This section describes how you can configure the unauthorized access protection settings on the device in case it gets lost or stolen.
In this section
Sending commands to a mobile device
Unlocking a mobile device
Data encryption