists of a client software that is installed on the user s mobile device and of the management portal that you can use to manage service subscribers and product updates Topi...

Page 6: ...t the misuse of confidential information if your device is lost or stolen Browsing protection keeps you safe on the Internet by blocking access to harmful web sites for example phishing and malware si...

Page 7: ...ind a description of the key features and basic functions of the management portal Topics Overview Logging in to the management portal for the first time Search and manage user account information Add...

Page 8: ...is hierarchical As an administrator you can see all of the information that is under the level where you have the access to Division administrators can create new regions and browse to see regional co...

Page 9: ...ortal prompts you to change your password You have to change your password during the first login 3 Enter your old password and create a new one that you will use to log in to the management portal Us...

Page 10: ...ption Edit the end user information Modify Send the license code by SMS to the end user First time registration Send an re registration message to the client to switch the license contract Re registra...

Page 11: ...has after the client application is activated 8 You can see the validity period of the license in the Contract start time and Contract end time fields 9 Select the Send activation sms check box to se...

Page 12: ...Click User statistics report to create a statistics report for the selected corporation and contract The statistics report displays the number of users and device platforms they use You need to selec...

Page 13: ...ll find a description of the key features of the product and how to install it on your device Topics Overview You will find more detailed information about F Secure Mobile Security in the product s us...

Page 14: ...the latest virus definition databases automatically Key features The list of key features in the product The product offers the following key features The application runs in the background while you...

Page 15: ...he product using your mobile device 1 If you downloaded the installation file directly the installation starts automatically Otherwise find and open the installation file that you moved to the device...

Page 16: ...to activate the product 1 Start the application The product displays the license terms the first time you start it 2 Read the license terms and accept them The activation starts after you have accept...

Page 17: ...rotecting confidential information With Anti theft you can locate or lock your device or erase your confidential data remotely to find out where your device is and prevent Anti theft management your p...

Page 18: ...ntial information in the device memory Taking Anti Theft into use You need to create a screen unlock pattern and a password before you can use Anti Theft On Android devices you also need to create a s...

Page 19: ...locked device can only be unlocked either by entering the defined lock password Symbian and Windows Mobile devices or by using the screen unlock pattern Android devices Wiping your device remotely Wh...

Page 20: ...mote operations To remotely lock the end user s device click Lock Once the command is sent the end user can unlock the device by entering the system lock password If the end user has not set up the An...

Page 21: ...when you access the site If the site is rated as suspicious or harmful Topics Changing the Browsing protection settings the product blocks the access to the site The safety rating of a web site is bas...

Page 22: ...n the Browsing protection is in use All operators the product checks the safety of visited web sites regardless of the operator network that you use My operator only the product checks the safety of v...

Page 23: ...included in the information you submit We protect your privacy further by using encryption when transferring the information The submitted information is used for improving the protection capabilitie...

Reviews: