F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS Getting Started

Advertisement

Quick Links

F-Secure Mobile Security for Business
Getting Started

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the MOBILE SECURITY - QUICK GUIDE FOR BUSINESS and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS

  • Page 1 F-Secure Mobile Security for Business Getting Started...
  • Page 3: Table Of Contents

    F-Secure Mobile Security for Business | TOC | 3 Contents Chapter 1: Introduction...............5 Overview...........................6 Chapter 2: F-Secure Mobile Security Portal........7 Overview...........................8 Administrator access levels...................8 Logging in to the management portal for the first time.............9 Search and manage user account information...............10 Add a new user for the corporation contract................11...
  • Page 4 4 | F-Secure Mobile Security for Business | TOC...
  • Page 5: Chapter 1: Introduction

    Chapter Introduction Topics: The product consists of a client software that is installed on the user's mobile device and of the management portal that you can use to manage • Overview service subscribers and product updates.
  • Page 6: Overview

    F-Secure Mobile Security for Business provides essential protection for today's sophisticated smartphones. As an owner and user of a smartphone or other mobile device, F-Secure Mobile Security for Business protects your device against malware, which could cause unwanted billing, privacy issues or problems in using the device.
  • Page 7: Chapter 2: F-Secure Mobile Security Portal

    Chapter F-Secure Mobile Security Portal Topics: Here you will find a description of the key features and basic functions of the management portal. • Overview • Logging in to the management portal for the first time • Search and manage user account information •...
  • Page 8: Overview

    8 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal Overview The key features of the product. With the management portal, you can: • download the latest version of the client application, • manage product licenses and subscriptions, •...
  • Page 9: Logging In To The Management Portal For The First Time

    F-Secure Mobile Security for Business | F-Secure Mobile Security Portal | 9 Logging in to the management portal for the first time You can use your web browser to log in to the management portal . To log in to the management portal for the first time, follow these instructions.
  • Page 10: Search And Manage User Account Information

    10 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal Search and manage user account information You can search for the end-user information that you want to view or edit. To find an end-user, follow these instructions. 1. Click Search in the main view.
  • Page 11: Add A New User For The Corporation Contract

    F-Secure Mobile Security for Business | F-Secure Mobile Security Portal | 11 Add a new user for the corporation contract You can add new end-users for the corporation account manually one-by-one. Follow these instructions to add new users for the corporation.
  • Page 12: Creating Reports

    12 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal Creating reports You can use the management portal to generate contract summary reports, user statistics reports and lists of end-users. Follow these instructions to create reports: 1. Click Exporting &...
  • Page 13: Chapter 3: F-Secure Mobile Security

    Here you will find a description of the key features of the product and how to install it on your device. • Overview You will find more detailed information about F-Secure Mobile Security • Installation on the device in the product's user guide.
  • Page 14: Overview

    14 | F-Secure Mobile Security for Business | F-Secure Mobile Security Overview F-Secure Mobile Security provides complete security for your mobile device. The product protects data stored in your mobile device against malicious code attacks and monitors incoming and outgoing connections and protects the device from network intrusion attempts. It also helps you protect your personal and confidential data in the event your device is lost or stolen.
  • Page 15: Installation On The Device

    F-Secure Mobile Security for Business | F-Secure Mobile Security | 15 Installation on the device Instructions how to install the product directly on the device You need to have the installation file on your device to start the installation. Either download the installation file to your computer and move it to the device, or download the installation directly to your device.
  • Page 16: Activating

    16 | F-Secure Mobile Security for Business | F-Secure Mobile Security Activating Activating the product turns on the protection. There are three different ways to activate the product: • Subscription key: You can use the subscription key that is given on your subscription agreement. You enter the subscription key when promtped during activation.
  • Page 17: Chapter 4: Anti-Theft

    Chapter Anti-theft Topics: Mobile devices can be easily lost or stolen, so it's important that you can remotely locate, protect and control your device. • Protecting confidential information With Anti-theft, you can locate or lock your device, or erase your •...
  • Page 18: Protecting Confidential Information

    18 | F-Secure Mobile Security for Business | Anti-theft Protecting confidential information With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen. Anti-theft can alert you if somebody changes the SIM card in your device.
  • Page 19: Locking Your Device Remotely

    F-Secure Mobile Security for Business | Anti-theft | 19 3. If you want to be able to lock your device remotely, follow these instructions: a) Enter a Security code if you have not created it yet. b) Turn on Remote lock.
  • Page 20: Anti-Theft Management

    20 | F-Secure Mobile Security for Business | Anti-theft Anti-theft management With Anti-theft, you can make sure that an end-user's device or data stored on it is not misused if the device is stolen. With Anti-theft management, you can remotely lock, wipe or reset the Anti-theft settings on an end-user's device.
  • Page 21: Chapter 5: Using The Internet Safely

    If the site is rated as suspicious or harmful, • Changing the Browsing protection the product blocks the access to the site. The safety rating of a web site settings is based on information from several sources, such as F-Secure malware analysts and F-Secure partners. • Privacy mode...
  • Page 22: Changing The Browsing Protection Settings

    22 | F-Secure Mobile Security for Business | Using the Internet safely Changing the Browsing protection settings You can select when the Browsing protection is turned on based on the operator network that you are using. To change the product settings: 1.
  • Page 23: Privacy Mode

    F-Secure Mobile Security for Business | Using the Internet safely | 23 Privacy mode Browsing protection can send information of web sites that contain harmful content to the analysis automatically to maintain the quality of service. You can choose which information you want to submit to the analysis.

Table of Contents