Chapter 6

Managing Mobile Devices


Bullet Looking at mobile devices

Bullet Considering security implications

Bullet Configuring iOS devices

Bullet Configuring Android devices

A computer consultant once purchased a used BlackBerry device on eBay for $15.50. When he put in a new battery and turned on the device, he discovered that it contained confidential emails and personal contact information for executives of a well-known financial institution.


It turns out that a former executive with the company sold his old BlackBerry on eBay a few months after he left the firm. He’d assumed that because he’d removed the battery, everything on the BlackBerry had been erased.

The point of this true story is that mobile devices such as smartphones and tablet computers pose a special set of challenges for network administrators. These challenges are now being faced even by administrators of small networks. Just a few years ago, only large companies had BlackBerry or other mobile devices that integrated with Exchange email, for example. Now it isn’t uncommon for companies with just a few employees to have ...

Get Networking All-in-One For Dummies, 8th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.