TREND MICRO Mobile Security for ios Product Guide

Size: px
Start display at page:

Download "TREND MICRO Mobile Security for ios Product Guide"

Transcription

1 H TREND MICRO Mobile Security for ios Product Guide V1.1 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A Phone: +1 (817) Toll-free: (888)

2 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2015 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro Mobile Security for ios Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Mobile Security for ios. At Trend Micro, we are always seeking to improve our documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at For Mobile Security for ios support, go to: DOCUMENT PROFILE: Product Name: Trend Micro Mobile Security for ios Document Title: Trend Micro Mobile Security for ios Product Guide Document Filename: PG - Mobile Security 3.0 ios - Product Guide GL v1.1 Document Release Date: September 9, 2015 Team: Consumer Technical Product Marketing 2

3 Table of Contents Trend Micro Mobile Security Overview... 4 Chapter 1: Introducing Trend Micro Mobile Security for ios... 5 Key Features... 5 System Requirements Incompatible Software Internet 3G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Consumer Support Line and Chat Support Premium Services Chapter 2: Getting Started with Trend Micro Mobile Security for ios Download and Install Trend Micro Mobile Security Activating a Subscription Chapter 3: Exploring Trend Micro Mobile Security for ios Overview of the Mobile Security Console Today View for Data Usage and SafeSurfing Safe Surfing Checking for Dangerous Websites in Safari Security Social Network Privacy Data Usage Backup & Restore Between ios and Android Devices Lost Device Protection Transferring Licenses Between Devices Settings Mobile Security for ios On Your ipad About Trend Micro

4 Trend Micro Mobile Security Overview Trend Micro Mobile Security for ios protects your iphone or ipad from malware, privacy threats, loss, data theft, and viruses. Utilizing the cloud-based security of Trend Micro s Smart Protection Network and Mobile App Reputation technologies, it stops threats before they reach you. Installing easily from the App Store onto your iphone or ipad, Trend Micro Mobile Security for ios (v3.0) provides the following essential features: SafeSurfing. Uses the Trend Micro Smart Protection Network to block malicious websites. New SafeSurfing engine boosts performance and provides HTML 5 support for an advanced browsing experience. New URL scan widget in Today View scans URLs to check if they re safe. New SafeSurfing ios extension for supporting browsers scans URLs to check if they re safe. Security. Scans every app you download or have installed to filter out malware and spyware that can steal your information and cost you money. Includes unlimited updates and cloud-based scanning for continuous protection. Social Network Privacy. Scan your Facebook and New - Twitter privacy settings. Helps you to adjust settings to increase your privacy and to protect from data theft. Figure 1. Trend Micro Mobile Security for ios Data Usage. Helps users manage their monthly data plan usage with Cellular, Roaming, and Wi-Fi monitors. New Data Usage ios widget in Today View reports how much data has been used or is left against your monthly cellular data limit. Cross-Platform Backup & Restore. Backup and Restore your Contacts between your ios and Android devices. Lost Device Protection. Remotely locate a lost or stolen device on a Google map using GPS, Cell Towers, or Wi- Fi. Trigger an alarm on your device, even if it is in silent mode. Jailbreak Protection. Warns you if the jailbroken device is vulnerable. Uninstall Protection. Prevents unauthorized removal of Mobile Security by requiring a password. Figure 2. Trend Micro Mobile Security for ios (Scrolling Down) 4

5 Chapter 1: Introducing Trend Micro Mobile Security for ios This chapter introduces you to Trend Micro Mobile Security for ios. The topics discussed in this chapter include: Key Features System Requirements Incompatible Software Internet 3-G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Key Features All features of Trend Micro Mobile Security for each platform are available during the 30-day Free Trial. When the trial has expired, you can still use the Free version, but many key features will only stay active for Paid subscribers. Free After 30-day Free Trial available to all customers. Paid After 30-day Free Trial available only to subscribers. Table 1. Trend Micro Security for ios (3.0) 1 of 2 ios Security Features Free Paid Security Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Security Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. Jailbreak Detection Warns if the device is vulnerable. New! Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. New ios Widget lets you check suspicious URLs in the Today View. 5

6 Table 2. Trend Micro Security for ios (3.0) 2 of 2 ios Security Features Free Paid New! Safe Surfing Browser New Safe Surfing Browser on ios speeds browsing up to 8 times faster than before. New! URL Check for Safe Surfing and Safari New copy/paste tool for the Safe Surfing browser and Safari lets you check suspicious URLs. Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode. Contacts Backup and Restore Contacts Backup and Restore; Cross-platform transfer of Contacts between ios and Android devices. Social Networking Protection: Scan Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes. New! Social Networking Protection: Scan Twitter New Trend Micro Privacy Scanner on ios verifies your Twitter privacy settings, recommends enhancements, and facilitates the changes. New! Data Usage Monitor Helps manage data plan usage and costs. New ios Widget lets you see your Data Usage in the Today View. Online Technical Support Offers support provided via online forums, knowledgebase, and . 6

7 Table 3. Trend Micro Mobile Security (7.0) for Android (1 of 3) Android Security Features Free Paid Enhanced! Virus Scanner: Enhanced Scanning Engine Enhanced scanning engine provides superior virus protection for your device. Virus Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Enhanced! Virus Scanner: Pre-Installation Scan Pre-installation scan blocks viruses and malware before they re downloaded and installed. Enhanced engine provides support for Android 5.0. Virus Scanner: Updates Unlimited updates to virus protection files. Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. New! Billing Security: Fake Banking Apps New capability in Mobile App Reputation helps you stop the installation of fake banking apps and install the real ones instead. Malware Cleaner Removes malware from your device Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information. New! App Manager Save valuable storage space by showing you Apps by usage and size, letting you uninstall rarely used and unused Apps and Setup Files Battery Optimizer Maximizes your battery s life. Just-a-Phone Turns off power-draining features and apps. Auto Just-a-Phone Turns off power-draining features and apps automatically. Smart Power Saver Intelligently manages and disables the network connection when it is not in use to maximize the battery life. 7

8 Table 4. Trend Micro Mobile Security (7.0) for Android (2 of 3) Android Security Features Free Paid Memory Status and Optimizer Helps free up memory and CPU to maximize performance. History Cleaner Cleans out old files to protect your privacy. Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions. Call and Text Blocking Filters calls and texts with whitelist and blacklist. Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode. Lost Device Protection: Remote Lock / Wipe Enables you to remotely lock your device (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) / Allows you to perform a factory reset of the device from the web portal to erase all your personal data. Lost Device Protection: SIM Card Protection Automatically locks your device if the SIM card is removed (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code). Automatically locates your device when the following actions take place: SIM removal, SIM replacement, Phone Restart. Lost Device Protection: Last Known Location Automatically locates your device when the following actions take place: SIM removal, SIM replacement, Phone Restart. Lost Device Protection: Low Power Location Records the location of your device just before it runs out of power. Cross-Platform Backup and Restore Backup your photos, contacts*, calendar, videos, voice memos, music (up to 50 MB for Free, 5GB for Premium). (*Cross-platform Backup and Restore of Contacts between ios and Android.) 8

9 Table 5. Trend Micro Mobile Security (7.0) for Android (3 of 3) Android Security Features Free Paid Social Networking Protection: Scan Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes. Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password). No Advertising Purchasing the Premium subscription removes third party ads from displaying in the US-regional app. Online Technical Support Offers support provided via online forums, knowledgebase, and . Table 6. Trend Micro Security (7.0) for Kindle (1 of 2) Kindle Security Features Free Paid Virus Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Virus Scanner: Updates Unlimited updates to virus protection files. Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information. Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions. 9

10 Table 7. Trend Micro Security (7.0) for Kindle (2 of 2) Kindle Security Features Free Paid Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password). Online Technical Support Offers support provided via online forums, knowledgebase, and . System Requirements Table 8. Mobile Security 7.0 (Android) and 3.0 (ios) System Requirements Requirements Operating Systems Description ios 8.0 or above Android OS 2.3/3.0/3.1/3.2/4.0/4.1/4.2/4.3/4.4/5.0/5.1* Device Space 85MB+ ios 40MB Android** Memory 85+MB ios (varies by device and usage of SafeSurfing) 25-90MB Android (varies by device) Supported ios Devices iphone 4S / 5 / 5C / 5S / 6 / 6 Plus ipad 2 / 3 (New ipad) / 4 ipad Air 1 / 2 ipad mini 1 / 2 / 3 ipod Touch 5 Other 3G/4G (LTE) Wi-Fi Internet Connection *SMS blocking functions are not supported on Android OS 4.4 and above **Also compatible with Kindle Fire (2 nd Gen), Fire HD 7 (2 nd Gen), HD 8.9 (2 nd Gen), HD 7 (3 rd Gen), HDX 7 (3 rd Gen), HDX 8.9 (3 rd & 4 th Gen), HD 6 & 7 (4 th Gen); not compatible with Kindle Paperwhite and Amazon Fire Phone. Incompatible Software To identify software that you should remove from the device before installing Trend Micro Mobile Security, please refer to the following Web site: Internet 3G-4G Connection Trend Micro Mobile Security uses a Wi-Fi Internet or 3G-4G connection for activating the program online, checking the expiration date, downloading updates, sending Trend Micro 10

11 URL/web queries and logs to the portal, logging into the management portal, and browsing knowledge-based pages on the Trend Micro Web site. 3G-4G data connections fees are usually charged on a monthly basis, using a fixed allocation with an upper limit. If you exceed this limit, you will be charged additional fees for the amount of time connected or for the amount of data downloaded. Testers are therefore encouraged to use a Wi-Fi router-based connection to the Internet whenever possible. Recommended Environment This Product Guide assumes that you are using Trend Micro Mobile Security in conjunction with a PC or Mac, so you can log in to the Trend Micro Mobile Security Portal easily at and review your Lost Device Protection settings and execute certain actions. ios users who also have an Android smartphone or tablet can test the cross-platform Backup and Restore functions for Contacts. Target Market Trend Micro Mobile Security is targeted to mobile users who wish to secure their iphones and ipads from malicious applications, web threats to them and their family, unwanted calls and messages, and device loss. (Versions for Android and Kindle are also available.) Availability July 29, 2015 App Store, itunes Contacting Trend Micro Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A. Phone: +1 (817) Toll-free: (888) Consumer Support Line (800) Monday - Friday, 5:00AM - 8:00PM Pacific and Chat Support Paid users of Mobile Security may obtain free , chat, and community forum support. For more information, contact esupport at: Premium Services Trend Micro offers Premium Services for a wide variety of technical issues including installation, virus and spyware removal, PC Tune-ups, and more. For more information, visit 11

12 Chapter 2: Getting Started with Trend Micro Mobile Security for ios This chapter gets you started with Trend Micro Mobile Security for ios. Topics discussed in this chapter include: Downloading and Installing Trend Micro Mobile Security Registering to Your Trend Micro Account Buying / Activating a License Note: Trend Micro Mobile Security is included with Trend Micro Maximum Security and Premium Security. To download the software, users of these editions can simply launch the Trend Micro Security Console. A Protect Another Device link to the Mobile Security download is available in the Console. Download and Install Trend Micro Mobile Security To download and install Trend Micro Mobile Security: 1. Tap the App Store icon on your ios device to load it. The App Store screen appears. 2. Tap the Search icon at the bottom to load the search field. The Search field appears and your ios keyboard pops up. 3. Type Trend Micro in the search field and when the Trend Micro page appears, scroll down to Trend Micro Mobile Security in the list and tap the listing. The Trend Micro install page appears, with Trend Micro Mobile Security at the top. Figure 3. App Store Figure 4. Search App Store 12

13 4. Tap Free; when it changes to Install, tap it again. Trend Micro Mobile Security downloads and installs. 5. When installation is complete, tap Open. Two preliminary instructional screens appear, explaining the benefits of Trend Micro Mobile Security, which includes the SafeSurfing browser. 6. Tap Next and Done to proceed through the screens. The License Agreement appears. Figure 5. Trend Micro Mobile Security Figure 6. Open Figure 7. Next Figure 8. Done 13

14 7. Tap Trend Micro License Agreement to read it. If you accept the terms of the agreement, tap Accept. 8. A demo screen appears, indicating where to tap to return to SafeSurfing and how to see Action details. 9. Tap the demo screen. The main Mobile Security Console appears. 10. Tap the globe in the upper right to open the SafeSurfing browser. A second demo screen appears, showing you the green icon that displays when a website is safe to access. 11. Tap the demo screen to continue. Figure 9. License Agreement Figure 10. Demo for SafeSurfing Action Details Figure 11. Mobile Security Console Figure 12. SafeSurfing Demo 14

15 12. The SafeSurfing browser appears, showing icons for Trend Micro and the Help Center, as well as familiar search engines. Note that you can copy a URL that looks suspicious and paste it into the address bar to check if it is safe for not. 13. Tap the Mobile Security icon in upper left-hand corner of the SafeSurfing browser to return to the main Console. 14. You may now use your Free Trial of Trend Micro Mobile Security. After 30 days, to maintain full use of Mobile Security s features, you ll need to buy a subscription. Figure 13. SafeSurfing Browser Figure 14. Main Console Activating a Subscription To activate Mobile Security, please follow the instructions that apply to your specific product and purchase process: To activate Mobile Security for ios as part of your Trend Micro Security bundle: If you ve already installed Trend Micro Maximum or Premium Security and registered it to your Trend Micro Account, a subscription for Mobile Security for ios is included as part of your bundle. Simply download and install Mobile Security for ios from the App Store. Open the app and scroll down to the bottom of the page. Tap Settings and then tap Set up account. Sign into your Trend Micro Account to activate the app. To upgrade to the Premium version: If you ve downloaded and installed a Trial version of Trend Micro Mobile Security from the App Store, purchase a subscription within the app. Open the app and scroll down to the bottom of the page. Tap Buy / Activate. You ll need to Create or Sign In to your Trend Micro Account. Once you do, you ll return to the main page and see that your Premium license has been activated. To activate using an Activation Code: If you ve purchased a subscription from the Trend Micro website, look in the confirmation for your Activation Code. If you ve purchased Trend Micro Mobile Security from a retail store, look for the Activation Code inside the box. 15

16 To Activate Mobile Security Using Your Activation Key: STEP 1: 1. To begin the activation, go to the Activation Website on your ios device: The Product Activation page appears. 2. Provide your Activation Code and tap Next. STEP 2: 3. Sign into or create a Trend Micro Account. Figure 15. Step 1 Figure 16. Step 2: Sign In 16

17 Step 2: Option 1 (Create a new Account) 4. If you need to create an account, tap Need an Account? 5. Provide your address, password, and name. 6. Choose your Location, optionally check Receive the latest news and offers from Trend Micro, and tap Next. 7. Confirm your registration and tap OK. Figure 17. Step 2: Option 1 Figure 18. Create Trend Micro Account. Figure 19. Confirm Registration 17

18 Step 2: Option 2 (Sign into Your Account) 8. If you already have a Trend Micro Account, provide the address and password for the account and tap Next. Step 3: 9. After you ve created or signed into your Trend Micro Account, you ll see the Mobile Security is Activated Successfully message. This completes your activation. 10. If you have not yet installed the Trend Micro Mobile Security app, scroll down the page to find the installation instructions. 11. Under If you have NOT yet installed the app or signed in with your Trend Micro Account, tap the Download Mobile Security App link. This will bring you directly to the Trend Micro Mobile Security page in the App Store. 12. Install Mobile Security, then create/sign into your account, as explained in the previous section. Figure 20: Step 2: Option 2 Figure 21. Step 3 18

19 Chapter 3: Exploring Trend Micro Mobile Security for ios This chapter provides an overview of Trend Micro Mobile Security for ios. Topics discussed in this chapter include: Overview of the Mobile Security Console Today View with Data Usage and SafeSurfing SafeSurfing Checking for Dangerous Websites in Safari Security Social Network Privacy Data Usage Backup and Restore Between ios and Android Devices Lost Device Protection Transferring Licenses Between Devices Settings Mobile Security on your ipad 19

20 Overview of the Mobile Security Console Once installed, an icon for Trend Micro Mobile Security for ios appears on your ios mobile device. To launch the Mobile Security Console: 1. Tap the Trend Micro Mobile Security icon on your ios device to load the Console. 2. Tap the internet Globe in the upper right to launch the SafeSurfing browser to safely surf the Web. 3. Tap Action Required, then items in the drop-down list, to respond to status alerts. 4. Tap SafeSurfing to obtain a Report on sites scanned and malicious websites blocked. Figure 22. Console SafeSurfing 5. Tap Security to scan apps and files for malware and spyware. 6. Tap Social Network Privacy to scan your Facebook and Twitter privacy settings. 7. Scroll down the Console. 8. Tap Data Usage to set up and track your cellular data usage per billing cycle. 9. Tap Backup & Restore to backup and restore your Contacts for your ios device, or between ios and Android devices. Figure 23. Security Lost Device Protection Scan Facebook Figure 24. Backup & Restore Data usage Settings 20

21 10. Tap Lost Device Protection to turn on the ability locate your lost device or trigger an alarm. 11. Tap Settings to configure your Mobile Security settings. 12. Free Edition: Tap Buy / Activate to buy and activate the Premium Edition of Mobile Security, or to fully register a 30-Day Free Trial in your Trend Micro account. 13. Registered Trial / Premium Edition: Tap More Tools to learn more about Trend Micro Password Manager, then download and install it from the App Store to manage your account passwords. Figure 25: Buy / Activate Figure 26. More Tools 21

22 Today View for Data Usage and SafeSurfing To Access the Today View for Data Usage and Safe Surfing: 1. The Today View in ios provides reminders and notification widgets at-aglance on your device. 2. To access the Today View, swipe down from the upper border of your ios device. The Today View scrolls down like a lampshade. 3. Scroll up and down to review Today View. 4. Tap Edit to edit what s displayed in Today View. Apps that can display a widget in Today View are displayed. 5. Tap the Data Usage and SafeSurfing plus signs to enable them in Today View. The widgets move to the active widgets list; then tap Done to enable them. 6. Swipe down from the top edge of your ios device to show Today View, then scroll down to display the Trend Micro Mobile Security Data Usage and SafeSurfing widgets. 7. Copy a potentially dangerous URL into the clipboard, then swipe down Today View to test it. The SafeSurfing widget pastes and scans the URL from the clipboard and warns you if it s dangerous. Figure 27. Today View Figure 29. Data usage and SafeSurfing Widgets Active Figure 28. Edit Today View Figure 30. Data usage and SafeSurfing in Today View 22

23 Safe Surfing To ensure Safe Surfing: 1. Back in the main Console, tap the Globe icon in the upper right to open the SafeSurfing browser. The browser appears. 2. In the location bar, enter the URL of a website you wish to browse and tap Go. Examples of dangerous sites (as of 06/16/15): Figure 31. SafeSurfing Figure 32. SafeSurfing Browser 3. If the site is malicious or potentially so, SafeSurfing blocks it to protect you. If you still want to visit this website despite the risk, tap proceed anyway. (Not recommended.) 4. Back in the main page of the Console, tap the SafeSurfing panel for a report of malicious websites blocked. Figure 33. Website Blocked Figure 34. Tap SafeSurfing Panel 23

24 5. The Safe Surfing Report screen appears, indicating which sites it has recently blocked. 6. Back in the main Console screen, scroll to the bottom and tap Settings to modify your SafeSurfing level. The Settings screen appears. 7. In Settings, scroll down to SafeSurfing, then tap the slider to turn Website Filtering on or off. 8. Tap Protection Strength, then check the protection level you prefer: High. Blocks websites showing any signs of transmitting malicious software, including suspicious websites that may not actually cause problems. Normal. Protects against malicious software, online fraud, and other threats, without aggressively blocking minor security risks. Low. Only blocks sites confirmed as fraudulent or malicious. Figure 35. SafeSurfing Report Figure 37. Protection Strength Figure 36. Settings > SafeSurfing 24

25 Checking for Dangerous Websites in Safari To check if a website is safe in Safari: 1. A Trend Micro Mobile Security extension for Safari lets you check if a website is potentially dangerous. You first have to activate the extension. 2. Tap the Safari icon on your ios device to open it. Safari loads your homepage, or the last website visited. 3. Tap the Action Button (up-arrow) in Safari s bottom menu. Safari loads a Tools Popup window for performing various functions. Figure 38. Safari Figure 39. Safari Action Button (Up-Arrow) 4. In the bottom row, scroll to the right to expose the More icon, then tap it. The Activities window appears. 5. Tap the toggle for Scan Website to On. Tip: If the Scan Website widget is at the bottom of the list, tap and hold the Drag bars on the right and drag the widget to the top of the list. 6. Tap Done. Figure 40. More Figure 41. Activities 25

26 7. You will now see the Scan Website icon in the Tools Popup window (you may have to scroll to the left to see it); then tap Cancel to close the Tools Popup. 8. To test the extension, enter or paste a suspicious website URL into Safari s search field and tap Go. The website loads. 9. Tap the Up-Arrow in the Safari s bottom menu to load the Tools Popup, then tap Scan Website to scan it. 10. Trend Micro Mobile Security scans the webpage in Safari and returns the result in this case, telling you it s a Dangerous Webpage and advising you to close it. 11. Use the X in the upper right to close the warning page, then enter a new URL in Safari s search field, or tap one of your bookmarks to navigate away from the dangerous page. Figure 42. Scan Website Figure 44. Scan Website Figure 43. Suspicious Website Figure 45. Dangerous Webpage 26

27 Security To conduct a Security scan: 1. Tap Security in the Console. The Security screen appears, with a list of past apps scanned (if any). 2. Tap Scan Now to conduct a malware scan on demand. A popup appears, asking permission to access your actively running apps. 3. Tap OK. The scan begins and a Scanning Apps screen shows you the progress of the scan. Figure 46. Security Figure 47. Scan Now Figure 48. Access to Apps Figure 49. Scanning Apps 27

28 4. When the scan is complete, the Security screen reappears, with an updated list of apps scanned. If malicious apps have been found, the user is advised to delete them. 5. Tap Rescan if you wish to scan again. Figure 50. Rescan Social Network Privacy Trend Micro Mobile Security also provides a Social Network Privacy utility, to scan and edit your Facebook and Twitter privacy settings. To Scan Facebook: 1. Tap Social Network Privacy in the main Console. The Scan Facebook screen appears for you to sign into your Facebook account. 2. Tap Sign into Facebook. A screen appears for you to sign in. Figure 51. Scan Facebook Figure 52. Sign Into Facebook 28

29 3. Enter the address and password you used to activate your Facebook account and tap Log In. 4. Mobile Security scans Facebook for privacy concerns. When it s done checking, it presents you with the analysis. 5. Tap Fix All, to fix everything at once. A window appears, showing that items that will be fixed. Figure 53. Facebook Login Figure 54. Checking Your Privacy Settings Figure Privacy Concerns Figure 56. Fix All 29

30 6. You can also tap each item in the list to reset it to the recommended setting. A popup appears, letting you change the Privacy Setting. 7. Tap the recommended Privacy Setting (e.g., Friends), then tap OK to enter it. 8. Mobile Security makes the change, telling you Looks good. You do not have any privacy concerns. Figure 57. Privacy Setting Figure 58. Looks Good To Scan Twitter: 1. Back in the main Console, tap Social Network Privacy, then the Twitter icon in the menu to open the window to Sign into Twitter. 2. Tap Sign into Twitter and a window appears for you to enter your phone, , or username and password. 3. Tap Log in to begin scanning your Twitter privacy settings. Figure 59. Sign Into Twitter Figure 60. Log In 30

31 4. Mobile Security checks the settings and returns the result. 5. As with Facebook, tap Fix It (All), or tap the individual settings to change it. 6. A window appears to show you the privacy settings that will be fixed. Tap Fix to fix it. 7. A popup appears to Confirm Twitter Password to save changes to your account. 8. Renter your Twitter password, then tap Fix. 9. Mobile Security fixes the privacy setting and tells you Looks good. You do not have any privacy concerns. Figure 62. Checking Privacy Figure 63. Fix All Figure 62. Fix It Figure 64. Confirm Twitter Password 31

32 Data Usage Trend Micro Mobile Security provides a Data Usage monitor to help you track your data usage against the Cellular and Roaming data plans you ve chosen with your provider, as well as your Wi-Fi data usage. For greater accuracy, open Mobile Security before and after restarting your mobile device and keep it running in the background. To use Data Usage: 1. In the main screen of the Console, tap Data Usage. The Data Usage instruction screen appears, advising you to set up a plan to track your cellular data usage. Note: A similar instruction screen appears also for Roaming and Wi-Fi data usages. Figure 65. Data Usage Figure 66. Set Up Cellular Data Usage Plan 2. Tap the instruction screen to display the Data Usage Cellular screen, then the circular Settings icon on the right to open Cellular Data Settings. 3. The Data Plan defaults to Undefined. Tap Data Plan to change this setting by first toggling the Unlimited toggle off. You re provided with a field to enter a Data Limitation. Figure 67. Data usage Cellular Figure 68. Cellular Data 32

33 4. Tap the Data Limitation field, then enter the data amount, and tap Done. 5. Choose the Unit of measure (GB or MB). 6. Return to the main Cellular Data settings screen and tap Billing Cycle to set the cycle. The Billing Cycle screen appears. Figure 69. Data Limitation Figure 70. Edit Data Limitation Figure 71. Unit of Measure Figure 72. Billing Cycle 33

34 7. Tap Billing Cycle to enter the billing cycle pick list, then scroll to the proper cycle. When done, tap Billing Cycle again to close the pick list. 8. Tap Start On to set the start date of the billing cycle; when the pick list appears, scroll to the day the billing cycle begins; then tap Start On again to close the setting 9. Back in the main Cellular Data settings screen, toggle Alert on. A popup appears for you to Turn On Alerts, saying To track more accurate data usage and see alerts at the right time, open Mobile Security every few days and let it continue running in the background. 10. Tap OK to close the dialog. The Alert toggle is turned on, and the First and Second Alerts appear, set by default to 80% and 100% of your data plan. Figure 73. Monthly, etc Figure 75. Turn On Alerts Figure st Day Figure 76. Alert Defaults 34

35 11. To adjust the Exceeding Plan Alerts, tap each respectively to change the percentage at which the alert will activate, then tap Done. 12. If necessary, scroll down to Optional Settings to manually set the amount of data already used in this billing period by tapping Adjust Current Usage. An edit screen appears. 13. Enter the amount you ve already used in this billing period and tap Done; then adjust the Unit if need be. 14. Return to the main Data Usage screen. The Data Usage for Cellular data displays a graph of your settings, providing Predicted Data Usage and Days Left in Billing Cycle. Figure 77. Exceeding Plan Alert Figure 78. Optional Settings Figure 79. Adjust Current Usage Figure 80. Cellular Data Usage Console 35

36 15. To adjust the Roaming Data settings, tap the Roaming tab in the main Data Usage screen. 16. Either manually adjust each setting to fit a separate Roaming data plan (e.g., 650 MBs), or toggle Match Cellular Data Settings on to match that group of settings. 17. Finally, adjust the Wi-Fi Data settings in the same way as the previous two, either manually or by matching the cellular data settings and billing cycle. Figure 81. Roaming Data Settings Figure 82. Roaming Data usage Console Figure 83. Match Cellular Data Settings Figure 84. Wi-Fi Data Usage 36

37 18. View a graphical report of usage for the Month and Year for Cellular Data, Roaming Data, or Wi-Fi Data, by tapping the respective tab. 19. Then tap the Graph icon in the upper left of the Data Usage screen. A graph of Usage History appears. For example, the Wi-Fi Usage History for the current Month or Year. Figure 85. Wi-Fi Usage History Month Figure 86. Wi-Fi usage History Year (to date) 37

38 Backup & Restore Between ios and Android Devices Trend Micro Mobile Security for ios provides Backup & Restore for your Contacts. You can back up all the Contacts on your device and restore them to it or another ios or Android device. To Back Up Your Contacts: 1. Tap Backup & Restore in the Console. A popup appears, asking Mobile Security Would Like to Access Your Contacts. 2. Tap OK to allow the access. The Back Up screen appears. 3. Tap Back Up to back up your Contacts. If your device is not plugged in, Backup & Restore advises you to plug it in during the backup to not drain your battery. 4. While it s backing up, Mobile Security provides a screen to show you the progress of the backup. Figure 87. Backup & Restore Figure 88. Access Contacts Figure 89. Back Up Figure 90. Backup in Progress 38

39 5. When the backup process is complete, a popup appears, indicating the results of the backup. If any contacts were not backed up, you can try another backup later. 6. To ensure the safety of your Contacts, Regular Backup is turned on after a backup. Tap OK to accept. Or you may turn this on by tapping Settings or Set Up Now at the bottom of the screen. Figure 91. Contacts Backup Complete Figure 92. Regular Backup is On To Restore Your Contacts: 1. Tap Backup & Restore in the Console. The Backup & Restore screen appears, with a banner indicating the number of backups you have, plus items to Restore Contacts and Manage Backups. 2. Tap Restore Contacts. A screen appears with the list of backup sets you can restore. Figure 93. Backup & Restore Figure 94. Restore Contacts Manage Backups 39

40 3. If you have Trend Micro Mobile Security on your Android device and have completed backups for it (e.g., DROID RAZR) and your ios device is registered to the same account your Android backups will also be listed here, along with your ios backups. 4. Tap the backup you wish to restore. A popup appears, asking if you re sure you wish to restore the contacts backup and giving details about the restoration. 5. If you do, tap Restore. Mobile Security restores the contacts in that backup to the device. 6. When finished, a popup dialog appears saying Contacts Restore Complete. 7. Tap OK to close the dialog. Figure 95. Restore Contacts List Figure 96. Restore Contacts? Figure 97. Restoring Contacts Figure 98. Contacts Restore Complete 40

41 Managing Backups: 1. As you accumulate backups, you can delete old ones to free up space in your account. 2. In the Backup & Restore screen, tap Manage Backups. The Manage Backups screen appears. 3. Tap the backup you wish to review or delete. The Backup Details screen appears. 4. Review the backup, which indicates the number of contacts and size. If you wish, tap Delete to delete the backup. A popup appears, asking if you re sure you want to delete the backup. 5. Tap Delete in the popup to confirm deletion of the backup. Figure 99. Restore Manage Backups Figure 100. Manage Backups Figure 101. Backup Details Figure 102. Delete Backup? 41

42 6. A progress dialog appears, showing the progress of the deletion. 7. When complete, Mobile Security returns you to the Manage Backups screen, with the backup deleted. Figure 103. Delete Progress Figure 104. Backup Deleted 42

43 Lost Device Protection To enable Lost Device Protection: 1. Back in the main Console, tap Lost Device Protection. The Lost Device Protection screen appears, with instructions to turn on Location Services. 2. Tap Turn It On Now to turn on the services. A popup appears, asking if you wish to allow Mobile Security to access your location even when you are not using the app. 3. If you wish, tap Allow to allow this function. A Device Located screen displays, with a link to the Lost Device Protection Portal. 4. Copy and this link to your PC or Mac, so you can access the portal later if your device is lost or stolen. Figure 105. Main Console Device Protection Figure 106. Lost Device Protection Figure 107. Allow Even When Not Using App Figure 108. Device Located 43

44 Lost Device Protection Portal To access the Lost Device Protection Portal: 1. Launch your browser on your PC and type com/lostdevice into the search field, and hit Enter. The Lost Device Protection Portal webpage appears. 2. Tap Find Now or Sign in to sign into your Trend Micro account. The Sign In page appears. Figure 109 Lost Device Protection Portal Sign In 3. Type the address and password you used to create your Trend Micro account and click Sign in. Figure 110. Sign In 4. A tutorial appears, describing how to use Lost Device Protection. 5. Click anywhere in the tutorial to continue. Figure 111. Lost Device Protection Tutorial 44

45 6. The Lost Device Protection Portal appears, with the location of your device shown on the Google map. Zoom the map for a closer view. 7. Click Share to share the device s location with a trusted nearby friend. 8. Click Scream to sound a one-minute alarm on your misplaced device, even if it has been set to silent mode. 9. Click Refresh to refresh the Google map. 10. Click Device Detail (below the device icon on the upper left of the portal) to view device details about your subscription. Figure 112. Lost Device Protection Options Figure 113. Device Detail 45

46 Transferring Licenses Between Devices Trend Micro Mobile Security allows you to transfer licenses between devices, whether they re ios or Android. The option is available for active or expired Trial accounts or for expired Paid accounts when you re signed in. To Transfer a License Between Devices: 1. In the main screen of the Console, tap Settings. The Settings screen appears. 2. Tap Transfer a license to this device. The Transfer License screen appears, with a panel for you to initiate the license transfer. 3. Tap the license that you want to transfer to this device. A popup appears, explaining that your purchased protection will be immediately disabled on the previous device and enabled on this one, asking Do you want to continue? 4. Tap OK to transfer the license. 5. A popup indicates that the subscription has been updated and transferred to the new device. Figure 114. Settings Figure 115. Transfer a License Figure 116. License Disabled from Transferring Device Figure 117. Subscription Updated 46

47 Settings To Access System Settings: 1. Tap Settings at the bottom of the main Console to open Settings. 2. Scroll down to review the options in the Settings screen. ACCOUNT & SUBSCRIPTION Trend Micro Account. Shows the account to which you re registered. Expiration Date. Expiration date for your subscription Activation Code. Shows the 20-digit activation code in use. Renew / Activate. Renew now or use an Activation Code. Transfer a license to this device. View and manage licenses under your account. Sign Out. Disconnect your Trend Micro account (needs password). Check your Trend Micro account. Manage your account and subscriptions. SAFESURFING Website Filtering. Turn filtering on and off. Protection Strength. Set strength to Low, Normal, or High. VIRUS SCANNER Scan Regularly. Turn the regular scan on or off. A scan is done periodically on a regular basis when certain conditions are met (e.g., free CPU, frequency of app usage). SOCIAL NETWORK PRIVACY Facebook. Sign in or out of your Facebook Account. Twitter. Sign in or out of your Twitter Account. BACKUP & RESTORE Regular Backup. Turn on to perform a data backup regularly. Figure 118. Settings (1) Figure 119. Settings (2) 47

48 DATA USAGE Cellular Data. Set settings for cellular data monitoring. Roaming Data. Set settings for roaming data monitoring. Wi-Fi Data. Set settings for Wi-Fi data monitoring. ABOUT AND HELP About. Provides version number. Help. Online Help. Share with Friends. Share with friends on social media. Love This App. Rate and review this app on App Store. Start collecting log. Collect a log to assist with troubleshooting. Help Improve This App. Anonymously share device information with Trend Micro. Figure 120. Settings (3) 48

49 Mobile Security for ios On Your ipad Trend Micro Mobile Security for ios is the same program on your ipad as your iphone, with the same key functionality. Naturally, the larger form factor allows for the full display of all panels without scrolling. Figure 121. Trend Micro Mobile Security for ios on the ipad (Vertical View) 49

50 When you hold your ipad horizontally, Trend Micro Mobile Security reconfigures the panels. Figure 122. Mobile Security for ios on the ipad (Horizontal View) 50

51 About Trend Micro Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25+ years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today s organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits. Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For additional information, visit 51

52 52

TREND MICRO Mobile Security 5.0 for Android Product Guide

TREND MICRO Mobile Security 5.0 for Android Product Guide H TREND MICRO Mobile Security 5.0 for Android Product Guide V1.1 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro

More information

Trend Micro Antivirus for Mac 2016

Trend Micro Antivirus for Mac 2016 H Trend Micro Antivirus for Mac 2016 Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Password Manager for PC and Android

Password Manager for PC and Android H Trend Micro Password Manager for PC and Android Product Guide Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Password Manager Product Guide for PC and Android

Password Manager Product Guide for PC and Android H Password Manager Product Guide for PC and Android Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

DirectPass Password Manager for PC

DirectPass Password Manager for PC H Trend Micro DirectPass Password Manager for PC Product Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro Incorporated

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3 H TREND MICRO SafeSync 5.1 for Consumer Product Guide SSFC - GLOBAL v2.3 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Consumer

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. SD Logo is a trademark of its proprietor.

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

7 Mini Tablet User Guide

7 Mini Tablet User Guide 7 Mini Tablet User Guide MODEL NUMBER: Powered by SYTABBL7 Wireless Mobile Internet Tablet Getting to Know Your New Tablet: Front View: Back View: Side Angle View: MENU MENU Power Key ON/OFF, Back Button

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

DroboAccess User Manual

DroboAccess User Manual DroboAccess User Manual Release 8.2 The DroboAccess developers June 02, 2016 CONTENTS 1 DroboAccess 8.2 User Manual Introduction 1 2 Configuration of DroboAccess 8.2 3 2.1 Users, passwords and share management................................

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Setting up Channel-21 Secure RSS CEP on

Setting up Channel-21 Secure RSS CEP on Setting up Channel-21 Secure RSS CEP on Important Information About C21 CEP Podcasts itunes iphone / ipad Android Phone/Tablet Demo Videos Important Information about Channel-21 CEP Channel-21 Digital

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents...

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC English Contents Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections...

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

OfficeSuite HD Meeting User Manual

OfficeSuite HD Meeting User Manual OfficeSuite HD Meeting User Manual Welcome to Broadview Networks OfficeSuite HD Meeting. Our service unifies cloud video conferencing, simple online meeting and mobile collaboration into one easy-to-use

More information

Online Banking User Guide

Online Banking User Guide Online Banking User Guide If you need assistance, please call 315.477.2200 or 800.462.5000 M-F 7:30am - 6:00pm Sat 9:00am - 1:00pm empowerfcu.com 315.477.2200 800.462.5000 Table of Contents Online Banking

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

AT&T U-verse App for iphone FAQ s

AT&T U-verse App for iphone FAQ s About AT&T U-verse What is AT&T U-verse for iphone? The AT&T U-verse for iphone is a service that provides all U-verse subscribers with the ability to view their U-verse TV Guide, manage their home DVR,

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Deltek Touch Time & Expense for Vision 1.3. Release Notes

Deltek Touch Time & Expense for Vision 1.3. Release Notes Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical

More information

Password Depot for ios

Password Depot for ios Password Depot for ios Table Of Contents First steps... 1 Creating a password file... 1 Creating new entries... 3 Adding entries / groups... 3 Copying or relocating entries / groups... 3 Deleting entries

More information

ios How to Back Up from icloud

ios How to Back Up from icloud ios How to Back Up from icloud How to back up from icloud icloud automatically backs up the most important data on your device using ios 5 or later. After you have enabled Backup on your iphone, ipad,

More information

VIVA 4G LTE Mini Router. Quick Start Guide

VIVA 4G LTE Mini Router. Quick Start Guide VIVA 4G LTE Mini Router Quick Start Guide Thank you for choosing the VIVA 4G LTE Mini Router (hereinafter referred to as the E57) The supported functions and actual appearance are subject to the product

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

LIBRARY MEMBER USER GUIDE

LIBRARY MEMBER USER GUIDE LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download Zinio Reader 4... 10 a) For your PC... 10 b) For your

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Point of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2

Point of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2 Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections... 3 1.2 Start up and shut down... 3 2.0 Introduction to Google Android

More information

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6. Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST Your HTC Desire 601 User guide 21 Phone setup and transfer Home screen Your Home screen is where you make HTC Desire 601 your own. After

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Frequently Asked Questions for logging in to Online Banking

Frequently Asked Questions for logging in to Online Banking Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the

More information

User Guide for Windows 10

User Guide for Windows 10 User Guide for Windows 10 System requirements E10684 First Edition July 2015 To facilitate a smoother transition from your previous operating system, read the system requirements below before upgrading

More information

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. This document will help you understand your Mobile Wi-Fi so you can start using it right

More information

M100 System File Manager Help

M100 System File Manager Help Copyright (c) Vuzix Corporation 2013-2014. All Rights Reserved. M100 System File Manager Help Section I) Installation of the M100 Section II) General Information Section III) Troubleshooting Section IV)

More information

Available on VitalSource

Available on VitalSource User Guide Available on VitalSource Welcome to Pageburst on VitalSource all of your Elsevier ebooks at your fingertips! This user guide contains the information you will need to redeem your access code

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

P90X App for iphone and Android FAQ

P90X App for iphone and Android FAQ P90X App for iphone and Android FAQ GETTING STARTED 1.) Does the P90X App for iphone and Android replace the P90X, P90X2, and P90X3 DVD systems, or does it complement them? The P90X App works in conjunction

More information

BlackBerry Link for Windows. Version: 1.2.3. User Guide

BlackBerry Link for Windows. Version: 1.2.3. User Guide BlackBerry Link for Windows Version: 1.2.3 User Guide Published: 2014-01-20 SWD-20140120093847797 Contents Related resources...5 Getting started...6 About BlackBerry Link... 6 Getting to know BlackBerry

More information

Mobile Print/Scan Guide for Brother iprint&scan

Mobile Print/Scan Guide for Brother iprint&scan Mobile Print/Scan Guide for Brother iprint&scan Version K ENG Definitions of notes We use the following note style throughout this user s guide: specifies the operating environment, conditions for installation,

More information

OneDrive for Business User Guide

OneDrive for Business User Guide OneDrive for Business User Guide Contents About OneDrive for Business and Office 365... 2 Storing University Information in the Cloud... 2 Signing in... 2 The Office 365 Interface... 3 The OneDrive for

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

LEVEL 3 SM XPRESSMEET SOLUTIONS

LEVEL 3 SM XPRESSMEET SOLUTIONS LEVEL 3 SM XPRESSMEET SOLUTIONS USER GUIDE VERSION 2015 TABLE OF CONTENTS Level 3 XpressMeet Calendar...3 Level 3 SM XpressMeet Outlook Add-In...3 Overview...3 Features...3 Download and Installation Instructions...

More information

8x8 Virtual Office Mobile User Guide for ios

8x8 Virtual Office Mobile User Guide for ios 8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 4.0, October 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4

More information

Egnyte for Power and Standard Users. User Guide

Egnyte for Power and Standard Users. User Guide Egnyte for Power and Standard Users User Guide Egnyte Inc. 1350 West Middlefield Road. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) Revised June 2015 Table of Contents Chapter 1: Getting

More information

FreeAgent DockStar Network Adapter User Guide

FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide FreeAgent DockStar Network Adapter User Guide 2010 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are

More information

Mobility with Eye-Fi Scanning Guide

Mobility with Eye-Fi Scanning Guide Mobility with Eye-Fi Scanning Guide Scan and Transfer Images Wirelessly with Eye-Fi This document is to be used in addition to the scanner s user guide located on the installation disc. The instructions

More information

MOTOROLA MotoCast. Next. Back LIFE. POWERED.

MOTOROLA MotoCast. Next. Back LIFE. POWERED. Tip: Select a link above or use Bookmarks in your Acrobat Reader to jump to a topic. here s what you can do MOTOROLA MotoCast Take your music, photos, videos, and documents with you wherever you go. MotoCast

More information

Avira Secure Backup INSTALLATION GUIDE. HowTo

Avira Secure Backup INSTALLATION GUIDE. HowTo Avira Secure Backup INSTALLATION GUIDE HowTo Table of contents 1. Introduction... 3 2. System Requirements... 3 2.1 Windows...3 2.2 Mac...4 2.3 ios (iphone, ipad and ipod touch)...4 3. Avira Secure Backup

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

How to Borrow Adobe EPUB Ebooks From Your iphone and ipod Touch

How to Borrow Adobe EPUB Ebooks From Your iphone and ipod Touch How to Borrow Adobe EPUB Ebooks From Your iphone and ipod Touch What you will need before starting: 1. WIFI or 3G connection 2. Westlake Porter Public Library Card number (located on the back of your card,

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

TIPS FOR USING OS X 10.8 MOUNTAIN LION

TIPS FOR USING OS X 10.8 MOUNTAIN LION Mac OS X Tutorial 10.8 Mountain Lion 1 TIPS FOR USING OS X 10.8 MOUNTAIN LION LAUNCHPAD Launchpad is an application launcher first introduced in OS X 10.7 Lion and improved upon in Mountain Lion. Launchpad

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

COPY9 USER GUIDE for iphone

COPY9 USER GUIDE for iphone COPY9 USER GUIDE for iphone Installation for iphone Devices Welcome to the installation page for your iphone. Copy9 is ONLY compatible with ANY jailbroken iphone 3G, 3GS, 4, iphone 4S, ipad at least 3.1.3

More information

Introduction to AirWatch and Configurator

Introduction to AirWatch and Configurator Introduction to AirWatch and Configurator Overview AirWatch integrates seamlessly with Apple Configurator to enable IT administrators to effectively deploy and manage Apple ios devices. Deploying a large

More information