00:00:02
if you've ever connected an external
00:00:03
device to your tablet or your mobile
00:00:06
phone then you've had to go through the
00:00:07
bluetooth pairing process this is a
00:00:10
security function that allows you to
00:00:12
control exactly what devices are able to
00:00:14
communicate to your mobile phone or your
00:00:16
tablet this commonly requires you to
00:00:18
view or verify a particular phrase or
00:00:21
personal identification number to be
00:00:24
assured that you're really connecting
00:00:25
the device you have in front of you this
00:00:28
pairing process is something you only
00:00:29
have to do one time from that point
00:00:31
forward anytime these devices are
00:00:33
together they will automatically connect
00:00:36
and network with each other
00:00:37
the process i'll give you in this video
00:00:39
for bluetooth pairing is a very generic
00:00:41
one but each of the steps may vary just
00:00:44
a little bit depending on the device
00:00:45
you're using make sure you check with
00:00:47
the manufacturer to understand the exact
00:00:49
pairing process and what buttons or
00:00:52
settings you should configure to make
00:00:53
sure these devices can connect to each
00:00:55
other and communicate using bluetooth
00:00:58
the first step in the pairing process is
00:01:00
making sure that both devices are
00:01:02
configured to use bluetooth some devices
00:01:04
like a mobile phone allow you to disable
00:01:07
the bluetooth functionality so make sure
00:01:09
that it's turned on on both of the
00:01:11
devices that you're pairing you'll then
00:01:13
set the devices to a discoverable mode
00:01:16
so that they can be seen by each other
00:01:18
and this may require a certain set of
00:01:20
key sequences on a bluetooth device to
00:01:22
put it into that mode for example if you
00:01:25
have a headset it may be holding a
00:01:27
particular button or pushing a button a
00:01:29
number of times that puts it into this
00:01:31
discoverable mode
00:01:33
once your device is in this discoverable
00:01:35
mode it should show up in the list of
00:01:37
available devices for bluetooth and
00:01:39
there may be a number of devices on this
00:01:42
list especially if you're in an area
00:01:44
with a lot of bluetooth devices you'll
00:01:46
want to choose the device you're working
00:01:48
with from the list of available
00:01:50
bluetooth devices in your immediate area
00:01:52
you'll then be prompted to either
00:01:54
confirm or to enter a personal
00:01:56
identification number or pin this
00:01:59
ensures that there is some security and
00:02:01
you know exactly what devices you're
00:02:03
adding to your mobile phone and that's
00:02:05
it you're now paired with your bluetooth
00:02:07
device and you can usually test
00:02:09
connectivity at that point to make sure
00:02:11
that both of those devices are able to
00:02:12
communicate with each other
00:02:15
many of our mobile phones are
00:02:16
communicating to multiple satellites
00:02:18
every day using gps or the global
00:02:21
positioning system these gps satellites
00:02:24
were originally created by the us
00:02:25
department of defense and there are
00:02:27
currently over 30 gps satellites in
00:02:29
orbit around the earth this allows us to
00:02:32
get very precise navigation from our
00:02:34
devices and as long as our phone is able
00:02:36
to hear the signals coming from at least
00:02:38
four of these satellites we can now get
00:02:41
very precise information about where we
00:02:43
happen to be in the world our phones are
00:02:45
able to calculate where we happen to be
00:02:48
based on timing differences from all of
00:02:50
these different satellites we're able to
00:02:52
calculate longitude latitude and
00:02:54
altitude of where we may be located we
00:02:57
don't commonly see these signals that
00:02:59
we're receiving from a gps satellite but
00:03:01
we do see the results of these signals
00:03:04
we commonly see this when we have maps
00:03:06
or when we need directions to a
00:03:08
particular location and our phone can
00:03:10
calculate exactly where we are relative
00:03:13
to where we need to be
00:03:14
our phones are also very smart in how
00:03:17
they gather information about where
00:03:18
we're located in the world and often gps
00:03:21
is one of those primary sources but our
00:03:23
phones can also use wi-fi connectivity
00:03:26
and identify cellular towers in our area
00:03:29
to narrow down more precisely where we
00:03:31
might happen to be
00:03:34
in a large organization you may be
00:03:36
responsible for managing all of these
00:03:38
mobile devices that are being used by
00:03:40
employees of your organization one way
00:03:42
to manage this is through the use of a
00:03:44
mobile device management solution or an
00:03:46
mdm this means that you can manage all
00:03:49
of the company owned phones or any
00:03:51
phones that users might own that they
00:03:53
bring to work we call this bring your
00:03:55
own device or byod
00:03:58
this allows the manager of the mdm to
00:04:01
sit at a single console and gain access
00:04:03
to the configurations of all of the
00:04:05
mobile devices in their environment this
00:04:08
is especially important if company data
00:04:09
is being stored on these devices we need
00:04:12
some way to manage the security and
00:04:14
update the configuration settings of all
00:04:16
of those mobile phones and tablets if
00:04:18
the manager wants to ensure that certain
00:04:20
applications are installed the data is
00:04:22
protected or that certain capabilities
00:04:24
of the phone are enabled or disabled
00:04:26
such as the camera you can do all of
00:04:29
that using the mdm
00:04:31
we commonly use our phones as one large
00:04:33
storage device but when you have part of
00:04:35
the phone being used for personal use
00:04:37
and part of the phone being used for
00:04:39
work use you may want to use an mdm to
00:04:41
be able to partition out the company
00:04:44
data and protect that differently than
00:04:46
the rest of the private data on that
00:04:48
phone this also means that if you need
00:04:51
to delete or remove any of that company
00:04:53
data you can do that on the mobile
00:04:55
device without affecting any of the
00:04:57
user's private data
00:04:59
this might also be a good way to
00:05:00
increase the security of your mobile
00:05:02
devices for example you can use the mdm
00:05:05
to manage the type of access control
00:05:07
that's being used on a mobile phone for
00:05:09
example you may require that the screen
00:05:11
automatically lock after a certain
00:05:13
amount of time and that users are using
00:05:15
a minimum of a personal identification
00:05:17
number to unlock the phone
00:05:20
this can also make things very easy for
00:05:22
the end user instead of having the user
00:05:24
manage the email configuration and set
00:05:27
up all of the detailed configuration
00:05:29
settings for that email you can simply
00:05:31
push out the email configuration from
00:05:33
the mdm the user doesn't have to
00:05:35
configure or set up anything on their
00:05:37
mobile device and if changes need to be
00:05:40
made later you can simply push those
00:05:42
changes from the mdm console
00:05:44
the mdm is also a good way to add
00:05:46
enhanced security to these devices for
00:05:49
example your security controls may
00:05:51
require two-factor authentication on
00:05:53
these devices there may be a personal
00:05:55
identification number or you may require
00:05:57
users to include biometrics when they're
00:06:00
unlocking the phone you might also use
00:06:02
the mdm to push down applications that
00:06:04
are useful for two-factor authentication
00:06:06
for example your company might use a
00:06:08
pseudo-random authentication app that
00:06:10
provides a number that would be used in
00:06:12
conjunction with your username and
00:06:14
password each time you log into a
00:06:16
service
00:06:17
and of course the mdm can control what
00:06:19
applications are available on that
00:06:21
mobile phone there may be certain
00:06:23
applications that are required for you
00:06:24
to use in the corporation and the mdm
00:06:27
can ensure that those applications are
00:06:28
installed automatically on your phone
00:06:31
the mdm can also be used to prevent
00:06:33
certain applications from being
00:06:35
installed so if the security of this
00:06:37
device is important you may have certain
00:06:39
applications that are restricted or
00:06:41
forbidden from being installed on your
00:06:43
mobile device
00:06:54
you