TREND MICRO Mobile Security 5.0 for Android Product Guide

Size: px
Start display at page:

Download "TREND MICRO Mobile Security 5.0 for Android Product Guide"

Transcription

1 H TREND MICRO Mobile Security 5.0 for Android Product Guide V1.1 Trend Micro, Inc N. De Anza Blvd. Cupertino, CA T / F

2 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2014 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro Mobile Security 5.0 Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Mobile Security At Trend Micro, we are always seeking to improve our documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact [ link here]. You can also evaluate this document on the following web site: DOCUMENT PROFILE: Product Name: Trend Micro Mobile Security 5.0 for Android Document Title: Trend Micro Mobile Security 5.0 for Android - Product Guide Document Filename: PG - Mobile Security 5.0 Android - Product Guide GL v1.1 Document Release Date: February 22, 2014 Team: Consumer Technical Product Marketing Author: Michael Miley, Consumer TPM Manager, michael_miley@trendmicro.com 2

3 Table of Contents Trend Micro Mobile Security Quick Overview... 4 Chapter 1: Introducing Trend Micro Mobile Security... 5 Key Features... 5 System Requirements... 7 Incompatible Software... 7 Internet 3G-4G Connection... 7 Recommended Environment... 7 Target Market... 7 Availability... 8 Contacting Trend Micro... 8 Chapter 2: Getting Started with Trend Micro Mobile Security... 9 Download and Install Trend Micro Mobile Security... 9 Chapter 3: Exploring Trend Micro Mobile Security Overview of the Mobile Security Console Virus Scanner Virus Scanner > Power Uninstall > Trend Micro Clean Tool Privacy Scanner Safe Surfing & Parental Control Call & Text Blocking Lost Device Protection Backup & Restore Between Android and ios Devices Scan Facebook Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security On Your Android Tablet Appendix: TMMS QR Code to Google Play Store About Trend Micro

4 Trend Micro Mobile Security Quick Overview Trend Micro Mobile Security for Android protects your Android device from privacy threats, loss, data theft, and viruses. Utilizing Trend Micro s cloud-based security via the Smart Protection Network and Mobile App Reputation, Trend Micro Mobile Security stops threats before they reach you. Installing easily from the Google Play Store onto your Android smartphone or tablet, Trend Micro Mobile Security 5.0 provides the following essential features: Preview Panel. In the left-hand panel you can quickly check the security status of your device. You can scan your device, check total files scanned in the last X days, scan for privacy risks, view your current backups, and view your Lost Device Protection status. Function Panel. Additionally, with a leftward swipe of the finger on the console, users have easy access to the following protections in the right-hand panel (Free Service = FS; Premium Service = PS): Virus Scanner. New apps are checked from the Cloud for virus and spyware threats. (FS) Privacy Scanner. Warns you of apps that potentially steal your private information. New apps are automatically checked for privacy risks upon download. (PS) Safe Surfing. Web filtering provides protection from malicious URLs (fake websites that try to steal your information) while you surf the Internet. Parental controls block kids from viewing inappropriate content. (PS) Call & Test Blocking. Annoying calls from unknown numbers can be blocked and disconnected. Annoying text messages coming from an unknown number can be blocked by keywords that you select. (PS) Lost Device Protection. From a personal online portal, you can locate a lost device, trigger an alarm, remotely lock it, or even wipe the device clean to protect your personal information. (PS) Cross-Platform Backup & Restore. Backup data on your device to the cloud. Links to the Mobile Backup and Restore app. Contacts can be backed up and restored across Android and ios. (50MB FS; 6GBs PS) Scan Facebook. Scan your Facebook privacy settings. Adjust them to increase your privacy and to protect from data theft. Links to the Facebook Privacy Scanner app. (FS) Figure 1. Preview Panel (Left) Figure 2. Function Panel (Right) 4

5 Chapter 1: Introducing Trend Micro Mobile Security This chapter introduces you to Trend Micro Mobile Security 5.0 for Android. The topics discussed in this chapter include: Key Features System Requirements Incompatible Software Internet 3-G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Key Features O Available only for Premium customers o Available for all customers - Not available Table 1. Trend Micro Mobile Security Feature Comparison Protection Android ios Kindle Virus Scanner: Apps Scans every app you install and every one you download to filter out virus and malicious apps that can steal your information and cost you money. Includes Trend Micro Clean Tool for Power Uninstall. Virus Scanner: Updates Unlimited updates to virus protection files Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions o o o o o o o o o O - - O O O O - O 5

6 Table 2. Trend Micro Mobile Security Feature Comparison (Con t) Protection Android ios Kindle Call and Text Blocking Filters calls and texts with whitelist and blacklist Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode O - - O O - Lost Device Protection: Remote Lock / Wipe Enables you to remotely lock your device (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) / Allows you to perform a factory reset of the device from the web portal to erase all your personal data. O - - Lost Device Protection: SIM Card Protection Automatically locks your device if the SIM card is removed (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) O - - Cross-Platform Backup and Restore Backup your photos, contacts*, calendar, videos, voice memos, music (up to 50 MB for Free, 5GB for Premium). (*Cross-platform Backup and Restore of Contacts between ios and Android.) Privacy Scanner for Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password) No Advertising There is no 3 rd party advertising displayed in the app Online Technical Support Offers support provided via online forums, knowledgebase, and o o - O O - O - O o o o o o o 6

7 System Requirements Table 3. System Requirements Requirements Description Operating Systems Android OS 2.2 and above ios 7 Device Space Memory Other At least 18MB disc space At least 65MB memory 3G-4G (LTE) Wi-Fi Internet Connection *SMS blocking functions are not supported on Android OS 4.4 *Compatible with Kindle Fire, Fire HD, HD 8.0, HDX, HDX 8.9 (as of April 24, 2014); not compatible with Kindle Paperwhite *Compatible with iphone 4, 4S, 5, 5C; ipad 2, 3, 4, Air; Mini 1, Mini 2, itouch 5 Incompatible Software To identify software that you should remove from the device before installing Trend Micro Mobile Security, please refer to the following Web site: Internet 3G-4G Connection Trend Micro Mobile Security uses a Wi-Fi Internet or 3G-4G connection for activating the program online, checking the expiration date, downloading updates, sending Trend Micro URL/web queries and logs to the portal, logging into the management portal, and browsing knowledge-based pages on the Trend Micro Web site. 3G-4G data connections fees are usually charged on a monthly basis, using a fixed allocation with an upper limit. If you exceed this limit, you will be charged additional fees for the amount of time connected or for the amount of data downloaded. Testers are therefore encouraged to use a Wi-Fi router-based connection to the Internet whenever possible. Recommended Environment This Product Guide assumes that you are using Trend Micro Mobile Security in conjunction with a PC or Mac, so you can log in to the Trend Micro Mobile Security Portal easily at and review your Lost Device Protection settings and execute certain actions. Target Market Trend Micro Mobile Security is targeted to mobile users who wish to secure their Android smart phones and tablets from malicious applications, web threats to them and their family, unwanted calls and messages, and device loss. 7

8 Availability February 24, 2013 Google Play Store Contacting Trend Micro Trend Micro Incorporated North De Anza Blvd. Cupertino, CA Tel: (408) or (800) Fax: (408) Further information is available at 8

9 Chapter 2: Getting Started with Trend Micro Mobile Security This chapter gets you started with Trend Micro Mobile Security. Topics discussed in this chapter include: Downloading and Installing Trend Micro Mobile Security Buying / Activating a License Registering to your Trend Micro Account Transferring an Existing License to a New Device Note: Trend Micro Mobile Security is bundled with Titanium Maximum Security and Titanium Premium Security. To download the bundled software, users of these editions can simply launch the Trend Micro Titanium Console. A link to the Mobile Security download is available both in the Welcome screen and in the Computer tab of the Console. Download and Install Trend Micro Mobile Security To download and install Trend Micro Mobile Security: 1. Tap the Google Play Store icon on your Android device to load it. 2. Alternately, open your browser on your Android device and type ecuritydownload, or scan the QR Code on the cover of this guide or in the Appendix. 3. The Google Play Store screen appears. 4. Tap the Spyglass icon at the top to load the search field. The Search Google Play field appears and your Android keyboard pops up. Figure 3. Google Play Store Figure 4. Search Google Play 9

10 5. Type Trend Micro Mobile Security in the search field and when Mobile Security & Antivirus appears in the list, tap the listing. The Trend Micro Mobile Security & Antivirus install page appears. 6. Tap Install. The App Permissions screen appears, indicating the access permissions Trend Micro Mobile Security & Antivirus needs on your device. 7. If you accept, tap Accept. Trend Micro Mobile Security & Antivirus downloads and installs. 8. When installation is complete, you re presented with a screen to Open or Uninstall the app. Tap Open. A License Agreement screen appears. Figure 5. Trend Micro Mobile Security Figure 6. Install Figure 7. Accept Figure 8. Open 10

11 9. Read the License Agreement. If you accept the terms of the agreement, tap Accept. The TMMS Console appears, with a popup advising you to tap the Menu key on your device to go to Settings to sign into or set up your Trend Micro account. 10. Tap the Menu key on your device, then Settings. The Settings screen appears. 11. Note the Account & Subscription section, where you can: Set up account. Tap here to Sign in or Create a Trend Micro account. Trial Expires. You have 30 days to try the TMMS Premium features for free before they expire. Once they do, you can buy a paid subscription. 12. OPTION 1: Buy / Activate. Tap here to buy a 1-Year, 2-Year, or Yearly Subscription. The purchase page is loaded in the Google Play Store, along with your Google account and credit card details. Note: For purchases, you should have previously set up your Google Play Account and credit card details in Google. Figure 9. License Agreement Figure 11. Settings Figure 10. Tap Menu key Figure 12. Account & Subscription 11

12 13. Tap the subscription you wish to purchase. Your Google account presents your payment credentials and the amount. 14. If you accept, tap Accept and Buy. Your subscription is activated. See below for instructions on how to register the activation to a Trend Micro account. 15. OPTION 2: Alternately, if you want to use a license you already own on this new device, in the Buy / Activate screen tap Want to transfer a license? to sign into your Trend Micro account and begin the license transfer. A Sign In screen appears. 16. Enter the address and password for the Trend Micro account that holds the license you wish to transfer and tap Sign In. The Transfer License screen appears. 17. Tap the license that you want to transfer to this device. A popup appears, letting you complete the transfer of your existing license. 18. Tap OK to transfer the license. Your purchased protection is immediately disabled on the old device and activated on this new one. Figure 13. Buy / Activate Figure 15. Sign In Figure 14. Accept & Buy Figure 16. Transfer License Figure 17. Transfer Existing License(s) 12

13 19. OPTION 3: If you have already purchased an Activation Code, in the Buy / Activate screen tap Use Activation Code. A screen appears for you to enter the activation code; then tap OK. Your subscription is activated. 20. REGISTERING TO AN ACCOUNT: Back in the Settings screen (Figure 12), tap Set up account. The Sign In screen appears. 21. REGISTRATION OPTION A: For those without an account, tap Create Account. The Create Account screen appears. 22. Enter your First and Last Names and the Address you wish to use (your Google account is inserted by default); then using the popup menu, select your Country and tap Next. A confirmation screen appears. 23. Confirm this is the address you wish to use to sign in and manage your Trend Micro subscription. Figure 18. Use Activation Code Figure 20. Create Account #1 Figure 19. Sign In Figure 21. Create Account #2 13

14 24. Enter and confirm a password for this account. If you wish, check I want to subscribe for Trend Micro updates, then tap Create Account. Your account is created. 25. REGISTRATION OPTION B: For those who already have a Trend Micro account, back in the Sign In screen (Figure 19), enter your Address and Password and tap Sign In. 26. If you re updating TMMS and you already have a subscription to a previous version of TMMS, a popup appears with Subscription Available, asking if you wish use it on this device or Buy a new one. 27. Tap Buy New to take you to the Buy / Activate screen, or tap Yes to use the subscription on this device. This take you to the TMMS Console, where you can now begin using TMMS. Figure 22. Subscription Available 14

15 Chapter 3: Exploring Trend Micro Mobile Security This chapter provides an overview of Trend Micro Mobile Security (TMMS). Topics discussed in this chapter include: Overview of the Mobile Security Console Virus Scanner Privacy Scanner Safe Surfing & Parental Control Call & Text Blocking Lost Device Protection Backup and Restore Between Android and ios Devices Scan Facebook Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security on your Android Tablet 15

16 Overview of the Mobile Security Console Once installed, Trend Micro Mobile Security (TMMS) appears in your Applications list on your Android mobile device and puts a shortcut on your screen. To launch the Mobile Security Console: 1. Tap the Trend Micro Mobile Security icon on your mobile device and the Mobile Security Console appears. 2. Tap the Status Banner (e.g., Action Required ) and dropdown to perform remedial actions on your device. 3. Tap the top two panels to obtain a Scan History for apps and files. 4. Tap the lower left panel to take you to the Backup and Restore Preview. Figure 23. Console Figure 24. Scan History 5. Tap the View Data Backup button in the preview (Figure 25) to take you to the linked Mobile Backup and Restore app (Figure 26), where you can manage your backups and restores. Note: For this link to work, you will have already installed Trend Micro Mobile Backup and Restore. See Chapter 3: Backup and Restore for details. 6. The Console s lower-right panel (Figure 23) provides access to the Lost Device Protection settings (Figure 27). Figure 25. Backup & Restore Preview Figure 26. Mobile Backup and Restore 16

17 7. Tap it to take you to the Ready for Remote Control page, with Find my Android checked by default in the Protection tab. Note: New users need to register an account before using this feature. See Chapter 3: Lost Device Protection for more details. 8. Back in the Console Preview Screen, tap the Scan Device button to execute a combination Virus & Privacy scan. 9. The scan begins and a circular progress bar indicates the progress and percentage completed of the scan. Files scanned, Threats found, and Privacy risks found are also indicated numerically. 10. When the scan is done, tap the popup menu in the Scan Results screen to view Virus Scan Results or Privacy Risk Scan Results. 11. Back in the main Console preview, swipe the Console to the left to see the function panels for Trend Micro Mobile Security. Figure 27. Lost Device Protection Figure 29. Scan in Progress Figure 28. Scan Device Figure 30. Virus / Privacy Risk Scan Results 17

18 Virus Scanner To use the Virus Scanner: 1. Tap Virus Scanner in the TMMS Console. The Virus Scanner settings screen appears, with the Scan tab selected by default. 2. Tap Scan Now to conduct a virus scan on demand. Scan options include the following: Real-Time Scan. This option is checked by default and provides a real-time scan of all downloaded apps. Scan Memory Card. This option checks the memory card for security threats. Scan Option. When Scan Memory Card is selected, the options appear and Scan only app files is selected by default; select Scan all files if you wish; the scan will take longer. 3. Tap the Update tab in the Virus Scanner screen. The Update options appear. 4. Tap the Update button to manually update the pattern file. 5. Variously check Auto Update, Auto Update Using Wi-Fi Only, and Automatic Scan after a successful update. Figure 31. Virus Scanner Figure 33. Virus Scanner > Scan Option Figure 32. Virus Scanner > Scan Figure 34. Virus Scanner > Update 18

19 6. Tap Auto Update Schedule (Figure 35). A popup appears to choose your Update Interval: Daily, Weekly, or Monthly. 7. Tap the History tab, then Virus Scanner or Updates to obtain a history of threats found or updates conducted Figure 35. Update Interval Figure 36. Virus Scanner > History Virus Scanner > Power Uninstall > Trend Micro Clean Tool Malicious apps that hook into your Android system will sometimes require the Power Uninstall of the Trend Micro Clean Tool to eradicate. After a Mobile Security real-time or manual virus scan, if you re infected by one or more of these malicious apps, you ll be prompted to download, install, and run the Clean Tool to get rid of them. Example: When the Trend Micro Clean Tool Power Uninstall is Required After a Scan: 1. Case 1: Real-Time Virus Scan Result: You ve downloaded the malicious app and the real-time scan has detected it 2. Case 2: Manual Virus Scan Result: You ve conducted a manual scan and the scan has detected the malicious app. 3. For Case 1: Real-Time Virus Scan Result, tap the Remove button in the Security Alert. 4. For Case 2: Manual Virus Scan Result, tap the trashcan to the right of the malware detected Figure 37. Case 1: Real- Time Scan Result Figure 38. Case 2: Manual Scan Result 19

20 indicating Clean Tool Required. 5. In Case 2, a popup confirms that Mobile Security requires you to download the Trend Micro Clean Tool to perform the Power Uninstall. Tap OK to approve the download. 6. If dialogs appear during this process and the uninstall is stopped, make sure to first deactivate the malicious app in Device Administrators and grant Superuser permissions to Mobile Security. Then begin the download again. 7. Otherwise, Mobile Security downloads the Clean Tool and automatically begins the Power Uninstall. 8. When the Power Uninstall is complete, Mobile Security indicates that the malware has been removed. Tap Close to close the screen. 9. If you have rooted your device, Mobile Security will recommend that you unroot your device, as a rooted device is susceptible to security vulnerabilities and malware. Figure 39. Case 2 Download Popup Figure 41. Threat Removed Figure 40. Trend Micro Clean Tool Downloading 20

21 Privacy Scanner To conduct a Privacy Scan: 1. Tap Privacy Scanner in the TMMS console. The Privacy Scanner settings screen appears. 2. Scan options include Realtime Scan and Scan Memory Card. Tap History to obtain a history of privacy risks found. 3. Tap Scan Now to conduct a Privacy Scan. When the scan is complete, a Privacy Risk Scan Result screen displays, providing you the results of the scan. Figure 42. Privacy Scanner Figure 43. Privacy Scanner > Scan 4. If the Privacy Risk Scan Result screen shows risks, you can tap any app in the list to address them. The resulting Details screen lets you Uninstall or Trust this app. Tapping Trust this app automatically puts it in the list of Trusted apps. Figure 44. Privacy Risk Scan Result Figure 45. Details 21

22 5. Back in the main screen, tap the Trusted Apps tab to view or add trusted apps that do not need to be scanned by the Privacy Scanner. (This shortens the length of the scan.) 6. Tap Add an App to add apps to the Trusted Apps list. The Add From popup appears, letting you select apps from the Privacy Scan History or from the Installed apps list. 7. For the latter option, when the list appears, check the Installed APPs you wish to add to the Trusted Apps list, then tap the Add (+) button. 8. When the popup appears, tap Add. The apps are added to your Trusted Apps list. Figure 46. Trusted Apps Figure 47. Add From > Privacy Scan History > Installed Apps List Figure 48. Add Figure 49. Trusted Apps 22

23 Safe Surfing & Parental Control To ensure Safe Surfing: 1. Back in the main TMMS Console functions panel, tap Safe Surfing. The Safe Surfing & Parental Control screen displays, with the Safe Surfing tab selected and surfing protection turned on by default. 2. Select your Safe Surfing Protection Level: High. Blocks sites showing any signs of fraud or malicious software. Normal. Provides balanced protection without blocking minor risks. This is chosen by default. Low. Blocks only sites confirmed as fraudulent or dangerous. 3. To add a URL to the Blocked or Approved Lists, tap the name of the respective list; e.g., Blocked List. The Add screen appears. 4. Tap Add. A popup appears. Type the name the item and the URL and tap Save. The URL is added to the Blocked or Approved List. Figure 50. Safe Surfing Figure 52. Blocked List Add Figure 51. Safe Surfing Protection Level Figure 53. Add URL Figure 54. URL Added to Blocked List

24 To enable Parental Controls: 1. Tap the Parental Controls tab or scroll right to access its settings. The Parental Controls screen appears, with the function off by default. 2. Tap the Parental Controls slider to the right to turn on the function. A Password Required popup appears, asking you to provide your password to save changes. 3. Enter your Trend Micro account password and tap OK. 4. Set your Protection Level: Child. Provides filtering for children 9 or younger. Pre-teen. Provides filtering for children between 10 and 13. Teen. Provides filtering for young adults between 14 and 18. Figure 55. Parental Controls Figure 56. Parental Controls Slider On Figure 57. Password Required 24

25 5. Scroll down to access Uninstall Protection, then tap the slider to the right to turn on the function. The Activate Device Administrator screen displays. Activating device administrator will allow TMMS to erase all data when you use the web portal. It does not delete any data upon activation. 6. Tap Activate. A popup appears, indicating Device Administrator Activated. You must now use your device s Security Settings to deactivate Device Administrator for TMMS if you wish to uninstall the app. Tap OK. 7. Add URLs to the Blocked or Approved Lists, as you did with Safe Surfing. 8. Using your Web browser, surf to a site prohibited by TMMS Parental Controls. A message will appear, indicating the site has been blocked by Mobile Security. Figure 58. Uninstall Protection Figure 60. Device Administrator Activated Figure 59. Activate Device Administrator? Figure 61. Blocked by Parental Controls 25

26 When Parental Controls are activated, if your browser contains prohibited bookmarks, TMMS will periodically present a popup allowing you to Delete All prohibited bookmarks, or Add all to Approved Sites. 9. Tap the History tab to obtain a history of all Websites blocked by Safe Surfing or Parental Controls, then tap the respective blocked category for details on what was blocked. Figure 62. Delete All Add All to Approved Sites Figure 63. History Figure 64. Parental Controls History 26

27 Call & Text Blocking To block unwanted calls: 1. Back in the main TMMS Console screen, tap Call & Text Blocking. The Call & Text Blocking screen displays, with the Call tab selected by default and both Call and Text Blocking enabled. Tap the sliders to the left to disable the functions. 2. Tap Filtering Method to change the filtering option in the popup: Stop only blocked callers Allow only approved callers Figure 65. Call and Text Blocking Figure 66. Call Filtering Options Allow approved and anonymous callers 3. Tap Action to change the action to be performed in the popup. Reject call Silence device Reject call + send reply 4. Tap Reject call + send reply and you re given three preset options for Automatic Reply. Figure 67. Filtering Method Figure 68. Action 27

28 5. Edit the reply text for the chosen option by selecting it, tapping the Edit button, and typing the alternate text. Tap Save to save your changes. 6. Check Block Annoying Calls from unknown numbers to disconnect them within three seconds. 7. Tap History to review your Call and Text Blocked History. Figure 69. Edit Reply Text Figure 70. Call and Text Blocked History To block unwanted text: 1. In the Call & Text Blocking screen, tap the Text tab to access the settings. The Text Blocking options display. 2. Tap Filtering Method to change the option. Stop only blocked senders Allow only approved senders 3. Tap Action to set the action to be performed. Block message Block and delete Figure 71. Text Blocking Figure 72. Filtering Method 28

29 message Block message and reply 8. Tap Block message + reply and you have three options for Automatic Reply (Figure 70). 9. Edit the reply text for the chosen option by selecting it, tapping the Edit icon, then typing the alternate text. Tap Save to save your changes. 10. Check Block Annoying Texts, then tap Filter Keywords to block texts containing the keyword(s). The Block Annoying Texts entry screen appears, letting you type your keyword entries. Tap Save to save the keywords. 11. Enter contacts into the Blocked or Approved Lists, as previously described. 12. Tap the History tab to access the Call and Text Blocked Histories. Figure 73. Action Figure 74. Automatic Reply Figure 75. Edit Message Figure 76. Enter Passwords 29

30 Lost Device Protection To enable Lost Device Protection: 1. Back in the main Console, tap Lost Device Protection. The Lost Device Protection screen appears, with the Protection tab selected by default and two options displayed: Find My Android. Locates this device in Google Map. This option is enabled by default. SIM Card Lock. Lock this device if the SIM card is changed or removed. 2. Check SIM Card Lock if you wish to lock your device when the SIM card is changed or removed. A Password Required screen appears. 3. Enter your password and tap OK. SIM Card Lock is enabled. 4. To disable the feature, check the checkbox again and reenter your password to validate the change. 5. Tap the Remote Lock tab to access the message that appears when your device is locked and someone tries to use it. The message is displayed. 6. Tap the message to edit it. The Edit Message screen appears. Edit your message using Figure 77. Main Console Figure 79. Password Required Figure 78. Lost Device Protection Figure 80. Remote Lock 30

31 the device popup keyboard and tap Save. 7. Tap the Remote Wipe tab to access the feature. The Remote Wipe screen appears, with Partial Remote Wipe selected by default. This deletes you contacts, call history, text messages, account info, and SD card contents in the event your device is lost or stolen. 8. Tap Full Remote Wipe to enable the function. The Activate Device Administrator screen appears. This allows Mobile Security to perform a complete erase of your device s content. 9. Tap Activate to enable the function. A screen appears indicating Device Administrator Activated, informing you that if you need to uninstall Mobile Security, you must use the uninstall option in the Setting menu on the action bar. 10. Reselect Partial Remote Wipe to revert to it. 11. Note that to change any Lost Device Protection settings, you must enter your password to make the changes. 12. Manage your protection in the Lost Device Protection Portal. See below for details. Figure 81. Edit Message Figure 83. Activate Device Administrator Figure 82. Remote Wipe Figure 84. Device Administrator Activated 31

32 Lost Device Protection Portal To access the Lost Device Protection Portal: 1. Launch your browser on your PC and type ostdevice into the search field, and hit Enter. The Lost Device Protection Portal webpage appears. 2. Tap Find Now or Sign in to sign into your Trend Micro account. The Sign In page appears. 3. Type the address and password you used to create your Trend Micro account and click Sign in. The Lost Device Protection Portal appears. Figure 85. Lost Device Protection Portal Sign In Figure 86. Sign In 32

33 4. Click Share to share the device s location with a trusted friend. 5. Click Scream to sound a oneminute alarm on your missing mobile device, even if it has been set to silent mode. 6. Click Refresh to refresh the Google Map. 7. Click Lock to stop anyone from using your missing mobile device. When you recover your device, click Unlock to unlock it, then use the Unlock Key provided or your Trend Micro password to complete the unlock. 8. Click Device Detail (below the device icon) to view the unlock code that can be entered into the device interface to unlock the device instead of the master account password. This key can also be ed to you at your account address by taping Yourself an Unlock Key on the device once it s found. 9. Click Wipe to permanently delete all the data stored on your missing mobile device. A warning appears. If you wish to wipe your device, click OK. Warning: Using this feature will perform a factory reset of your device. For testing or review purposes, please ensure you are using a test device or have a complete backup of your information. Once reset, TMMS will be removed from the device and the location feature will no longer function. Figure 87. Lost Device Protection Options Figure 88. Unlock Figure 90. Wipe Warning Figure 32. Device Unlock 33

34 Backup & Restore Between Android and ios Devices Trend Micro Mobile Security is integrated with Trend Micro Mobile Backup and Restore (MBR), available on the Google Play Store. It provides an overview of the files you ve currently backed up, as well as direct linked access to the MBR app. Using MBR, you can back up all the key data on your device and restore that data to it or another device. To Back Up Your Data: 1. Tap Backup & Restore in the TMMS Console. The Free Download screen appears. 2. Tap Free Download to download Mobile Backup and Restore (MBR). The app appears in Google Play. 3. Tap Install to install MBR. The App Permissions screen appears. 4. Read the list of permissions. If you accept them, tap Accept. The app downloads and installs and a shortcut is placed on your device. Figure 33. Backup and Restore Figure 92. Free Download Figure 93. Mobile Backup & Restore Figure 94. Accept 34

35 5. Tap Open to open MBR. The MBR Create an Account appears. 6. Since you ve already created an account for TMMS, tap Sign In to sign into your account. 7. The License Agreement appears. Read the License Agreement. If you agree, tap Accept. The Sign In screen appears. 8. Enter the address and password you used to create your account and tap Sign In. Figure 95. Open Figure 96. Create an Account Sign In Figure 97. License Agreement Figure 98. Sign In 35

36 9. The MBR Demo screen appears. 10. Tap Start. The MBR Console appears. 11. Tap Back Up Now. MBR scans your device for items to back up. 12. When the scan is done, choose the items you wish to back up, then tap Start Backup. 13. If your device is not plugged in, MBR advises you Before You Continue to plug it in during the backup to not drain your battery. Figure 99. Demo Figure 100. Backup Now Figure 101. Choose Items to Back Up Figure 102. Before You Continue 36

37 14. Tap Continue. MBR backs up your device. When the backup is complete, a popup notifies you Backup Complete. 15. Tap Ok, and you re returned to the main Backup screen Figure 103. Backing up Figure 104. Backup Complete Figure 105. Backup Screen 37

38 To Restore Your Data Between Android and ios Devices: 1. At any time, you can restore a backup from this or another Android or ios device. To begin, tap Restore in the MBR Console. The Restore screen appears. 2. Scroll to the right or left to Choose a Backup to Restore. For example, choose an iphone backup, if you include an iphone in your Trend Micro account. 3. Tap Restore to restore the backup to your Android device. The Provide Password screen appears. 4. Provide your Trend Micro Account password, then tap Continue. The Choose Items to Restore screen appears. 5. Select the items you wish to restore (if it s an iphone backup, it will be Contacts), then tap Restore Selected. A Restore Contacts? popup appears, asking if you re sure you want to restore the contacts, with details on what to expect. 6. Tap Continue. If your device is not plugged Figure 106. Restore Figure 108. Choose Items to Restore Figure 107. Provide Password Figure 109. Restore Contacts? 38

39 in, a dialog appears, recommending you plug it in to save your battery. 7. Tap Continue. Mobile Backup & Restore restores your Contacts. 8. When the Restore is complete, a dialog appears, saying Restore Complete. Figure 110. Before You Continue Figure 111. Restoring 9. Tap OK to close the dialog. Your Contacts have been restored. Figure 112. Restore Complete 39

40 To Manage Your Backups: 1. At any time, you can delete backups to recover space in your online storage. In the MRB Console, tap More. A list of your backups appears, along with your Online Storage Status and an option to Get More Storage (up to 5GBs for subscribers). 2. Tap the backup you wish to delete. A screen appears, listing details about the backup (e.g., Count and Size). 3. Tap Delete Selected Backup. A Delete Selected Backup? dialog appears, asking if you re sure you want to delete the backup. 4. Tap Delete. After a few moments, the backup is deleted from your list of backups. Figure 113. Online Storage Status Figure 114. Delete Selected Backup Figure 115. Delete Selected Backup? Figure 116. Backup Deleted 40

41 Scan Facebook Trend Micro Mobile Security is also integrated with Trend Micro Privacy Scanner for Android (TMPSA), available on the Google Play Store. It provides an overview of your current Facebook privacy settings, as well as direct linked access to the TMPSA app. Using TMPSA, you can scan and edit your Facebook privacy settings. To access Privacy Scanner: 1. Tap Scan Facebook in the main TMMS Console. The Free Download screen appears for Trend Micro Privacy Scanner for Android (TMPSA). 2. Tap Free Download to begin the process of downloading and installing TMPSA. 3. Follow the same procedures you used to install MBR (see previous section). 4. Once TMPSA is installed, a screen appears for you to sign into Facebook. Tap Sign into Facebook to begin checking your privacy settings. Our Privacy Promise appears, describing our privacy policies. 5. Tap OK to proceed with the sign in. Figure 117. Scan Facebook Figure 118. Free Download Figure 119. Sign Into Facebook Figure 120. Our Privacy Promise 41

42 6. Enter the address and password you use to sign into Facebook and tap Log In. TMPSA checks you privacy settings. 7. When it s done checking, it presents you with the analysis. Tap each item in the list to reset it to the recommended setting. A popup appears, letting you make the change. 8. Check the proper Privacy Setting and tap OK to enter it. TMPSA makes the change. Figure 121. Enter Facebook Address and Password Figure 122. Checking Your Privacy Settings Figure 123. Privacy Concerns Figure 124. Change Privacy Setting 42

43 9. In the future, whenever you wish to check your Facebook privacy settings from within TMMS, simply tap Scan Facebook in the main TMMS Console. The TMPSA scanner appears. 10. Tap Check Settings to repeat the above process. 11. Tap Rescan to rescan your Facebook privacy settings. 12. Tap the Trend Micro Mobile Security listing in Privacy Scanner to return you to the TMMS Console. Figure 125. Scan Facebook Figure 126. Check Settings Figure 127. Return to TMMS Console 43

44 Password Uninstall Protection Enabling password protection stops unauthorized changes to Parental Controls and Trend Micro Mobile Security s Anti-Theft feature. The master account password is also used when unlocking the device following a Remote Find, Remote Wipe, or Simcard change. Finally, Uninstall Protection is ensured by activating the Device Administrator; deactivating this protection also requires the master password. Using Password Protection: 1. Enabling Parental Controls requires a password. In the main screen, tap Safe Surfing and the screen appears. 2. Tap the Parental Controls slider on the right to turn it on. The Password screen appears. 3. Enter your password and Parental Controls is enabled. 4. Similarly, to change the settings on Lost Device Protection, tap it in the main screen. The Lost Device Protection screen appears. 5. To enable or disable a feature, tap Find My Android or SIM Card Lock to check/uncheck the checkbox(es). The Password Required screen again appears. 6. Enter your password to allow the change to Find My Android or SIM Card Lock. Figure 128. Parental Controls > Password Required Figure 129. Parental Controls Slider Figure 130. Password Required Figure 131. Enable or Disable Find My Android or SIM Card Lock 44

45 Using Device Administration for Uninstall Protection: 1. When you activate Parental Controls, you re also given the option to activate Uninstall Protection using Device Administration. 2. In the Safe Surfing & Parental Control screen, tap the Uninstall Protection slider on the right to enable it. A screen appears, asking if you wish to Activate Device Administrator. 3. Click Activate. Uninstall Protection is activated. 4. A Device Administrator Activated popup appears, providing directions if you ever need to uninstall Mobile Security. 5. Wait approximately ten minutes after enabling Uninstall Protection to test disabling the function and its password protection, as TMMS maintains a grace period to ensure easy editing for users. 6. To disable Uninstall Protection, tap the Uninstall Protection slider on the left to deactivate it. Figure 132. Uninstall Protection Figure 134. Device Administrator Activated Figure 133. Activate Device Administrator? Figure 135. Deactivate Uninstall Protection 45

46 7. A popup appears, requiring you to enter your password. 8. Enter your password to deactivate Uninstall Protection. 9. Uninstall Protection is deactivated. Figure 136. Password Required Figure 137. Uninstall Protection Deactivated Note: Device Administration activation for TMMS is automatically deactivated when your TMMS subscription expires. 46

47 Transferring Licenses Between Devices Trend Micro Mobile Security lets you transfer licenses among Android and ios devices. To Transfer a License: 1. Tap Mobile Security on our device to launch the Console. 2. Tap the Settings icon on your device and when the menu appears, select Settings. The Mobile Security Settings screen appears. 3. Tap Buy / Activate in the Settings Screen The Buy Activate screen appears. 4. At the top of the screen, tap Want to transfer a license? The Sign-In screen appears. 5. Enter the address and password for your Trend Micro account and tap Sign In. A list of available licenses appears in the Transfer License screen. 6. Tap the license you wish to transfer. Figure 138. Buy / Activate Figure 139. Want to transfer a license? Figure 140. Sign In Figure 141. Transfer License 47

48 7. A Transfer Existing License(s) dialog appears, asking if you wish to transfer the license to this device. 8. Tap OK. The license is transferred and your subscription is updated. Figure 142. Transfer Existing License(s) Figure 143.Your Subscription Has Been Updated Settings Trend Micro Mobile Security provides system settings for application management. 1. Tap Mobile Security on your device to open the Console. 2. Tap the Settings menu on your device to open the popup. 3. Here, you have access to various options. Settings. Access various system-level settings. Renew / Activate. Renew or activate a subscription. Share. Send friends or associates a recommendation to use Trend Micro Mobile Security. Trend Micro Apps. Get access to other Trend Micro apps for your mobile device. Rate. Provide a rating and review on Google Play. Help. Get Online Help with Mobile Security. Figure 144. Settings Popup Menu (Device) 48

49 4. Tap Settings to access system-level options. The Settings screen appears, with the list of options available. Scroll down to view the options. Trend Micro Account. Account you re registered to. Expiration Date. Date your subscription expires. Activation Code. 20 character key code. Renew / Activate. Purchase or activate a subscription. Sign Out. Disconnect your Trend Micro account Visit MyAccount Portal. Manage your account and subscriptions. Set up alternate addresses. Send from an unlock key from the lock screen to your Trend Micro account and the address you set up here. Display App Icon on Status Bar. Make it visible in the pull-down menu. Uninstall. Uninstall Mobile Security. About. Product details and version number. Help. Access Online Help. Start collecting log. Collect logs to troubleshoot and send to Trend Micro. Diagnostic logs history. Check the token and report to Trend Micro Help us improve our product. Share device information anonymously with Trend Micro. Figure 145. Settings (1) Figure 146. Settings (2) 49

50 Mobile Security On Your Android Tablet Trend Micro Mobile Security works much the same way on your Android tablet as it does on your Android smartphone, minus Call and Text Blocking, which is a specific set of functions for smartphones. When you re holding your tablet vertically, the dual-panel display works the same way as on your smartphone: Preview Panel (Left). In the left-hand panel you can quickly check the security status of your device. You can scan your device, check total files scanned in the last X days, scan for privacy risks, view your current backups, and view your Lost Device Protection status. Function Panel (Right). Additionally, with a leftward swipe of the finger on the console, users have easy access to the following protections in the right-hand panel (Free Service = FS; Premium Service = PS): Virus Scanner. New apps are checked from the Cloud for virus and spyware threats. (FS) Privacy Scanner. Warns you of apps that potentially steal your private information. New apps are automatically checked for privacy risks upon download. (PS) Safe Surfing. Web filtering provides protection from malicious URLs (fake websites that try to steal your information) while you surf the Internet. Parental controls block kids from viewing inappropriate content. (PS) Figure 147. Preview Panel (Left) Lost Device Protection. From a personal online portal, you can locate a lost device, trigger an alarm, remotely lock it, or even wipe the device clean to protect your personal information. (PS) Backup & Restore. Backup data on your device to the cloud. Restore it upon demand. Links to the Mobile Backup and Restore app (when installed). Contacts can be backed up and restored across Android and ios. (50MB FS; 6GBs PS) Scan Facebook. Scan your Facebook privacy settings. Adjust them to increase your privacy and to protect from data theft. Links to the Facebook Privacy Scanner app (when installed). (FS) Figure 148. Function Panel (Right) 50

51 When you re holding your Android tablet horizontally, both panels are available at once: Figure 149. Mobile Security Console (Horizontal Tablet View) 51

52 Appendix: TMMS QR Code to Google Play Store The TMMS QR Code below can be scanned to take you to the following page in the Android Market: 52

53 About Trend Micro Trend Micro Incorporated, a global leader in Internet content security, focuses on securing the exchange of digital information for businesses and consumers. A pioneer and industry vanguard, Trend Micro is advancing integrated threat management technology to protect operational continuity, personal information, and property from malware, spam, data leaks and the newest web threats. Visit TrendWatch at to learn more about the threats and Trend Micro Smart Protection Network. Trend Micro s flexible solutions, available in multiple form factors, are supported 24/7 by threat intelligence experts around the globe. A transnational company, with headquarters in Tokyo, Trend Micro s trusted security solutions are sold through its business partners worldwide. Please visit Copyright 2014 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the prior written consent of Trend Micro Incorporated. Trend Micro, the t-ball logo, and Titanium are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. Legal Notice: Trend Micro licenses this service in accordance with terms and conditions set forth in the License Agreement. If you wish to review the License Agreement prior to purchase, visit: If you (or the company you represent) do not agree to these terms and conditions, you may contact your service representative for a full refund. 53

54 54

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Trend Micro Antivirus for Mac 2016

Trend Micro Antivirus for Mac 2016 H Trend Micro Antivirus for Mac 2016 Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

DirectPass Password Manager for PC

DirectPass Password Manager for PC H Trend Micro DirectPass Password Manager for PC Product Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro Incorporated

More information

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3 H TREND MICRO SafeSync 5.1 for Consumer Product Guide SSFC - GLOBAL v2.3 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Consumer

More information

Password Manager Product Guide for PC and Android

Password Manager Product Guide for PC and Android H Password Manager Product Guide for PC and Android Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Password Manager for PC and Android

Password Manager for PC and Android H Trend Micro Password Manager for PC and Android Product Guide Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. SD Logo is a trademark of its proprietor.

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST Your HTC Desire 601 User guide 21 Phone setup and transfer Home screen Your Home screen is where you make HTC Desire 601 your own. After

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Thank you for choosing Huwei E589 4G Mobile WiFi

Thank you for choosing Huwei E589 4G Mobile WiFi Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Quick Start Guide. PC, Mac, Android & ios

Quick Start Guide. PC, Mac, Android & ios Quick Start Guide PC, Mac, Android & ios Installation for PC Please refer to the Trend Micro website for detailed system requirements. If you encounter difficulties while installing or activating this

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. This document will help you understand your Mobile Wi-Fi so you can start using it right

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail. Send SMS as fast as e-mail! KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

AVG AntiVirus for Mac

AVG AntiVirus for Mac AVG AntiVirus for Mac User Manual Document revision 2015.02 (30.6.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2 Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Connecting your device for the first time... 3 1.2 Connections... 4 1.3 Using the remote control

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Quick Guide: ixpand Transfer

Quick Guide: ixpand Transfer Quick Guide: ixpand Transfer ixpand Transfer is Android application for SanDisk ixpand Flash Drive. This application enables you to back up your contacts, photos and videos in your Android smartphone or

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

Thank you for choosing HUAWEI Mobile WiFi

Thank you for choosing HUAWEI Mobile WiFi Thank you for choosing HUAWEI Mobile WiFi Supported functions and actual appearance depend on the specific models you purchased. The illustrations are provided for your reference only. For details about

More information

Premium Design Phone with Smartphone Connect

Premium Design Phone with Smartphone Connect Smartphone Connect App Guide Premium Design Phone with Smartphone Connect Model No. KX-PRW130 Thank you for purchasing a Panasonic product. This document explains how to use the Smartphone Connect app.

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

F-Secure Mobile Security for Nokia E51, E71 and E75. 1 Installing and Activating F-Secure Client 5.1

F-Secure Mobile Security for Nokia E51, E71 and E75. 1 Installing and Activating F-Secure Client 5.1 F-Secure Mobile Security for Nokia E51, E71 and E75 1 Installing and Activating F-Secure Client 5.1 N.B.: The previous version of F-Secure Mobile Security does not have to be uninstalled. The new version

More information

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome

Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Remove ANY TOOLBAR from Internet Explorer, Firefox and Chrome Browser toolbars have been around for years, however, in the last couple of months they became a huge mess. Unfortunately, lots of free software

More information

Protection Service for Business

Protection Service for Business Protection Service for Business FAQ Version 4.0 Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for

More information

FAQ for Transformer TF201

FAQ for Transformer TF201 FAQ for Transformer TF201 Managing files... 2 How do I access my data stored in microsd, SD card and USB device?... 2 How do I move the selected file to another folder?... 2 How do I copy and paste the

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

AT&T Voicemail Viewer User Guide

AT&T Voicemail Viewer User Guide AT&T Voicemail Viewer User Guide Table of Contents iphone... 4 Requirements... 4 Installation... 4 Message Notification and Message Count... 6 Application... 8 Login... 8 Functionality Summary...10 Settings...

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

AVG Protection. User Manual. Document revision 2015.37 (26.8.2015)

AVG Protection. User Manual. Document revision 2015.37 (26.8.2015) AVG Protection User Manual Document revision 2015.37 (26.8.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

7 Mini Tablet User Guide

7 Mini Tablet User Guide 7 Mini Tablet User Guide MODEL NUMBER: Powered by SYTABBL7 Wireless Mobile Internet Tablet Getting to Know Your New Tablet: Front View: Back View: Side Angle View: MENU MENU Power Key ON/OFF, Back Button

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

User Manual. Product Model: MiTraveler 7D-4A. OS: Android 4.0

User Manual. Product Model: MiTraveler 7D-4A. OS: Android 4.0 User Manual Product Model: MiTraveler 7D-4A OS: Android 4.0 Tablet of Contents Specifications.1 What s inside the box 2 Tablet Parts 2 Getting started...2 Connection to Internet..6 Task Bar..8 Install

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

DocuSign Connect for Salesforce Guide

DocuSign Connect for Salesforce Guide Information Guide 1 DocuSign Connect for Salesforce Guide 1 Copyright 2003-2013 DocuSign, Inc. All rights reserved. For information about DocuSign trademarks, copyrights and patents refer to the DocuSign

More information

COPY9 USER GUIDE for iphone

COPY9 USER GUIDE for iphone COPY9 USER GUIDE for iphone Installation for iphone Devices Welcome to the installation page for your iphone. Copy9 is ONLY compatible with ANY jailbroken iphone 3G, 3GS, 4, iphone 4S, ipad at least 3.1.3

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

FAQ for Eee Pad TF201

FAQ for Eee Pad TF201 FAQ for Eee Pad TF201 E6915 Managing files... 2 How do I access my data stored in microsd, SD card and USB device?... 2 How do I move the selected file to another folder?... 2 How do I copy and paste the

More information

Home Internet Filter User Guide

Home Internet Filter User Guide Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter

More information

support@escanav.com http://forums.escanav.com escan Mobile Security for Android

support@escanav.com http://forums.escanav.com escan Mobile Security for Android support@escanav.com http://forums.escanav.com escan Mobile Security for Android Introduction 3 Features added 3 System Requirements 3 Installation 4 Features of escan Mobile Security for Android 4 Antivirus

More information

Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4

Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4 Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4 August 2015 COPYRIGHT NOTICE This is an unpublished work protected by the United States copyright laws and is proprietary to Teletrac, Inc.

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

Dell OpenManage Mobile Version 1.4 User s Guide (Android) Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information