Notices. Copyright 2016 Malwarebytes. All rights reserved.

Size: px
Start display at page:

Download "Notices. Copyright 2016 Malwarebytes. All rights reserved."

Transcription

1 Malwarebytes Anti-Malware Mobile User Guide Version May 2016

2 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. You may copy and use this document for your internal, reference purposes only. This document is provided as-is. The information contained in this document is subject to change without notice and is not warranted to be error-free. If you find any errors, we would appreciate your comments; please report them to us in writing. The Malwarebytes logo and Malwarebytes Anti-Malware Mobile are trademarks of Malwarebytes. Android and Google are registered trademarks of Google, Inc. All other trademarks or registered trademarks listed belong to their respective owners. Copyright 2016 Malwarebytes. All rights reserved.

3 Contents 1.0 Introduction What s New Background (Real-Time) Scanning Getting Started Correcting Initial Issues Last Scan Performed Last Scan Ignore Malware (not deleted or added to whitelist) Unscanned Apps Old/Missing Malware Database Old/Missing Malicious URL Database Whitelist Cleared Scheduled Scans Disabled Real-Time Protection Disabled Security Audit Issues Malware Cannot be Deleted Navigating the App Scanner Scan Settings Running a Scan Viewing Scan History Interpreting Scan Results Acting on Scan Results Whitelist Security Audit Installing apps from unknown sources Development mode NFC Android Beam GPS tracking Your Apps Privacy Audit About Settings Scanning Protection Real-Time Protection Scan Links Sent Via SMS...18

4 9.3 Other Scanning History Database Updated Notifications Feedback Help Us Anonymously Share Third Party Project Usage... 22

5 1.0 Introduction Malwarebytes Anti-Malware Mobile has been designed to detect and eliminate malware, spyware and PUPs (Potentially Unwanted Programs) for mobile devices utilizing the Android operating system (version 2.3 or later). Malwarebytes Anti-Malware Mobile also provides features which enable the user to control security features that affect them and their mobile device, in plain English! 1.1 What s New A number of changes have taken place in the newest version of Malwarebytes Anti-Malware Mobile. This is a brief rundown on those changes: Kindle device rotation problem fixed Turkish language support Resolution of memory issues New user interface scheme Several bug fixes Malwarebytes Anti-Malware Mobile User Guide Page 1

6 2.0 Background (Real-time) Scanning Malwarebytes Anti-Malware Mobile will automatically perform scans in the background during normal operation. These scans occur in real-time, and are based on specific events. These events include: Additions and/or modifications to files on the file system Downloading of files from external sources Installation of downloaded files Execution of applications Potentially Unwanted Programs (PUPs), based on functionality and/or behavior Insertion of SD memory cards Scan on reboot. At this time, some devices do not support this feature. If questionable files are found during a scan, they will be brought to your attention. You may choose to whitelist, skip, or delete each item. Whitelisting a file will prevent it from appearing on subsequent scans unless its signature changes. Skipping an item will allow it to remain, but it will be detected during the next scan. Malwarebytes Anti-Malware Mobile User Guide Page 2

7 3.0 Getting Started The first time that Malwarebytes Anti-Malware Mobile is launched, it will behave a bit differently than it will from that point forward. We want to give you the chance to read the End User License Agreement (EULA), to learn more about the value of Real-Time Protection, as well as give you the opportunity to turn on Real-Time Protection. As with any security product, always on protection keeps you and your device the safest. The following screenshots show what you will see the first time you launch Malwarebytes Anti-Malware Mobile. This is the screen you see when you launch Malwarebytes Anti-Malware Mobile for the first time. You will only see it once. Click Next to continue. Real-Time Protection is an essential part of keeping your device safe. We give you a chance immediately to Activate it or to Skip it and move on. Time to get started learning about Malwarebytes Anti-Malware Mobile! Malwarebytes Anti-Malware Mobile User Guide Page 3

8 You will now get your first look at the Dashboard. It is the entry screen for Malwarebytes Anti-Malware Mobile, and serves as a starting point for everything else you need to do within the program. You will briefly see an in-progress screen while the Dashboard performs a health check. This is a series of assessments that inform you of your device s security status. Samples of the Dashboard display are shown below. The device is considered safe. If you see the message See ignored issues after the first scan, it indicates that you have elected to ignore certain non-critical issues. The health check has detected noncritical issues which should be reviewed and/or corrected. Press Fix Now to see issues which were detected, and choose whether to correct them or to ignore them. The health check has detected critical issues. The database version is outdated. There may be other issues as well. Press the Fix now bar to see a list of all issues and correct them. Malwarebytes Anti-Malware Mobile User Guide Page 4

9 3.1 Correcting Initial Issues During the health check, the See ignored issues and Fix now message bars gave you the opportunity to look deeper at issues which Malwarebytes Anti-Malware Mobile considered to be a problem. Selecting either of those messages (depending on which was displayed) takes you to the Issues screen, shown below. Depending on the number of issues noted by the program, you may need to scroll through the list to see all of the issues. Issues are color-coded to denote their importance to your level of protection. Color coding appears on the bullet to the left of the message. Colors used are: Yellow: Issues have been noted which may affect your security, but they are not critical. Red: Critical issues have been noted, and your security is at risk. You will notice checkboxes to the right of each item. These checkboxes determine whether the accompanying notification will appear on the Dashboard. Red (critical) items are always checked, and are always displayed on the Dashboard. Yellow (non-critical) items may be checked or unchecked, and display of each non-critical item on the Dashboard is controlled by the state of its checkbox. The next several sections are a listing of all issues which may appear on this list, their severity, and the recommended method to correct each of them Last Scan Performed Non-Critical: Last scan has been performed more than a week ago Critical: Full scan has never been performed yet Critical: Last scan has been performed more than 2 weeks ago Resolution: Perform a full scan Last Scan Ignore Malware (not deleted or added to whitelist) Non-Critical: After last scan user ignored some unwanted malware Critical: After last scan user ignored some dangerous malware Resolution: Perform a full scan Unscanned Apps Non-Critical: User has new apps that haven't been scanned yet Resolution: Perform a full scan Old/Missing Malware Database Non-Critical: Last malware database update has been performed more than a week ago Critical: Malware database has not been updated yet Critical: Last malware database update has been performed more than 2 weeks ago Resolution: Update Malware Database Malwarebytes Anti-Malware Mobile User Guide Page 5

10 3.1.5 Old/Missing Malicious URL Database Non-Critical: Last malicious URL database update has been performed more than a week ago Critical: Malicious URL database has not been updated yet Critical: Last malicious URL database update has been performed more than 2 weeks ago Resolution: Update Malicious URL Database Whitelist Cleared Non-Critical: Whitelist that contained unwanted malware has been cleared Critical: Whitelist that contained dangerous malware has been cleared Resolution: Perform a full scan Scheduled Scans Disabled Non-Critical: Scheduled scans are disabled Resolution: Enable scheduled scans Real-Time Protection Disabled Non-Critical: Real-Time Protection is disabled Resolution: Enable Real-Time Protection Security Audit Issues Non-Critical: Security Audit detected some issues Resolution: Review Security Audit and make changes where appropriate Malware Cannot be Deleted Critical: Resolution: User has malware which couldn't be deleted after last scan Send report to Malwarebytes Technical Support with malware items info Malwarebytes Anti-Malware Mobile User Guide Page 6

11 3.2 Navigating the App Once Malwarebytes Anti-Malware Mobile has been installed on your device, it can be launched from the notification bar at the top of your screen, as well as from your Apps screen. You may configure the notification bar icon to be hidden as well more on that later. The following screenshot shows the presentation of Malwarebytes Anti-Malware Mobile. The entire left edge of the Dashboard is a hot spot. If you see three horizontal bars in the upper left corner of the Malwarebytes screen, swipe your finger from the left edge of the display, across the screen to display the program Menu. It is shown here. At other times, you will see an arrow pointing to the left in the same area of the screen. Pressing the arrow takes you back to the screen you were on most recently. The remainder of this guide will go into detail for the seven options that are displayed on the Menu. Malwarebytes Anti-Malware Mobile User Guide Page 7

12 4.0 Scanner These settings allow you to define how and when Malwarebytes Anti-Malware Mobile will scan your system for malware, what to do if malware is found, and what if anything it should ignore. Before going any further, two settings at the top of the Scanner page should be mentioned. Whitelist is used to exclude some files from being scanned as part of a normal scan. Scan Settings allow you to define if scheduled scans are to be performed, when they are to be performed, and if scans should be run based on certain device events. Both will be covered in more detail later. 4.1 Scan Settings This option is also available as part of Settings available from the Malwarebytes Anti-Malware Mobile Menu. Please refer to Section 9.1 for detailed information on this option. 4.2 Running a Scan The left screenshot is a typical view of the Scanner. There is no history until you create that history. Note the blue bar at the bottom labeled Run a Scan. Press that bar to start a scan. The screenshot on the right shows a scan in progress. The progress bar may be green, yellow or red. Green means a clean device. Yellow means that one or more PUP s (Potentially Unwanted Program) have been detected. Red means that malware has been detected. Malwarebytes Anti-Malware Mobile User Guide Page 8

13 4.3 Viewing Scan History After Malwarebytes Anti-Malware Mobile has been running on your device for a while, Scan History will look more like what you see here. There is a limited amount of room to show history of individual scans on a single screen, so you will need to scroll up or down to see the full scan history. 4.4 Interpreting Scan Results When looking at Scan History, you will notice a number of similarities between scan results. We thought it might be helpful to document the results you will be seeing. In this section, references will be made to whitelisting, ignoring and deleting files. Those will be covered in detail in the following section. The user ran an On-demand (non-scheduled) scan to completion. No problems were noted during the scan, so it is shown with a green dot. The user ran an On-demand (non-scheduled) scan, but stopped the scan before it was finished. The red dot indicates that malware was detected. If no malware was detected and the scan was not allowed to run to completion, the scan is not logged. The user ran an On-demand (non-scheduled) scan to completion. Malware was detected, and remediation has taken place. A scheduled scan was run by Malwarebytes Anti-Malware Mobile. No malware was detected. A scheduled scan was run by Malwarebytes Anti-Malware Mobile. Malware was detected. You must whitelist, ignore or delete the detected malware. Malwarebytes Anti-Malware Mobile User Guide Page 9

14 The user ran an On-demand scan to completion. Multiple PUPs were detected. Please note that PUPs are counted as malware. True malware would cause the status indicator to shift from yellow to red. You must whitelist, ignore or delete the detected malware. A scan was executed after the signature database was updated. The scan detected malware. You must whitelist, ignore or delete the detected malware. An SMS scan detected a phishing link. A scan of a SD memory card being inserted into the device resulted in malware being detected. From the red status indicator, we can tell that it is true malware. There may also be PUPs among the malware which has been detected. A scan was executed after the device was rebooted, and malware was detected. From the red status indicator, we can tell that it is true malware. There may also be PUPs among the malware which has been detected. Real-Time Protection detected malware during a file transfer. You must whitelist, ignore or delete the detected malware. Real-Time Protection detected a PUP during a file transfer. We know it was a PUP and not malware because the status indicator is yellow (instead of red). You must whitelist, ignore or delete the detected malware. Real-Time Protection was triggered by installation of a file which was identified as a PUP. It is shown as malware, but because it is shown with a yellow status indicator, we know it is a PUP. You must whitelist, ignore or delete the detected malware. Real-Time Protection was triggered by execution of a file which was identified as malware. You must whitelist, ignore or delete the detected malware. 4.5 Acting on Scan Results If you run a scan and the scan does not detect any malware, you re safe for the time being. If malware is detected, it needs to be dealt with. You have three choices: Delete The threat will be deleted from your device Ignore Always The file which has been detected as a threat will be added to a Whitelist, and excluded from future scans. Legitimate files are sometimes detected as malware. There may also be files which are classified as PUPs that you want to use. These are examples of files to be excluded from scanning. Ignore Once A file has been detected as a threat, but you re not sure whether it should be added to a Whitelist or deleted. You choose to ignore it this time only. It will be detected as malware on your next scan, and this scan to be shown as red status, because malware remains after the scan results have been processed. Malwarebytes Anti-Malware Mobile User Guide Page 10

15 This is a typical view of Scan results after a scan has been completed and malware has been detected. Please note that all items have been checked. (While we only see 5 items here, the Deselect All choice in the upper right means that all malware detected has been selected. Pressing Deselect All will remove the checkmarks from all files, and change the option from Deselect All to Select All. As stated above, you can choose to delete threats, ignore them once, or ignore them always. For each disposition, select the file(s) from the list and choose what you want to do with them. You will be asked to confirm your choice, and if confirmed, your choice will be acted on. The file(s) will be removed from the list, leaving only the files which still need to be acted on. Choose the files which will be handled in the next method. If your first action was to delete threats, you would now choose which should be ignored always. If any files are left over, choose to delete them or to ignore them this time only. You should not leave any threats outstanding without choosing how they should be handled. There may be times that files cannot be deleted after a scan. This may occur for the following reasons: Files may reside in system folders They are locked or in use by other apps Malwarebytes Anti-Malware Mobile was not given storage permissions (or permissions were revoked) Files are bloatware installed on the device by the vendor. If this situation occurs, you will see an error indication when you try to delete a file of this type. To find the location/path of the file, tap on the scan history (available in Menu Scanner). This will display all files and apps detected for that particular scan. Malwarebytes Anti-Malware Mobile User Guide Page 11

16 4.6 Whitelist Whitelist is a list of files or apps that have been considered suspicious based on scan results by Malwarebytes Anti- Malware Mobile, but have been specifically listed as acceptable by the user. A screenshot of the Whitelist is shown below. If a file/app is listed here, it is considered safe only because the user said it is safe. Files/apps may only be added to the Whitelist as part of processing malware detected during a scan. If you have added a file/app to the Whitelist and later decided that you do not wish it to be excluded from scanning, select the checkbox next to the file/app and press Remove from whitelist. It will be removed immediately. You may remove all files/apps from the Whitelist by pressing Select all at the top right, followed by Remove from whitelist. Once a file/app has been added to the Whitelist, it will remain there until you remove it, or if Malwarebytes Anti-Malware Mobile has determined that the file has changed. This may be because its signature has changed (possibly indicating active malware in the file/app), or because the file/app has been updated. Malwarebytes Anti-Malware Mobile User Guide Page 12

17 5.0 Security Audit This feature provides capability to enable different options which enhance your personal privacy and security. Options shown are dependent on features which the mobile device offers. Each option shown here is shown in either the Insecure Settings or Secure Settings areas of the screen. Insecure Settings imply a security risk due to the setting chosen for the specific option, while Secure Settings are ones which do not put your device at risk. Shown below is the Security Audit screen displaying typical results. The screenshot at the left shows results of a Security Audit. Two settings fall into the category of insecure, while the other three settings are optimal. By turning off the two detected settings, the Security Audit screen will then appear as shown in the screenshot at the right. Please note that the Security Audit screen will only show references to features which your device offers. Below is a description of each of these settings. 5.1 Installing apps from unknown sources This feature maps to an Android screen which allows a choice between installing apps from any source, or only from approved sources. The specific screen name is variable depending on the mobile device used. 5.2 Development mode This feature maps to the Android Developer Options screen, which allows a device to be used as a development platform. In development mode, many security features are disabled to allow a developer to control these features programmatically. Presence of this feature is dependent on hardware and software which supports this feature. 5.3 NFC This feature maps to the Android Wireless/Networks screen, which allows a device to be able to communicate with another device using Near Field Communication (NFC). Presence of this feature is dependent on hardware and software which supports this feature. Malwarebytes Anti-Malware Mobile User Guide Page 13

18 5.4 Android Beam This feature maps to the Android Wireless/Networks screen, which allows a device to be able to transfer information to/from another Android device if Near Field Communication (NFC) is enabled. Presence of this feature is dependent on hardware and software which supports this feature. 5.5 GPS tracking This feature maps to the Android Location Access screen, which controls whether other apps can determine your location based on Global Positioning System (GPS) measurements made by your mobile device. Please note that GPS is always enabled for devices used in United States of America to comply with Emergency Services (911) guidelines. This setting cannot disable that aspect, and other built-in security measures assure that only Emergency Services communication systems are permitted to track device location. Malwarebytes Anti-Malware Mobile User Guide Page 14

19 6.0 Your Apps Your Apps is divided into two sections: Running apps and Installed apps. The left screenshot shows Running apps. You can see all Installed apps by pressing Installed. For either type, swipe down if needed to see the full list. Press the three bars at the upper right of the screen to change the way apps are sorted. Press the arrow next to Malwarebytes Anti-Malware to display app information, as shown in the screenshot at the right. You can get much more detailed information about the app itself by pressing App Info from the App screen. This screen shows memory usage characteristics of the app, and provides options affecting operation of the app as well as memory usage and configuration. These options include: Stop App info Uninstall Please note that when you are looking at App info, you have crossed over from the Malwarebytes Anti-Malware Mobile app to an Android system utility. It is an extension of the Android operating system, and while this utility provides deeper access to how apps function, it can also allow you to break apps unknowingly. For this reason, please read the following warnings: WARNINGS: 1. Many running apps are required for functionality of the mobile device. Use of the Stop or Uninstall options may cause undesired results. Stop affect all processes and threads related to the app, and may also affect other apps which rely on any of the processes being closed. 2. Unintended use of Clear data or Clear cache options may destroy app configuration and may immediately affect app behavior. 3. Many installed apps are required for functionality of the mobile device. Use of the Force close option may cause undesired results. Malwarebytes Anti-Malware Mobile User Guide Page 15

20 7.0 Privacy Audit Privacy Audit is designed to help you maintain a more secure environment when using your mobile device. When you load this screen, all apps are scanned with regard to privacy settings. When the scan is complete, you will receive a breakdown of how your privacy may be affected by each installed app, based on the following criteria. You may need to scroll down to see the entire list. Can Cost You Money These apps can send SMS and make calls. Can Make Calls These apps can make calls without user confirmation Can Track Location These apps can access your location. Have Network Access These apps can access the internet. Can Read Your Personal Info These apps can access your contacts, phone number and web history. Can Access Secure Settings These apps can change your PINs and lock patterns. Can Access Calendar These apps can access your calendar. Can Monitor Calls These apps can record your calls. Can Access Text Messages These apps can read your text messages. Can Access Storage These apps can read and write files from your phone s memory. Can Access Accounts These apps can access your added system accounts. These accounts include, but are not limited to, your Google account. Can Publish Shortcuts These apps can automatically create shortcuts on the main a screen, a tactic often used by aggressive ad networks. Can Control Hardware These apps can access your hardware, including, but not limited to, camera and NFC adapters. Press the arrow next to any privacy category to see a list of which apps are in that category. From the list of apps, you can press an arrow next to an any app which details its resource usage (as shown in the previous section. Don t be alarmed if you see some variation in resource usage each time you view an app. These numbers are dynamic, and are affected by what you are asking the app to do. Malwarebytes Anti-Malware Mobile User Guide Page 16

21 8.0 About The About screen allows you to quickly determine database versions used in Malwarebytes Anti-Malware Mobile, as well as the version of the program itself. App version is the version of Malwarebytes Anti-Malware Mobile. This includes added information that is primarily used internally. The part you need to be concerned with the leftmost portion (v2.00). Malware DB version is the collection of threat signatures which keep you safe. It is updated on a regular basis. Malicious URL DB version guards against phishing and malicious web sites. It too is updated on a regular basis. Rate this app allows you to tell other potential users what you think of Malwarebytes Anti-Malware Mobile in Google Play. Clicking License Agreement will launch a browser and connect to the Malwarebytes website, to allow viewing of the licensing agreement which governs use of all Malwarebytes products. Malwarebytes Anti-Malware Mobile User Guide Page 17

22 9.0 Settings These options control many aspects of the behavior of Malwarebytes Anti-Malware Mobile. You may control scheduling of scans and database updates, real-time protection and which results you see. 9.1 Scanning These settings allow you to enable/disable certain types of scans, and in the case of scheduled scans, specify exactly when they will be performed. Explanation of each setting is as follows: Scan after reboot If checked (enabled), a full system scan will occur immediately after your device is rebooted (restarted). If unchecked, no scan will occur at that time. Scan after update If checked (enabled), a full system scan will occur after each database update. If unchecked, a database update will not trigger a scan. Scheduled scans If checked, your device will be scanned automatically by Malwarebytes Anti-Malware Mobile based on the following settings: o Scan frequency Select this to choose whether scheduled scans will occur on a daily or weekly basis. o The days of the week If Scan Frequency is set to Weekly, selecting this option will take you to the Scan Days screen. This screen allows you to check which days that you would like a scan to occur on. o Time Select this to choose the exact time at which a scan will begin. Please note that if scans are scheduled to be run on multiple days, all scans will occur at the same time of day. If Scheduled scans is unchecked (disabled), non-scheduled scans still occur on an on-demand basis. 9.2 Protection Along with maintaining a current set of database threat signatures, these settings control the most critical aspect of protection that Malwarebytes Anti-Malware Mobile offers. While some users prefer to run scans at a time that is convenient, it is not always possible to undo damage which may have been caused by not using real-time protection. For this reason, we strongly encourage you to enable these settings Real-Time Protection When this setting is checked (enabled), Malwarebytes Anti-Malware Mobile proactively protects your device from harm in a number of ways, which include: Additions and/or modifications to files on the file system Downloading of files from external sources Installation of downloaded files Execution of applications Insertion of SD memory cards Scan Links Sent Via SMS When this setting is checked (enabled), Malwarebytes Anti-Malware Mobile will scan received SMS messages to assure that links in these messages do not contain phishing URLs. This type of malware is very prevalent in mobile devices. Malwarebytes Anti-Malware Mobile User Guide Page 18

23 9.3 Other This group of settings takes care of what information is provided to you in your scan history, as well as how and when you perform database updates Scanning History This defines which types of scans will be reported to the user via History, as described above. This option does not affect what triggers a scan, only what is reported following completion of the scan. Scan categories which can be reported are as follows: Execution These are apps which have entered the run state (scheduled, programmatic or by user request). The scan will occur after execution. If no malware is present, no entry log is created. Installation This includes apps which are being installed. The app will be scanned after installation. File monitor This includes files which have been added, moved or renamed. System scan This includes all directories on the mobile device. Specific file extensions which will be scanned are.apk,.dex,.so,.bin and.jar files. This also includes all installed applications, but does not include applications currently being installed. SD card monitor This includes all files stored in auxiliary memory (SD card). SMS scanner This includes phishing links or malicious links which are associated with SMS messaging Database Updated These settings determine how and when your device receives updates. A brief description of each setting is as follows. Auto updates enabled Determines whether you receive updates to your signature database automatically. If this setting is disabled, the setting for Update frequency is also disabled. Please note that this is a critical part of keeping your device protected. Auto update Over Wi-Fi Allows you to specify whether you receive database updates using Wi-Fi networks exclusively, or use a cellular network. Use of Wi-Fi allows you to reduce data usage. Update frequency The interval between checks for database updates. You may choose an interval of 1, 3 or 6 hours between checks. This setting is disabled if Auto Updates Enabled has been turned off. Force Update A toaster message will inform you that the database is up to date, or that a database update is beginning. Please note that the date and time of the most recent update check will be shown here whether you actually download a database update. If your signatures are already current, there is no need to update again. 9.4 Notifications This screen includes four settings which govern information provided by Malwarebytes Anti-Malware Mobile during execution. Information pertaining to these settings is as follows: Notification Icon This setting determines whether the Malwarebytes icon is shown on the Notification bar, and when shown, whether it is in color or in shades of gray. The choice of color to be displayed is strictly a matter of user preference. Scheduled Scans This setting determines whether a notification is displayed when a scheduled scan starts. If disabled, the scan will run silently in the background. Scan Result This setting controls whether scan results are displayed following execution of a scan when no malware was detected during the scan. Malwarebytes Anti-Malware Mobile will let you know when malware was detected. When no malware was detected, the choice is yours to make. Database Updates This settings determines whether notifications will be displayed pertaining to database updates. Malwarebytes Anti-Malware Mobile User Guide Page 19

24 9.5 Feedback This option allows you to send us an . After using Malwarebytes Anti-Malware Mobile, tell us what you like. Tell us what you don t like. What would you like to see in the future? We can t tailor our products to match everyone s wish list, but it s always good to know what people want and need. This gives you a chance to tell us how we re doing. 9.6 Help Us Anonymously Checking this setting allows Malwarebytes Anti-Malware Mobile to send usage characteristics for review. Usage characteristics is defined as: App Name and Version Device System Architecture (ARM, x86, etc.) Phone Locale OS Name (currently Android only) UUID (unique code associated with Malwarebytes installation on a specific device) Database Version Analytics will also be sent when malware has been detected as a result of real-time protection, an ondemand scan or a scheduled scan. This information is sent five minutes after installation of Malwarebytes Anti-Malware Mobile, and every six hours afterwards. If this option is turned off, App Name/Version and UUID will not be sent to Malwarebytes. All other information listed above will continue to be sent every six hours. Malwarebytes Anti-Malware Mobile User Guide Page 20

25 10.0 Share Pressing Share allows you to share Malwarebytes Anti-Malware Mobile with one or more contacts. In this case, no method has been previously set up, so you can choose from the various messaging methods which you are using on this device. Once you have chosen a method of sharing the app, you will see a way to specify who to share the app with. This may be through use of another app, or through a code snippet. That varies from method to method and will not be shown here. Please note that if you uninstall the app which you have chosen as your sharing method, you may experience undesired results. Also, choosing a sharing method which you are not logged into at the time will prompt you to login to the app used by that method. Malwarebytes Anti-Malware Mobile User Guide Page 21

26 11.0 Third Party Project Usage Malwarebytes software is made possible thanks in part to many open source and third party projects. A requirement of many of these projects is that credit is given where credit is due. The Malwarebytes Third Party License Supplement is a downloadable reference which specifies each of these projects, and where they are used. It can be downloaded from: Malwarebytes Anti-Malware Mobile User Guide Page 22

Malwarebytes Anti-Malware for Mac User Guide Version 1.1 1 October 2015

Malwarebytes Anti-Malware for Mac User Guide Version 1.1 1 October 2015 Malwarebytes Anti-Malware for Mac User Guide Version 1.1 1 October 2015 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

Sophos Cloud Help Document date: January 2016

Sophos Cloud Help Document date: January 2016 Sophos Cloud Help Document date: January 2016 Contents 1 About Sophos Cloud Help...4 2 Activate Your License...5 3 The Sophos Cloud User Interface...6 4 Dashboard...7 4.1 Action Center...7 4.2 Email Alerts...14

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

MALWAREBYTES PLUGIN DOCUMENTATION

MALWAREBYTES PLUGIN DOCUMENTATION Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016

Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016 Malwarebytes Anti-Malware User Guide Version 2.2.1 18 March 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

GFI Cloud User Guide A guide to administer GFI Cloud and its services

GFI Cloud User Guide A guide to administer GFI Cloud and its services GFI Cloud User Guide A guide to administer GFI Cloud and its services Contents 1 Introduction to GFI Cloud 5 1.1 The aim of this guide 6 1.2 What is GFI Cloud? 6 1.3 GFI Cloud features 6 1.4 How it works

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

User Manual for Web. Help Desk Authority 9.0

User Manual for Web. Help Desk Authority 9.0 User Manual for Web Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

TrustPort Mobile Security

TrustPort Mobile Security TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,

More information

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014

Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Malwarebytes Enterprise Edition Best Practices Guide Version 1.3 21 March 2014 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15

DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD. Unify Data Management Platform 2012/2013 Software Build 5.15 DIRECT MESSAGING END USER GUIDE ALABAMA ONE HEALTH RECORD Unify Data Management Platform 2012/2013 Software Build 5.15 April 2015 Proprietary and Confidential Property of Truven Health Analytics Inc.

More information

GROUPTALK FOR ANDROID VERSION 3.0.0. for Android

GROUPTALK FOR ANDROID VERSION 3.0.0. for Android for Android Requirements Android version 2.3 or later. Wi-Fi or mobile data connection of at least 20kbit/s network bandwidth. Optional: Bluetooth audio requires Android version 4.0.3 or later. Optional:

More information

Kaspersky Password Manager

Kaspersky Password Manager Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Outlook Web Access. PRECEDED by v\

Outlook Web Access. PRECEDED by v\ Outlook Web Access Logging in to OWA (Outlook Web Access) from Home 1. Login page http://mail.vernonct.org/exchange 2. To avoid these steps each time you login, you can add the login page to your favorites.

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

Install MS Office 365 on your Android mobile device

Install MS Office 365 on your Android mobile device Install MS Office 365 on your Android mobile device IT Documentation Team, March 2015 This factsheet contains instructions for installing the Office Mobile for Android phone and Office for Android tablet

More information

Rochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation

Rochester Institute of Technology. Finance and Administration. Drupal 7 Training Documentation Rochester Institute of Technology Finance and Administration Drupal 7 Training Documentation Written by: Enterprise Web Applications Team CONTENTS Workflow... 4 Example of how the workflow works... 4 Login

More information

Sophos Computer Security Scan startup guide

Sophos Computer Security Scan startup guide Sophos Computer Security Scan startup guide Product version: 1.0 Document date: February 2010 Contents 1 About the software...3 2 What do I need to do?...3 3 Prepare for scanning...3 4 Install the software...4

More information

USER MANUAL SlimComputer

USER MANUAL SlimComputer USER MANUAL SlimComputer 1 Contents Contents...2 What is SlimComputer?...2 Introduction...3 The Rating System...3 Buttons on the Main Interface...5 Running the Main Scan...8 Restore...11 Optimizer...14

More information

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0.

User Guide. Essentials Edition. for the. Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com. Version 8.0. User Guide for the Essentials Edition Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Version 8.0.1 Webroot SecureAnywhere User Guide for the Essentials Edition

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Verizon Wireless Field Force Manager. Windows Mobile Devices

Verizon Wireless Field Force Manager. Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Verizon Wireless Field Force Manager User Guide for Windows Mobile Devices Table of Contents Application Requirements...3 Windows

More information

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015

Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015 Malwarebytes Anti-Malware for Business Endpoint Administrators Guide Version 1.80 17 September 2015 Notices Malwarebytes products and related documentation are provided under a license agreement containing

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

ESC Mobile App Guide

ESC Mobile App Guide ESC Mobile App Guide General Info and Installation Guide For Android Note: If you re just trying to demo the ESC Mobile app in our sample database, then all that is required is to download it from your

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Samsung KNOX User Guide KNOX for Consumers Edition

Samsung KNOX User Guide KNOX for Consumers Edition Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

Viewing Paycheck Information Online - LSUSH Off Campus

Viewing Paycheck Information Online - LSUSH Off Campus Viewing Paycheck Information Online - LSUSH Off Version Date: March 2013 COPYRIGHT & TRADEMARKS Copyright 1998, 2011, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark

More information

Detecting and Removing Spyware From Your Home Computer

Detecting and Removing Spyware From Your Home Computer Detecting and Removing Spyware From Your Home Computer Preamble: Spyware are programs that silently monitor and report on computing activities via the Internet. Companies use Spyware to target users with

More information

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1

What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 What is new or different in AppScan Enterprise v9.0.2 if you re upgrading from v9.0.1.1 Larissa Berger Miriam Fitzgerald April 24, 2015 Abstract: This white paper guides customers through the new features

More information

CareSentinel Set Up Guide for Android Devices

CareSentinel Set Up Guide for Android Devices CareSentinel Set Up Guide for Android Devices Compatible Devices: Only devices running Android 4.3 or newer support Bluetooth Smart. Any smart phone or tablet running an Android operating system older

More information

AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)

AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012) AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement...

AdwareMedic. About AdwareMedic... 2. How to use AdwareMedic... 3. Frequently Asked Questions... 7. Version History... 9 License Agreement... AdwareMedic http://www.adwaremedic.com [email protected] About AdwareMedic... 2 System Requirements... 2 Limitations... 2 How to use AdwareMedic... 3 Scan for Adware... 4 Optional items... 5 Firefox

More information

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection

User Guide for PCs. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection User Guide for PCs SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Endpoint Protection Copyright Webroot SecureAnywhere User Guide for PCs July, 2013 2013 Webroot

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Document Number: 13004.25-4.5.2-6/15/2012

Document Number: 13004.25-4.5.2-6/15/2012 Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo

More information

Viewing Paycheck Information Online - LSU Health New Orleans - On Campus

Viewing Paycheck Information Online - LSU Health New Orleans - On Campus Viewing Paycheck Information Online - LSU Health New Orleans - On Campus Version Date: March 2013 COPYRIGHT & TRADEMARKS Copyright 1998, 2011, Oracle and/or its affiliates. All rights reserved. Oracle

More information

TRIMS Cloud Computing

TRIMS Cloud Computing TRIMS Cloud Computing www.trims.com/cloud TRIMS Workstation iphone, ipad, Android TRIMS Cloud computing lets you access your TRIMS Grounds Management Software data from any iphone, ipad, Android Device

More information

New Features in Primavera P6 EPPM 16.1

New Features in Primavera P6 EPPM 16.1 New Features in Primavera P6 EPPM 16.1 COPYRIGHT & TRADEMARKS Copyright 2016, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates.

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc.

Sample- for evaluation purposes only! Outlook Web App. TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. A Presentation of TeachUcomp Incorporated. Copyright TeachUcomp, Inc. 2015 Outlook Web App TeachUcomp, Inc. it s all about you Copyright: Copyright 2015 by TeachUcomp, Inc. All rights reserved. This publication,

More information

Good Share Client User Guide for ios Devices

Good Share Client User Guide for ios Devices Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting

More information

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide

Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide Kaspersky Security 9.0 for Microsoft SharePoint Server Administrator's Guide APPLICATION VERSION: 9.0 Dear User! Thank you for choosing our product. We hope that this document will help you in your work

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011) AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

This document should help you get started. The most important button in TagNotate is the, which you can find on the bottom of each screen:!

This document should help you get started. The most important button in TagNotate is the, which you can find on the bottom of each screen:! Welcome to TagNotate Read this page, even if you read nothing else This document should help you get started. The most important button in TagNotate is the, which you can find on the bottom of each screen:

More information

Welcome to GIFTS Online Mobile... 3

Welcome to GIFTS Online Mobile... 3 Legal Notice The software described in this document is furnished under a license agreement. The software may be used or copied only in accordance with the terms of the agreement. No part of this document

More information

How to install the TLW Android Mobile Application:

How to install the TLW Android Mobile Application: How to install the TLW Android Mobile Application: Make sure that your mobile device allows for satellite signals to locate your GPS location. These functions can be obtained by clicking on: 1. Menu 2.

More information

Mobile Time Manager. Release 1.2.1

Mobile Time Manager. Release 1.2.1 Mobile Time Manager Release 1.2.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015

www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 www.novell.com/documentation User Guide Novell iprint 1.1 March 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically

More information

Mobile Connect for USA Mobility Pagers for iphone

Mobile Connect for USA Mobility Pagers for iphone User Guide for Mobile Connect for USA Mobility Pagers for iphone Amcom Software, Inc. Copyright Mobile Connect 3.5 Document Version 1.0 Last Saved Date: September 19, 2013 Copyright 2003-2013 Amcom Software,

More information

How to Install Applications (APK Files) on Your Android Phone

How to Install Applications (APK Files) on Your Android Phone How to Install Applications (APK Files) on Your Android Phone Overview An Android application is stored in an APK file (i.e., a file named by {Application Name}.apk). You must install the APK on your Android

More information

Contents. McAfee Internet Security 3

Contents. McAfee Internet Security 3 User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21

More information

Intel Unite Solution. Standalone User Guide

Intel Unite Solution. Standalone User Guide Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access

Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Installation and Troubleshooting Guide for SSL-VPN CONNECTIONS Access Version 1 Revised 11/29/2007 Table of Contents Java Installation:...4 Browser Configuration:...4 Citrix Client Installation:...8 Attempting

More information

Connecting Software Connect Bridge - Mobile CRM Android User Manual

Connecting Software Connect Bridge - Mobile CRM Android User Manual Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual

More information

Protection Service for Business

Protection Service for Business Protection Service for Business FAQ Version 4.0 Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Driver Updater Manual

Driver Updater Manual Driver Updater Manual Keep your drivers up-to-date! Improve your system performance and stability by keeping your drivers updated. Automatically find, update and fix the drivers on your computer and turn

More information

ESET NOD32 Antivirus. Table of contents

ESET NOD32 Antivirus. Table of contents ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32

More information

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216

Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

10 Magni Tablet User Guide

10 Magni Tablet User Guide 10 Magni Tablet User Guide MODEL NUMBER: Wireless Mobile Internet Tablet Powered by SYTAB10ST Top View Front View Bottom View Side View SYTAB10ST Getting to Know Your New Tablet: MINI Micro SD Micro SD

More information

YOUR SUNPOWER MONITORING SYSTEM GUIDE

YOUR SUNPOWER MONITORING SYSTEM GUIDE YOUR SUNPOWER MONITORING SYSTEM GUIDE YOUR SUNPOWER MONITORING SYSTEM Congratulations on your new SunPower solar system with SunPower monitoring! SunPower s advanced monitoring solution allows you to easily

More information