This section describes how you can configure the unauthorized access protection settings on the device in case it gets lost or stolen.
In this section
Sending commands to a lost or stolen mobile device
Unlocking a mobile device
Data encryption
Deleting data on Android devices after failed password entry attempts