Contents
Chapter 1: Introduction.......................................................................5
Overview...................................................................................................................................6
Chapter 2: F-Secure Mobile Security Portal......................................7
Overview...................................................................................................................................8
Administrator access levels...........................................................................................8
Logging in to the management portal for the first time.............................................................9
Search and manage user account information.......................................................................10
Add a new user for the corporation contract...........................................................................11
Creating reports......................................................................................................................12
Chapter 3: F-Secure Mobile Security...............................................13
Overview.................................................................................................................................14
Key features.................................................................................................................14
Installation on the device........................................................................................................15
Activating................................................................................................................................16
Chapter 4: Anti-theft..........................................................................17
Protecting confidential information..........................................................................................18
Taking Anti-Theft into use............................................................................................18
Turning on remote Anti-Theft.......................................................................................18
Locking your device remotely......................................................................................19
Wiping your device remotely........................................................................................19
Locating your device....................................................................................................19
Anti-theft management...........................................................................................................20
Using the remote Anti-theft..........................................................................................20
Chapter 5: Using the Internet safely................................................21
Changing the Browsing protection settings............................................................................22
Privacy mode..........................................................................................................................23
Changing the privacy mode.........................................................................................23
F-Secure Mobile Security for Business | TOC |
3