Customizing the Devices view (Mobile Protection only) (F-Secure) 0 (0)

You can select which columns you want to be visible in the Devices table . Note: The feature is currently available only in the Mobile devices tab. To customize the Devices view: Click Devices on the sidebar. If the scope selector is set to display all customer companies, select the company you wish to manage. The Devices page is displayed. Select the Mobile […]

Read More

Remotely managing a device (F-Secure) 0 (0)

To send a command to a selected device or manage it via the F-Secure Elements Endpoint Protection portal: Click Devices on the sidebar. If the scope selector is set to display all customer companies, select the company you wish to manage. The Devices page is displayed. Select one of the following tabs: Computers – shows devices with F-Secure Computer Protection and […]

Read More

Managing Mobile Protection invitations (F-Secure) 0 (0)

You can send an email with an installation link that allows the recipient to install the app on one device. To manage the invitations: Click Devices on the sidebar. If the scope selector is set to display all customer companies, select the company you wish to manage. The Devices page is displayed. Select  and then select Manage Mobile Protection invitations. The Manage Mobile Protection […]

Read More

Importing multiple mobile devices (F-Secure) 0 (0)

You can add multiple mobile devices to the F-Secure Elements Endpoint Protection portal at the same time. Note: This topic applies only to the older F-Secure Mobile Security and F-Secure Freedome for Business products, not the current F-Secure Elements Mobile Protection product. To import multiple mobile devices at the same time, you need a Comma Separated […]

Read More

Downloading software from the portal (F-Secure) 0 (0)

You can download F-Secure software installation packages through the F-Secure Elements Endpoint Protection portal. Note: You can download the software without first logging in by selecting the Downloads link on the login page. When you download the software this way, the subscription key is not embedded in the installer. To download the software: Log in to the F-Secure […]

Read More

Sending installation link via email (F-Secure) 0 (0)

You can provide a user or users in a company with the installer for an F-Secure Elements Endpoint Protection product. They may then install the product on their computer or mobile device at their own convenience. Once the software is installed, the device will appear in your Elements Endpoint Protection account. To provide a user […]

Read More

Distributing F-Secure software 0 (0)

This section explains how to distribute F-Secure Elements Endpoint Protection software. You can install the following products using the same installation package. The subscription key determines which product is installed: Note: For the installation instructions, see section “Installing the F-Secure Computer Protection software”. F-Secure Computer Protection F-Secure Computer Protection Premium F-Secure Computer Protection and Rapid Detection […]

Read More

Adding devices for management (F-Secure) 0 (0)

To monitor and manage the security of a computer or mobile device by using your F-Secure Elements Endpoint Protection portal account, you must first install an Endpoint Protection product on the computer or mobile device. Once the product is installed, the device will be added to your portal account. Through the portal, you can follow […]

Read More