Junos Pulse for Google Android

Size: px
Start display at page:

Download "Junos Pulse for Google Android"

Transcription

1 Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc.

2 Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright 2012, Juniper Networks, Inc. All rights reserved. M10/30/12 ii Copyright 2012, Juniper Networks, Inc.

3 Table of Contents Downloading and Installing Junos Pulse...1 Available Junos Pulse Features...1 Registering Security...2 The Mobile Security Dashboard...3 Address Validation...3 Using Security Features...3 Scan/Threats detected...4 Backup...6 Remote Monitoring...7 Web Security...8 Settings...8 Security Settings...8 Support Info...9 Update...9 Anti Theft Features...9 Password Policies and Storage Encryption...11 Scream Dismiss...11 Custom Button...11 Uninstalling or Clearing Data...12 Adding a Secure Connection...12 Connecting...13 Viewing Connection Status Icon...13 Viewing Connection Status Window...13 Limited Access...14 User Interface Modes...14 Known Issues and Limitations...14 iii

4 iv

5 Installing and Using Junos Pulse for Google Android Junos Pulse lets you access protected network resources from your Google Android device. It also protects your device against viruses and malware, and includes tools to reduce the inherent risks of a lost or stolen device. Additional information for Junos Pulse, including information on supported platforms, can be found at Downloading and Installing Junos Pulse Use the following instructions to download and install Junos Pulse software on Google Android devices. Informational Note: The Junos Pulse client is available from the Google Play application store. 1. From your Android device, download the Junos Pulse software directly to the device. Once downloaded, Junos Pulse installs automatically. 2. Once the application has been downloaded and installed, the Junos Pulse icon appears in the applications menu. 3. The first time you start Junos Pulse, the End User License Agreement appears. You must Accept the license to begin using Junos Pulse. Available Junos Pulse Features Informational Note: Junos Pulse can be deployed with all available features or with a subset of features based on your usage needs. You may not have all of the Junos Pulse features described here on your device. Junos Pulse can include the following features: Security Tab Scan/Threats Detected: Lists threats that have been found on the device and gives you the ability to allow or remove suspicious applications. When no threats are found this button reads Scan. When threats are found, this button reads Threats Detected. Backup: Lets you backup Contacts and Calendar events. Remote Monitoring: Provides information on what device activities are being monitored. Anti Theft: Lists the anti theft features that are activated on your device. Custom Button: Provides a link to a customized URL which takes you to a web page that is set up by your service provider Copyright 2012, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1

6 VPN Tab Informational Note: This service is only offered if you are accessing your corporate network resources securely. Connections: Lets you add, edit, and remove corporate network connections. Intranet: Provides Web links configured by your administrator. (Note that on Android 4.0, when VPN is enabled, the Intranet and buttons will be disabled. This is due to the way the mobile client communicates with the SA gateway.) Launches your application. (Note that on Android 4.0, when VPN is enabled, the Intranet and buttons will be disabled. This is due to the way the mobile client communicates with the SA gateway.) Status: Lets you view, delete, and log files, which you might need to do in a troubleshooting operation. The log files show all security incidents, such as virus scan times and viruses discovered. If you have an established VPN connection, you can also view the status of that connection from this window. Registering Security The Junos Pulse Mobile Security Suite provides access to features that protect your device from malware and viruses and it allows you to backup your device s calendar and contact information to a central server. You must register your device before you can access the security feature set. Your can register with automatic URL registration or using a manual registration process. Automatic URL Registration Automatic URL registration requires you to select a URL provided by your administrator or service provider. Once you select the URL, you are prompted to verify that the URL comes from a trusted source. When you tap Yes from this prompt, the automated security registration process takes place. To register security features automatically, do the following: 1. Start Junos Pulse. 2. Select the registration URL provided to you via , text message, or Web site. 3. Because the automatic registration changes the security settings on your device, you should verify the validity of the URL. If you are certain the URL is trusted, select Yes when prompted. Once you select Yes, your device is automatically registered for security features. Manual Registration In some cases, manual registration may also require you to select a URL. Once you select the URL, you are prompted to verify that the URL has comes from a trusted source. When you tap Yes in the registration prompt, the manual registration window appears. The registration window requires that you to enter information such as a license code provided to you by your administrator or service provider. Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no cellular service), the phone number field does not appear in the registration window. 2 Registering Security Copyright 2012, Juniper Networks, Inc.

7 Installing and Using Junos Pulse for Google Android To manually register security features, do the following: 1. Start Junos Pulse. 1. Select the URL provided via , text message, or Web site. 2. Verify the URL is trusted and tap Yes when prompted. The registration window appears. 3. Enter an address and Password. 4. Specify the License Code. 5. Your device s phone number appears in the Phone Number box. If the number does not appear, enter it manually including Country Code and Area Code without the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special characters. Valid phone numbers are between 11 and 15 digits (including country code). 6. Select Register. The Mobile Security Dashboard The dashboard is one of the servers with which you register your device. If you are given access to the dashboard (This access is optionally given by an administrator or service provider.), you can login to monitor your device, control some security settings, and change your address and password. You can access the dashboard web interface using a URL provided to you. For dashboard login and configuration details, please refer to the Junos Pulse Mobile Security Dashboard documentation. Address Validation After you first login to the dashboard, you receive an requesting that you validate your address. This contains a link that you must click to validate your address. After you click the link, a web page notification appears informing you that your address has been validated. Using Security Features Once you have successfully registered, if your device is running Android 2.2 or higher, the Activate device administrator prompt appears. Informational Note: If you do not activate the Device Administrator, some features behave differently. See the following sections for details: Anti Theft Features on page 9 and Uninstalling or Clearing Data on page 12. When security features are registered, the available features appear and are now accessible from the Security tab. Those features are as follows: Scan/Threats Detected: Lists threats (viruses and malware) that have been found on the device and gives you the ability to allow or remove suspicious applications. When no threats are found this button reads Scan. You can tap it go to the Scan window. When threats are found, this button reads Threats Detected. You can tap it to view the detected threats. Backup: Lets you backup Contacts and Calendar events. Copyright 2012, Juniper Networks, Inc. Using Security Features 3

8 Remote Monitoring: Provides information on what device activities are being monitored. Settings: Available from the Menu key. Settings allows you to set scan intervals, view support information and application logs, update virus signatures and update Junos Pulse software. Scan/Threats detected Anti Virus and malware detection protects your device by scanning all files and scanning secure digital (SD) cards to prevent device infections. To view threats and configure settings for threat detection: 1. Start Junos Pulse. 2. Select the Security tab. 3. If threats have been found, tap the Threats detected button. This takes you to the Scan Results window. 4. The Scan Results window lists the viruses, malware, suspicious applications and prohibited applications found on your device. If your device does not have Threat detection enabled, you only see the prohibited applications found on your device. Informational Note: From the Notification bar, the following notification appears when you have a detected threat. Detections Tab Each detected item is displayed in the Detections tab. You can select the orange button beside the detected item to view more information about the detection and see the available actions. Detection types and available actions are as follows: Prohibited Application: This is an application that has been prohibited. To remove a prohibited application, select the orange button beside the application name and tap the available Uninstall button. If you do not uninstall applications that are prohibited, the notification icon continues to appear at the top of the Junos Pulse window. Informational Note: On some devices, Junos Pulse can automatically uninstall applications that are prohibited. 4 Using Security Features Copyright 2012, Juniper Networks, Inc.

9 Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is known to be malware. To remove malware, select the orange button beside the application name and tap the available Uninstall button. If you do not uninstall applications that are found to be malware, the notification icon continues to appear at the top of the Junos Pulse window. Informational Note: On some devices, Junos Pulse can automatically uninstall applications that are found to be malware. Suspicious Application: This is an application installed on your device that appears to be suspicious. The suspicious label is applied to an application when a set of heuristics determine that the application may be malware. For suspicious applications, you are given the option of allowing the application (adding it to your While list) or uninstalling it. To allow a suspicious application, select the orange button beside the application name and tap the available Allow button. You must also tap Yes to confirm the Allow action and then tap OK to confirm that you realize this action may put your device at risk. (You can choose to hide the last dialog so it does not appear again.) To uninstall a suspicious application, select the orange button beside the application and tap the Uninstall button. If you do not uninstall or allow applications that are found to be suspicious, the notification icon continues to appear at the top of the Junos Pulse window. Tap the View Detail button to access more information on the suspicious applications. You can also Allow or Uninstall the application from the details window. Virus: Viruses found during the last scan are listed in the Detections tab. It is recommended that you delete viruses when they appear here. To delete the virus from your device, select the orange button beside the virus name and tap the Remove button. Tap the View Detail button to access more information on the detected virus. You can also Remove the virus from the details window. Copyright 2012, Juniper Networks, Inc. Using Security Features 5

10 Scan button: The Scan button at the top of the Detections tab displays the how long ago the most recent device scan occurred. You can tap the Scan button to open a window which allows you to initiate one of three types of available device scans. Select one of the following scan options and tap OK to start the scan. Application scan: Scans all non system applications. Application and SD card scan: Scans all non system applications and the SD card. Full device scan: Scans all files, non system applications, and the SD card. Informational Note: When you manually initiate a full device scan, a Battery usage warning may appear. It is to inform you that scans can use large amounts of battery life. Therefore, you may want to have your device charging during the scan. White list Tab When you allow a detected suspicious application, it appears in your White list tab. From the White list tab, you can manage suspicious applications in case you change your mind and want to uninstall an allowed application at a later time. By selecting the orange button beside the application name and taping the available Uninstall button, you can uninstall the white listed application. You can also tap the View Detail button to view more information about the application and then Uninstall the application from the detail window. Backup Junos Pulse Mobile Security backs up contact and calendar appointment information to a central location. To restore data, you must contact your administrator or access the dashboard. A restore occurs in the form of an SMS command that tells your device to contact the server to retrieve your backup. To back up device data: 1. Start Junos Pulse. 2. Select the Security tab. 3. Select Backup. The time of the last backup is displayed on the Backup button. 4. From the Backup window, the number of Contacts and Calendar events previously backed up is displayed. To initiate a backup, tap the Backup button at the top of the window. The backup immediately begins. 6 Using Security Features Copyright 2012, Juniper Networks, Inc.

11 Installing and Using Junos Pulse for Google Android Remote Monitoring The Remote Monitoring window lets you view the device event types and activities that are being monitored. To view the Remote Monitoring window, do the following: 1. Start Junos Pulse. 2. Select the Security tab. 3. Select Remote Monitoring. The Remote Monitoring window may display one or more of the following monitored activities: Monitoring SMS: Inbound and outbound SMS messages are logged, including the sender, receiver and contents of each message. MMS: Logging MMS messages is not supported at this time. Voice: Call history events are logged, such as initiated outgoing calls and received incoming calls (call duration is not recorded, but the remote phone number is noted.) Log images/pictures: If enabled from the server, the images downloaded or captured on the device are turned into thumbnail images and uploaded to the server. This occurs immediately and is not dependent on log limits. Logs: Event limit: When the total number of events (SMS, , voice) crosses this threshold, the full suite of logs is uploaded to the server. File size limit: When the total combined file size of all logs (SMS, , voice) crosses this threshold, the full suite of logs is uploaded to the server. Note that SMS messages are generally several hundred bytes in size. s are usually 2KB or larger (no attachments included). And voice messages are typically 200 hundred bytes. Control: Periodic GPS updates: This update period is configured on the server. This setting periodically queries the device position and uploads that information to the server for tracking purposes. Block calls: When enabled, blocks all outbound calls. Copyright 2012, Juniper Networks, Inc. Using Security Features 7

12 Web Security If Web Security is enabled on your device, URLs that you are attempting to access may be blocked or monitored. If a URL is blocked by the security policy on the device, the web browser displays a page informing you that the web site you are attempting to view is blocked. When Web Security is active on your device, a notification at the bottom of the Junos Pulse screen informs you of this. Settings From the Settings window, you can configure security settings such as scanning options and virus signature update intervals. You can also view support information and log files. From within the Junos Pulse application, you can access the Settings window through the Settings button. Locate the Settings button by doing the following: Select the three vertical dots on the right side of the Action bar (for Android 4.0 and later) to access the menu. Select Settings from the menu. Select the Menu button (Android 3.0 and earlier) to access the menu. Select Settings from the menu. Action bar button Menu button From the Settings window, you can access the following: Security Settings Security settings are configured by your administrator or service provider, and changes are downloaded to your device. You may change security settings by selecting the orange arrow beside the Security Settings to access the following: Scan applications on install: When enabled, a scan is initiated on an application when it is installed. A malware scan also takes place on files downloaded to /sdcard/download. When disabled, a scan only occurs at the scheduled interval or when manually initiated. Select the check box to enable this feature. Scan SD Card on Insert: Scans the SD card for malware and viruses. Select the check box to enable this feature. 8 Settings Copyright 2012, Juniper Networks, Inc.

13 Installing and Using Junos Pulse for Google Android Scan inside archives: Scans the contents of compressed files such as.zip and.apk files. Optimize media scanning: Allows for faster scanning of photos, media, and music files by not re scanning large files that have already been scanned (unless those files have changed). Full device scan: Displays the time interval in which a full device scan occurs. A full device scan scans all files, the SD card, and non system applications. Select the arrow beside the time interval to change the scan interval. Profile update: Virus definitions are loaded when you register, and they are updated on a preset schedule. Select the arrow beside the time interval to change the update interval. Support Info You can view device and Junos Pulse application information as well as view and send logs by selecting the orange arrow beside Support Info in the Settings window. This takes you the Support Info window where you can do the following: Tap the View Logs button to see the log file data. From this data window, you can select which log type to view from the pulldown list and you can clear the log file by tapping the Clear Logs button. Tap the Send Logs button to select an application from which to send the log file. Informational Note: You can only send log files using an application. No other methods are supported at this time. Update You can update the virus list and the Junos Pulse application (if updates exist for both) by selecting the orange arrow beside Update in the Settings window. This takes you to the Update window. From here you can check for updates for the following: Virus List: If there is an update available, tap the Update button to update your virus list. If there is no Update button, your list is likely up to date. An available Check button allows you to check for updates. Application: If there is an update available for Junos Pulse, tap the Update button to update your software. If there is no Update button, your software is likely up to date. An available Check button allows you to check for updates. Anti-Theft Features There are a number of measures that can be taken to protect your device if it is lost or stolen. If your Junos Pulse deployment makes these features visible to you, an Anti Theft button appears on your Junos Pulse home screen. When you tap this button, the anti theft features that are activated on your device are listed. You can tap the Manage Anti-Theft Features button from the Anti Theft window to go to your service provider s web site to purchase or view more anti theft features. Anti theft features include: Copyright 2012, Juniper Networks, Inc. Anti Theft Features 9

14 Lock Handset and Unlock Handset Locks the device until an unlock command is sent from the server or by entering a device password that matches the device password policy. When a lock command is sent from the server to the device, a new password can be generated, as well. This password may be sent via to you and you can modify it. When the lock command is triggered with this newly generated password, the following occurs on various devices: If the Device Administrator is enabled and the device already has a password configured: When a lock command is sent with a new password, the device is locked with the existing password. The new password from the server is not used. When a lock command is sent with an empty password, the device is locked with the existing password. The password from the server is not used. If the Device Administrator is enabled and the device does not have a password configured: When a lock command is sent with a new password, the device is locked with this new password. When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is automatically registered: When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is registered manually: When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. Emergency Call Button When the device is locked, an Emergency Call button is available from the unlock window. You can make an emergency call, to 911 for example, when you select this button and enter an emergency number. SIM Change (On Android OS 2.2 and later) If the Device Administrator function is activated and Wipe is enabled, a wipe command sets the device back to factory settings. No lock is performed. If the Device Administrator function is not activated and the SIM card is changed, the device switches on GPS Theft Mode and the device is locked. SIM Change (On Android OS 2.1) The device switches on GPS Theft Mode and the device is locked. If Wipe is enabled, sensitive device information is wiped automatically. Wipe Handset (On Android OS 2.2 and later) If the Device Administrator function is activated, a wipe command sent from the server sets the device back to factory settings. If the Device Administrator function is not activated, a wipe command deletes scheduling, contact and task information, SMS messages, and the memory card. 10 Anti Theft Features Copyright 2012, Juniper Networks, Inc.

15 Installing and Using Junos Pulse for Google Android Wipe Handset (On Android OS 2.1) Deletes scheduling, contact and task information. Send Backup If this data is not stored on the server, this feature gathers the backup information from the device and s it to the address provided in the registration process. GPS Location If your device is equipped with GPS, your administrator can locate your device. Device location is displayed on the Junos Pulse server. Alarm On and Off (Scream locate) Blares a maximum volume alarm sound to locate the device in a nearby location. GPS Theft On and Off Sends GPS updates to the Junos Pulse server on a 2 to 5 minute period to fine-tune GPS location if the device is stolen. Password Policies and Storage Encryption Junos Pulse can enforce password and storage encryption policies on your device. This means that you are required to use a device password and set up device data encryption that meets the criteria of the Junos Pulse security policy. A password policy can include but is not limited to requirements such as the number of required characters, the frequency in which you must change your password, the number of failed password entry attempts that can occur before the device is wiped, and the amount of time your device can remain idle before an auto lock occurs. Also, your password can be remotely reset and sent to you via . For example, if your device is remotely locked, an unlock command may reset your password with the new password being sent to you in an . If you have not set a device password or if your password does not meet the password policy requirements, you are prompted to reset your password so that it meets those requirements. As part of your device security policy, you may be required to encrypt your application data. If this is the case, a prompt will inform you of this requirement. You are continually prompted until you set the data encryption feature on your device. If you fail to meet the security policy requirements within a given period of time, it is possible for your device to be remotely locked or wiped. Scream Dismiss From the dashboard, a scream command can be sent to your device which allows you to audibly locate the device if it s within hearing distance, even if the speakers and ringer are muted. Once you locate the device, you can turn off the scream from the Notification bar. Select the Scream activated notification to dismiss the scream. Custom Button If your Junos Pulse deployment makes this feature visible to you, an additional button customized by your service provider, appears on your home screen. When you tap this button, a customized URL takes you to a web page that is set up by your service provider. This page may offer the purchase of additional features or it may provide additional information. This will vary by service provider. Copyright 2012, Juniper Networks, Inc. Anti Theft Features 11

16 Uninstalling or Clearing Data You may need to re register your device after the initial registration or you may need to clear your devices Junos Pulse settings for another reason. You can accomplish this by uninstalling Junos Pulse or by manually clearing all settings as follows. 1. From the main menu, select Settings > Applications > Manage Applications > Junos Pulse. 2. To uninstall Junos Pulse, select the Uninstall button. or 3. To clear all Junos Pulse data, select the Clear data button. If the Device Administrator function is activated, you can uninstall Junos Pulse by doing the following: 1. From the main menu, select Settings> Location & Security (or just Security on some devices). 2. Select Device Administrator and uncheck the Junos Pulse check box. Now you can begin the regular uninstall process. Adding a Secure Connection Informational Note: This service is only offered if you are accessing your corporate network resources securely. Junos Pulse uses your device s 3G, 4G, Edge or WiFi connectivity to establish an authenticated connection to a protected network. You can add a connection for each different network to which you connect. This is a secure VPN connection to your corporate network or a core access SSL channel to web bookmarks configured by your administrator. To define a connection, do the following: 1. Start Junos Pulse. 2. From the VPN tab, select Connections. 3. Select Add Connection. 4. Enter the connection properties as follows: Connection name: A descriptive name. URL: The Web address provided by your administrator. (Note that Connection name and URL are the only required fields when creating a connection profile. All other fields are optional.) Username: Enter your username. Realm: If your administrator has provided this information, enter the realm value. Role: If your administrator has provided this information, enter the role value. Uses Certificate: Select this check box if your administrator has provided you with a digital certificate. If you do not use a certificate, you may have to provide a username and password when you connect. 12 Uninstalling or Clearing Data Copyright 2012, Juniper Networks, Inc.

17 Installing and Using Junos Pulse for Google Android Certificate Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the certificate file. (Note that this field is required if you have selected Uses Certificate.) Key Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the network key provided by your administrator. (Note that this field is required if you have selected Uses Certificate.) 5. Select Create Connection. Your connection is now created and saved. Connecting Once you have configured your connection, select the Connect button. If the Select Connection field does not default to the correct connection, you can select it from the pulldown menu. You may have to enter additional information required by your network when you are establishing a connection. Viewing Connection Status Icon The status of your current connection also appears at the bottom of the Junos Pulse window in the form of an icon. The appearance of the icon indicates whether the connection is active, inactive, or limited by policy non compliance (see Limited Access on page 14). Active Connection No Session Limited Access The active connection icon also appears in the status bar at the top of your device window. When you close Junos Pulse, that icon remains visible as long as your VPN connection is active. Viewing Connection Status Window When you have an established, full VPN connection (not all devices support full VPN capability), selecting the Status button in the main window displays the following VPN information: VPN Status: Connected or Disconnected Server: Server URL Duration Bytes Sent Bytes Received Address From the Notification bar, the following notification also appears when you have an active VPN connection. Informational Note: If you only have access to web bookmarks (Core Access rather than VPN access) the VPN status is Disconnected but the Junos Pulse connection icon will appear at the bottom of the Junos Pulse window. Copyright 2012, Juniper Networks, Inc. Connecting 13

18 Limited Access To ensure the integrity of mobile devices that are accessing network resources, an administrator can enforce a security policy with which mobile devices must comply in order to connect to the network. If a device is found to be non compliant when attempting a secure network connection, only limited network access may be granted. When your device is non compliant, you are prompted with this information and you may be presented with a Continue button which you can tap to obtain limited network access. Reasons for non compliance may include the following: Your device has been rooted. Your device is running an operating system that is not allowed by the security policy. Your device is not actively registered with the appropriate Mobile Security Gateway (MSG) and/or Junos Pulse Mobile Security Suite is not active on your device. You must remedy the non compliance issue on your device before you can establish a full network connection. User Interface Modes Your administrator or service provider can deploy Junos Pulse to your device with varying features sets available to you through the Junos Pulse UI. You can have a full UI with all possible Junos Pulse features visible to you or you can have a minimal or security UI that includes a subset of Junos Pulse features that are visible to you. The possible UI modes that your administrator can deploy to your device are as follows: Full UI: The full UI includes all available Junos Pulse features as described in this manual. Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a Home screen that provides an About menu. For supported devices only, detected viruses, malware, and prohibited applications are deleted automatically. For malware and prohibited applications, a notification is displayed when an application removal occurs. When you tap on the notification, a screen appears which provides information on the application that was removed. You can tap the Clear button remove the notification. Security UI: The security UI includes only the Junos Pulse security features and does not provide the ability to make VPN connections. Known Issues and Limitations Android has limitations in its support for certificates. If you experience the "No cert" error, or if Junos Pulse closes unexpectedly when you try to connect, contact your administrator. At this time, you can only send log files using . No other methods are supported. Although Photo and Video Share appears as an option when you select Send Logs, it is not a valid method for sending logs. You should not select that option when sending log files. 14 User Interface Modes Copyright 2012, Juniper Networks, Inc.

19 Installing and Using Junos Pulse for Google Android When the device is locked by either the Handset Lock command or the Lock on SIM Change command, you may still be able to access the device s Home window and the Notifications window. If a device does not have cell service, it cannot receive commands. For example, if a device is connected only through WiFi, commands such as Lock and Wipe are not received by the device. If the Device Administrator is not activated, automatic removal of malware and prohibited applications, as well as the automatic application removal feature, are only available on certain Samsung devices. Please refer to the Junos Pulse Supported Platforms Guide for details. If your device registers with the MSG using automatic registration, and Lock on SIM change is enabled, and you change the SIM, the only way to unlock the device is to put the original SIM back in or to send an unlock command to the device from the dashboard. Copyright 2012, Juniper Networks, Inc. Known Issues and Limitations 15

20 16 Known Issues and Limitations Copyright 2012, Juniper Networks, Inc.

21 Index Index A anti-theft features alarm on and off, scream locate emergency call button GPS location GPS theft lock handset, new passcode set send backup SIM change unlock handset, new passcode set antivirus automatic application removal automatic URL registration available features B back up data C clear data connecting , 13 add a connection certificate key realm role status icon status screen, full VPN URL username custom button D dashboard Detections tab device administrator download application E address validation emergency call button EULA I installation L license code limited access, non-compliance M malware applications manual registration Mobile Security Dashboard O optimize media scanning P password policy profile update prohibited applications R remote monitoring S scan button scan inside archives scan results malware prohibited prohibited applications suspicious viruses scream dismiss secure connection security features antivirus, malware detection automatic URL registration manual registration register for security settings send logs settings storage encryption support info suspicious applications T threats detected U uninstall Copyright 2012, Juniper Networks, Inc. Index 1

22 update user interface modes V validate address view logs viruses W web security WIFI only devices Index Copyright 2012, Juniper Networks, Inc.

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

MiVoice Integration for Salesforce

MiVoice Integration for Salesforce MiVoice Integration for Salesforce USER GUIDE MiVoice Integration for Salesforce User Guide, Version 1, April 2014. Part number 58014124 Mitel is a registered trademark of Mitel Networks Corporation. Salesforce

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Sophos Mobile Control User guide for Apple ios

Sophos Mobile Control User guide for Apple ios Sophos Mobile Control User guide for Apple ios Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Egnyte App for Android Quick Start Guide

Egnyte App for Android Quick Start Guide Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

Accessing TP SSL VPN

Accessing TP SSL VPN Accessing TP SSL VPN This guide describes the steps to install, connect and disconnect the SSL VPN for remote access to TP intranet systems using personal notebooks. A. Installing the SSL VPN client Junos

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Zipit Chat. Functional Specification / User Manual

Zipit Chat. Functional Specification / User Manual Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment

More information

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE Mobile Device Management, User Guide Copyright 2013, CommuniTake Technologies Ltd., Yokneam, Israel. All rights reserved. For a hard-copy

More information

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07

Using MioNet. 2006 Senvid Inc. User Manual Version 1.07 Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

BlackBerry Desktop Software User Guide

BlackBerry Desktop Software User Guide BlackBerry Desktop Software User Guide Version: 2.4 SWD-1905381-0426093716-001 Contents Basics... 3 About the BlackBerry Desktop Software... 3 Set up your smartphone with the BlackBerry Desktop Software...

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Juniper Networks Management Pack Documentation

Juniper Networks Management Pack Documentation Juniper Networks Management Pack Documentation Juniper Networks Data Center Switching Management Pack for VMware vrealize Operations (vrops) Release 2.5 Modified: 2015-10-12 Juniper Networks, Inc. 1133

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

NHSmail mobile configuration guide Android mobile devices

NHSmail mobile configuration guide Android mobile devices NHSmail mobile configuration guide Android mobile devices Version: V.6 Date: September 2011 THIS INFORMATION IS FOR NHS STAFF AND IS NOT TO BE DISTRIBUTED OR COPIED OUTSIDE OF THE NHS Version 6.0 Crown

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

Notices. Copyright 2016 Malwarebytes. All rights reserved.

Notices. Copyright 2016 Malwarebytes. All rights reserved. Malwarebytes Anti-Malware Mobile User Guide Version 2.0.5 3 May 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

WE VoIP User Guide For OfficeServ 7000 Series

WE VoIP User Guide For OfficeServ 7000 Series WE VoIP User Guide For OfficeServ 7000 Series WE-VoIP Client V3.5.0.3 WE VoIP User Guide for OfficeServ November 2013 1 Disclaimer Every effort has been made to eliminate errors and ambiguities in the

More information

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4 Updated: May 31, 2011 Contents This document describes the Cisco AnyConnect Secure Mobility Client 2.4 for devices running Symbian.

More information

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011 Sophos Mobile Control User guide for Apple ios Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on an Apple iphone... 4 3 Set up

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Frequently Asked Questions: Cisco Jabber 9.x for Android

Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

USER GUIDE: MaaS360 Services

USER GUIDE: MaaS360 Services USER GUIDE: MaaS360 Services 05.2010 Copyright 2010 Fiberlink Corporation. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

NetSuite OpenAir Mobile for Android User Guide Version 1.3

NetSuite OpenAir Mobile for Android User Guide Version 1.3 NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Samsung KNOX User Guide KNOX for Consumers Edition

Samsung KNOX User Guide KNOX for Consumers Edition Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung

More information

Secure Work Space for Android. User Guide

Secure Work Space for Android. User Guide User Guide Published: 2015-10-07 SWD-20151007211003333 Contents... 4 About Secure Work Space for BES12...4 About Work Space Manager for BES12... 4 Switch between your personal space and work space... 4

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

Verizon Wireless Field Force Manager. Windows Mobile Devices

Verizon Wireless Field Force Manager. Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Table of Contents Application Requirements...3 Windows

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009 Getting Started with Microsoft Office Live Meeting Published October 2007 Last Update: August 2009 Information in this document, including URL and other Internet Web site references, is subject to change

More information

Sophos Mobile Control User guide for Windows Mobile

Sophos Mobile Control User guide for Windows Mobile Sophos Mobile Control User guide for Windows Mobile Product version: 2 Document date: December 2011 Contents 1 About Sophos Mobile Control... 3 2 Set up Sophos Mobile Control on a Windows Mobile device...

More information

Configuring, Customizing, and Troubleshooting Outlook Express

Configuring, Customizing, and Troubleshooting Outlook Express 3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane

More information

TABLE OF CONTENTS. Legend:

TABLE OF CONTENTS. Legend: user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main

More information

Getting Started with Microsoft Office Live Meeting. Published October 2007

Getting Started with Microsoft Office Live Meeting. Published October 2007 Getting Started with Microsoft Office Live Meeting Published October 2007 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Android, AdWords, Gmail,

More information

CareSentinel Set Up Guide for Android Devices

CareSentinel Set Up Guide for Android Devices CareSentinel Set Up Guide for Android Devices Compatible Devices: Only devices running Android 4.3 or newer support Bluetooth Smart. Any smart phone or tablet running an Android operating system older

More information

Manage Mobile Devices

Manage Mobile Devices Manage Mobile Devices After your mobile device users enroll with the GlobalProtect Mobile Security Manager, you can monitor the devices and ensure that they are maintained to your standards for protecting

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface Contents 1. Introduction 2. How to Install/Uninstall Business Everywhere 3. The Business Everywhere interface 4. Launching Business Everywhere 5. Connection 6. Business Everywhere management tools 7. Troubleshooting

More information

User Guide PUSH TO TALK PLUS. For Android

User Guide PUSH TO TALK PLUS. For Android User Guide PUSH TO TALK PLUS For Android PUSH TO TALK PLUS For Android Contents Introduction and Key Features...4 PTT+ Calling to Individuals and Groups...4 Supervisory Override...4 Real-Time Presence...4

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Android support for Microsoft Exchange in pure Google devices

Android support for Microsoft Exchange in pure Google devices Android support for Microsoft Exchange in pure Google devices Note: The information presented here is intended for Microsoft Exchange administrators who are planning and implementing support for any of

More information

Vodafone Email Plus. User Guide for Windows Mobile

Vodafone Email Plus. User Guide for Windows Mobile Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING

More information