Protection of stolen or lost device data

This section describes how you can configure the unauthorized access protection settings on the device in case it gets lost or stolen.

In this section

Sending commands to a mobile device

Unlocking a mobile device

Data encryption

Page top