F-Secure Mobile Security for Business
Getting Started
Contents
Chapter 1: Introduction.......................................................................5
Chapter 2: F-Secure Mobile Security Portal......................................7
F-Secure Mobile Security for Business | TOC | 3
Overview...................................................................................................................................6
Overview...................................................................................................................................8
Administrator access levels...........................................................................................8
Logging in to the management portal for the first time.............................................................9
Search and manage user account information.......................................................................10
Add a new user for the corporation contract...........................................................................11
Creating reports......................................................................................................................12
Chapter 3: F-Secure Mobile Security...............................................13
Overview.................................................................................................................................14
Key features.................................................................................................................14
Installation on the device........................................................................................................15
Activating................................................................................................................................16
Chapter 4: Anti-theft..........................................................................17
Protecting confidential information..........................................................................................18
Taking Anti-Theft into use............................................................................................18
Turning on remote Anti-Theft.......................................................................................18
Locking your device remotely......................................................................................19
Wiping your device remotely........................................................................................19
Locating your device....................................................................................................19
Anti-theft management...........................................................................................................20
Using the remote Anti-theft..........................................................................................20
Chapter 5: Using the Internet safely................................................21
Changing the Browsing protection settings............................................................................22
Privacy mode..........................................................................................................................23
Changing the privacy mode.........................................................................................23
4 | F-Secure Mobile Security for Business | TOC
Introduction
Chapter
1
Topics:
•
Overview
The product consists of a client software that is installed on the user's
mobile device and of the management portal that you can use to manage
service subscribers and product updates.
6 | F-Secure Mobile Security for Business | Introduction
Overview
F-Secure Mobile Security for Business provides essential protection for today's sophisticated smartphones.
As an owner and user of a smartphone or other mobile device, F-Secure Mobile Security for Business protects
your device against malware, which could cause unwanted billing, privacy issues or problems in using the
device. The product also protects you against the misuse of confidential information if your device is lost or
stolen. Browsing protection keeps you safe on the Internet by blocking access to harmful web sites, for
example phishing and malware sites.
As a system administrator, F-Secure Mobile Security for Business gives you the tools for the centralized
management and monitoring of your company's mobile devices. You can add new smartphones to the service,
send activation codes via SMS and monitor the subscription status of users through a standard web browser.
F-Secure Mobile Security Portal
Chapter
2
Topics:
•
Overview
•
Logging in to the management
portal for the first time
•
Search and manage user account
information
•
Add a new user for the
corporation contract
•
Creating reports
Here you will find a description of the key features and basic functions
of the management portal.