TREND MICRO. Mobile Security 7. Comprehensive security for enterprise handhelds

Size: px
Start display at page:

Download "TREND MICRO. Mobile Security 7. Comprehensive security for enterprise handhelds"

Transcription

1 TREND MICRO Mobile Security 7 Comprehensive security for enterprise handhelds

2

3 Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file and the latest version of the User s Guide, which are available from the Trend Micro Web site at: Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Release Date: September 2011 Document Part No.: TSEM74853/110520

4 The User s Guide for Trend Micro Mobile Security for Enterprise version 7.1 introduces the main features of the software and installation instructions. Trend Micro recommends reading it before installing or using the software. Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at docs@trendmicro.com. You can also evaluate this document at the following Web site:

5 Contents Contents Chapter 1: Introducing Trend Micro Mobile Security Protecting Mobile Devices Mobile Security Overview Contents Chapter 2: Chapter 3: Installing Trend Micro Mobile Security Before Installing Manual Installation Methods System Requirements Host Computer Installing Mobile Security Manual Registration Uninstallation Getting Started with Trend Micro Mobile Security Product License Understanding the Mobile Security Interface Reviewing the Default Protection Policies iii

6 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide Contents Chapter 4: Updating Anti-Malware Components Scanning for Security Threats Updating App Scanner Components Connecting to the Master Server Types of Updates Manual Updates Automatic Updates Update History Chapter 5: Scanning for Security Threats Security Threats Scan Types Manual Scan Real-time Scan Manual Scan Results Viewing the Manual Scan Results Handling Security Threats Scan History iv

7 Contents Chapter 6: Filtering Calls and SMS Messages Call Blocking Configuring Call Blocking Configuring Call Blocking Actions Configuring Annoying Call Protection Text Blocking Configuring Text Blocking Configuring Text Blocking Actions Configuring Annoying Message Protection Call and Text Message Filtering Lists Managing Filtering Lists Contents Chapter 7: Using Web Security Using Web Security Understanding Web Security Configuring Web Security Handling Web Sites Blocked by Web Security Using Approved Lists Configuring Web Security Approved List Web Security Blocked History Handling Blocked History v

8 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide Contents Chapter 8: Chapter 9: History Viewing History Deleting History Troubleshooting, FAQs, and Technical Support Troubleshooting Frequently Asked Questions (FAQ) Technical Support Contacting Technical Support Using the Knowledge Base Index vi

9 Chapter 1 Introducing Trend Micro Mobile Security Read this chapter to understand how Mobile Security can protect your device. This chapter covers the following topics: Protecting Mobile Devices on page 1-2 Mobile Security Overview on page

10 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 1 Introducing Trend Micro Mobile Security Protecting Mobile Devices Trend Micro recommends the following safe practices when using your mobile device: Do not accept and install any content sent by strangers. Ignore SMS messages that tell you that you have won something, especially if these messages instruct you to send money or disclose personal information. Do not install or run applications received through unsolicited Bluetooth messages. When in a public area, avoid leaving your Bluetooth radio turned on. Mobile Security Overview Trend Micro Mobile Security uses the latest security technologies to defend against threats to mobile devices. Integrated filters can also block unwanted telephone calls and text messages. Mobile Security also provides Web Security that can help protect you from online fraud like phishing and pharming by blocking access to risky sites on the Web. The logon password protection helps protect your mobile device from an unathorized access. Mobile Security offers the following features: Scheduled or manual component updates from the Trend Micro Master Server to ensure up-to-date scan engine, pattern, security policies, and program versions Logon authentication to prevent anyone from accessing your mobile device Enables the adminisdtrator to control the camera and bluetooth on your mobile device. 1-2

11 Introducing Trend Micro Mobile Security Award-winning anti-malware scanning technology for mobile malware Web Security to ensure safe Internet browsing SMS filtering to block unwanted text messages Call filtering feature to block calls from unwanted and anonymous callers Comprehensive logs tracking scan results, security threats found, text messages and calls filtered, and other events 1 Introducing Trend Micro Mobile Security 1-3

12 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 1 Introducing Trend Micro Mobile Security 1-4

13 Chapter 2 Installing Trend Micro Mobile Security Read this chapter to understand how to install Mobile Security manually on your mobile device. This chapter covers the following topics: Before Installing on page 2-2 System Requirements on page 2-4 Installing Mobile Security on page 2-5 Manual Registration on page 2-7 Uninstallation on page

14 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 2 Installing Trend Micro Mobile Security Before Installing You can skip the installation section if your network administrator has already installed and configured Mobile Security on your mobile device. Before you begin, obtain the following information from your network administrator: installation method registration information (if manual registration is required) Manual Installation Methods If you install Mobile Security manually, your network administrator will tell you the installation method to use. You can manually install Mobile Security on your mobile device using one of the following methods: Clicking the appropriate URL in an SMS message Executing the setup file from the memory card Depending on your installation method, make sure you have the required information provided by your network administrator. 2-2

15 Installing Trend Micro Mobile Security TABLE 2-1. Required information for manual installation 2 METHOD Installation Message Memory Card REQUIREMENTS Installation SMS messages in the inbox on your mobile device A memory card with the Mobile Security setup file Installing Trend Micro Mobile Security 2-3

16 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 2 Installing Trend Micro Mobile Security System Requirements Before installing and using Mobile Security, ensure that your mobile device meets the requirements. TABLE 2-2. Operating system and mobile device memory requirements OPERATING SYSTEM MEMORY STORAGE Android v2.1 or above 9-MB 8-MB You can install Mobile Security only on your mobile device s internal storage space, not a memory card. To determine the Android version running on your mobile device: 1. On your mobile device, navigate to Settings > About phone > Software information. 2. On the Software information screen, verify the Android version. 2-4

17 Installing Trend Micro Mobile Security Host Computer Installing Mobile Security does not require a host computer, but you may need to connect the device to a computer to copy the installation file onto your mobile device. Installing Mobile Security This section explains how to install Mobile Security on your mobile device manually. After the installation is complete, Mobile Security is added to All apps. To manually install Mobile Security through the notification SMS message: This method only works for telephones. 2 Installing Trend Micro Mobile Security 1. Make sure your mobile device is connected to the Internet and can connect to the Master Server. 2. Check the inbox on your mobile device. Your device should have received a text message from the Master Server. 3. Open the SMS message, and use the URL to download the Mobile Security setup package. After downloading the file, your mobile device will show a pop-up confirmation message. 4. Tap Install to start the installation. 2-5

18 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 2 Installing Trend Micro Mobile Security Do not delete the registration SMS message from your inbox. Mobile Security uses information in the SMS message for registering with the Master Server. If you have accidentally deleted this SMS message, contact your network administrator for assistance. 5. After the installation process is completed, register your mobile device to the Master Server. To install Mobile Security using a memory card: Check with your network administrator to find out how to get the Mobile Security setup file onto your memory card. 1. Switch on your mobile device after inserting the memory card. 2. Using a file explorer, navigate to the Mobile Security setup file location and then tap the file to start the installation process. After the installation is complete, Mobile Security is added to All apps. 3. Manually register your mobile device with the Master Server (refer to Manual Registration on page 2-7 for more information). 2-6

19 Installing Trend Micro Mobile Security To install Mobile Security by executing the setup file: 1. Connect your mobile device to your computer. 2. Copy the setup file TmmsSuite.apk onto your mobile device. You can also use a memory card to transfer the file. 3. On your device, navigate to the location of the setup file. 4. Open the setup file to start installing Mobile Security. After the installation is complete, Mobile Security is added to All apps. 5. Register your mobile device with the Master Server (refer to Manual Registration on page 2-7 for more information). Manual Registration You need an Internet connection to register your mobile device. 2 Installing Trend Micro Mobile Security Register your mobile device to the Master Server to obtain the licenses for Mobile Security on your mobile device. 2-7

20 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 2 Installing Trend Micro Mobile Security If you did not register your mobile device, a message will ask you to register everytime you start Mobile Security. To register, tap Yes to make the Register screen appear, then provide the registration information (such as the host name or IP address, and the port number of the Master Server) given to you by your network administrator. If you do not wish to register your mobile device at the time of installation, you can still use Mobile Security on your mobile device with a thirty-day evaluation license. You will also not be able to receive the synchronization policies from the administrator. To register your mobile device: 1. Configure the fields in the Register screen: Device Name - Type a descriptive name for your mobile device. This name identifies your mobile device on the Master Server. Server Name or IP address - Type the server name or IP address of the Master Server. This information is provided by your network administrator. Port - Type the port number of the Master Server (such as port number 80). This information is provided by your network administrator. Domain Username and Domain Password - Type your network domain name and password. 2. Tap Register. The registration process starts and may take some time depending on the speed of your network connection. The main Mobile Security screen will appear after a successful registration. 2-8

21 Installing Trend Micro Mobile Security Uninstallation You can uninstall Mobile Security on your mobile device from Applications. To uninstall Mobile Security on Android 2.1: 1. On your mobile device, navigate to Settings > Applications > Manage applications. 2. On the All tab, tap Mobile Security, and then tap Uninstall. 3. Tap OK. To uninstall Mobile Security on Android 2.2 or above: 1. On your mobile device, navigate to Settings > Security > Device administrator and deactivate Mobile Security. 2. Navigate to Settings > Applications > Manage applications. 3. On the All tab, tap Mobile Security, and then tap Uninstall. 4. Tap OK. 2 Installing Trend Micro Mobile Security 2-9

22 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 2 Installing Trend Micro Mobile Security 2-10

23 Chapter 3 Getting Started with Trend Micro Mobile Security You can start using Mobile Security immediately after installation. Read this chapter to understand how to perform basic tasks and the default product policies. This chapter covers the following topics: Product License on page 3-2 Reviewing the Default Protection Policies on page 3-4 Scanning for Security Threats on page

24 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 3 Getting Started with Trend Micro Mobile Security Product License You can use Mobile Security with an evaluation license for thirty days before registering it. If the evaluation license expires before you register Mobile Security, or if the registered version of Mobile Security expires, all of the features will be disabled. 3-2

25 Getting Started with Trend Micro Mobile Security Understanding the Mobile Security Interface The main interface of Mobile Security displays all the features, where you can enable and disable any of them as per your requirements. You can also tap on any feature to see the detailed configuration and ammend it according to your needs. 3 Getting Started with Trend Micro Mobile Security Figure 3-1. Main screen 3-3

26 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 3 Getting Started with Trend Micro Mobile Security Reviewing the Default Protection Policies After installing Mobile Security, you might want to review the default protection policies shown in Table 3-1 to decide if you want to modify them. The Master Server may control the Call and SMS message filtering features on your mobile device. TABLE 3-1. Default protection policies FEATURE DEFAULT POLICY RESULTING ACTION Real-time scan Enabled Scans applications being installed Automatic updates Enabled Automatically checks for, downloads, and installs updates Update frequency 30 days Automatically checks for updates again 30 days after the last check 3-4

27 Getting Started with Trend Micro Mobile Security TABLE 3-1. Default protection policies FEATURE DEFAULT POLICY RESULTING ACTION Text message filtering Enabled All text messages are allowed to reach your inbox without filtering (feel free to adjust this setting) Call filtering Enabled All telephone calls are allowed to reach your inbox without filtering (feel free to adjust this setting) 3 Getting Started with Trend Micro Mobile Security 3-5

28 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 3 Getting Started with Trend Micro Mobile Security Updating Anti-Malware Components To ensure that you have the latest protection, update Mobile Security after installation. To update Mobile Security: 1. Go to the installed applications, and tap Mobile Security icon to start Trend Micro Mobile Security. 2. Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration. 3. On the main screen, tap Automatic Updates > Update tab > Update Now to start the update. Tap Cancel if you need to stop the update before it has finished. For more information on getting updates, see Updating App Scanner Components on page

29 Getting Started with Trend Micro Mobile Security Scanning for Security Threats Trend Micro recommends scanning your mobile device right after installing Mobile Security. If the scan finds any security threats, Mobile Security will record it in Scan History. For more information, see Scanning for Security Threats on page 5-1. To scan your mobile device for security threats: 1. Go to the installed applications, and tap the Mobile Security icon to start Trend Micro Mobile Security. 2. On the main screen, tap Real-time Scan > Scan tab > Scan Now to start scanning. Tap Cancel if you need to stop the scan before it has finished. 3 Getting Started with Trend Micro Mobile Security 3-7

30 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 3 Getting Started with Trend Micro Mobile Security 3-8

31 Chapter 4 Updating App Scanner Components To stay protected against the latest security threats, update Mobile Security regularly. This chapter covers the following topics: Connecting to the Master Server on page 4-2 Types of Updates on page 4-2 Manual Updates on page 4-3 Automatic Updates on page 4-4 Update History on page

32 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 4 Updating App Scanner Components Connecting to the Master Server To update Mobile Security, your mobile device must connect to the Master Server. You may need to type the IP address and port number of the Master Server in the Register screen (see Manual Registration on page 2-7). Types of Updates You can configure Mobile Security to download updates automatically, or get the updates manually. There are two types of updates. TABLE 4-1. Update types TYPE Manual Update DESCRIPTION Try to download a new update whenever you want Automatic Update Starts according to a schedule if the network connection is available on your mobile device 4-2

33 Updating App Scanner Components Manual Updates You can start a manual update at any time. To perform a manual update: 1. Ensure that your mobile device is connected to the Internet. 2. Start Mobile Security from the installed applications. 3. Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration. 4. On the main screen, tap Automatic Updates > Update tab > Update Now to start the update, as shown in Figure 4-1. Tap Cancel if you need to stop the update before it has finished. Trend Micro strongly recommends performing a manual scan immediately after every update. For more information on performing a manual scan, see Manual Scan on page Updating App Scanner Components Figure 4-1. Update screen 4-3

34 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 4 Updating App Scanner Components Automatic Updates Automatic updates run according to the schedule that you have selected. To enable automatic updates: 1. Start Mobile Security from the installed applications. 2. Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration. 3. On the main screen, tap Automatic Updates > Update tab. 4. Select Automatic Updates. 5. Tap Scheduled Updates, and then choose the update interval from the pop-up options list, as shown in Figure 4-2. This update will run only if your mobile device is connected to the Internet. To disable automatic updates, clear Automatic Updates on the main screen or on the Update screen shown in Figure 4-1. Figure 4-2. Update interval options 4-4

35 Updating App Scanner Components Update History Mobile Security maintains records of all the updates that it has received. To view the Update History: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Automatic Updates > History tab > Update History, and then tap the record that you want to view. The record screen will look like Figure 4-3. To delete all of the update records: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Automatic Updates > History tab > Update History. 3. Press the Menu button, and then tap Delete all. 4 Updating App Scanner Components Figure 4-3. Update History screen 4-5

36 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 4 Updating App Scanner Components 4-6

37 Chapter 5 Scanning for Security Threats Read this chapter to understand the anti-malware features of Mobile Security. This chapter covers the following topics: Security Threats Scan Types on page 5-2 Manual Scan on page 5-3 Real-time Scan on page 5-3 Manual Scan Results on page 5-5 Scan History on page

38 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 5 Scanning for Security Threats Security Threats Scan Types Mobile Security offers the following Security Threat scan types: TABLE 5-1. Security Threat scan types SCAN TYPE Manual scan Real-time scan DESCRIPTION Checks for security threats on demand Automatically checks for threats in each application that you install 5-2

39 Scanning for Security Threats Manual Scan Manual scans check all of the applications and files on your mobile device for security threats. The Scan Results screen lists any infected or suspicious files and applications. You can then remove them from your mobile device. For more information, see Handling Security Threats on page 5-6. To scan your mobile device for malware: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Real-time Scan > Scan tab > Scan Now to start scanning. Tap Cancel if you need to stop the scan before it has finished. 5 Scanning for Security Threats Real-time Scan When enabled, the real-time scan checks for security threats in every new application that you install. Enabling Real-Time Scanning You should always keep the real-time scan enabled to protect your mobile device. Figure 5-1. Scan screen 5-3

40 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 5 Scanning for Security Threats To enable real-time scanning: 1. Start Mobile Security from the installed applications. 2. On the main screen, select Real-time Scan. To disable real-time scanning, clear the Real-time Scan setting on the main screen or on the Scan screen shown in Figure

41 Scanning for Security Threats Manual Scan Results Use the scan results to decide what actions to take in response to security threats found. Viewing the Manual Scan Results After a manual scan, Mobile Security displays a list of infected or suspicious files and applications, as shown in Figure Scanning for Security Threats Figure 5-2. Scan Result screen 5-5

42 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 5 Scanning for Security Threats Handling Security Threats If you close the results screen without deleting any suspicious files or applications, they will stay on your mobile device and may damage other files or cause performance problems. To remove infected or suspicious applications: On the Scan Results screen that opens when the scan has finished, do one of the following: To remove applications from mobile device s internal memory: a. Navigate to Settings > Applications > Manage applications. b. On the All tab, tap the application name, and then tap Uninstall. c. Tap OK. To remove applications from the memory card: a. Select applications to remove. To select everything on the list, press the Menu button, and then tap Select All. b. Press the Menu button, and then tap Delete to remove what you selected. 5-6

43 Scanning for Security Threats Scan History Mobile Security maintains record of all the scans performed on you mobile device, which you can use to track scan activities and view task results. To view Scan History: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Real-time Scan > History tab > Scan History, and then tap the record that you want to view. The record screen will look like Figure 5-3. To delete all of the scan reocrds: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Real-time Scan > History tab > Scan History. 3. Press the Menu button, and then tap Delete all. 5 Scanning for Security Threats Figure 5-3. Scan History screen 5-7

44 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 5 Scanning for Security Threats 5-8

45 Chapter 6 Filtering Calls and SMS Messages Read this chapter to understand how to configure the call and message blocking features if your mobile device includes a telephone. This chapter covers the following topics: Call Blocking on page 6-2 Text Blocking on page 6-7 Call and Text Message Filtering Lists on page

46 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages Call Blocking Trend Micro Mobile Security helps you filter unwanted calls with the following filtering lists: Blocked list - When enabled, Mobile Security will block calls from numbers on this list and allow all others. Approved list - When enabled, Mobile Security only allows calls from numbers on this list, and blocks all others. For more information on filtering lists, see Call and Text Message Filtering Lists on page You can also make Mobile Security block unwanted calls and reply with an SMS text message automatically. Configuring Call Blocking To configure call blocking: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking > Calls tab. 3. Select Call Blocking. 4. Tap Filtering Method, and then select one of the following options: Use Blocked List Use Approved List 5. Tap Action, and then select one of the following options: Reject call 6-2

47 Filtering Calls and SMS Messages Silence device Reject call + send reply If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically. Refer to Configuring Call Blocking Actions on page 6-3 for more details. 6. Press the Back button to save your settings and return to the Calls tab. 7. Select Block Annoying Calls to filter calls from an unknown numbers if the caller disconnects within three seconds. Refer to Configuring Annoying Call Protection on page 6-6 for more details. To disable call blocking: 1. Start Mobile Security from the installed applications. 2. On the main screen, clear Call Blocking. Configuring Call Blocking Actions Mobile Security lets you choose from the following call blocking actions: Reject call uses the Call Blocking list to block incoming calls. Silence device prevents your mobile device from making noise. 6 Filtering Calls and SMS Messages 6-3

48 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Reject call + send reply blocks incoming calls according to the filtering list you selected, and automatically sends a predefined text message to the caller. Filtering Calls and SMS Messages The standard text messaging data rates defined in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions. To configure call blocking actions: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking > Calls tab. 3. Tap Action, and then select one of the following options: Reject call Silence device Reject call + send reply If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically. 4. Press the Back button to save your settings and return to the Calls tab. 6-4

49 Filtering Calls and SMS Messages To change the automatic reply text message: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking > Calls tab. 3. Tap Action, and then select Reject call + send reply. 4. Tap Automatic reply, and then choose what Mobile Security should send in response automatically. 5. Press the Back button twice to save your settings and return to the Calls tab. To add, edit, or delete an automatic reply text message: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking > Calls tab. 3. Tap Action, and then select Reject call + send reply. 4. Tap Automatic reply. 5. You can now either add, edit, or delete a message: To add a new message, press the Menu button, and then tap Add. After typing the message, tap OK. To edit an existing message, tap and hold that message, and then tap Edit on the list that appears. After editing the message, tap OK. To delete an existing message, tap and hold that message, and then tap Delete on the list that appears. When asked to confirm your decision, tap OK. 6 Filtering Calls and SMS Messages 6-5

50 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages Configuring Annoying Call Protection Enabling Block Annoying Calls records a call as "blocked" if it came from an unknown number and the caller disconnected within three seconds. Mobile Security identifies any phone number not in your address book or on the Blocked List or Approved list as an unknown number. The icon indicates Annoying Call records in the Blocked Call History. You can add Annoying Call records to your Blocked List. Refer to Call and Text Message Filtering Lists on page 6-12 for detailed instructions. To enable or disable Annoying Call Protection: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking > Calls tab. 3. Select Block Annoying Calls to enable Annoying Call Protection. Clear Block Annoying Calls to stop using this feature. 6-6

51 Filtering Calls and SMS Messages Text Blocking Trend Micro Mobile Security helps you filter unwanted text messages with the following filtering lists: Blocked list - When enabled, Mobile Security will block text messages from senders on this list and allow all others. Approved list - When enabled, Mobile Security only allows text messages from senders on this list, and blocks all others. For more information on filtering lists, see Call and Text Message Filtering Lists on page You can choose to block unwanted text messages or configure Mobile Security to reply with an text message automatically. Mobile Security will block unwanted messages from reaching your inbox but keeps the complete message in Blocked Text History. 6 Filtering Calls and SMS Messages Configuring Text Blocking To configure Text Blocking: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 3. Select Text Blocking. 6-7

52 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages 4. Tap Filtering Method, and then select one of the following options: Use Blocked List Use Approved List 5. Tap Action, and then select one of the following options: Block message Block message + reply If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically. Refer to Configuring Text Blocking Actions on page 6-9 for more details. 6. Press the Back button to save your settings and return to the Texts tab. 7. Select Block Annoying Texts if you want to block messages received from unknown numbers, based on your defined keywords. See Configuring Annoying Message Protection on page 6-11 for more details. 8. Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons. To disable text blocking: 1. Start Mobile Security from the installed applications. 2. On the main screen, clear Text Blocking. 6-8

53 Filtering Calls and SMS Messages Configuring Text Blocking Actions Mobile Security provides the following text blocking actions: Block message stops text messages according to the filtering list you selected. Block message + reply stops text messages according to the filtering list you selected, and automatically transmits a predefined text message to the sender. The standard text messaging data rates defined in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions. To configure text blocking actions: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 3. Tap Action, and then select one of the following options: Block message Block message + reply If you select the last option, tap Automatic reply, and then choose a message that Mobile Security should automatically transmit back to the sender. 4. Press the Back button to save your settings and return to the Texts tab. 6 Filtering Calls and SMS Messages 6-9

54 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages To add, edit, or delete an automatic reply text message: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 3. Tap Action, and then select Block message + reply. 4. Tap Automatic reply. 5. You can now either add, edit, or delete a message: To add a new message, press the Menu button, and then tap Add. After typing the message, tap OK. To edit an existing message, tap and hold that message, and then tap Edit on the list that appears. After editing the message, tap OK. To delete an existing message, tap and hold that message, and then tap Delete on the list that appears. When asked to confirm your decision, tap OK. 6-10

55 Filtering Calls and SMS Messages Configuring Annoying Message Protection Enabling Block Annoying Texts blocks text messages from unknown numbers based on keywords that you have selected. Mobile Security identifies any phone number not in your address book or on the Blocked List or Approved list as an unknown number. The icon indicates Annoying Text records in the Blocked Text History. You can add Annoying Text records to your Blocked List. Refer to Call and Text Message Filtering Lists on page 6-12 for detailed instructions. To enable or disable annoying message protection: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 3. Select Block Annoying Texts. 4. Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons. 5. Tap Save. To disable annoying message protection: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 6 Filtering Calls and SMS Messages 6-11

56 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages 3. Clear Block Annoying Texts. To add keywords for message filtering: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Text Blocking > Texts tab. 3. Select Block Annoying Texts if you have not done that already. 4. Tap Filter Keywords, and then type new filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons. 5. Tap Save. Call and Text Message Filtering Lists Trend Micro Mobile Security includes the following two types of filtering lists: The Blocked List stores phone numbers that Mobile Security will block. If you enable this list, Mobile Security only stops incoming calls or text messages from phone numbers on this list. Nobody else will be blocked. The Approved List stores phone numbers that Mobile Security will never block. If you enable this list, Mobile Security only allows incoming calls and text messages from phone numbers on this list. Everyone else will be blocked. 6-12

57 Filtering Calls and SMS Messages Uninstalling Mobile Security will permanently remove your Blocked and Approved lists. 6 Managing Filtering Lists To import contacts into your filtering list: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking or Text Blocking > Lists tab > Blocked List or Approved List. 3. Press the Menu button, tap Add, and then select one of the following options: Use device contact list Use call history Use text history Use annoying call/text list 4. You can now import contacts to your filtering list: To import multiple contacts, select the individual contacts, press the Menu button, and then tap Import. To import all the contacts, press the Menu button, and then tap Import all. Filtering Calls and SMS Messages 6-13

58 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 6 Filtering Calls and SMS Messages To add, edit, or delete contacts in your filtering lists: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Call Blocking or Text Blocking > Lists tab > Blocked List or Approved List. 3. Select either the Blocked List or the Approved List. 4. You can now either add, edit, or delete list items: To make an addition, press the Menu button, then tap Add > Add phone number, and type the name and phone number. When finished, tap Save. To edit a contact, tap and hold that contact, then tap Edit Contact on the list that appears, and make your changes. When finished, tap Save. To delete a contact, tap and hold that contact, then tap Delete Contact on the list that appears. When asked to confirm your decision, tap OK. To delete multiple contacts: i. Press the Menu button, and then tap Delete. ii. Select the contact(s) you want to delete. iii. Press the Menu button, and then tap Delete. When asked to confirm your decision, tap OK. To delete all contacts, tap Menu, and then tap Delete all. When asked to confirm your decision, tap OK. 6-14

59 Chapter 7 Using Web Security Trend Micro Mobile Security can filter unsafe sites when you browse the Web. This chapter covers the following topics: Using Web Security on page 7-2 Using Approved Lists on page 7-4 Web Security Blocked History on page

60 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 7 Using Web Security Using Web Security Web Security can help protect you from online fraud like phishing and pharming by blocking access to risky sites on the Web. Understanding Web Security Mobile Security provides the following levels of Web Security protection: Low blocks only sites that have been confirmed as fraudulent or dangerous. Normal provides appropriate protection for everyday use without aggressively blocking minor risks (Trend Micro recommends this setting). High provides the most protection by blocking site that show any signs of fraud or malicious software. After enabling Web Security, attempts to open blocked sites are recorded in the Blocked History. For more details, refer to Web Security Blocked History on page

61 Using Web Security Configuring Web Security Web Security provides protection against online security threats by blocking access to unsafe Web sites. To enable or adjust Web Security: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Web Security > Protection tab. 3. Select Web Security, and then select either Low, Normal, or High to enable or adjust Web Security, as shown in Figure 7-1. Clear Web Security to stop using this feature. To disable Web Security: 1. Start Mobile Security from the installed applications. 2. On the main screen or on the screen shown in Figure 7-1, clear Web Security. 7 Using Web Security Figure 7-1. Web Reputation Screen 7-3

62 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 7 Using Web Security Handling Web Sites Blocked by Web Security Mobile Security displays a warning whenever it detects a suspicious site, as shown in Figure 7-2. The screen will show the following information: Address - the address of the blocked site Type - the classification of the blocked site Rating - rates the site as Safe, Suspicious, Dangerous, or Unknown When you try to visit a blocked site, the Web Security blocking screen will appear, showing the address of the blocked site, as well as its type and risk level. The attempt is recorded in the Blocked History. If you think a page has been misclassified, please contact Trend Micro. Using Approved Lists Approved List under Web Security enables you to access only sites that appear on this lists and blocks all the others. Figure 7-2. Web Reputation block screen 7-4

63 Using Web Security Configuring Web Security Approved List Enabling and then adding trusted sites to the Approved List will block access to any site not on the list. To add sites to or delete sites from the Approved List: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Web Security > Approved List tab. 3. You can now either add or delete sites: To add a site, press the Menu button, tap Add, fill in the Name and Website fields, and then tap Save. To delete a site, tap and hold the one you want to remove, and then tap Delete. 7 Using Web Security To delete everything on the list, press the Menu button, and then tap Delete All. 7-5

64 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 7 Using Web Security Web Security Blocked History Mobile Security adds a record to the Blocked History under Web Security upon detecting a suspicious or risk website. Handling Blocked History To view or delete records in the Blocked History: 1. Start Mobile Security from the installed applications. 2. On the main screen, tap Web Security > Blocked History tab. 3. You can now either view or delete log records: Tap a record in the logs that you want to see. To delete the records, press the Menu button, and then tap Delete all. 7-6

65 Chapter 8 History Read this chapter to understand how to use the records that keep track of the events that occur while Trend Micro Mobile Security is running. The chapter covers the following topics: Viewing History on page 8-2 Deleting History on page

66 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 8 History Viewing History To view history: 1. Start Mobile Security from the installed applications. 2. On the main screen, press Menu, and then tap History to view a list like the example shown in Figure 8-1. Deleting History To delete history: 1. Start Mobile Security from the installed applications. 2. On the main screen, press Menu, and then tap History. 3. Press the Menu button, and then tap Delete all on the pop-up menu. Figure 8-1. History screen 8-2

67 Chapter 9 Troubleshooting, FAQs, and Technical Support Read this chapter for a list of common problems and workarounds and instructions for contacting technical support. This chapter covers the following topics: Troubleshooting on page 9-2 Frequently Asked Questions (FAQ) on page 9-4 Technical Support on page

68 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 9 Troubleshooting, FAQs, and Technical Support Troubleshooting This section explains what you can do if issues arise when installing, configuring, or using Mobile Security. ISSUE The mobile device runs out of power during the installation of Mobile Security. Mobile Security performs actions slowly. I cannot receive text messages after installing Mobile Security. After successfully installing Mobile Security, it did not detect a security risk. RECOMMENDED ACTION Recharge the mobile device and then restart the installation process. Check the storage space available and try removing unnecessary files and applications. If you have enabled the Approved List but added nothing to that list, then Mobile Security will move all incoming messages to the Blocked Message Logs. Check those logs and consider adjusting your Message Filtering configuration. Ask your network administrator if your Mobile Security license has expired. 9-2

69 Troubleshooting, FAQs, and Technical Support ISSUE RECOMMENDED ACTION 9 Mobile Security cannot receive updates. I do not know if Mobile Security has been registered. Verify the following: Check if Mobile Security was registered successfully. Make sure that your mobile device can connect with the Internet or Intranet. Contact your network administrator to see if your server has been configured properly for access. Check the Mobile Security registration screen. If the Device Name, Host Name or IP Address, and Port Security fields contain information, then you have registered Mobile Security. Troubleshooting, FAQs, and Technical Support 9-3

70 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 9 Troubleshooting, FAQs, and Technical Support Frequently Asked Questions (FAQ) Can I install Mobile Security on a storage card? No, you can only install Mobile Security on your mobile device s internal memory. Certain features seem to be missing in this version. Where did they go? Your administrator might have disabled the availability of certain features. Contact your administrator before contacting support. Can I download the updates to a storage card even though Mobile Security is installed directly on the device? No, you must download and install updates in the same place where you installed Mobile Security. How often should I update Mobile Security? Trend Micro recommends updating Mobile Security weekly. Your network administrator may have already set up scheduled updates on your mobile device. Can I receive or make a call while Mobile Security is performing a scan? Yes. Mobile Security can scan in the background while you do other things with your mobile device. You can view the logs to see details on scans and any detected malware and security risks. 9-4

71 Troubleshooting, FAQs, and Technical Support How does Mobile Security match callers and message senders with the filtering lists? Mobile Security can match partial numbers or names with items on the filtering lists. If the caller or sender's number has more than seven digits, for example, Mobile Security will check the last seven of them against the lists. If the caller or sender's number contains less than seven digits, the entire number is compared to the lists. Technical Support Trend Micro has sales and corporate offices located in many cities around the globe. For global contact information, visit the Trend Micro Web site at: The information on this Web site is subject to change without notice Contacting Technical Support You can contact Trend Micro by fax, phone, and , or visit us at: 9 Troubleshooting, FAQs, and Technical Support 9-5

72 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide 9 Troubleshooting, FAQs, and Technical Support Speeding Up Support Calls When you contact Trend Micro Technical Support, to speed up your problem resolution, ensure that you have the following details available: Network type Amount of memory and free space on your mobile device Exact text of any error messages Steps to reproduce the problem Using the Knowledge Base The Trend Micro Knowledge Base is a 24x7 online resource that contains thousands of do-it-yourself technical support procedures for Trend Micro products. Use Knowledge Base, for example, if you are getting an error message and want to find out what to do. New solutions are added daily. Also available in Knowledge Base are product FAQs, important tips, preventive anti-malware advice, and regional contact information for support and sales. All Trend Micro customers, including users of evaluation versions, can access Knowledge Base at: If you cannot find an answer to a particular question, Knowledge Base includes an additional service that allows you to submit your questions by

73 Index A automatic updates 4-2, 4-4 B before you install 2-2 Bluetooth 1-2 D default policies 3-4 E event logs types 8-2 viewing 8-2 F FAQ 9-4 G getting started 3-1 H Handling Security Threats 5-6 History deleting 8-2 History records 8-1 host computer requirements 2-5 I Installation 2-5 installation 2-2, 2-5 installation methods 2-2, 2-5 Internet 4-2 K Knowledge Base 9-6 M manual installation 2-2, 2-5 manual scan 5-2 manual updates Mobile Security features 1-2 P parental controls 7-1 product registration 2-7 R real-time scan 5-2 registering Mobile Security manually 2-7 registration 2-7 removing the product 2-9 S safe practices 1-2 Index Index I 1

74 Trend Micro Mobile Security for Enterprise v7.1 for Android User s Guide Index scan results delete 5-6 scan types 5-2 scanning 3-7, 5-1 SMS 1-2 system requirements 2-4 T technical support 9-5 troubleshooting 9-2 U uninstallation 2-9 uninstalling Mobile Security 2-9 update options 4-4 updating 3-2, 4-1 user interface 3-2 W web filtering 7-1 web security 7-1 I 2

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx

http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

WNMS Mobile Application

WNMS Mobile Application WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

http://downloadcenter.trendmicro.com/

http://downloadcenter.trendmicro.com/ Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

Ans.: Spam Monitor support all popular email programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera Faqs > Spam Monitor General Q1. What is Spam Monitor? Ans.: Spam Monitor is an easy-to-use spam filter that detects and isolates unsolicited junk mail sent to your mailbox. Designed for computer users,

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Do I need anything special to use it? All you need to use Twitter is an Internet connection or a mobile phone with Internet capability.

Do I need anything special to use it? All you need to use Twitter is an Internet connection or a mobile phone with Internet capability. Twitter Guide What is Twitter? Twitter is a real-time communication platform that allows you to quickly share thoughts, opinions, and interesting links with friends, family, and the general public. People

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3

More information

http://docs.trendmicro.com/en-us/home.aspx

http://docs.trendmicro.com/en-us/home.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

http://www.trendmicro.com/download

http://www.trendmicro.com/download Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide

ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

Setting up Hyper-V for 2X VirtualDesktopServer Manual

Setting up Hyper-V for 2X VirtualDesktopServer Manual Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein

More information

Trend Micro Hosted Email Security. Best Practice Guide

Trend Micro Hosted Email Security. Best Practice Guide Trend Micro Hosted Email Security Best Practice Guide Hosted Email Security Best Practice Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products described

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Copyright 2013 Trend Micro Incorporated. All rights reserved.

Copyright 2013 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Avira Exchange Security Small Business Edition. Quick Guide

Avira Exchange Security Small Business Edition. Quick Guide Avira Exchange Security Small Business Edition Quick Guide Table of contents Table of contents 1 Introduction...3 2 System requirements...4 3 The Avira Exchange Console...5 3.1 Virus Scanner status...6

More information

RMFT Outlook Add-In User Guide

RMFT Outlook Add-In User Guide RMFT Outlook Add-In User Guide Software Version 2.5 November 23, 2011 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: info@repliweb.com, Support:

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

NetSuite OpenAir Mobile for Android User Guide Version 1.3

NetSuite OpenAir Mobile for Android User Guide Version 1.3 NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

ONE-TOUCH MAIL V 2.3 MANUAL

ONE-TOUCH MAIL V 2.3 MANUAL ONE-TOUCH MAIL V 2.3 MANUAL The Email Solution for a Mobile World One-Touch Mail combines a number of state-of-the-art technologies in one small package to give you access to vital information and keep

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

8x8 Virtual Office Telephony Interface for Salesforce

8x8 Virtual Office Telephony Interface for Salesforce 8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Notices. Copyright 2016 Malwarebytes. All rights reserved.

Notices. Copyright 2016 Malwarebytes. All rights reserved. Malwarebytes Anti-Malware Mobile User Guide Version 2.0.5 3 May 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Pendragon Forms Industrial

Pendragon Forms Industrial Pendragon Forms Industrial Version 7 Installation & Reference Guide for Android Devices Contents What Is Pendragon Forms Industrial?... 2 Installing Pendragon Forms Industrial... 2 Installing Pendragon

More information

Configuration Information

Configuration Information Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

Setting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App

Setting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App Introduction Using the ios Mobile App Opto 22 s free groov View apps for ios and Android allow you to use View for one or more groovs on your smartphone or tablet in full-screen mode without the address

More information

KPN SMS mail. Send SMS as fast as e-mail!

KPN SMS mail. Send SMS as fast as e-mail! KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.

More information

F-Secure Internet Security 2012

F-Secure Internet Security 2012 F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.

Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. 2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered

More information

SPC Connect Configuration Manual V1.0

SPC Connect Configuration Manual V1.0 SPC Connect Configuration Manual V1.0 I-200090-1 28.11.2014 Copyright Copyright Technical specifications and availability subject to change without notice. Copyright Siemens AB We reserve all rights in

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Sophos Endpoint Security and Control standalone startup guide

Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Get Started MyLab and Mastering for Blackboard Learn Students

Get Started MyLab and Mastering for Blackboard Learn Students Get Started MyLab and Mastering for Blackboard Learn Students March 21, 2013 Copyright Notice Copyright 2013 by Pearson Education. All rights reserved. No part of the contents of this book may be reproduced

More information

Sierra Wireless AirCard Watcher Help for Mac OS X

Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Digital Persona Fingerprint Reader Installation

Digital Persona Fingerprint Reader Installation Digital Persona Fingerprint Reader Installation The link to download the Fingerprint Reader Software for AXIS-ACH is http://corpcu.com/fingerprint-reader-software This will begin the download for the drivers.

More information

Sendspace Wizard Desktop Tool Step-By-Step Guide

Sendspace Wizard Desktop Tool Step-By-Step Guide Sendspace Wizard Desktop Tool Step-By-Step Guide Copyright 2007 by sendspace.com This publication is designed to provide accurate and authoritative information for users of sendspace, the easy big file

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

ESET NOD32 ANTIVIRUS 8

ESET NOD32 ANTIVIRUS 8 ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

POLICY PATROL MFT. Manual

POLICY PATROL MFT. Manual POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Worry-Free TM Remote Manager

Worry-Free TM Remote Manager Worry-Free TM Remote Manager for Small and Medium Business Agent Installation Guide Trend Micro Incorporated reserves the right to make changes to this document and to the products/services described

More information

5050 Getting Started

5050 Getting Started 5050 Getting Started Getting Started.. The 50/50 system is basically made up of four components, the Software Application, Server, J2 Selling Stations (on tables) and the Handheld Selling Units. This manual

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Sophos Anti-Virus for NetApp Storage Systems startup guide

Sophos Anti-Virus for NetApp Storage Systems startup guide Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp

More information

T E C H N I C A L S A L E S S O L U T I O N

T E C H N I C A L S A L E S S O L U T I O N Trend Micro Email Encryption Gateway 5.0 Deployment Guide January 2009 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 USA T +1.800.228.5651 / +1.408.257.1500 F +1.408.257.2003 www.trendmicro.com

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management AT&T Business Messaging Account Management Admin User Guide December 2015 1 Copyright 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein

More information

eprism Email Security Suite

eprism Email Security Suite FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks

More information

Junk E-mail Settings. Options

Junk E-mail Settings. Options Outlook 2003 includes a new Junk E-mail Filter. It is active, by default, and the protection level is set to low. The most obvious junk e-mail messages are caught and moved to the Junk E-Mail folder. Use

More information

After you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages.

After you've enabled POP/IMAP access in i.mail, you need to configure your email client to download i.mail messages. User Guide- i.mail enhancement Configure POP/IMAP access using Outlook and Windows Mail Firstly, you need to enable POP/IMAP on your i.mail account: 1. Log into your i.mail account via web 2. Click Mail

More information

Setting Up and Using the Funambol Outlook Plug-in v7

Setting Up and Using the Funambol Outlook Plug-in v7 Setting Up and Using the Funambol Outlook Plug-in v7 Contents Introduction.......................................... 2 Requirements for Plug-In Use........................... 2 Installing the Funambol

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

Web Connect Guide MFC-J825DW MFC-J835DW. Version 0 USA

Web Connect Guide MFC-J825DW MFC-J835DW. Version 0 USA Web Connect Guide MFC-J825DW MFC-J835DW Version 0 USA Definitions of notes We use the following icon throughout this user s guide: s tell you how you should respond to a situation that may arise or give

More information

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets

More information

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black

How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise

More information

Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4

Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4 Android Driver s App Update Version 1.89 Samsung Galaxy Tab 4 August 2015 COPYRIGHT NOTICE This is an unpublished work protected by the United States copyright laws and is proprietary to Teletrac, Inc.

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information