Samsung Galaxy S III Mini User Manual - Page 132

Device Administration, Credential Storage, Settings, Security, Unknown sources, Warning, Verify Apps

Page 132 highlights

Device Administration Use the Device Administration feature to select one or more administration applications that control your device for security purposes (for example, if your device is lost of stolen). These applications enforce remote or local device security policies. Some of the features a device administration application might control are: • Setting the number of failed password attempts before the device is restored to factory settings. • Automatically locking the device. • Restoring factory settings on the device. Note: If a device uses multiple enabled administration applications, the strictest policy is enforced. 1. From the Settings screen, touch Security. 2. Touch Device administrators, to select a device administrator, and follow the prompts. If no device administrators are listed, you can download them from the Play Store. 3. Touch Unknown sources to download and install applications that do not come from Play Store. Warning! Enabling this option causes your device and personal data to be more vulnerable to attack by applications from unknown sources. 4. Touch Verify Apps to cause your device to either block or warn you before installing apps that may cause harm to your device. Credential Storage If a certificate authority (CA) certificate gets compromised or for some other reason you do not trust it, you can disable or remove it. 1. From the Settings screen, touch More tab ➔ Security. 2. Touch Storage type to set a storage type for credential contents. 3. Touch Trusted credentials. • System: Displays CA certificates that are permanently installed in the ROM of your device. • User: Displays any CA certificates that you installed, for example, in the process of installing a client certificate. Settings 125

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185

Device Administration
Use the Device Administration feature to select one or more
administration applications that control your device for
security purposes (for example, if your device is lost of
stolen). These applications enforce remote or local device
security policies.
Some of the features a device administration application ±
might control are:±
Setting the number of failed password attempts before the
device is restored to factory settings.
Automatically locking the device.
Restoring factory settings on the device.
Note:
If a device uses multiple enabled administration
applications, the strictest policy is enforced.
1.
From the
Settings
screen, touch
Security
.
2.
Touch
Device administrators
, to select a device
administrator, and follow the prompts.
If no device administrators are listed, you can
download them from the Play Store.
3.
Touch
Unknown sources
to download and install
applications that do not come from Play Store.
Warning!
Enabling this option causes your device and
personal data to be more vulnerable to attack by
applications from unknown sources.
4.
Touch
Verify Apps
to cause your device to either block
or warn you before installing apps that may cause
harm to your device.
Credential Storage
If a certificate authority (CA) certificate gets compromised or
for some other reason you do not trust it, you can disable or
remove it.
1.
From the
Settings
screen, touch
More
tab
➔ ±
Security
2.
Touch
Storage type
to set a storage type for credential
contents.
3.
Touch
Trusted credentials
.
• System
: Displays CA certificates that are permanently
installed in the ROM of your device.
• User
: Displays any CA certificates that you installed, for
example, in the process of installing a client certificate.
Settings
125