Skip to ContentSkip to Footer
  • Business

    View all Business

    • Acquisition
    • Careers & training
    • Data & insights
    • Data protection
    • Digital transformation
    • Leadership
    • Marketing & comms
    • Policy & legislation
    • Public sector
    • VoIP
  • Cloud

    View all Cloud

    • Cloud management
    • Cloud security
    • Cloud storage
    • Hybrid cloud
    • Infrastructure as a service (IaaS)
    • Platform as a service (PaaS)
    • Private cloud
    • Public cloud
    • Software as a service (SaaS)
    • Virtualisation
  • Hardware

    View all Hardware

    • Desktops
    • Laptops
    • Mobile phones
    • Monitors
    • Printers
    • Routers
    • Tablets
    • Windows Migration
  • Infrastructure

    View all Infrastructure

    • Backup
    • Broadband
    • Email providers
    • Internet
    • Internet of Things (IoT)
    • Mobile networks
    • Networking
    • Servers
    • Web hosting
  • Security

    View all Security

    • Software
    • Antivirus
    • Cyber attacks
    • Data breaches
    • Encryption
    • Firewalls
    • Hacking
    • Malware
    • Privacy
    • Ransomware
    • Unified threat management (UTM)
  • Software

    View all Software

    • Apple iOS
    • Business apps
    • Development
    • Google Android
    • Google Docs
    • Linux
    • Microsoft Office
    • Microsoft Windows
    • Open source
    • Operating systems
    • Windows Migration
  • Technology

    View all Technology

    • Artificial Intelligence (AI)
    • Augmented reality (AR)
    • Blockchain
    • Cognitive technology
    • Cryptocurrencies
    • Machine learning
    • Neural network
    • Smart city
    • Voice assistants
    • Voice recognition
  • Resources
  • .com
    • .co.uk
IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more
Tutorials
  • Hardware
  • Mobile

iAnywhere Afaria (Step by Step)

Managing mobile devices and the flow of mobile data remains one of the most daunting tasks for the network manager. IT PRO shows you how you can use Afaria from iAnywhere to simplify the process.

by: IT Pro team
1 Feb 2007
Go to: iAnywhere Afaria
  • Step 1: Understanding the handset client

    Step 1: Understanding the handset client

  • Step 2: Security policies

    Step 2: Security policies

  • Step 3: Orientation settings

    Step 3: Orientation settings

  • Step 4: Understanding device and language support

    Step 4: Understanding device and language support

  • Step 5: Controlling data syncing

    Step 5: Controlling data syncing

  • Step 6: Manipulating files and registry

    Step 6: Manipulating files and registry

  • Step 7: Controlling device settings

    Step 7: Controlling device settings

  • Step 8: Security options

    Step 8: Security options

  • Step 9: Lock down policy

    Step 9: Lock down policy

  • Step 10: Using encryption

    Step 10: Using encryption

  • Step 11: Customise the user interface

    Step 11: Customise the user interface

  • Step 12: Setting passwords

    Step 12: Setting passwords

Most Popular

Getting the best value from your remote support software
Advertisement Feature

Getting the best value from your remote support software

13 Mar 2023
Microsoft set to block emails from unsupported Exchange servers
Security

Microsoft set to block emails from unsupported Exchange servers

28 Mar 2023
What the UK can learn from the rest of the world when it comes to the shift to IP
Sponsored

What the UK can learn from the rest of the world when it comes to the shift to IP

20 Mar 2023
  • About us
  • Contact us
  • Cookie Policy
  • Privacy Policy
  • Accessibility
  • Privacy Preferences
  • Do Not Sell My Information

Get the IT Pro newsletter

Get the free daily newsletter from IT Pro, delivering the latest news, reviews, insights and case studies

ITPro is part of Future plc, an international media group and leading digital publisher. Visit our corporate site www.futureplc.com
© Future US LLC, 10th floor, 1100 13th Street, N.W Washington, DC 20005 . All rights reserved.

Follow us on FacebookFollow us on TwitterConnect on LinkedIn