User manual F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE MOBILE SECURITY. We hope that this F-SECURE MOBILE SECURITY user guide will be useful to you.


F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS: Download the complete user guide (266 Ko)

You may also download the following manuals related to this product:

   F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS (293 ko)
   F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS (295 ko)
   F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS (290 ko)
   F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS (375 ko)
   F-SECURE MOBILE SECURITY QUICK GUIDE FOR BUSINESS (282 ko)

Manual abstract: user guide F-SECURE MOBILE SECURITYQUICK GUIDE FOR BUSINESS

Detailed instructions for use are in the User's Guide.

[. . . ] Region administrators can create new corporation accounts in their region and browse to see corporate-level information. Corporation administrators have access to contract and user information under their corporation account. · · F-Secure Mobile Security for Business | F-Secure Mobile Security Portal | 9 Logging in to the management portal for the first time You can use your web browser to log in to the management portal . To log in to the management portal for the first time, follow these instructions. Open https://msp. f-secure. com with your web browser. The login screen opens. [. . . ] When the installation is ready, restart your device if the installation asks you to do so. The product does not protect your device if you have not activated it. 16 | F-Secure Mobile Security for Business | F-Secure Mobile Security Activating Activating the product turns on the protection. There are three different ways to activate the product: · · · Subscription key: You can use the subscription key that is given on your subscription agreement. SMS: Your administrator can send an activation code by SMS through the management portal. The product will automatically retrieve the activation code during activation. XML file: Your administrator can provide the license. xml file that contains the activation code. This method can be used, for example, when installing the product from a memory card or via device management (both the installation package and license. xml file are transferred to the device). Your administrator can access this file from the contract details page on the management portal. Follow these instructions to activate the product: 1. The application connects to the update service and activates the product. If you used the subscription code to activate the product, the application downloads the latest virus definition database during the first update. After the product has downloaded all the necessary updates, the activation is complete. After you have activated the product, the main user interface of the product opens and the product protects your device. Scan your device for viruses to make sure your device is clean after you have installed and activated the product. The default firewall level is set to normal. Chapter 4 Anti-theft Topics: · · Protecting confidential information Anti-theft management Mobile devices can be easily lost or stolen, so it's important that you can remotely locate, protect and control your device. With Anti-theft, you can locate or lock your device, or erase your confidential data remotely to find out where your device is and prevent your personal and confidential information from being misused. An administrator can also remotely lock, wipe or locate your device through the management portal. 18 | F-Secure Mobile Security for Business | Anti-theft Protecting confidential information With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen. Anti-theft can alert you if somebody changes the SIM card in your device. If you lose your device, you can send an SMS text message to your device to locate it or lock it remotely. · After the device is locked, it can be unlocked only with the remote lock code or screen unlock pattern. Note: To use the remote lock, keep the device lock or screen unlock pattern of your device turned on. · · On Symbian and Windows Mobile devices; when you send an SMS message to wipe your device, the product deletes all the information stored in the device memory. On Android devices; when you send an SMS message to wipe your device, the product removes information in the inserted SD card, SMS and MMS messages, contacts and calendar information. [. . . ] Select Go back in the block page to return to the page where you left. If you want to enter the site even though Browsing protection blocked it, follow the I want to enter this web site anyway link in the block page. F-Secure Mobile Security for Business | Using the Internet safely | 23 Privacy mode Browsing protection can send information of web sites that contain harmful content to the analysis automatically to maintain the quality of service. Even though the submitted information may be considered personal under some jurisdictions, your privacy is protected during the process. We transfer the information securely, remove any unnecessary personal information, and process the information anonymously in an aggregate format. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE MOBILE SECURITY




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE MOBILE SECURITY will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.