F-secure MOBILE SECURITY FOR BUSINESS QUICK GUIDE

F-Secure Mobile Security for Business
Getting Started

Contents

Chapter 1: Introduction.......................................................................5
Chapter 2: F-Secure Mobile Security Portal......................................7
F-Secure Mobile Security for Business | TOC | 3
Overview...................................................................................................................................6
Overview...................................................................................................................................8
Administrator access levels...........................................................................................8
Search and manage user account information.......................................................................10
Add a new user for the corporation contract...........................................................................11
Creating reports......................................................................................................................12
Chapter 3: F-Secure Mobile Security...............................................13
Overview.................................................................................................................................14
Key features.................................................................................................................14
Installation on the device........................................................................................................15
Activating................................................................................................................................16
Chapter 4: Anti-theft..........................................................................17
Protecting confidential information..........................................................................................18
Taking Anti-Theft into use............................................................................................18
Turning on remote Anti-Theft.......................................................................................18
Locking your device remotely......................................................................................19
Wiping your device remotely........................................................................................19
Locating your device....................................................................................................19
Anti-theft management...........................................................................................................20
Using the remote Anti-theft..........................................................................................20
Chapter 5: Using the Internet safely................................................21
Changing the Browsing protection settings............................................................................22
Privacy mode..........................................................................................................................23
Changing the privacy mode.........................................................................................23
4 | F-Secure Mobile Security for Business | TOC

Introduction

Chapter
1
Topics:
Overview
The product consists of a client software that is installed on the user's mobile device and of the management portal that you can use to manage service subscribers and product updates.
6 | F-Secure Mobile Security for Business | Introduction

Overview

F-Secure Mobile Security for Business provides essential protection for today's sophisticated smartphones.
As an owner and user of a smartphone or other mobile device, F-Secure Mobile Security for Business protects your device against malware, which could cause unwanted billing, privacy issues or problems in using the device. The product also protects you against the misuse of confidential information if your device is lost or stolen. Browsing protection keeps you safe on the Internet by blocking access to harmful web sites, for example phishing and malware sites.
As a system administrator, F-Secure Mobile Security for Business gives you the tools for the centralized management and monitoring of your company's mobile devices. You can add new smartphones to the service, send activation codes via SMS and monitor the subscription status of users through a standard web browser.

F-Secure Mobile Security Portal

Chapter
2
Topics:
Overview
Logging in to the management portal for the first time
Search and manage user account information
Add a new user for the corporation contract
Creating reports
Here you will find a description of the key features and basic functions of the management portal.
Loading...
+ 16 hidden pages