Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision , Juniper Networks, Inc.

Size: px
Start display at page:

Download "Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc."

Transcription

1 Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision , Juniper Networks, Inc.

2 Juniper Networks, Inc North Mathilda Avenue Sunnyvale, California USA This product includes the Envoy SNMP Engine, developed by Epilogue Technology, an Integrated Systems Company. Copyright , Epilogue Technology Corporation. All rights reserved. This program and its documentation were developed at private expense, and no part of them is in the public domain. This product includes memory allocation software developed by Mark Moraes, copyright 1988, 1989, 1993, University of Toronto. This product includes FreeBSD software developed by the University of California, Berkeley, and its contributors. All of the documentation and software included in the 4.4BSD and 4.4BSD-Lite Releases is copyrighted by the Regents of the University of California. Copyright 1979, 1980, 1983, 1986, 1988, 1989, 1991, 1992, 1993, The Regents of the University of California. All rights reserved. GateD software copyright 1995, the Regents of the University. All rights reserved. Gate Daemon was originated and developed through release 3.0 by Cornell University and its collaborators. Gated is based on Kirton s EGP, UC Berkeley s routing daemon (routed), and DCN s HELLO routing protocol. Development of Gated has been supported in part by the National Science Foundation. Portions of the GateD software copyright 1988, Regents of the University of California. All rights reserved. Portions of the GateD software copyright 1991, D. L. S. Associates. This product includes software developed by Maker Communications, Inc., copyright 1996, 1997, Maker Communications, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. YEAR 2000 NOTICE Juniper Networks hardware and software products are Year 2000 compliant. Junos OS has no known time-related limitations through the year However, the NTP application is known to have some difficulty in the year END USER LICENSE AGREEMENT The Juniper Networks product that is the subject of this technical documentation consists of (or is intended for use with) Juniper Networks software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at By downloading, installing or using such software, you agree to the terms and conditions of that EULA. Copyright 2013 Juniper Networks, Inc. - ii -

3 Table of Contents About This Guide 1 Audience 1 Contacting Technical Support 1 Junos Pulse Mobile Security Dashboard Features 1 Overview 2 Home Tab Information and Commands 5 Validation and Alerts Notification 5 Anti-Theft Protection 6 Lock Device/Reset Passcode 6 Unlock Device/Reset Passcode 8 Wipe Device 8 Scream 9 Locate Your Device 10 Device Monitoring 11 Anti-Virus Activity 11 Backup Your Data 12 Custom Button 12 Settings Link Information and Configuration 13 Account Management 13 Handset Management 13 Reports Tab Information and Configuration 15 History 16 Alert Setup Tab Information and Configuration 16 Support/Help Tab Information and Configuration 18 FAQs 19 Index 21 - iii -

4 About This Guide This guide describes how to use the Junos Pulse Mobile Security Dashboard to manage registered mobile devices and to enable features such as remote wipe and remote lock in case a device is lost or stolen. For information on installing and configuring Junos Pulse on individual mobile devices, refer to the Junos Pulse documentation for that device type. Audience This guide is intended for users who wish to configure controls for device users, providing security features and access control features. Contacting Technical Support Technical product support is available through the Juniper Networks Technical AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support contract,or are covered under warranty, and need post-sales technical support, you can access our tools and resources online or open a case with JTAC. JTAC policies For a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at Product warranties For product warranty information, visit JTAC hours of operation The JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year. Junos Pulse Mobile Security Dashboard Features The Junos Pulse Mobile Security Dashboard provides both control and security for registered mobile devices. Control features include: Monitor activity on the device. View pictures taken by the device camera and sent or received via text or

5 Contacting Technical Support View the content of all text messages and messages. Automatically receive alerts when keywords are found in messages sent or received. List all applications and software installed on the device. Display the location of the device in an online map. Sound an alarm on the device. Use GPS to help locate a lost or stolen device. (GPS functionality on Verizon BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality may have been blocked by the service provider or the device may be out of range of a satellite.) Security features include: Antivirus This feature provides real-time protection against malware threats by automatically scanning devices to ensure files are not infected with malware. The on-demand scanning ability lets you scan selected files and folders to ensure the device and memory card are clean and protected. The automatic update capability ensures that the device possesses the latest antivirus signatures. Backup and restore This feature lets you backup contact and calendar information. Firewall The firewall security features let you block or allow data traffic to and/or from your device using rule lists that control traffic based on port number and ip addresses. Anti-theft This set of features includes remote commands you can send to the device if it is lost or stolen. Those commands include: lock device, wipe device, locate device, and backup device. Overview Note: Before you can login to the Mobile Security dashboard, you must install and register Junos Pulse on your mobile device. Please refer to the Junos Pulse User Guide for your device type (Android, BlackBerry, ios, Windows Mobile, Symbian) for Junos Pulse installation, registration, and configuration details. Once the Junos Pulse application is installed on the device and you have setup an address and password as part of the device installation and registration process, you can use that address and password to login to the Mobile Security dashboard. You access the dashboard by entering the URL you received from your administrator or service provider. See See "Mobile Security Dashboard Login Window" on page

6 Contacting Technical Support You can also login using your phone number and password. When you enter the phone number, it must appear exactly as it was entered during the device registration process. You cannot use characters that were not used as part of the phone number during registration. Note: When you login using a phone number, you can only view that device information on the dashboard. But if you have multiple registered devices under one username, you can view them all when you login with that username. Password Reset If you forget your dashboard login password, you can reset it by clicking the Forgot your password? link on the login page. When you click this link, you are taken to a new window where you must do the following: 1. Enter your Address. 2. Enter the last four digits of your phone number. 3. Click Reset Password. Once you click the Reset Password button, a new password is generated for you and sent to you in an . Use this new password the next time you login. Once you successfully login, you can change your password to something you prefer. See See "Account Management" on page 13. Mobile Security Dashboard Login Window Once you login, the Home tab is displayed. See See "Home Tab" on page 4. Next to the Home tab, you can find tabs and links for each functional area of the dashboard. Those tabs and links are as follows: Note: Junos Pulse can be deployed with all available features or with a subset of features based on your usage needs. You may not have all of the Junos Pulse features described here visible on your dashboard

7 Contacting Technical Support Home Once you have configured the dashboard, the Home tab provides all the information and commands you need at a glance. It provides links to anti-theft commands, logged messages and calls, found viruses, events, installed applications, and photos. It also provides recent GPS locations, and the ability to backup and restore data to the selected device. Reports Configure report filters to look for certain senders or keywords in a range of messages, based on dates. Alert Setup Configure parameters for triggering alerts. (You can also find Alert status and configure alerts by clicking the Alert message, when available, as it appears below the tabs on the Home tab.) Settings Configure different user accounts and devices you wish to monitor from the Settings link that is always available at the top of the dashboard window. Web Security Monitor or block access by registered devices to multiple categories of web content. Note: Alert Settings are not available for ios devices. Home Tab - 4 -

8 Validation and Alerts Notification Home Tab with Web Security Home Tab Information and Commands The Home tab provides all the information and commands you need at a glance for the selected device. You select a device using the pulldown menu in the top right corner of the dashboard window. The Home tab may provide the following: Validation and Alerts Notification The notification section on the Home tab, beneath the row of tabs, provides information for the selected device. The information provided here can include: Alert notifications: If there are any alerts for a device, that information is posted here. See See "Alert Setup Tab Information and Configuration" on page 16 for more details. validation status: Once users have successfully registered a device, after they first login to the dashboard, they receive an requesting that they validate their address. This contains a link that users must click to validate their address. After the - 5 -

9 Anti-Theft Protection link is clicked, a web page notification appears to inform the user that the address has been validated. Note: An validation request is also sent if an address is updated on the dashboard. See See "Account Management" on page 13. Anti-Theft Protection Lock Device/Reset Passcode Click the available Anti-Theft command buttons to send the command in question. When you click a command button, a pop-up window appears asking you to verify the command you have chosen before it is sent, and in some cases, to enter additional information. When you click this button for the selected device, a pop-up window appears. From this window, you can send a command that locks the device if it is lost or stolen, or if you wish to stop the use of the device for any other reason. For Android and BlackBerry devices, the pop-up window provides a randomly generated lock passcode that can be sent to the device along with the lock command (see See "Lock Device Pop-up Window" on page 7). You can edit this lock passcode before sending the command. If you do send a new passcode, with the provided check box, you can select to this passcode to the device user. The lock passcode command works in the following manner: On Android Devices: If the Device Administrator is enabled and the device already has a password configured: o o When a lock command is sent with a new password, the device is locked with the existing password. The new password from the server is not used. When a lock command is sent with an empty password, the device is locked with the existing password. The password from the server is not used. If the Device Administrator is enabled and the device does not have a password configured: o o When a lock command is sent with a new password, the device is locked with this new password. When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is automatically registered: - 6 -

10 Anti-Theft Protection o o When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is registered manually: o o When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. On BlackBerry Devices: If the device was automatically registered: o o When a lock command is sent with a new password, the device is locked with this new password. When a lock command is sent with an empty password, the device is locked with the random password generated at the device. This password is not ed. If the device was manually registered: o o When a lock command is sent with a new password, the device is locked with this new password. When a lock command is sent with an empty password, the device is locked with the password used during registration. This password is not ed. Note: On all other devices, once a Lock command has been sent, an Unlock command must be sent to unlock the device. Click the Lock button to send the lock command or click Cancel to send no command. Lock Device Pop-up Window - 7 -

11 Anti-Theft Protection Unlock Device/Reset Passcode When you click this button for the selected device, a pop-up window appears. From this window, you can send a command that unlocks the locked device or clears the passcode on ios devices so that users can enter a new password to unlock the device. For Android and BlackBerry devices, the pop-up window provides a randomly generated passcode that can be sent to the device along with the unlock command (see See "Lock Device Pop-up Window" on page 7). You can edit this unlock passcode before sending the command. If you do send a new passcode, with the provided check box, you can select to this passcode to the device user. The user must enter the new passcode to unlock the device. Note: For Android devices, if the Device Administrator is enabled and a passcode is defined on the device, the new passcode replaces the existing one only if it satisfies the device passcode policy. A blank passcode unlocks the device only if the device allows an empty passcode and encryption is not enabled. Refer to the previous section See "Lock Device/Reset Passcode" on page 6 for details on how a device is locked based on various conditions. Note: On all other devices, an unlock command unlocks the device. The passcode field is not supported. Click the Unlock button to send the unlock command or click Cancel to send no command. Unlock Device Pop-up Window Wipe Device When you click this button for the selected device, a pop-up window appears. From this window, you can send a command that wipes the device. Different devices support different wipe capabilities. In some - 8 -

12 Anti-Theft Protection case, a wipe command resets the device to factory settings. In other cases, a wipe commands removes only personal data from the device such as contacts, calendar events, notes, call history, message folders, and all data on the SD card. The manner in which wipe works on individual devices is not configurable. Please refer to the Junos Pulse User Guide device documentation to understand what a wipe command does on that device type. Click the Wipe button to send the wipe device command or click Cancel to send no command (see See "Wipe Device Pop-up Window" on page 9). When you click Wipe, another pop-up window appears asking you to confirm the Wipe. Wipe Device Pop-up Window Scream When you click this button for the selected device, a pop-up window appears. From this window, you can send a scream command to the device which allows the device user to audibly locate a misplaced device within hearing distance, even if the speakers and ringer are muted. From the Scream pop-up, click Alarm On to send a scream command. Click Alarm Off to send a command to turn the scream off. Click Cancel to send no command (see See "Scream Pop-up Window" on page 10)

13 Locate Your Device Scream Pop-up Window Locate Your Device From the Home tab, click the Locate button to access the Locate pop-up window. From this window, you can send a command to determine the GPS location of the device. The result is displayed in the Locate pop-up window and on the Home tab. In the Locate pop-up window, click Locate to send a locate command, click Close to send no command (see See "Locate Pop-up Window" on page 10). Locate Pop-up Window Note: GPS is not supported on the ipod Touch and on ios devices that do not have cell service. Note: There are no commands available for ios devices that do not have an associated APNS certificate. When no APNS certificate is present, GPS location is the only available feature

14 Device Monitoring Device Monitoring When there are events present for any of the available monitoring categories for the selected device, the number of events appear for each category under Device Monitoring as clickable links. When you click one of those event links, it takes you to a window that lists the events for that category. In each individual event type window, you can manage events by selecting the check box next to the item you want to remove and clicking the Delete button. You can also select the check box at the top of the check box column and click the Delete button to delete all events in that event category. Click the Refresh button to query the device. This causes the device to upload new events that have not yet been sent to the dashboard. The available events may include one or more of the following: New messages View messages (voice, , text) received on the device. New voice calls View voice calls received on the device. New applications View new applications that have been installed on the device. You can remotely uninstall an application by selecting the check box beside the application and clicking the Uninstall speci fic application on the handset button. New photos View new photos stored on the device. The photo event window displays photos as 20 pictures per window. Note: New applications is the only event type available for ios devices at this time. Anti-Virus Activity When there are anti-virus events present for the selected device, those events appear as a clickable link in the Anti-Virus Activity section of the Home tab (see See "Home Tab" on page 4). When you click the <#> Anti_Virus events occurred link from the Home tab, you open the Anti- Virus Activity event list window where you can view more details and manage anti-virus events (see See "Anti-Virus Activity Events Window" on page 12). You can manage anti-virus events by selecting the check box next to the item you want to remove and clicking the Delete button. You can also select the check box at the top of the check box column and click the Delete button to delete all anti-virus events. Click the Refresh button to query the device. This causes the device to upload new events that have not yet been sent to the dashboard

15 Backup Your Data Anti-Virus Activity Events Window Backup Your Data When you click this button from the Home tab for the selected device, a pop-up window appears. From this window, you can remotely backup or restore data to the selected device. A backup command creates a copy of the device s contact and calendar information. This is useful if a device is lost or stolen. In the Backup Your Data pop-up window, click the Backup button to send a backup command. Click the Restore button to send a restore command. Click the Cancel button to send no command (see See "Backup Your Data Pop-up Window" on page 12). Backup Your Data Pop-up Window Custom Button If your device administrator or service provider makes this feature visible to you, an additional customized button appears on your Home tab. When you click this button, a customized URL takes you to a web page that is set up by your service provider. This page may offer the purchase

16 Account Management of additional features or it may provide additional information. This will vary by service provider. Settings Link Information and Configuration From the Settings link at the top of the dashboard window, you can configure Account Management and Handset Management. See See "Settings Window" on page 15. Account Management You can remove, edit or add a new address to a device account. 1. To add an address and corresponding password, 2. Click the Settings link. 3. From the Select phone to view pulldown in the top right corner, select the device you want to manage. 4. To add a new address for handset account management, enter the address in the Username ( ) edit field. 5. Enter the new password in the Password edit field. 6. Click the Add User button. To remove an address, select it and click Remove Selected. To edit an address, make your edits in the edit field and click Update . It is important to note that changing this address also changes the login username for the account. Handset Management With Handset Management, you can update specific device monitoring functions, change the GPS update period, control log file size limits, and determine data wipe parameters. Note that updates are not received until the device reports in at the next scheduled time. Note: Handset Management is not available for ios devices. From the Settings link, you can view Handset Information for the selected ios device such as phone number, device type, device name and UDID. See See "Reports Tab Information and Configuration" on page 15. To update or change the available settings, do the following, 1. If it isn t already selected, from the Select phone to view pulldown in the top right corner, select the phone number for the device you want to manage

17 Handset Management In the Handset Management column on right side of the window, set the following: 2. Next to Monitoring, select the check box to enable this feature for the selected device. 3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable messaging monitoring for the selected device. 4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to enable monitoring of messages containing pictures, video, sound or other multimedia types for the selected device. 5. Next to Voice Call Monitoring, select the check box to enable this feature for the selected device. Voice Monitoring provides a timestamp for a conversation. 6. Next to Log Event Limit, select an available event limit from the pulldown list. We recommend that you do not set this limit lower than Next to Log Size Limit, select an available size limit from the pulldown list. We recommend that you do not set this limit to Off. The Log Event Limit and Log Size Limit work together in that whichever setting is triggered first is the one that takes effect. The event limit causes the device to send the specified amount of events ( , voice, SMS, MMS) each as one combined event when the event limit is achieved. This is preferable to sending each individual event in real-time. If the device sends or receives a large number of messages, you should set this limit higher rather than lower. Otherwise, the device could be constantly sending events to the dashboard which could hinder device performance. The Log Size Limit restricts the amount monitored data this is sent from the device. The limit that is achieved first is the one that is used. 8. Next to Image Monitoring, select the check box to enable this feature for the selected device. 9. Next to Web Image Monitoring, select the check box to enable this feature for the selected device. 10. Next to GPS Update Period, select an available update time frame from the pulldown list. With this setting, you can configure GPS updates to occur automatically every fifteen minutes, 30 minutes, hourly, or daily. 11. Next to Lock on SIM Change, select the check box to enable this feature. With this feature selected, if the SIM is changed, the device switches on GPS Theft Mode and Locks the device. You can unlock the device with a password. Note: Lock on SIM Change is only available if a Lock command is available as part of the device profile

18 Handset Management 12. Next to Wipe on SIM Change, select the check box to enable this feature.this check box is only available when the Lock on SIM Change check box is enabled. With this feature selected, if the SIM is swapped for another, sensitive device information is automatically wiped. Note: Wipe on SIM Change is only available if a Wipe command is available as part of the device profile. 13. Click the Update button to apply your settings. Settings Window Reports Tab Information and Configuration You can run customized reports against collected device data by entering criteria into the fields provided in this window. To run a customized report, enter report criteria in one or more fields described here. 1. Select the Reports tab. See See "Reports Tab" on page If it isn t already selected, from the Select phone to view pulldown in the top right corner, select the phone number for the device on which you want to run a report. 3. If you want the report to include sender information, enter the Sender address or phone number in the corresponding field. Note that the address or number you enter must match the sender address or number as it appears in the Messages display. 4. If you want the report to include recipient information, enter the Recipient address or phone number in the corresponding field

19 History Note that the address or number you enter must match the recipient address or number as it appears in the Messages display. 5. In the Start Date field, enter a start date parameter for the report you are creating. Format the date as Year-Month-Day as in the following example: In the End Date field, enter an end date parameter for the report you are creating. Format the date as Year-Month-Day as in the following example: From the Messages pulldown list, select the type of message for which you are running this report. Your options are All, SMS, MMS, , Voice. 8. In the Keyword Search edit field, enter a keyword or phrase you want to search for within messages. Messages containing this keyword are used to build your report. 9. Click the Search button to run the report. History On the right side of the Reports window, there is a History column. Here you can view the last ten commands sent to the device and their send dates. Reports Tab Alert Setup Tab Information and Configuration By using unique identifiers, such as keywords or addresses, messages that meet a defined criteria are identified and viewed by clicking on the

20 History Alerts message (if available) that appears beneath the Home tab in the Home window (see See "Home Tab" on page 4). Alerts can also be configured to be sent via to you; for example, an SMS message that contains the keyword you designate can be automatically ed to you. To configure an alert, do the following. 1. Select the Alert Setup tab. See See "Alert Setup Tab" on page If it isn t already selected, from the Select phone to view pulldown in the top right corner, select the phone number for the device for which you want to configure an alert. 3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this word is found in a message sent or received by the device. Click the Add button. The keyword now appears in the Keyword list in the field below. 4. The Keywords field also has a check box that allows you to use suggested keywords from the column on the right side of the window. These are keywords that are often used as shorthand in messages. To use suggested keywords in place of or in addition to keywords you enter, select the Use Suggested Keywords check box. When this check box is selected, the Suggested Keywords that are enabled are used as part of the alert. You can scroll through the Suggested Keywords list and enable check boxes besides keywords you want to trigger an alert if found. 5. If you are selecting to Send the event as an Message by enabling the check box in the Sender/Recipient Address field, enter the address or phone number to check for alerts. Use this feature to flag any communication with a particular contact as an alert. 6. From the Select what to do with an event options, you can choose to, Report the event as an Alert message Send the event as an message Select one or both check boxes. Click the Update button to enable the alert

21 History Alert Setup Tab Support/Help Tab Information and Configuration If you have questions or need technical support, select the Support/Help tab. Enter the required information in the available fields and click Submit. Note: Your dashboard may not have a Support/Help tab. Your service provider can remove this tab or customize it for your deployment

22 FAQs I do not want the device user to see the Junos Pulse application on his/her device. Can I hide it? We are aware that on some devices icons can be hidden from view, but you cannot hide the Junos Pulse application. In addition to control and monitoring, Junos Pulse provides security features that require end user access for configuration. What happens if the device user modifies the Junos Pulse settings on the device? Depending on the modification made, the modification may not display on the Mobile Security Dashboard. For example, if the device user uninstalls Junos Pulse from the device, this event is not displayed in the Mobile Security Dashboard. You will simply notice an absence of events. Why would my GPS coordinates be inaccurate? There could be several reasons for this inaccuracy. First, confirm that you have a GPS enabled device and that GPS is a part of your carrier's data plan. If you do not have GPS functionality as a part of your network service, the GPS feature will not work. Also, check the GPS feature on the device to make sure there are no restrictions and that all features are set to enabled. Calibrate your location with the device through Google maps from a location with good carrier signal strength. The premier location for testing is outdoors. GPS can also be gathered via satellite or network, with varying degrees of accuracy. What does it mean when the GPS coordinates are 0.0? Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that this feature is blocked by the carrier for use by 3rd party applications. (Note that we cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1 devices.) How long does it take for the Mobile Security Dashboard to update with the device user s activities? This is configurable from the dashboard. See See "Handset Management" on page 13 for information and guidelines. (Note that if the device user sends and receives a high volume of texts, sending these texts to the dashboard in real-time is not advised.) Can I use Junos Pulse to monitor or block URLs? No, Junos Pulse does not provide that functionality at this time

23 How many devices can I monitor using the Mobile Security Dashboard? There is no limit to the number of devices you can monitor on an account. To add a new device to the account, you must first download the software to the additional device. Once the device registers with the dashboard, you can monitor it. I want to monitor several devices, but each device uses a different carrier. The carrier does not matter. As long as the device is running a supported operating system, you can use Junos Pulse

24 Index Index A account management 13 Account management 13 alert setup 16 alerts notification 5 anti-theft protection 6 anti-virus activity 11 APNS certificate 10 B backup your data 12 C custom button 12 D device monitoring 11 E monitoring 14 validation 5 F features control overview 1 security overview 2 G GPS support information for ios 10 update period 14 H handset management 13 History commands 16 I Image monitoring 14 K Keywords, messaging shorthand 17 L locate your device 10 lock device 6 Lock on SIM change 14 Log event limit 14 Log size limit 14 M MMS monitoring 14 Mobile Security Dashboard overview 2 P password reset 3 R refresh button 11 reports 15 S scream 9 settings 13 SMS monitoring 14 U unlock device

25 Index username/password change 13 V voice call monitoring 14 Voice monitoring 14 W Web image monitoring 14 wipe device 8 Wipe on SIM change

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Junos Space. Service Now User Guide. Release 13.1. Published: 2013-06-29. Copyright 2013, Juniper Networks, Inc.

Junos Space. Service Now User Guide. Release 13.1. Published: 2013-06-29. Copyright 2013, Juniper Networks, Inc. Junos Space Service Now User Guide Release 13.1 Published: 2013-06-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes

More information

Junos Pulse. Administration Guide. Release 3.0. Published: 2012-04-30. Copyright 2012, Juniper Networks, Inc.

Junos Pulse. Administration Guide. Release 3.0. Published: 2012-04-30. Copyright 2012, Juniper Networks, Inc. Junos Pulse Administration Guide Release 3.0 Published: 2012-04-30 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This product includes the Envoy

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.2 Published: 2012-06-27 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager Release 2013.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-03-15 Copyright Notice Copyright 2013

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Junos OS. DDoS Protection Configuration Guide. Release 12.3. Published: 2012-12-11. Copyright 2012, Juniper Networks, Inc.

Junos OS. DDoS Protection Configuration Guide. Release 12.3. Published: 2012-12-11. Copyright 2012, Juniper Networks, Inc. Junos OS DDoS Protection Configuration Guide Release 12.3 Published: 2012-12-11 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product

More information

Junos OS. DDoS Protection Configuration Guide. Release 12.1. Published: 2012-02-29. Copyright 2012, Juniper Networks, Inc.

Junos OS. DDoS Protection Configuration Guide. Release 12.1. Published: 2012-02-29. Copyright 2012, Juniper Networks, Inc. Junos OS DDoS Protection Configuration Guide Release 12.1 Published: 2012-02-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Sophos Mobile Control Administrator guide. Product version: 3.6

Sophos Mobile Control Administrator guide. Product version: 3.6 Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Kaspersky Security 10 for Mobile Implementation Guide

Kaspersky Security 10 for Mobile Implementation Guide Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Junos Space. Audit Logs. Release 14.1. Published: 2014-08-21. Copyright 2014, Juniper Networks, Inc.

Junos Space. Audit Logs. Release 14.1. Published: 2014-08-21. Copyright 2014, Juniper Networks, Inc. Junos Space Audit Logs Release 14.1 Published: 2014-08-21 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Intrusion Detection and Prevention

Intrusion Detection and Prevention Intrusion Detection and Prevention Published: 2013-08-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy SNMP

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

SECURING TODAY S MOBILE WORKFORCE

SECURING TODAY S MOBILE WORKFORCE WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.2 Published: 2014-08-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server

TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

Managing Service Design for PTP Timing

Managing Service Design for PTP Timing Managing Service Design for PTP Timing Published: 2012-02-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Big Data Management Guide Release 2014.1 Published: 2014-03-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Virtual Appliance Installation Guide Release 2014.1 Published: 2014-12-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

After you have created your text file, see Adding a Log Source.

After you have created your text file, see Adding a Log Source. TECHNICAL UPLOADING TEXT FILES INTO A REFERENCE SET MAY 2012 This technical note provides information on how to upload a text file into a STRM reference set. You need to be comfortable with writing regular

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Junos Pulse. Mobile Device Integration Guide. Published: 2010-12-17. Copyright 2010, Juniper Networks, Inc.

Junos Pulse. Mobile Device Integration Guide. Published: 2010-12-17. Copyright 2010, Juniper Networks, Inc. Junos Pulse Mobile Device Integration Guide Published: 2010-12-17 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This product includes the Envoy

More information

Identity-Based Traffic Logging and Reporting

Identity-Based Traffic Logging and Reporting Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Kaspersky Security for Mobile Administrator's Guide

Kaspersky Security for Mobile Administrator's Guide Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Vulnerability Manager User Guide Release 2014.2 Published: 2014-12-08 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite. White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Juniper Secure Analytics Release Notes

Juniper Secure Analytics Release Notes Juniper Secure Analytics Release Notes 2014.5 February 2016 Juniper Networks is pleased to introduce JSA 2014.5. Juniper Secure Analytics (JSA) 2014.5 Release Notes provides new features, known issues

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15 Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

SPC Connect Configuration Manual V1.0

SPC Connect Configuration Manual V1.0 SPC Connect Configuration Manual V1.0 I-200090-1 28.11.2014 Copyright Copyright Technical specifications and availability subject to change without notice. Copyright Siemens AB We reserve all rights in

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: 2016-06-10. Copyright 2016, Juniper Networks, Inc.

Junos Space. Junos Space Security Director Restful Web Services API Reference. Modified: 2016-06-10. Copyright 2016, Juniper Networks, Inc. Junos Space Junos Space Security Director Restful Web Services API Reference Modified: 2016-06-10 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-03-14 Copyright Notice Copyright 2014 Juniper

More information

Junos Space Security Director

Junos Space Security Director Junos Space Security Director Logging and Reporting Getting Started Guide Release 13.3 Published: 2014-04-29 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Users Guide Release 2014.1 Modified: 2015-06-25 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Junos OS. Distributed Denial-of-Service Protection Feature Guide. Release 13.2. Published: 2013-07-25. Copyright 2013, Juniper Networks, Inc.

Junos OS. Distributed Denial-of-Service Protection Feature Guide. Release 13.2. Published: 2013-07-25. Copyright 2013, Juniper Networks, Inc. Junos OS Distributed Denial-of-Service Protection Feature Guide Release 13.2 Published: 2013-07-25 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Integrating Juniper Netscreen (ScreenOS)

Integrating Juniper Netscreen (ScreenOS) Integrating Juniper Netscreen (ScreenOS) EventTracker Enterprise Publication Date: Jan. 5, 2016 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide helps you

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

Workflow Templates Library

Workflow Templates Library Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT

ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT ADMINISTRATOR GUIDE FOR USA MOBILITY AMC SELECT AMC Select Administrator Guide 1 March 5, 2013 This page intentionally left Blank. AMC Select Administrator Guide 2 March 5, 2013 I. INTRODUCTION... 4 II.

More information

MaaS360 Mobile Device Management (MDM) Administrators Guide

MaaS360 Mobile Device Management (MDM) Administrators Guide MaaS360 Mobile Device Management (MDM) Administrators Guide Copyright 2014 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.1 Published: 2012-06-27 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos OS Support for OpenFlow v1.0 Beta Draft

Junos OS Support for OpenFlow v1.0 Beta Draft Junos OS Support for OpenFlow v1.0 Beta Draft Published: 2012-12-20 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes

More information

Migrating Log Manager to JSA

Migrating Log Manager to JSA Juniper Log Manager Release 2014.4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-03-02 Copyright Notice Copyright 2015 Juniper Networks,

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

NHSmail and mobile devices overview

NHSmail and mobile devices overview NHSmail and mobile devices overview Version: V.7 Date: May 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 7 Crown Copyright, May 2011 Contents

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

support@escanav.com http://forums.escanav.com escan Mobile Security for Android

support@escanav.com http://forums.escanav.com escan Mobile Security for Android support@escanav.com http://forums.escanav.com escan Mobile Security for Android Introduction 3 Features added 3 System Requirements 3 Installation 4 Features of escan Mobile Security for Android 4 Antivirus

More information

Junos OS. MPLS Network Operations Guide. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc.

Junos OS. MPLS Network Operations Guide. Published: 2012-12-10. Copyright 2012, Juniper Networks, Inc. Junos OS MPLS Network Operations Guide Published: 2012-12-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes the Envoy

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Vulnerability Assessment Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information