Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Getting Started with TRITON Mobile Security > Step 7: Register mobile devices with the system
Step 7: Register mobile devices with the system
Getting Started Guide | Mobile Security Solutions
End users must register their devices with the system in order to be protected by it. To assist with this, you can send an email message inviting them to register their mobile devices.
Inviting users to register their devices
1.
Select General > Devices.
2.
Click Register New Device (s).
3.
4.
5.
Click the right arrow (>) to move the selected end users into the right pane.
6.
7.
Running the registration wizard (end users)
End users receive an email message prompting them to register their device or devices with Mobile Security. The registration request message includes a link to start the registration process.
Here is the procedure end users perform:
1.
2.
Click Start Registration.
 
3.
4.
5.
Click Install.
The following iOS configuration profiles are deployed to the device:
*
Websense Mobile Email Profile – If enabled, contains information for defining email accounts to install on the device.
*
Websense Mobile Exchange Profile – If enabled, contains information for defining Microsoft Exchange ActiveSync accounts to install on the device.
*
Websense Mobile Wifi Profile – If enabled, contains information that allows user devices to automatically connect to your wireless networks.
*
Websense VPN Profile – If enabled, contains information and certificates required to establish a VPN connection to the cloud service server.
*
Websense Mobile Setting Profile – Contains mobile device manager policies that secure the mobile device.
All installed profiles are shown in your iOS device under Settings > General > Profiles.
When the devices are registered, they are monitored and protected by the TRITON Mobile Security system!
For information on configuring and using the product after it is running, see the TRITON Mobile Security Help.
To access information on the self-help functions device users can perform, see the Mobile Device User's Guide. We recommend that you provide this document to your device users.
 

Go to the table of contents Go to the previous page You are at the end of the document View or print as PDF
Getting Started with TRITON Mobile Security > Step 7: Register mobile devices with the system
Copyright 2016 Forcepoint LLC. All rights reserved.