Samsung SM-G360TRWATMB Galaxy Core Prime Metropcs, White

User Manual - Page 78

For SM-G360TRWATMB.

PDF File Manual, 90 pages, Read Online | Download pdf file

Loading ...
Loading ...
Loading ...
74
Lock Screen and Security
Settings
Lock Screen and Security
Choose a method for unlocking
your screen. Different Screen
Locks have different levels of
security and options.
Set a Screen Lock
1. From a Home screen, tap Apps >
Settings.
2. Tap Lock Screen and security.
3. Tap Screen lock type to select a screen lock
and level of security:
Swipe: Swipe the screen to unlock it. This
option provides no security.
Pattern: A screen unlock pattern is a tap
gesture you create and use to unlock your
device. This option provides medium security.
PIN: Select a PIN to use for unlocking the
screen. This option provides medium to high
security.
Password: Create a password for unlocking
the screen. This option provides high security.
None: Never use a Lock screen.
Screen Lock Options
The following options display depending on the
screen lock type.
Show information: Show the dual clock, or
information such as the weather information, on
the lock screen.
Unlock effect: Set the visual effect used when
unlocking the screen. Available for Swipe only.
Secure lock settings: Set your secure lock
functions such as Auto lock, Lock instantly with
Power key, and Smart lock. Not available for
Swipe.
SIM Change Alert
Protect your device from loss or theft allowing your
device to be locked, tracked, and for your data to be
deleted remotely.
1. From a Home screen, tap Apps >
Settings.
2. Tap Lock screen and security > SIM change
alert to prevent unauthorized changes to your
SIM card by being alerted whenever an app or
service attempts to change data on your SIM
card.
Unknown Sources
Enable installation of non-Google Play applications.
1. From a Home screen, tap Apps >
Settings.
2. Tap Lock screen and security.
3. Tap ON/OFF next to Unknown sources to
enable this option.
Warning: Enabling installation of third-party
applications can cause your device and personal data
to be more vulnerable to attacks by unknown sources.
Loading ...
Loading ...
Loading ...