Skip to ContentSkip to Footer
  • Business

    View all Business

    • Acquisition
    • Careers & training
    • Data & insights
    • Data protection
    • Digital transformation
    • Leadership
    • Marketing & comms
    • Policy & legislation
    • Public sector
    • VoIP
  • Cloud

    View all Cloud

    • Cloud management
    • Cloud security
    • Cloud storage
    • Hybrid cloud
    • Infrastructure as a service (IaaS)
    • Platform as a service (PaaS)
    • Private cloud
    • Public cloud
    • Software as a service (SaaS)
    • Virtualisation
  • Hardware

    View all Hardware

    • Desktops
    • Laptops
    • Mobile phones
    • Monitors
    • Printers
    • Routers
    • Tablets
    • Windows Migration
  • Infrastructure

    View all Infrastructure

    • Backup
    • Broadband
    • Email providers
    • Internet
    • Internet of Things (IoT)
    • Mobile networks
    • Networking
    • Servers
    • Web hosting
  • Security

    View all Security

    • Software
    • Antivirus
    • Cyber attacks
    • Data breaches
    • Encryption
    • Firewalls
    • Hacking
    • Malware
    • Privacy
    • Ransomware
    • Unified threat management (UTM)
  • Software

    View all Software

    • Apple iOS
    • Business apps
    • Development
    • Google Android
    • Google Docs
    • Linux
    • Microsoft Office
    • Microsoft Windows
    • Open source
    • Operating systems
    • Windows Migration
  • Technology

    View all Technology

    • Artificial Intelligence (AI)
    • Augmented reality (AR)
    • Blockchain
    • Cognitive technology
    • Cryptocurrencies
    • Machine learning
    • Neural network
    • Smart city
    • Voice assistants
    • Voice recognition
  • Resources
  • .co.uk
    • .com
Tutorials
  • Home
  • Hardware
  • Mobile

iAnywhere Afaria (Step by Step)

Managing mobile devices and the flow of mobile data remains one of the most daunting tasks for the network manager. IT PRO shows you how you can use Afaria from iAnywhere to simplify the process.

by: IT Pro team
1 Feb 2007
Go to: iAnywhere Afaria
  • Step 1: Understanding the handset client

    Step 1: Understanding the handset client

  • Step 2: Security policies

    Step 2: Security policies

  • Step 3: Orientation settings

    Step 3: Orientation settings

  • Step 4: Understanding device and language support

    Step 4: Understanding device and language support

  • Step 5: Controlling data syncing

    Step 5: Controlling data syncing

  • Step 6: Manipulating files and registry

    Step 6: Manipulating files and registry

  • Step 7: Controlling device settings

    Step 7: Controlling device settings

  • Step 8: Security options

    Step 8: Security options

  • Step 9: Lock down policy

    Step 9: Lock down policy

  • Step 10: Using encryption

    Step 10: Using encryption

  • Step 11: Customise the user interface

    Step 11: Customise the user interface

  • Step 12: Setting passwords

    Step 12: Setting passwords

Most Popular

How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is the Raspberry Pi Pico?
Hardware

What is the Raspberry Pi Pico?

21 Jan 2021
How to recover deleted emails in Gmail
email delivery

How to recover deleted emails in Gmail

6 Jan 2021
Logo
  • CloudPro
  • ChannelPro
  • Expert Reviews
  • About us
  • Contact us
  • Cookie Policy
  • Privacy Policy
  • Accessibility
  • Privacy Preferences

Get the IT Pro newsletter

Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies

Copyright © Dennis Publishing Limited 2021. All rights reserved.
IT Pro™ is a registered trademark.

Follow us on FacebookFollow us on TwitterConnect on LinkedIn