Trusted Device Management is a security feature designed to enhance account protection and reduce the risk of unauthorized access or phishing attacks.
- Function: This feature allows the system to identify, authorize, and monitor specific devices (such as mobile phones, laptops, or tablets) that are permitted to access your account.
- Benefit: By managing this list, you can ensure that only your personal devices have easy access. If a device is removed from the trusted list, the system will automatically require full re-authentication (including 2FA) for any future login attempts on that device. This is essential if you lose a device or notice any suspicious activity.
How to manage your trusted devices:
You can view and manage your authorized devices by navigating to:
User Center → Security Settings → Trusted Device Management.
In this section, you can:
- Review the List: Check device names, IP addresses, and the last login activity.
- Remove Devices: Delete old devices, unrecognized hardware, or any device you no longer use to maintain high security for your account.
Comments
0 comments
Article is closed for comments.