Samsung SGH-I717 User Manual Ver.la1_f3 (English(north America)) - Page 117

Applications - factory reset

Page 117 highlights

These applications enforce remote or local device security policies. Some of the features a device administration application might control are: • Setting the number of failed password attempts before the device is restored to factory settings. • Automatically locking the device. • Restoring factory settings on the device. Note: If a device uses multiple enabled administration applications, the strictest policy is enforced. 1. From the Home screen, tap and security. ➔ Settings ➔ Location 2. Tap Select device administrators. 3. Select a device administrator and follow the prompts. If no device administrators are listed, you can download them from the Android Market. Credential storage This option allows certain applications to access secure certificates and other credentials. Certificates and credentials can be installed to the SD card and password protected. 1. From the Home screen, tap ➔ Settings ➔ Location and security. 2. Tap Use secure credentials to activate this feature. A check mark displayed next to the feature indicates secure credentials is active. 3. Tap Install from USB storage to install encrypted certificates from USB storage. 4. Tap Set password to set or change the credential storage password. 5. Tap Clear storage to clear the storage (SD card or phone memory) of all contents and reset the credentials password. Applications This device can be used for Android development. You can write applications in the SDK and install them on this device, then run the applications using the hardware, system, and network. This feature allows you to configure the device for development. Warning!: Android Dev Phone 1 devices are not intended for non-developer end-users. Because the device can be configured with system software not provided by or supported by Google or any other company, end-users operate these devices at their own risk. Changing Your Settings 112

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223

Changing Your Settings
112
These applications enforce remote or local device security
policies.
Some of the features a device administration application might
control are:
Setting the number of failed password attempts before the device is
restored to factory settings.
Automatically locking the device.
Restoring factory settings on the device.
Note:
If a device uses multiple enabled administration applications, the
strictest policy is enforced.
1.
From the Home screen, tap
Settings
Location
and security
.
2.
Tap
Select device administrators
.
3.
Select a device administrator and follow the prompts. If no
device administrators are listed, you can download them
from the Android Market.
Credential storage
This option allows certain applications to access secure
certificates and other credentials. Certificates and credentials
can be installed to the SD card and password protected.
1.
From the Home screen, tap
Settings
Location
and security
.
2.
Tap
Use secure credentials
to activate this feature. A check
mark displayed next to the feature indicates secure
credentials is active.
3.
Tap
Install from USB storage
to install encrypted certificates
from USB storage.
4.
Tap
Set password
to set or change the credential storage
password.
5.
Tap
Clear storage
to clear the storage (SD card or phone
memory) of all contents and reset the credentials
password.
Applications
This device can be used for Android development. You can write
applications in the SDK and install them on this device, then run
the applications using the hardware, system, and network. This
feature allows you to configure the device for development.
Warning!:
Android Dev Phone 1 devices are not intended for non-developer
end-users. Because the device can be configured with system
software not provided by or supported by Google or any other
company, end-users operate these devices at their own risk.