Bluetooth
Enable Bluetooth: Ensure Bluetooth is turned on for the moble phone/tablet and the Bluetooth device (e.g., a headset) is in discoverable mode.
Enable pairing: Ensure the Bluetooth device (e.g., a headset) is in discoverable mode.
Find a device for pairing: Find the Bluetooth peripheral from your device’s settings
Enter the appropriate PIN code: Should be the same on both devices - ensures that the peripheral you’re pairing with your device is correct
Test connectivity: Devices should now communicate - check audio/phone for a headset, for example
Location services
Global Positioning System (GPS) services: Originally created via the US DoD, location is calculated via timing differences between different satellites - at least 4 are needed for location determination.
Cellular location services: Mobile phones can also use Wi-Fi and cell towers to give a more precise location.
Mobile device management (MDM)/mobile application management (MAM)
Manages company-owned and user-owned devices - can work with BYOD (Bring Your Own Device) policies
Centralized management of mobile devices - sets policies on application usage. Can control the entire device or a partition.
Manage access control for mobile devices
Corporate email configuration: User doesn’t need to configure anything - allows for account details/server addresses, communication methods
Two-factor authentication: MDMs can enforce specific authentication types
Corporate applications: Can ensure applications relevant to corporate use are installed on devices, and prevent certain applications from being installed for security purposes.
Definition: The process of connecting an external device to a mobile phone or tablet.
Purpose: Security function that controls which devices can communicate with your device.
Verification: Often requires you to view or confirm a passphrase or PIN for security.
Reusability: This pairing only needs to be done once; devices will automatically reconnect in the future.
Enable Bluetooth: Both devices must have Bluetooth turned on, as some devices allow this feature to be disabled.
Discoverable Mode: Devices must be set to discoverable mode, allowing them to be visible to each other. This may involve specific key sequences (e.g., holding a button on a headset).
Selecting Device: After activation, the device will appear on a list of available devices that are discoverable.
Confirmation: The user will typically need to confirm or enter a PIN to complete the pairing.
Testing Connection: After pairing, connectivity can usually be tested to ensure communication is established between the devices.
Overview: Used by mobile phones to communicate with GPS satellites for navigation.
History: Originally created by the US Department of Defense with over 30 satellites orbiting Earth.
Functionality: Precise location is determined based on signals from at least four satellites, calculating longitude, latitude, and altitude.
Data Visualization: Information is often displayed through maps and directions on the phone, showing current location relative to destination.
Additional Location Methods: Phones may also utilize Wi-Fi connectivity and cellular tower identification for improved location accuracy.
Purpose: Allows management of mobile devices within an organization, including both company-owned and employee-owned devices (BYOD).
Central Management: Managers can access and configure settings for all mobile devices from a single console.
Security Management: Essential for protecting company data, ensuring specific applications are installed, and managing device capabilities (e.g., camera access).
Data Partitioning: Helps separate company data from personal data, allowing for secure management.
Data Deletion Capabilities: Enables removal of company data without affecting personal information in case of security breaches.
Access Control: Can impose security measures like requiring automatic screen locks and PINs for unlocking devices.
User Experience: Simplifies user configuration by allowing automatic setup of emails and other services via MDM.
Security Enhancement: Supports two-factor authentication and may implement biometric features for device access.
Application Management:
Required Apps: MDM can push necessary applications to devices automatically.
Restrictions: Can prevent certain applications from being installed to enhance device security.