F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS Owner's manual

Type
Owner's manual

This manual is also suitable for

F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS

F-Secure Mobile Security for Business is a comprehensive security solution designed to protect your business's mobile devices from a wide range of threats. With advanced features like anti-theft protection, malware scanning, and web filtering, F-Secure Mobile Security for Business helps you keep your data safe and secure.

Key features:

  • Anti-theft protection: Remotely lock and wipe your device to protect your data if it's lost or stolen.
  • Malware scanning: Scans apps and files for malicious content to protect your device from viruses, spyware, and other threats.

F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS

F-Secure Mobile Security for Business is a comprehensive security solution designed to protect your business's mobile devices from a wide range of threats. With advanced features like anti-theft protection, malware scanning, and web filtering, F-Secure Mobile Security for Business helps you keep your data safe and secure.

Key features:

  • Anti-theft protection: Remotely lock and wipe your device to protect your data if it's lost or stolen.
  • Malware scanning: Scans apps and files for malicious content to protect your device from viruses, spyware, and other threats.
F-Secure Mobile Security for Business
Getting Started
Contents
Chapter 1: Introduction.......................................................................5
Overview...................................................................................................................................6
Chapter 2: F-Secure Mobile Security Portal......................................7
Overview...................................................................................................................................8
Administrator access levels...........................................................................................8
Logging in to the management portal for the first time.............................................................9
Search and manage user account information.......................................................................10
Add a new user for the corporation contract...........................................................................11
Creating reports......................................................................................................................12
Chapter 3: F-Secure Mobile Security...............................................13
Overview.................................................................................................................................14
Key features.................................................................................................................14
Installation on the device........................................................................................................15
Activating................................................................................................................................16
Chapter 4: Anti-theft..........................................................................17
Protecting confidential information..........................................................................................18
Taking Anti-Theft into use............................................................................................18
Turning on remote Anti-Theft.......................................................................................18
Locking your device remotely......................................................................................19
Wiping your device remotely........................................................................................19
Locating your device....................................................................................................19
Anti-theft management...........................................................................................................20
Using the remote Anti-theft..........................................................................................20
Chapter 5: Using the Internet safely................................................21
Changing the Browsing protection settings............................................................................22
Privacy mode..........................................................................................................................23
Changing the privacy mode.........................................................................................23
F-Secure Mobile Security for Business | TOC | 3
4 | F-Secure Mobile Security for Business | TOC
Chapter
1
Introduction
The product consists of a client software that is installed on the user's
mobile device and of the management portal that you can use to manage
service subscribers and product updates.
Topics:
Overview
Overview
F-Secure Mobile Security for Business provides essential protection for today's sophisticated smartphones.
As an owner and user of a smartphone or other mobile device, F-Secure Mobile Security for Business protects
your device against malware, which could cause unwanted billing, privacy issues or problems in using the
device. The product also protects you against the misuse of confidential information if your device is lost or
stolen. Browsing protection keeps you safe on the Internet by blocking access to harmful web sites, for
example phishing and malware sites.
As a system administrator, F-Secure Mobile Security for Business gives you the tools for the centralized
management and monitoring of your company's mobile devices. You can add new smartphones to the service,
send activation codes via SMS and monitor the subscription status of users through a standard web browser.
6 | F-Secure Mobile Security for Business | Introduction
Chapter
2
F-Secure Mobile Security Portal
Here you will find a description of the key features and basic functions
of the management portal.
Topics:
Overview
Logging in to the management
portal for the first time
Search and manage user account
information
Add a new user for the
corporation contract
Creating reports
Overview
The key features of the product.
With the management portal, you can:
download the latest version of the client application,
manage product licenses and subscriptions,
view and edit end-user information, and
create and manage corporation and administrator accounts.
Administrator access levels
You may have access to different level of information when using the portal, depending on your administrator
level.
The management structure is hierarchical. As an administrator, you can see all of the information that is under
the level where you have the access to.
Division administrators can create new regions and browse to see regional, corporate-level, and contract
information. However division administrators cannot view or manage any other divisions or the related
information.
Region administrators can create new corporation accounts in their region and browse to see corporate-level
information.
Corporation administrators have access to contract and user information under their corporation account.
8 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal
Logging in to the management portal for the first time
You can use your web browser to log in to the management portal .
To log in to the management portal for the first time, follow these instructions.
1.
Open https://msp.f-secure.com with your web browser.
The login screen opens.
2. Log in with your username and the password that you have received.
The management portal prompts you to change your password. You have to change your password during
the first login.
3. Enter your old password and create a new one that you will use to log in to the management portal.
Use a password that is easy to remember but hard to guess. The password must contain at least 10
characters and it should contain upper and lower case letters, numbers and special characters.
The main view of the management portal opens after you have successfully entered your new password.
F-Secure Mobile Security for Business | F-Secure Mobile Security Portal | 9
Search and manage user account information
You can search for the end-user information that you want to view or edit.
To find an end-user, follow these instructions.
1. Click Search in the main view.
2. Enter any search criteria you want to use to find the user. You can leave any fields empty.
3. Click Search.
The management portal displays all end-users that match your search criteria.
4. Click the name of the end-user to view detailed account information.
The user subscription details view opens.
5. Select any of the following actions to manage the end-user account.
DescriptionOption
Edit the end-user informationModify
Send the license code by SMS to the end-userFirst time registration
Send an re-registration message to the client to switch the license
contract
Re-registration
Send the end-user a link to the product download page by SMSSend download link
Remove the end-user account permanentlyDelete
Note: If you send the first time registration code to a new device, the client application that is installed
in the previously used device is disabled and cannot be used.
Click Usage log in the menu to view information about the product and database updates.
Click Message log in the menu to view the log of all messages that the portal has sent to the client
application.
10 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal
Add a new user for the corporation contract
You can add new end-users for the corporation account manually one-by-one.
Follow these instructions to add new users for the corporation.
1. Click Corporations in the main view.
The management portal displays the list of corporate accounts in your domain.
2. Click the name of the corporation from the list for which you want to add new end-users.
Tip: If the list is long, you can use the Seach Corporations search to find the corporation account
that you want to manage.
3. Click Contracts to view all licenses for the selected corporation account.
4. Click the name of the license for which you want to add new end-users.
The management portal displays the license details and the list of end-users that use the license.
5. Click Add new to add a new user for the license.
6. Enter the user's name and the contact information to First name, Last name, Mobile phone and eMail
fields.
7. The Device type field will display the device that the end-user has after the client application is activated.
8. You can see the validity period of the license in the Contract start time and Contract end time fields.
9. Select the Send activation sms check box to send the activation message to user's mobile phone number
as an SMS message.
If you want to deliver the activation message some other way, leave the check box empty.
10. Click OK.
If the Send activation sms check box selected, the user receives the activation message after the user
account is created. The client application installed on the mobile device uses the activation message to
activate the product automatically.
If the Send download link check box is selected, new users receive a link to the product download page,
from which they can download and install F-Secure Mobile Security.
You can also use the license.xml file for activating the product, for example when the installation package
is delivered on a memory card. To download the license.xml file, select the contract you want to use from
the corporation contracts list and click Modify, then click Download License.xml on the contract details
page.
F-Secure Mobile Security for Business | F-Secure Mobile Security Portal | 11
Creating reports
You can use the management portal to generate contract summary reports, user statistics reports and lists
of end-users.
Follow these instructions to create reports:
1. Click Exporting & Reporting in the main view.
2. Select one of the following reports to generate:
Click Contract summary report to create a list of contracts for the selected year and month.
Click Export users to create a list of users for the selected corporation and contract.
You can export the user list as an XML or HTML file or in a CSV format.
Click User statistics report to create a statistics report for the selected corporation and contract.
The statistics report displays the number of users and device platforms they use.
You need to select the details for the report you want to generate.
3. Select details for the report.
4. Click Create.
The View/Download report view opens.
5. The View/Download report view lists all your reports and their status. If the status of the report is In
queue, click Refresh to update the status list.
The status changes to Ready after the portal has generated the report.
6. Click View to view the report with your browser or Download to download the report as a file.
12 | F-Secure Mobile Security for Business | F-Secure Mobile Security Portal
Chapter
3
F-Secure Mobile Security
Here you will find a description of the key features of the product and
how to install it on your device.
Topics:
Overview
You will find more detailed information about F-Secure Mobile Security
in the product's user guide.
Installation on the device
Activating
Overview
F-Secure Mobile Security provides complete security for your mobile device.
The product protects data stored in your mobile device against malicious code attacks and monitors incoming
and outgoing connections and protects the device from network intrusion attempts. It also helps you protect
your personal and confidential data in the event your device is lost or stolen. Browsing protection identifies
which web sites are safe and which web sites you should avoid, and automatically blocks harmful sites to
ensure you are safe on the Internet.
The product scans all files for viruses automatically when they are saved, copied, downloaded, synchronized
or otherwise modified. All infected files are immediately quarantined to protect all other data on the device.
The automatic scanning happens transparently in the background.
To work effectively, antivirus software requires an always up-to-date virus definition database. The product
retrieves the latest virus definition databases automatically.
Key features
The list of key features in the product.
The product offers the following key features:
The application runs in the background while you use your device.Transparent Operation
The application automatically scans all files when they are accessed. You can
also manually scan your device for viruses whenever you want.
Extensive Scanning
The application automatically downloads regular updates to keep the virus
definition database up-to-date.
Automatic Updates
The application protects you from potential network harm by blocking information
that does not meet the set security criteria.
Firewall
The application protects your confidential infromation by locking the device
automatically when the SIM card is changed. You can also send a message to
your mobile device to locate it or remotely wipe the data stored on it if it is stolen.
Anti-theft
The application protects you from web sites that may steal your personal
information, including credit card numbers, user account information, and
passwords.
Browsing protection
14 | F-Secure Mobile Security for Business | F-Secure Mobile Security
Installation on the device
Instructions how to install the product directly on the device
You need to have the installation file on your device to start the installation. Either download the installation
file to your computer and move it to the device, or download the installation directly to your device.
Follow these instructions to install the product using your mobile device.
1. If you downloaded the installation file directly, the installation starts automatically. Otherwise, find and
open the installation file that you moved to the device.
2. Follow the on-screen instructions to install the product.
3. When the installation is ready, restart your device if the installation asks you to do so.
After the installation, you need to activate the product. The product does not protect your device if you have
not activated it.
F-Secure Mobile Security for Business | F-Secure Mobile Security | 15
Activating
Activating the product turns on the protection.
There are three different ways to activate the product:
Subscription key: You can use the subscription key that is given on your subscription agreement. You
enter the subscription key when promtped during activation.
SMS: Your administrator can send an activation code by SMS through the management portal. The product
will automatically retrieve the activation code during activation.
XML file: Your administrator can provide the license.xml file that contains the activation code. This
method can be used, for example, when installing the product from a memory card or via device
management (both the installation package and license.xml file are transferred to the device). Your
administrator can access this file from the contract details page on the management portal.
Follow these instructions to activate the product:
1. Start the application.
The product displays the license terms the first time you start it.
2. Read the license terms and accept them.
The activation starts after you have accepted the license terms.
3. Select the activation type.
4. The activation requires a connection to the update service. Press Yes to connect to the update service.
The application connects to the update service and activates the product.
If you used the subscription code to activate the product, the application downloads the latest virus definition
database during the first update.
5. After the product has downloaded all the necessary updates, the activation is complete. Press Continue
to finish the activation.
After you have activated the product, the main user interface of the product opens and the product protects
your device.
Scan your device for viruses to make sure your device is clean after you have installed and activated the
product.
The default firewall level is set to normal.
16 | F-Secure Mobile Security for Business | F-Secure Mobile Security
Chapter
4
Anti-theft
Mobile devices can be easily lost or stolen, so it's important that you can
remotely locate, protect and control your device.
Topics:
Protecting confidential information
With Anti-theft, you can locate or lock your device, or erase your
confidential data remotely to find out where your device is and prevent
Anti-theft management
your personal and confidential information from being misused. An
administrator can also remotely lock, wipe or locate your device through
the management portal.
Protecting confidential information
With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen.
Anti-theft can alert you if somebody changes the SIM card in your device.
If you lose your device, you can send an SMS text message to your device to locate it or lock it remotely.
After the device is locked, it can be unlocked only with the remote lock code or screen unlock pattern.
Note: To use the remote lock, keep the device lock or screen unlock pattern of your device turned
on.
You can wipe the data in the device remotely with the remote wipe.
On Symbian and Windows Mobile devices; when you send an SMS message to wipe your device, the
product deletes all the information stored in the device memory.
On Android devices; when you send an SMS message to wipe your device, the product removes information
in the inserted SD card, SMS and MMS messages, contacts and calendar information. In addition, we
recommend that you change the password of your Google account.
Note: As memory cards can be easily removed, store your confidential information in the device memory.
Taking Anti-Theft into use
You need to create a screen unlock pattern and a password before you can use Anti-Theft.
On Android devices, you also need to create a screen unlock pattern.
Follow these instructions to take Anti-Theft into use:
1. In the main view, select Settings.
The settings selection list opens.
2. Select Anti-Theft from the settings selection list.
3. Select Set unlock pattern in the Anti-Theft settings view.
Skip this step if you are not using an Android device.
The unlock pattern screen opens.
4. Draw the unlock pattern and press Confirm.
For more information, consult the documentation that came with your device.
Skip this step if you are not using an Android device.
5. Select Set password.
The Set password dialog opens.
6. Enter your password and type it again to make sure you entered it correctly.
7. Press OK.
Anti-Theft is turned on automatically after you have set the unlock pattern and the password.
Turning on remote Anti-Theft
When remote Anti-Theft features are turned on, you can send SMS text message to your device to lock it or
to wipe information in it.
To set up remote Anti-Theft:
1. In the main view, open Anti-theft.
2. In the Anti-theft menu, select Settings.
18 | F-Secure Mobile Security for Business | Anti-theft
3. If you want to be able to lock your device remotely, follow these instructions:
a) Enter a Security code if you have not created it yet.
b) Turn on Remote lock.
4. If you want to be able to wipe your device remotely, turn on Remote wipe.
5. If you want to be able to locate your device remotely, turn on Remote locate.
To use the remote locate, make sure that the positioning methods in your device are turned on. Usually
these are turned on by default. For more information, consult the documentation that came with your
device.
The remote Anti-Theft is turned on.
Locking your device remotely
When you lock your device remotely, it cannot be used without your permission.
Follow these instructions to lock your lost or stolen device:
To lock the device, send the following SMS message to your device:#LOCK#<security code>
(For example: #LOCK#12345678)
A locked device can only be unlocked either by entering the defined lock password (Symbian and Windows
Mobile devices) or by using the screen unlock pattern (Android devices).
Wiping your device remotely
When you wipe your device, Anti-theft deletes your personal information stored in the device.
Follow these instructions to wipe your lost or stolen device:
To wipe the device, send the following SMS message to your device:#WIPE#<security code>
(For example: #WIPE#12345678)
When you wipe the device, the product removes all data stored on it.
Locating your device
You can send an SMS message to your lost device to locate it.
Follow these instructions to locate your device:
Anti-theft replies with an SMS message that contains the latest location of the device.
Tip: Send the locate message to your device after you have set it up to make sure that it works correctly.
Note:
Anti-theft does not store any location data, the only location information is in the SMS text message that
is sent to you.
F-Secure Mobile Security for Business | Anti-theft | 19
Anti-theft management
With Anti-theft, you can make sure that an end-user's device or data stored on it is not misused if the device
is stolen.
With Anti-theft management, you can remotely lock, wipe or reset the Anti-theft settings on an end-user's
device. All Anti-theft operations are logged and shown in the user subscription details view.
Using the remote Anti-theft
You can remotely lock, wipe or reset the Anti-theft settings for an end-user with a subscription that you can
manage.
To remotely run Anti-theft operations, follow these instructions.
1. To find the end-user information you want to modify, you can use the Seach user search to find the
end-user account that you want to modify.
2. Click the name of the end-user in the search results to view detailed account information.
The user subscription details view opens.
3. Click Antitheft in the menu to view the Anti-theft operation log for the end-user and to run remote operations.
To remotely lock the end-user's device, click Lock. Once the command is sent, the end-user can unlock
the device by entering the system lock password. If the end-user has not set up the Anti-theft settings,
you can unlock the device by sending a Reset command.
Note: Android and Windows Phone 6.0 and 6.1 require that the remote lock is turned on and the
lock code or pattern is set in the device in order to use the adminstrator managed remote lock.
This does not apply to remote wipes initiated by the administrator.
To remotely erase all data stored on the end-user's device, click Wipe.
To remotely reset the Anti-theft settings on the end-user's device, click Reset.
Note: After an administrator resets a Windows Mobile device, you need to reboot the device and
turn on the device lock.
4. In the confimation dialog, select the confirmation checkbox and click OK.
Once the command is received, the end-user's device is immediately locked, wiped or reset. The command
type, time sent and time the response was received are logged on the user subscription details view.
20 | F-Secure Mobile Security for Business | Anti-theft
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23

F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS Owner's manual

Type
Owner's manual
This manual is also suitable for

F-SECURE MOBILE SECURITY - QUICK GUIDE FOR BUSINESS

F-Secure Mobile Security for Business is a comprehensive security solution designed to protect your business's mobile devices from a wide range of threats. With advanced features like anti-theft protection, malware scanning, and web filtering, F-Secure Mobile Security for Business helps you keep your data safe and secure.

Key features:

  • Anti-theft protection: Remotely lock and wipe your device to protect your data if it's lost or stolen.
  • Malware scanning: Scans apps and files for malicious content to protect your device from viruses, spyware, and other threats.

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI