After Logging In



Hello. You have arrived at an outdated topic. Please click this link to be redirected to the updated Endpoint Protection Admin Guide.

Before completing the procedures described in this manual, follow the instructions in SecureAnywhere Business Mobile Protection Getting Started to install the software, set up your account and log in.

Workflow of Tasks

Once you have logged in to your Mobile Protection account, you follow these steps:

When you have gone through the above steps for all your users and devices, you can assign policies on a group or device basis that control the following:

  • The level of protection on the device
  • Block malicious text messages from a device.
  • Block a device from browsing on malicious websites.
  • Require a password and specify password formats for the device.
  • For a detailed description of policy options, see:

You can also perform the following device management functions remotely:

  • View alerts and work with the user to remove threats.
  • Run scans and force a virus definition update.
    Note:

    If you have Mobile Protection software that is version 3.7.1 or greater, cloud definitions are always up to date, and you will not need to push them. However, if you have software that is version 3.7.0 or older, the Scan Now and Force Definitions Update buttons will be available and you will still be able to schedule and push updates.

  • Depending on your OS, locate, lock, unlock, wipe devices, and issue a scream. For more information, see Sending Lost Device Protection Commands to Android Devices.
If You Are Upgrading
  • If you are upgrading from a previous version of Mobile Protection, your users will be assigned to the Default Group, which is assigned the Default Android policy and Default iOS policy.
  • If you want to move users to a different group, see Moving Users Between Groups.