TREND MICRO Mobile Security 7.0 for Android Product Guide

Size: px
Start display at page:

Download "TREND MICRO Mobile Security 7.0 for Android Product Guide"

Transcription

1 H TREND MICRO Mobile Security 7.0 for Android Product Guide V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A Phone: +1 (817) Toll-free: (888)

2 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2015 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro Mobile Security 7.0 for Android Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Mobile Security for Android. At Trend Micro, we are always seeking to improve our documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at For support regarding Trend Micro Mobile Security for Android, go to: DOCUMENT PROFILE: Product Name: Trend Micro Mobile Security 7.0 for Android Document Title: Trend Micro Mobile Security 7.0 for Android - Product Guide Document Filename: PG - Mobile Security 7.0 Android - Product Guide GL v1.0 Document Release Date: July 29, 2015 Team: Consumer Technical Product Marketing 2

3 Table of Contents Trend Micro Mobile Security Quick Overview... 4 Chapter 1: Introducing Trend Micro Mobile Security... 5 Key Features... 6 System Requirements Incompatible Software Internet 3G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Consumer Support Line and Chat Support Premium Services Chapter 2: Getting Started with Trend Micro Mobile Security Download and Install Trend Micro Mobile Security Chapter 3: Exploring Trend Micro Mobile Security Overview of the Mobile Security Console Virus Scanner Privacy Scanner App Manager System Tuner Safe Surfing & Parental Controls Call & Text Blocking Lost Device Protection Backup & Restore Between Android and ios Devices Scan Facebook Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security On Your Android Tablet Appendix: Unsupported Devices Pre-Installation Scan About Trend Micro

4 Trend Micro Mobile Security Quick Overview Trend Micro Mobile Security for Android protects your Android device from privacy threats, loss, data theft, and viruses. Utilizing Trend Micro s cloud-based security via the Smart Protection Network and the Mobile App Reputation Service (MARS), Trend Micro Mobile Security stops threats before they reach you. Installing easily from the Google Play Store onto your Android smartphone or tablet, Trend Micro Mobile Security 7.0 provides the following essential features: Mobile Security Console. Provides easy access to all functions (Free = F; Paid = P): Enhanced Virus Scanner! Stop installation of fake banking apps and install the real ones. Pre-Installation Scan blocks bad apps and malware on Google Play before they re installed. Includes support for Android 5.0 and an enhanced scanning engine. (F) Privacy Scanner. New apps are automatically checked for privacy risks upon download. (P) New App Manager! Save valuable storage space by viewing Apps by usage, uninstalling rarely used and unused Apps and Setup Files. (P) System Tuner. Optimize your device s Battery and Memory use. Clean your Web Browser History, Google Play Search History, and Clipboard Data. (F) Safe Surfing. Web filtering provides protection from malicious URLs (fake websites that try to steal your information) while you surf the Internet. Parental controls block kids from viewing inappropriate content. (P) Call & Text Blocking. Annoying calls from unknown numbers can be blocked and disconnected. Annoying text messages can be blocked by keywords that you select. (P) Lost Device Protection. Using the online portal, locate a lost device, trigger an alarm, remotely lock it, or even wipe the device clean to protect your personal information. (P) Backup & Restore. Backup data on your device to the cloud via Mobile Backup & Restore. Contacts can be backed up and restored across Android and ios. (50MB F; 6GBs P) Scan Facebook. Scan your Facebook privacy settings. Adjust them to increase your privacy and to protect from data theft. Links to the Facebook Privacy Scanner app. (F) Figure 1. Console Scrolled Up Figure 2. Console Scrolled Down 4

5 Chapter 1: Introducing Trend Micro Mobile Security This chapter introduces you to Trend Micro Mobile Security 7.0 for Android. The topics discussed in this chapter include: Key Features System Requirements Incompatible Software Internet 3-G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro 5

6 Key Features All features of Trend Micro Mobile Security for each platform are available during the 30-day Free Trial. When the trial has expired, you can still use the Free version, but many key features will only stay active for paid subscribers. Free After 30-day Free Trial available to all customers. Paid After 30-day Free Trial available only to subscribers. Table 1. Trend Micro Mobile Security (7.0) for Android (1 of 3) Android Security Features Free Paid Enhanced! Virus Scanner: Enhanced Scanning Engine Enhanced scanning engine provides superior virus protection for your device. Virus Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Enhanced! Virus Scanner: Pre-Installation Scan Pre-installation scan blocks viruses and malware before they re downloaded and installed. Enhanced engine provides support for Android 5.0. Virus Scanner: Updates Unlimited updates to virus protection files. Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. New! Billing Security: Fake Banking Apps New capability in Mobile App Reputation helps you stop the installation of fake banking apps and install the real ones instead. Malware Cleaner Removes malware from your device Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information. New! App Manager Saves valuable storage space by showing you Apps by usage and size, letting you uninstall rarely used and unused Apps and Setup Files Battery Optimizer Maximizes your battery s life. Just-a-Phone Turns off power-draining features and apps. Auto Just-a-Phone Turns off power-draining features and apps automatically. 6

7 Table 2. Trend Micro Mobile Security (7.0) for Android (2 of 3 Continued) Android Security Features Free Paid Smart Power Saver Intelligently manages and disables the network connection when it is not in use to maximize the battery life. Memory Status and Optimizer Helps free up memory and CPU to maximize performance. History Cleaner Cleans out old files to protect your privacy. Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions. Call and Text Blocking Filters calls and texts with whitelist and blacklist. Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode. Lost Device Protection: Remote Lock / Wipe Remotely lock your device (accessing the phone again will require that you insert your Trend Micro password or a unique unlock code). Perform a factory reset of the device from the web portal to erase all your personal data. Lost Device Protection: SIM Card Protection Automatically locks your device if the SIM card is removed (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code). Automatically locates your device when the following actions take place: SIM removal, SIM replacement, Phone Restart. Lost Device Protection: Last Known Location Automatically locates your device when the following actions take place: SIM removal, SIM replacement, Phone Restart. Lost Device Protection: Low Power Location Records the location of your device just before it runs out of power. Cross-Platform Backup and Restore Backup your photos, contacts*, calendar, videos, voice memos, music (up to 50 MB for Free, 5GB for Premium). (*Cross-platform Backup and Restore of Contacts between ios and Android.) Social Networking Protection: Scan Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes. Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password). 7

8 Table 3. Trend Micro Mobile Security (7.0) for Android (3 of 3 Continued) Android Security Features Free Paid No Advertising Purchasing the Premium subscription removes third party ads from displaying in the US-regional app. Online Technical Support Offers support provided via online forums, knowledgebase, and . Table 4. Trend Micro Security (7.0) for Kindle Kindle Security Features Free Paid Virus Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Virus Scanner: Updates Unlimited updates to virus protection files. Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information. Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions. Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password). Online Technical Support Offers support provided via online forums, knowledgebase, and . 8

9 Table 5. Trend Micro Security for ios (3.0) ios Security Features Free Paid Security Scanner: Apps Scans apps you download and install to filter out viruses and malware that can steal your information and cost you money. Security Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. Jailbreak Detection Warns if the device is vulnerable. New! Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. New ios Widget lets you check suspicious URLs in the Today View. New! Safe Surfing Browser New Safe Surfing Browser on ios speeds browsing up to 8 times faster than before. New! URL Check for Safe Surfing and Safari New copy/paste tool for the Safe Surfing browser and Safari lets you check suspicious URLs. Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode. Contacts Backup and Restore Contacts Backup and Restore; Cross-platform transfer of Contacts between ios and Android devices. Social Networking Protection: Scan Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes. New! Social Networking Protection: Scan Twitter New Trend Micro Privacy Scanner on ios verifies your Twitter privacy settings, recommends enhancements, and facilitates the changes. New! Data Usage Monitor Helps manage data plan usage and costs. New ios Widget lets you see your Data Usage in the Today View. Online Technical Support Offers support provided via online forums, knowledgebase, and . 9

10 System Requirements Table 6. Mobile Security System Requirements Requirements Description Operating Systems Android OS * - ** ios 8.0 and above*** Device Space 40MB Android 85MB+ ios Memory 25MB-90MB Android (varies by device) 85MB+ ios (varies by device and usage of SafeSurfing) Other 3G/4G (LTE) Wi-Fi Internet Connection *SMS blocking functions are not supported on Android OS 4.4 and above **Compatible with Kindle Fire (2nd Gen), Kindle Fire HD 7 (2nd Gen), Kindle Fire HD 8.9 (2nd Gen), Kindle Fire HD 7 (3rd Gen), Kindle Fire HDX 7 (3rd Gen), Kindle Fire HDX 8.9 (3rd Gen), Fire HDX 8.9 (4th Gen), Fire HD 7 (4th Gen), Fire HD 6 (4th Gen) ***Compatible with iphone 4S / 5 / 5C / 5S / 6 / 6 Plus; ipad 2 / 3 (New ipad) / 4; ipad Air 1 / 2; ipad mini 1 / 2 / 3; ipod Touch 5 Incompatible Software To identify software that you should remove from the device before installing Trend Micro Mobile Security, please refer to the following Web site: Internet 3G-4G Connection Trend Micro Mobile Security uses a Wi-Fi Internet or 3G-4G connection for activating the program online, checking the expiration date, downloading updates, sending Trend Micro URL/web queries and logs to the portal, logging into the management portal, and browsing knowledge-based pages on the Trend Micro Web site. 3G-4G data connections fees are usually charged on a monthly basis, using a fixed allocation with an upper limit. If you exceed this limit, you will be charged additional fees for the amount of time connected or for the amount of data downloaded. Testers are therefore encouraged to use a Wi-Fi router-based connection to the Internet whenever possible. Recommended Environment This Product Guide assumes that you are using Trend Micro Mobile Security in conjunction with a PC or Mac, so you can log in to the Trend Micro Mobile Security Portal easily at and review your Lost Device Protection settings and execute certain actions. 10

11 Target Market Trend Micro Mobile Security is targeted to mobile users who wish to secure their Android, Kindle, and ios smart phones and tablets from malicious applications, web threats to them and their family, unwanted calls and messages, and device loss. Availability July 29, 2015 Google Play Store, App Store (Apple), and Amazon App Store Contacting Trend Micro Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A. Phone: +1 (817) Toll-free: (888) Consumer Support Line (800) Monday - Friday, 5:00AM - 8:00PM Pacific and Chat Support Paid users of Mobile Security may obtain free , chat, and community forum support. For more information, contact esupport at: Premium Services Trend Micro offers Premium Services for a wide variety of technical issues including installation, virus and spyware removal, PC Tune-ups, and more. For more information, visit 11

12 Chapter 2: Getting Started with Trend Micro Mobile Security This chapter gets you started with Trend Micro Mobile Security. Topics discussed in this chapter include: Downloading and Installing Trend Micro Mobile Security Buying / Activating a License Registering to your Trend Micro Account Transferring an Existing License to a New Device Note: Trend Micro Mobile Security is included with Trend Micro Maximum Security and Premium Security. To download the bundled software, users of these editions can simply launch the Trend Micro Security Console. A Protect Another Device link to the Mobile Security download is available in the Console. Download and Install Trend Micro Mobile Security To download and install Trend Micro Mobile Security: 1. Open your browser on your Android device and type ecuritydownload. 2. This takes you directly to the Google Play Store page for Trend Micro Mobile Security & Antivirus. 3. Alternately, tap the Google Play Store icon on your Android device to load it. 4. The Google Play Store screen appears. 5. Tap the Spyglass icon at the top to load the search field. The Search Google Play field appears and your Android keyboard pops up. Figure 3. Google Play Store Figure 4. Search Google Play 12

13 6. Type Trend Micro Mobile Security in the search field and when Mobile Security & Antivirus appears in the list, tap the listing. The Trend Micro Mobile Security & Antivirus install page appears. 7. Tap Install. The App Permissions screen appears, indicating the access permissions Trend Micro Mobile Security & Antivirus needs on your device. 8. If you accept, tap Accept. Trend Micro Mobile Security & Antivirus downloads and installs. 9. When installation is complete, you re presented with a screen to Open or Uninstall the app. Tap Open. A License Agreement screen appears. Figure 5. Trend Micro Mobile Security Figure 6. Install Figure 7. Accept Figure 8. Open 13

14 10. Read the License Agreement. If you accept the terms of the agreement, tap Accept. The TMMS Console appears, with a Welcome screen advising you to tap the Menu key on your device to go to Settings to sign into or set up your Trend Micro account. 11. Tap the Menu key on your device, then tap Settings. The Settings screen appears. 12. Note the Account & Subscription section, where you can: Set up account. Tap here to Sign in or Create a Trend Micro account. Trial Expires. You have 30 days to try the TMMS Premium features for free before they expire. Once they do, you can buy a paid subscription. 13. OPTION 1: Buy / Activate. Tap here to buy a 1-Year, 2-Year, or Yearly Subscription. The purchase page is loaded in the Google Play Store, along with your Google account and credit card details. Note: For purchases, you should have previously set up your Google Play Account and credit card details in Google. Figure 9. License Agreement Figure 11. Settings Figure 10. Welcome Figure 12. Account & Subscription 14

15 14. Tap the subscription you wish to purchase. Your Google account presents your payment credentials and the amount. 15. If you accept, tap Accept and Buy. Your subscription is activated. See below for instructions on how to register the activation to a Trend Micro account. 16. OPTION 2: Alternately, if you want to use a license you already own on this new device, in the Buy / Activate screen tap Want to transfer a license? to sign into your Trend Micro account and begin the license transfer. A Sign In screen appears. 17. Enter the address and password for the Trend Micro account that holds the license you wish to transfer and tap Sign In. The Transfer License screen appears. 18. Tap the license that you want to transfer to this device. A popup appears, letting you complete the transfer of your existing license. 19. Tap OK to transfer the license. Your purchased protection is immediately disabled on the old device and activated on this new one. Figure 13. Buy / Activate Figure 15. Sign In Figure 14. Accept & Buy Figure 16. Transfer License Figure 17. Transfer Existing License(s) 15

16 20. OPTION 3: If you have already purchased an Activation Code, in the Buy / Activate screen tap Use Activation Code. A screen appears for you to enter the activation code; then tap OK. Your subscription is activated. 21. REGISTERING TO AN ACCOUNT: Back in the Settings screen (Figure 12), tap Set up account. The Sign In screen appears. 22. REGISTRATION OPTION A: For those without an account, tap Create Account. The Create Account screen appears. 23. Enter your First and Last Names and the Address you wish to use (your Google account is inserted by default); then using the popup menu, select your Country and tap Next. A confirmation screen appears. 24. Confirm this is the address you wish to use to sign in and manage your Trend Micro subscription. Figure 18. Use Activation Code Figure 20. Create Account #1 Figure 19. Sign In Figure 21. Create Account #2 16

17 25. Enter and confirm a password for this account. If you wish, check I want to subscribe for Trend Micro updates, then tap Create Account. Your account is created. 26. REGISTRATION OPTION B: For those who already have a Trend Micro account, back in the Sign In screen (Figure 19), enter your Address and Password and tap Sign In. 27. If you re updating TMMS and you already have a subscription to a previous version of TMMS, a popup appears with Subscription Available, asking if you wish use it on this device or Buy a new one. 28. Tap Buy New to take you to the Buy / Activate screen, or tap Yes to use the subscription on this device. This takes you to the TMMS Console, where you can now begin using TMMS. Figure 22. Subscription Available 17

18 Chapter 3: Exploring Trend Micro Mobile Security This chapter provides an overview of Trend Micro Mobile Security (TMMS). Topics discussed in this chapter include: Overview of the Mobile Security Console Virus Scanner (Includes Pre-Installation Scan) Privacy Scanner App Manager System Tuner Safe Surfing & Parental Controls Call & Text Blocking Lost Device Protection Backup and Restore Between Android and ios Devices Scan Facebook Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security on your Android Tablet 18

19 Overview of the Mobile Security Console Once installed, Trend Micro Mobile Security (TMMS) appears in your Applications list on your Android mobile device and you can put a shortcut on your screen. To use the Mobile Security Console: 1. Tap the Trend Micro Mobile Security icon on your mobile device and the Mobile Security Console appears. 2. Simply tap a button or panel to access the Console functions. Tap, hold and scroll to see functions lower down in the list. 3. For example, tap Scan Device in the Status Banner to do a dual scan for Threats and Privacy Risks. 4. Or tap the Action Required numbered dropdown menu in the Status Banner; then tap the dropdown panels to remove a threat. The Virus Scan Result screen appears. 5. In the Virus Scan Result screen, tap the trashcan beside the virus or malware to delete it. 6. Or tap any panel in the Console, such as Virus Scanner (Figure 23), to execute the function or configure its settings. See the following sections to get more details. Figure 23. Console Figure 25. Remove Threat Now Figure 24. Scanning Device Figure 26. Virus Scan Result 19

20 Virus Scanner To configure the Virus Scanner: 1. Tap Virus Scanner in the TMMS Console. The Virus Scanner settings screen appears, with the Scan tab selected by default. 2. Tap Scan Now to conduct a virus scan on demand. The Virus Scanner does a virus-centered scan and returns the result. 3. Scan options include: Real-Time Scan. This option is checked by default and provides a real-time scan of all downloaded apps. Pre-Installation Scan. Blocks malware from Google Play before they re installed. Scan Memory Card. This option checks the memory card for security threats. Scan Option. Check Scan Memory Card, then tap Scan all files or Scan only apps (default) to set the option. 4. Note that the Virus Scanner now adds specific protection against fake banking apps. If you accidently download and install a fake banking app from Google Play Store, TMMS automatically scans it and presents you with the result, as shown in Figure 29. Figure 27. Virus Scanner Figure 29. Fake App Popup Figure 28. Scan Now Pre- Installation Scan 20

21 5. Tap Uninstall to uninstall the fake banking app. A popup appears, asking Do you want to uninstall this app? 6. Tap OK to uninstall the fake banking app. The app uninstalls and provides you with a screen saying Uninstall finished. 7. Tap OK to complete the uninstallation. A popup appears, saying you have just uninstalled the fake app. Tap here to download the actual app. 8. Tap the link and you re taken to the Google Play Store, where you can download and install the actual app. Figure 30. Do you want to uninstall this app? Figure 31. Uninstall Finished Figure 32. Tap here to download the actual app. Figure 33. The real app in Google Play Store. 21

22 To enable the Pre-Installation Scan: NOTE: Your device must be protected by a Screen Lock PIN, pattern or password before you can turn on the Pre-Installation Scan and install a User Security Certificate. Also see Appendix A for a list of unsupported devices. Finally, the Pre-Installation Scan is only available for Android 4.0 and above. 1. Back in the Virus Scanner main settings screen, tap the Pre-Installation panel. The Pre-Installation Scan screen appears. 2. Tap the right side of the toggle to turn it on. An Allow Connection screen appears, asking if you want to set up a VPN connection, which intercepts all network traffic. 3. Tap OK. A security certificate is created and a popup appears for you to name the certificate. 4. Accept the default name or provide your own and tap OK. The Pre-Installation Scan is enabled. 5. To test the Pre-Installation Scan feature, simply search for EICAR in the Google Play App to obtain the test virus (i.e., EICAR Antivirus Test) and proceed through the normal download and install process. Figure 34. Pre-Installation Scan Toggle Figure 36. CA Certificate Figure 35. VPN Creation Figure 37. EICAR Anti-virus Test 22

23 6. When you do, Mobile Security scans the app and a popup appears, notifying you the app seems malicious. 7. Cancel the download/install to abort the process. NOTE: An error message may appear when you cancel the EICAR download; while Android 4.4 devices will also provide a message Network might be monitored after the scan has been enabled because a security certificate, used for SSL inspection, has already been installed on your device by the OS. Both messages indicate the Pre-Installation Scan is working and the VPN is enabled, while the monitoring message also lets you check the validity of the Trend Micro (User) Security Certificate that s installed when you activate the scan. 8. Note that Mobile Security s protection against fake banking apps also applies to the pre-installation scan. If the scan is turned on and you accidentally download a fake banking app, the process described in the previous section applies before the fake app is even installed. Figure 38. EICAR Anti-virus Test - Malicious Popup 23

24 Updates and History: 1. Tap the Update tab in the Virus Scanner screen. The Update options appear. 2. Tap the Update button to manually update the pattern file. Mobile Security updates. 3. Variously check Auto Update, Auto Update Using Wi-Fi Only. Tap Auto Update Schedule and a popup appears, letting you choose your Update Interval: Daily, Weekly, or Monthly. 4. Below that, check Automatic Scan to scan after a successful update (not shown). 5. Tap the History tab, then Virus Scanner or Updates to obtain a history of threats found or updates conducted. 6. Tap the Trashcan if you wish to delete the history. Figure 39. Virus Scanner Update Figure 40. Virus Scanner > History Figure 41. Virus Scan History 24

25 Privacy Scanner To conduct a Privacy Scan: 1. Tap Privacy Scanner in the TMMS console. The Privacy Scanner settings screen appears. 2. Scan options include Realtime Scan (checked by default), Scan Memory Card (check to enable), and the History of privacy risks found. 3. Tap Scan Now to conduct a Privacy Scan. When the scan is complete, a Privacy Risk Scan Result screen displays, providing you the results of the scan. 4. If the Privacy Risk Scan Result screen shows risks, you can tap any app in the list to address them. The resulting Details screen lets you Uninstall or Trust this app. Tapping Trust this app automatically puts it in the list of Trusted Apps. Figure 42. Privacy Scanner Figure 43. Scan Now Figure 44. Privacy Risk Scan Result Figure 45. Details 25

26 5. Back in the main Privacy Scanner settings screen, tap the Trusted Apps tab to view or add trusted apps that do not need to be scanned by the Privacy Scanner. (This shortens the length of the scan.) 6. Tap Add an App to add apps to the Trusted Apps list. The Add From popup appears, letting you select apps from the Privacy Scan History or from the Installed apps list. 7. For the latter option, when the list appears, check the Installed APPs you wish to add to the Trusted Apps list, then tap the Add (+) button. 8. When the popup appears, tap Add. The apps are added to your Trusted Apps list. Figure 46. Trusted Apps Figure 47. Add From Figure 48. Add Figure 49. Apps Added to Trusted Apps list 26

27 App Manager App Manager lets you remove unwanted files and apps, including setup files, which can take up unnecessary memory and space on your device. To use App Manager: 1. Tap App Manager to manage your apps. A demo screen appears, showing you how to change your sorting options. 2. Tap Ok to close the demo screen. The App Manager Uninstall tab displays. 3. Using the Sort menu in the upper right, sort by Size, Date, Name, or Last used, if you wish. 4. Scroll down to view apps you might want to uninstall; or tap Pre-installed apps to view that list and check the checkbox for an app to uninstall. Figure 50. App Manager Figure 51. App Manager > Uninstall 5. Tap Uninstall. A screen or popup appears, either showing Disable or Uninstall updates for an upgraded system app. 6. In this case, an Uninstall updates popup appears, saying The application will be replaced with the factory version. 7. Tap Uninstall to begin the uninstallation. Figure 52. Uninstall Preinstalled App Figure 53. Uninstall Updates 27

28 8. When the uninstall finishes, a page appears, showing the storage space reclaimed, along with options to Force Stop or Turn On the default installed app. 9. Back in the Pre-installed apps list, the uninstalled app is now listed in Disabled Apps. 10. Tap Setup Files to delete app installation files on your device. The Setup Files list appears. App Manager divides them between apps that are Installed and those Not Installed. 11. Check those you wish to delete, then tap Delete to delete the setup files. The files are deleted. Figure 54. App Uninstalled Figure 55. Disabled Apps Figure 56. Delete Setup Files 28

29 System Tuner Mobile Security s System Tuner lets you optimize the battery and memory settings on your device, as well as to clean up your clipboard data, web browser and Google Play search histories. Battery optimization tools include Just-a-Phone Mode, to manually or automatically turn off many settings to save battery power when it s especially low; and the Smart Power Saver, to automatically change Wi-Fi, 3G/4G, and Bluetooth connections upon idle to also save power. To use System Tuner: 1. Tap System Tuner in the Mobile Security Console. System Tuner scans active apps in memory and returns the result, indicating the minimum of memory you can save by optimizing. 2. Tap Optimize to free up memory. System Tuner optimizes your device and returns the result. 3. System Tuner shows the percentage of memory in use, memory regained, and extra battery time available on your device because of the optimization. Tap Done. 4. Tap the Battery tab in the System Tuner to begin to optimize your settings for increased battery use. System Tuner automatically scans your battery status and returns the result. 5. Tap Optimize to optimize your battery-related settings. Figure 57. System Tuner Figure 58. Optimize Figure 59. Memory Optimized Figure 60. Battery 29

30 6. System Tuner optimizes your battery settings, indicating how much battery time and memory has been gained by optimizing. 7. Tap Done to close the screen. 8. Tap the History Cleaner tab to clean up your history records. System Tuner automatically checks for items it can clean up and returns the result. 9. Tap Clean Up to clean up your web browser or Google Play Search history and clipboard data. System Tuner cleans up your system and returns the result, including Records cleaned now and Total records cleaned. 10. Tap Done to close the screen. Figure 61. Battery Optimized Figure 62. History Cleaner Figure 63. History Cleaned 30

31 To use Just-a-Phone Mode: 1. Tap the Battery tab again to access its settings. 2. Tap the Just-a-Phone Mode toggle to the right to turn it on. The Ready for Just-a- Phone Mode screen appears. 3. Tap Enable to enable Just-a- Phone Mode. The Just-a- Phone Mode is enabled according to the Just-a- Phone Options (including Screen Brightness and Sleep options not shown below). 4. To adjust those options, tap Auto Just-a-Phone. The Auto Just-a-Phone screen appears. 5. Tap Auto Activate and Auto Activate Threshold to enable those functions. 6. Tap Set Schedule to adjust the schedule Start and Stop times. Figure 64. Just-a-Phone Mode Figure 65. Ready for Just-a- Phone Mode Figure 66. Auto Just-a- Phone Figure 67. Set Schedule Time 31

32 7. Tap Set Threshold to set the battery threshold at which Auto Just-a-Phone is activated. 8. Check or uncheck the various Just-a-Phone Options to switch On/Off 3G/4G, Wi-Fi, Bluetooth, or stop running apps. 9. Tap the Screen Brightness panel to set the percentage of brightness Just-a-Phone Mode will set when it s enabled. 10. Tap the Sleep panel to set how soon after idle when Just-a-Phone Mode will put your device to sleep. Figure 68. Battery Power Threshold Figure 69. Screen Brightness To enable Smart Power Saver: 1. Tap the Smart Power Saver toggle on the right to turn it on. 2. Tap the Smart Power Saver panel to access its settings. The Smart Power Saver settings screen appears. Figure 70. Sleep Figure 71. Smart Power Saver 32

33 3. Check/uncheck the settings to enable the changes to W- Fi, 3G/4G, and Bluetooth to save power. 4. If you still want to get or messages, check that option to maintain your 3G/4G connection, even when Smart Power Saver is on. 5. For Smart Standby, set how long after the screen darkens to switch-off 3G/4G and Bluetooth. 6. Also for Smart Standby, set at what intervals 3G/4G will switch on again to make a connection for /text messages. 7. For Smart Wi-Fi, set the interval to switch off Wi-Fi. Figure 72. Enable Smart Power Saver Figure 73. Switch off 3G/4G and Bluetooth Figure 74. Switch On 3G/4G Figure 75. Switch Off Wi-Fi 33

34 8. Again, for Smart Wi-Fi, set the interval when it will switch on again to make a connection. Figure 76. Switch on Wi-Fi Safe Surfing & Parental Controls Note: SafeSurfing & Parental Controls work on the Android default browser and Chrome browser only. To ensure Safe Surfing: 1. Back in the main TMMS Console functions panel, tap Safe Surfing. The Safe Surfing & Parental Controls screen displays, with Safe Surfing on by default. 2. Select your Safe Surfing Protection Level: High. Blocks sites showing any signs of fraud or malicious software. Normal. Provides balanced protection without blocking minor risks. This is chosen by default. Low. Blocks only sites confirmed as fraudulent or dangerous. Figure 77. Safe Surfing Figure 78. Protection Level 34

35 3. To add a URL to the Blocked or Approved Lists, tap the name of the respective list; e.g., Blocked List. The Add screen appears. 4. Tap Add. A popup appears. Type the name the item and the URL and tap Save. The URL is added to the Blocked or Approved List. Figure 79. Add URL to Blocked List Figure 80. Add Specific URL To enable Parental Controls: 1. Tap the Parental Controls tab or scroll right to access its settings. The Parental Controls tab appears, with the function off by default. 2. Tap the Parental Controls slider to the right to turn on the function. A Password Required popup appears, asking you to provide your password to save changes. 3. Enter your Trend Micro account password and tap OK. Figure 81. Parental Controls Figure 82. Password Required 35

36 4. Set your Protection Level: Child. Provides filtering for children 9 or younger. Pre-teen. Provides filtering for children between 10 and 13. Teen. Provides filtering for young adults between 14 and Scroll down to access Uninstall Protection, then tap the slider to the right to turn on the function. The Activate Device Administrator screen displays. Figure 83. Protection Level Figure 84. Uninstall Protection Activating device administrator will allow TMMS to erase all data when you use the web portal. It does not delete any data upon activation. 6. Tap Activate. A popup appears, indicating Device Administrator Activated. You must now use your device s Security Settings to deactivate Device Administrator for TMMS if you wish to uninstall the app. Tap OK. 7. Add URLs to the Blocked or Approved Lists, as you did with Safe Surfing. Figure 85. Activate Device Administrator Figure 86. Device Administrator Activated 36

37 8. Using your Web browser, surf to a site prohibited by TMMS Parental Controls. A message will appear, indicating the site has been blocked by Mobile Security s Parental Controls. 9. Tap the History tab to obtain a history of all Websites blocked by Safe Surfing or Parental Controls, then tap the respective blocked category for details on what was blocked. Figure 87. Blocked by Parental Controls Figure 88. History Figure 89. Parental Controls History 37

38 Call & Text Blocking To block unwanted calls: 1. Back in the main TMMS Console screen, tap Call & Text Blocking. The Call & Text Blocking screen displays, with the Call tab selected by default and both Call and Text Blocking enabled. Tap the sliders to the left to disable the functions. 2. Tap Filtering Method to change the filtering option in the popup: Stop only blocked callers Allow only approved callers Figure 90. Call & Text Blocking Figure 91. Call Allow approved and anonymous callers 3. Tap Action to change the action to be performed in the popup. Reject call Silence device Reject call + send reply 4. Tap Reject call + send reply and you re given three preset options for Automatic Reply. Figure 92. Filtering Method Figure 93. Action 38

39 5. Edit the reply text for the chosen option by selecting it, tapping the Edit button, and typing the alternate text. Tap Save to save your changes. 6. Check Block Annoying Calls from unknown numbers to disconnect them within three seconds. 7. Tap History to review your Call and Text Blocked History. Figure 94. Edit Reply Text Figure 95. Call and Text Blocked History To block unwanted text: Note: Because of certain Android limitations, Text Blocking is not available for Android 4.4 or above. 1. In the Call & Text Blocking screen, tap the Text tab to access the settings. The Text Blocking options display. 2. Tap Filtering Method to change the option. Stop only blocked senders Allow only approved senders Figure 96. Text Blocking Figure 97. Filtering Method 39

40 3. Tap Action to set the action to be performed. Block message Block and delete message Block message and reply 8. Tap Block message + reply and you have three options for Automatic Reply. 9. Edit the reply text for the chosen option by selecting it, tapping the Edit icon, then typing the alternate text. Tap Save to save your changes. 10. Check Block Annoying Texts, then tap Filter Keywords to block texts containing the keyword(s). The Block Annoying Texts entry screen appears, letting you type your keyword entries. Tap Save to save the keywords. 11. Enter contacts into the Blocked or Approved Lists, as previously described. 12. Tap the History tab to access the Call and Text Blocked Histories. Figure 98. Action Figure 100. Edit Method Figure 99. Automatic Reply Figure 101. Enter Passwords 40

41 Lost Device Protection To enable Lost Device Protection: 1. Back in the main Console, tap Lost Device Protection. The Lost Device Protection screen appears, with the Protection tab selected by default and three options displayed: Find My Android. Locates this device in Google Map. This option is enabled by default. SIM Card Lock. Lock this device if the SIM card is changed or removed. Device Name. Click the Edit icon to change the device name. 2. Check SIM Card Lock if you wish to lock your device when the SIM card is changed or removed. 3. A Password Required screen appears. Enter your password and tap OK. SIM Card Lock is enabled. 4. Tap the Remote Lock tab to access the message that appears when your device is locked and someone tries to use it. The message is displayed. 5. Tap the message to edit it. The Edit Message screen appears. Figure 102. Lost Device Protection Figure 103. Protection Figure 104. Password Required Figure 105. Remote Lock 41

42 6. Edit your message using the device popup keyboard and tap Save. 7. Tap the Remote Wipe tab to access the feature. The Remote Wipe screen appears, with Partial Remote Wipe selected by default. This deletes you contacts, call history, text messages, account info, and SD card contents in the event your device is lost or stolen. 8. Tap Full Remote Wipe to enable the function. The Activate Device Administrator screen appears. This allows Mobile Security to perform a complete erase of your device s content. 9. Tap Activate to enable the function. A screen appears indicating Device Administrator Activated, informing you that if you need to uninstall Mobile Security, you must use the uninstall option in the Setting menu on the action bar. 10. Reselect Partial Remote Wipe to revert to it. 11. Note that to change any Lost Device Protection settings, you must enter your password to make the changes. 12. Manage your protection in the Lost Device Protection Portal. See below for details. Figure 106. Edit Message Figure 108. Activate Device Administrator Figure 107. Remote Wipe Figure 109. Device Administrator Activated 42

43 Lost Device Protection Portal To access the Lost Device Protection Portal: 1. Launch your browser on your PC and type ostdevice into the search field, and hit Enter. The Lost Device Protection Portal webpage appears. 2. Tap Find Now or Sign in to sign into your Trend Micro account. The Sign In page appears. 3. Type the address and password you used to create your Trend Micro account and click Sign in. The Lost Device Protection Portal appears. Figure 110. Lost Device Protection Portal Sign In Figure 111. Sign In 43

44 4. Click Share to share the device s location with a trusted friend. 5. Click Scream to sound a oneminute alarm on your missing mobile device, even if it has been set to silent mode. 6. Click Refresh to refresh the Google Map. 7. Click Lock to stop anyone from using your missing mobile device. When you recover your device, click Unlock to unlock it, then use the Unlock Key provided or your Trend Micro password to complete the unlock. 8. Click Device Detail (below the device icon) to view the unlock code that can be entered into the device interface to unlock the device instead of the master account password. This key can also be ed to you at your account address by taping Yourself an Unlock Key on the device once it s found. 9. Click Wipe to permanently delete all the data stored on your missing mobile device. A warning appears. If you wish to wipe your device, click OK. Warning: Using this feature will perform a factory reset of your device. For testing or review purposes, please ensure you are using a test device or have a complete backup of your information. Once reset, TMMS will be removed from the device and the location feature will no longer function. Figure 112. Lost Device Protection Options Figure 113. Unlock Figure 114. Device Unlock Figure 115. Wipe Warning 44

45 Backup & Restore Between Android and ios Devices Trend Micro Mobile Security is integrated with Trend Micro Mobile Backup and Restore (MBR), available on the Google Play Store. It provides an overview of the files you ve currently backed up, as well as direct linked access to the MBR app. Using MBR, you can back up all the key data on your device and restore that data to it or another device. To Back Up Your Data: 1. Tap Backup & Restore in the TMMS Console. The Free Download screen appears. 2. Tap Free Download to download Mobile Backup and Restore (MBR). The app appears in Google Play. 3. Tap Install to install MBR. The App Permissions screen appears. 4. Read the list of permissions. If you accept them, tap Accept. The app downloads and installs and a shortcut is placed on your device. Figure 116. Backup and Restore Figure 117. Free Download Figure 118. Mobile Backup & Restore Figure 119. Accept 45

46 5. Tap Open to open MBR. The MBR Create an Account appears. 6. Since you ve already created an account for TMMS, tap Sign In to sign into your account. 7. The License Agreement appears. Read the License Agreement. If you agree, tap Accept. The Sign In screen appears. 8. Enter the address and password you used to create your account and tap Sign In. Figure 120. Open Figure 121. Create an Account Sign In Figure 122. License Agreement Figure 123. Sign In 46

47 9. The MBR Demo screen appears. 10. Tap Start. The MBR Console appears. 11. Tap Back Up Now. MBR scans your device for items to back up. 12. When the scan is done, choose the items you wish to back up, then tap Start Backup. 13. If your device is not plugged in, MBR advises you Before You Continue to plug it in during the backup to not drain your battery. Figure 124. Demo Figure 125. Back Up Now Figure 126. Choose Items to Back Up Figure 127. Before You Continue 47

48 14. Tap Continue. MBR backs up your device. When the backup is complete, a popup notifies you Backup Complete. 15. Tap Ok, and you re returned to the main Backup screen. 16. Tap Settings and you re taken to the Backup Settings screen, where you can set Backup Frequency (Time and Repeat interval), Wireless and network backup (Wi-Fi, when plugged in, not while roaming), and what items you want to have Automatically backed up (Contacts, Calendar, Call History, Text History, Photos, Music, Videos). 17. Note that, while you re in Mobile Backup & Restore, you can simply tap the Settings menu on your smartphone to return to the Automatic Backup Settings screen. Figure 128. Backing Up Figure 129. Backup Complete Figure 130. Backup Screen Figure 131. Backup Settings 48

49 To Restore Your Data Between Android and ios Devices: 1. At any time, you can restore a backup from this or another Android or ios device. To begin, tap Restore in the MBR Console. The Restore screen appears. 2. Scroll to the right or left to Choose a Backup to Restore. For example, choose an iphone backup, if you include an iphone in your Trend Micro account. 3. Tap Restore to restore the backup to your Android device. The Provide Password screen appears. 4. Provide your Trend Micro Account password, then tap Continue. The Choose Items to Restore screen appears. 5. Select the items you wish to restore (if it s an iphone backup, it will be Contacts), then tap Restore Selected. A Restore Contacts? popup appears, asking if you re sure you want to restore the contacts, with details on what to expect. 6. Tap Continue. If your device is not plugged in, a dialog appears, recommending you plug it in to save your battery. 7. Tap Continue. Mobile Backup & Restore restores your Contacts. Figure 132. Restore Figure 134. Choose Items to Restore Figure 133. Provide Password Figure 135. Restore Contacts? 49

50 8. When the Restore is complete, a dialog appears, saying Restore Complete. 9. Tap OK to close the dialog. Your Contacts have been restored. Figure 136. Before You Continue Figure 137. Restoring Figure 138. Restore Complete 50

51 To Manage Your Backups: 1. At any time, you can delete backups to recover space in your online storage. In the MRB Console, tap More. A list of your backups appears, along with your Online Storage Status and an option to Get More Storage (up to 5GBs for subscribers). 2. Tap the backup you wish to delete. A screen appears, listing details about the backup (e.g., Count and Size). 3. Tap Delete Selected Backup. A Delete Selected Backup? dialog appears, asking if you re sure you want to delete the backup. 4. Tap Delete. After a few moments, the backup is deleted from your list of backups. Figure 139. Online Storage Status Figure 140. Delete Selected Backup Figure 141. Delete Selected Backup? Figure 142. Backup Deleted 51

52 Scan Facebook Trend Micro Mobile Security also includes the Trend Micro Facebook Privacy Scanner, (also available as an independent app, Privacy Scanner for Facebook, on the Google Play Store). Using Scan Facebook from your Console, you can scan and easily edit your Facebook privacy settings. To access Privacy Scanner: 1. Tap Scan Facebook in the main TMMS Console. The Facebook Privacy Scanner screen appears. 2. Tap Sign into Facebook to check your privacy settings. The Facebook Login screen appears. Figure 143. Scan Facebook Figure 144. Facebook Privacy Scanner 3. Enter the address and password you use to sign into Facebook and tap Log In. Facebook Privacy Scanner checks your privacy settings. 4. When it s done checking, it presents you with the analysis. Figure 145. Enter Facebook Address and Password Figure 146. Checking Your Privacy Settings 52

53 5. Tap each item in the list to reset it to the recommended setting. A popup appears, letting you make the change. 6. Check the recommended Privacy Setting and tap OK. Privacy Scanner makes the change, saying Great! You fixed this concern. 7. Repeat for any remaining privacy concerns. 8. Since Facebook periodically changes its privacy policies or adds new features to the social network, you should periodically rescan your privacy settings to ensure your privacy. Figure 147. Two Privacy Concerns Figure 148. Editing Privacy Setting Figure 149. Great! You Fixed This Concern. 53

54 Password Uninstall Protection Enabling password protection stops unauthorized changes to Parental Controls and Trend Micro Mobile Security s Anti-Theft feature. The master account password is also used when unlocking the device following a Remote Find, Remote Wipe, or Simcard change. Finally, Uninstall Protection is ensured by activating the Device Administrator; deactivating this protection also requires the master password. Using Password Protection: 1. Enabling Parental Controls requires a password. In the main screen, tap Safe Surfing and the screen appears. 2. Tap the Parental Controls slider on the right to turn it on. The Password screen appears. 3. Enter your password and Parental Controls is enabled. 4. Similarly, to change the settings on Lost Device Protection, tap it in the main screen. The Lost Device Protection screen appears. 5. To enable or disable a feature, tap Find My Android or SIM Card Lock to check/uncheck the checkbox(es). The Password Required screen again appears. 6. Enter your password to allow the change to Find My Android or SIM Card Lock. Figure 150. Password Protection Required Figure 151. Parental Controls Slider Figure 152. Password Required Figure 153. Enable or Disable Find My Android or SIM Card Lock 54

55 Using Device Administration for Uninstall Protection: 1. When you activate Parental Controls, you re also given the option to activate Uninstall Protection using Device Administration. 2. In the Safe Surfing & Parental Control screen, tap the Uninstall Protection slider on the right to enable it. A screen appears, asking if you wish to Activate Device Administrator. 3. Click Activate. Uninstall Protection is activated. 4. A Device Administrator Activated popup appears, providing directions if you ever need to uninstall Mobile Security. 5. Wait approximately ten minutes after enabling Uninstall Protection to test disabling the function and its password protection, as TMMS maintains a grace period to ensure easy editing for users. 6. To disable Uninstall Protection, tap the Uninstall Protection slider on the left to deactivate it. Figure 154. Uninstall Protection Figure 156. Device Administrator Activated Figure 155. Activate Device Administrator? Figure 157. Deactivate Uninstall Protection 55

56 7. A popup appears, requiring you to enter your password. 8. Enter your password to deactivate Uninstall Protection. 9. Uninstall Protection is deactivated. Figure 158. Password Required Figure 159. Uninstall Protection Deactivated Note: Device Administration is automatically deactivated when your subscription expires. 56

57 Transferring Licenses Between Devices Trend Micro Mobile Security allows you to transfer licenses between devices, whether they re ios or Android. The option is available for active or expired Trial accounts when you re signed in, or for expired Paid accounts when you re signed in. To Transfer a License: 1. Tap Mobile Security on our device to launch the Console. 2. Tap the Settings icon on your device and when the menu appears, select Settings. The Mobile Security Settings screen appears. 3. Tap Buy / Activate in the Settings Screen. The Buy Activate screen appears. 4. At the top of the screen, tap Want to transfer a subscription? The Sign- In screen appears. 5. Enter the address and password for your Trend Micro account and tap Sign In. A list of available licenses appears in the Transfer License screen. 6. Tap the license you wish to transfer. Figure 160. Buy / Activate Figure 161. Want To Transfer A License? Figure 162. Sign In Figure 163. Transfer License 57

58 7. A Transfer Existing License(s) dialog appears, asking if you wish to transfer the license to this device. 8. Tap OK. The license is transferred and your subscription is updated. Figure 164. Transfer Existing License(s) Figure 165. Your Subscription Has Been Updated Settings Trend Micro Mobile Security provides system settings for application management. 1. Tap Mobile Security on your device to open the Console. 2. Tap the Settings menu on your device to open the popup. 3. Here, you have access to various options. Settings. Access various system-level settings. Renew / Activate. Renew or activate a subscription. Share. Send friends or associates a recommendation to use Trend Micro Mobile Security. Trend Micro Apps. Get access to other Trend Micro apps for your mobile device. Love This App. Provide a rating and review on Google Play. Help. Get Online Help with Mobile Security. Figure 166. Settings Popup Menu (Device) 58

59 4. Tap Settings to access system-level options. The Settings screen appears, with the list of options available. Scroll down to view the options. Trend Micro Account. Account you re registered to. Expiration Date. Date your subscription expires. Serial Number. 20 character key code. Renew / Activate. Purchase/renew or activate a subscription. Sign Out. Disconnect your Trend Micro account Check your Trend Micro Account. Manage your account and subscriptions. Set up alternate addresses. Send from an unlock key from the lock screen to your Trend Micro account and the address you set up here. Display App Icon on Status Bar. Make it visible in the pull-down menu. Uninstall. Uninstall Mobile Security. About. Product details and version number. Help. Access Online Help. Start collecting log. Collect logs to troubleshoot and send to Trend Micro. Diagnostic logs history. Reports sent to Trend Micro. Help us improve this app. Anonymously share device information with Trend Micro. Figure 167. Settings (1) Figure 168. Settings (2) 59

60 Mobile Security On Your Android Tablet Trend Micro Mobile Security works much the same way on your Android tablet as it does on your Android smartphone, minus Call and Text Blocking, which is a specific set of functions for smartphones. Whether you re holding your tablet vertically or horizontally, the Console displays the same functions, it just distributes them differently. Figure 169. Mobile Security on Tablet (Vertical View) 60

61 Figure 170. Mobile Security on Tablet (Horizontal View) 61

TREND MICRO Mobile Security 5.0 for Android Product Guide

TREND MICRO Mobile Security 5.0 for Android Product Guide H TREND MICRO Mobile Security 5.0 for Android Product Guide V1.1 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro

More information

Trend Micro Antivirus for Mac 2016

Trend Micro Antivirus for Mac 2016 H Trend Micro Antivirus for Mac 2016 Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Password Manager for PC and Android

Password Manager for PC and Android H Trend Micro Password Manager for PC and Android Product Guide Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. SD Logo is a trademark of its proprietor.

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

Password Manager Product Guide for PC and Android

Password Manager Product Guide for PC and Android H Password Manager Product Guide for PC and Android Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents...

Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC. Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... Point of View ProTab 3XXL IPS - Android 4.0 Tablet PC English Contents Contents... 1 General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections...

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Point of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2

Point of View Mobii 925 - Android 4.2 Tablet PC. General notices for use... 2 Disclaimer... 2 Box Contents... 2 Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Buttons and connections... 3 1.2 Start up and shut down... 3 2.0 Introduction to Google Android

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. Thank you for purchasing the Mobile Wi-Fi. This Mobile Wi-Fi brings you a high speed wireless network connection. This document will help you understand your Mobile Wi-Fi so you can start using it right

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

Norton Family Product Manual

Norton Family Product Manual Norton TM Family Product Manual Care for our Environment; It's the right thing to do. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3

Consumer Technical Product Marketing. TREND MICRO SafeSync 5.1 for Consumer Product Guide. SSFC - GLOBAL v2.3 H TREND MICRO SafeSync 5.1 for Consumer Product Guide SSFC - GLOBAL v2.3 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Consumer

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

Premium Design Phone with Smartphone Connect

Premium Design Phone with Smartphone Connect Smartphone Connect App Guide Premium Design Phone with Smartphone Connect Model No. KX-PRW130 Thank you for purchasing a Panasonic product. This document explains how to use the Smartphone Connect app.

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

DirectPass Password Manager for PC

DirectPass Password Manager for PC H Trend Micro DirectPass Password Manager for PC Product Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro Incorporated

More information

7 Mini Tablet User Guide

7 Mini Tablet User Guide 7 Mini Tablet User Guide MODEL NUMBER: Powered by SYTABBL7 Wireless Mobile Internet Tablet Getting to Know Your New Tablet: Front View: Back View: Side Angle View: MENU MENU Power Key ON/OFF, Back Button

More information

AT&T Voicemail Viewer User Guide

AT&T Voicemail Viewer User Guide AT&T Voicemail Viewer User Guide Table of Contents iphone... 4 Requirements... 4 Installation... 4 Message Notification and Message Count... 6 Application... 8 Login... 8 Functionality Summary...10 Settings...

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Deltek Touch Time & Expense for Vision 1.3. Release Notes

Deltek Touch Time & Expense for Vision 1.3. Release Notes Deltek Touch Time & Expense for Vision 1.3 Release Notes June 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or technical

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide

HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST. Your HTC Desire 601 User guide HTC Hotline Support: 1866-449-8358 7 days a week 8am EST to 1am EST Your HTC Desire 601 User guide 21 Phone setup and transfer Home screen Your Home screen is where you make HTC Desire 601 your own. After

More information

AVG Protection. User Manual. Document revision 2015.37 (26.8.2015)

AVG Protection. User Manual. Document revision 2015.37 (26.8.2015) AVG Protection User Manual Document revision 2015.37 (26.8.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

OfficeSuite HD Meeting User Manual

OfficeSuite HD Meeting User Manual OfficeSuite HD Meeting User Manual Welcome to Broadview Networks OfficeSuite HD Meeting. Our service unifies cloud video conferencing, simple online meeting and mobile collaboration into one easy-to-use

More information

Trend Micro Security 10 Product Guide

Trend Micro Security 10 Product Guide H Trend Micro Security 10 Product Guide Trend Micro Antivirus+ Security 10 Trend Micro Internet Security 10 Trend Micro Maximum Security 10 Trend Micro Premium Security 10 V1.1 Trend Micro Incorporated

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

ASUS WebStorage Client-based for Windows [Advanced] User Manual

ASUS WebStorage Client-based for Windows [Advanced] User Manual ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

Mobile Print/Scan Guide for Brother iprint&scan

Mobile Print/Scan Guide for Brother iprint&scan Mobile Print/Scan Guide for Brother iprint&scan Version K ENG Definitions of notes We use the following note style throughout this user s guide: specifies the operating environment, conditions for installation,

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Frequently Asked Questions for logging in to Online Banking

Frequently Asked Questions for logging in to Online Banking Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the

More information

VIVA 4G LTE Mini Router. Quick Start Guide

VIVA 4G LTE Mini Router. Quick Start Guide VIVA 4G LTE Mini Router Quick Start Guide Thank you for choosing the VIVA 4G LTE Mini Router (hereinafter referred to as the E57) The supported functions and actual appearance are subject to the product

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3

More information

Avira System Speedup. HowTo

Avira System Speedup. HowTo Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1

More information

Why you need. McAfee. Multi Acess PARTNER SERVICES

Why you need. McAfee. Multi Acess PARTNER SERVICES Why you need McAfee Multi Acess PARTNER SERVICES McAfee Multi Access is an online security app that protects all types of devices. All at once. The simple monthly subscription covers up to five devices

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

MOBILE BANKING USER GUIDE

MOBILE BANKING USER GUIDE MOBILE BANKING USER GUIDE CentricBank.com DrCentricBank.com 717.657.7727 Centric Bank does not currently charge a fee for Mobile Banking. However, your mobile phone provider may charge data usage fees

More information

Thank you for choosing Huwei E589 4G Mobile WiFi

Thank you for choosing Huwei E589 4G Mobile WiFi Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Android, AdWords, Gmail,

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail. Send SMS as fast as e-mail! KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2

Point of View SmartTV HDMI 210 dongle - Android 4.2. General notices for use... 2 Disclaimer... 2 Box Contents... 2 Table of Contents General notices for use... 2 Disclaimer... 2 Box Contents... 2 1.0 Product basics... 3 1.1 Connecting your device for the first time... 3 1.2 Connections... 4 1.3 Using the remote control

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016)

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016) AVG Protection User Manual Document revision AVG.32 (6/27/2016) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents 1.

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2

Point of View SmartTV-500 Center - Android 4.2. General notices for use...2 Disclaimer...2 Box Contents...2 Point of View SmartTV-500 Center - Android 4.2 English Table of Contents General notices for use...2 Disclaimer...2 Box Contents...2 1.0 Product basics...3 1.1 Buttons and connections... 3 1.2 Connecting

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Home Internet Filter User Guide

Home Internet Filter User Guide Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter

More information

YOGA TABLET 8. User Guide V1.0. Please read the safety precautions and important notes in the supplied manual before use.

YOGA TABLET 8. User Guide V1.0. Please read the safety precautions and important notes in the supplied manual before use. YOGA TABLET 8 User Guide V1.0 Please read the safety precautions and important notes in the supplied manual before use. Chapter 01 YOGA TABLET 8 Overview 1-1 Appearance 1-2 Buttons 1-3 Turning On/Off Your

More information

AT&T U-verse App for iphone FAQ s

AT&T U-verse App for iphone FAQ s About AT&T U-verse What is AT&T U-verse for iphone? The AT&T U-verse for iphone is a service that provides all U-verse subscribers with the ability to view their U-verse TV Guide, manage their home DVR,

More information

8x8 Virtual Office Mobile User Guide for ios

8x8 Virtual Office Mobile User Guide for ios 8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 4.0, October 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4

More information

User's Guide. [Home Network] app. Model No.

User's Guide. [Home Network] app. Model No. User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it

More information

User Guide Vodafone Pocket WiFi Extreme. Designed by Vodafone

User Guide Vodafone Pocket WiFi Extreme. Designed by Vodafone User Guide Vodafone Pocket WiFi Extreme Designed by Vodafone Welcome to the world of mobile communications 1 Welcome 2 Device overview 3 Getting started: setup 4 Getting started: use 5 Pocket WiFi online

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Quick Start. is a trademark of ETSI.

Quick Start. is a trademark of ETSI. TM Quick Start is a trademark of ETSI. Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15

Product Manual. Mobile Device Managment Version 8.1. Last Updated: 06/07/15 Product Manual Mobile Device Managment Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Installation Instructions

Installation Instructions Avira Secure Backup Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other brand

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

User Guide PUSH TO TALK PLUS. For Android

User Guide PUSH TO TALK PLUS. For Android User Guide PUSH TO TALK PLUS For Android PUSH TO TALK PLUS For Android Contents Introduction and Key Features...4 PTT+ Calling to Individuals and Groups...4 Supervisory Override...4 Real-Time Presence...4

More information

Specifications. What s Inside The box

Specifications. What s Inside The box Tablet of Contents Specifications.1 What s inside the box Tablet Parts Getting started... Connection to Internet..6 Task Bar..8 Install and Uninstall 9 Camera.10 HDMI.11 Trouble Shooting 11 Specifications

More information