Chapter 6

Managing Mobile Devices


Bullet Looking at mobile devices

Bullet Considering security implications

Bullet Configuring iOS devices

Bullet Configuring Android devices

A computer consultant once purchased a used BlackBerry device on eBay for $15.50. When he put in a new battery and turned on the device, he discovered that it contained confidential emails and personal contact information for executives of a well-known financial institution.


It turns out that a former executive with the company sold his old BlackBerry on eBay a few months after he left the firm. He’d assumed that because he’d removed the battery, everything on the BlackBerry had been erased.

The point of this true story is that mobile devices such as smartphones and tablet computers pose a special set of challenges for network administrators. These challenges are now being faced even by administrators of small networks. Just a few years ago, only large companies had BlackBerry or other mobile devices that integrated with Exchange email, for example. Now it isn’t uncommon for companies with just a few employees to have ...

Get Networking All-in-One For Dummies, 8th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.