The administration of protection of data on a client mobile computing
device by a server computer system such as within an enterprise network
or on a separate mobile computing device is described. Security tools are
described that provide different security policies to be enforced based
on a location associated with a network environment in which a mobile
device is operating. Methods for detecting the location of the mobile
device are described. Additionally, the security tools may also provide
for enforcing different policies based on security features. Examples of
security features include the type of connection, wired or wireless, over
which data is being transferred, the operation of anti-virus software, or
the type of network adapter card. The different security policies provide
enforcement mechanisms that may be tailored based upon the detected
location and/or active security features associated with the mobile
device. Examples of enforcement mechanisms are adaptive port blocking,
file hiding and file encryption.