TrustPort Mobile Security

Size: px
Start display at page:

Download "TrustPort Mobile Security"

Transcription

1 TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort, a.s., All rights reserved.

2 Content CONTENT ABOUT PRODUCT OVERVIEW AND KEY FEATURES MINIMUM SYSTEM REQUIREMENTS SUPPORTED LANGUAGES INSTALLATION AND UNINSTALLATION OF TRUSTPORT MOBILE SECURITY HOW TO INSTALL THE APK FILES MANUALLY ON YOUR ANDROID DEVICE INSTALLATION FROM GOOGLE PLAY STORE UNINSTALLATION OF TRUSTPORT MOBILE SECURITY USER INTERFACE AND BASIC SETTINGS RUNNING INTERFACE SETUP WIZARD REGISTRATION AND LICENSING PREMIUM VERSION PASSWORD PROTECTION OF MOBILE SECURITY TRUSTPORT WEB CONTROL ACCESSING WEB CONTROL ACCOUNT DASHBOARD REMOTE COMMAND ANTIVIRUS RESIDENT SHIELD ON DEMAND SCANNING UPDATING OF VIRUS DATABASE WEB SHIELD USING THE SAFE BROWSER

3 7 APPLICATION MANAGER USING THE APPLICATION MANAGER DATA BACKUP USING DATA BACKUP PHONE CALL AND SMS FILTER USING PHONE CALL AND SMS FILTER TESTING OF TRUSTPORT MOBILE SECURITY ANTI- THEFT FUNCTIONS GEOLOCATION Prepare the Mobile Phone for Geolocation Allow Location service and GPS satellites Sending remote command for Geolocation REMOTE LOCK OF THE PHONE Sending remote lock command Sending remote lock and scream command Change of Lock screen message REMOTE WIPE OF THE PHONE Sending remote wipe command APPLICATION BLOCKING AND PARENTAL CONTROL ENABLING APPLICATION BLOCKING AND PARENTAL CONTROL ALERT ON SIM CHANGE ENABLING ALERT ON SIM CHANGE GEOFENCING ENABLING GEOFENCING TECHNICAL SUPPORT

4 1 About 1.1 Product overview and key features TrustPort Mobile Security offers you not only the function of scanning your phone on demand, but it also offers a resident shield on access scanning, as main protection against malware. The application enables you to surf the web safely, because it scans the URL addresses that you visit, and it blocks websites which contain malicious codes. If you happen to lose your mobile, TrustPort application will find it for you, because you will receive an SMS with the specific coordinates of the location of where your mobile phone is currently located. In the same way you can even remotely delete all your data on the lost device and restore your phone to factory default settings. Your contacts are always secure, because a backup function is offered. You can also easily create your own blacklist and whitelist for the blocking of outgoing and incoming calls and SMS s. The application enables you to define so-called forbidden dialing codes. This function is especially connected with premium rate SMS s or with expensive phone lines. Antivirus and Anti-Malware protection based on TrustPort s engine Resident shield on-access scanning Application manager Contacts backup on memory card Geolocation a useful tool for the loss of a mobile phone Steal Protection a useful tool for remote wiping of your data Blocking of outgoing and incoming calls and SMS s (blacklist/ whitelist) Safe web surfing blocking of infected and phishing webpages Blocking of defined dialing codes (premium rate SMS s or expensive phone lines) 1.2 Minimum System Requirements The TrustPort Antivirus requires at least the following software configuration: Android 2.2 version or higher. At least 20 megabytes (MB) of free space. At least 128 megabytes (MB) of RAM 1.3 Supported languages English Russian 4

5 2 Installation and uninstallation of TrustPort Mobile Security 2.1 How to install the APK files manually on your android device You can install Mobile security from APK (Android application package) file downloaded from TrustPort site or from installation media or web sites of TrustPort partners. (CD may contain Older Versions of Software - latest version is always available at TrustPort website). Things you ll need: USB cable for your Android device (or a connection between your computer system and the Android device, which can be connected either through Bluetooth or Wi-Fi) The application APK you need to install A file manager app installed on your Android device (Total Commander, Astro File Manager, File Expert etc.) Steps: Install the required USB/Bluetooth or Wi-Fi drivers you need to connect your Android device to the computer. You probably have it already installed if you ever connect your PC with your phone. If not for most devices the driver will be installed automatically after you connect your device into your PC. In task bar of PC you will see similar information like in picture. Download the APK of the app you need to install on your Android device and transfer the APK file to your Android device. You can just copy the file mobilesecurity.apk from your CD or the downloaded one to your SD card. You can use any file manager you have or use Windows explorer. Your storage will be probably already shown in My Computer. Copy the file like you copy music, pictures etc. It does not matter what is location of the installation file at your SD card. (You can also use section and download the APK of TrustPort Mobile Security file directly to your SD card using your Android device). 5

6 On your Android device, go to Settings>Applications>Check the box Unknown sources. Location can be different on each device for example Settings>Security. If this option will not be checked on, your device asks for permission during the installation anyway. There will be displayed warning about vulnerability of the device just choose OK. It is recommended to switch this option off after successful installation. Disconnect your device from the computer system Use the file manager to explore the APK file on your device Tap on the APK to open it and choose Install the APK for Complete action using choose Package installer (Just once). If you did not check the box Unknown sources in one of the previous step choose Setting and allow it in this case you need to start installation from this point again. 6

7 7

8 Follow the installation wizard and finish installation of the application. 2.2 Installation from Google Play store You can find Mobile Security application also at Google Play store just use search tab and find TrustPort or use directly this link: The version from Google play store may not be compatible with the activation codes! 2.3 Uninstallation of TrustPort Mobile Security You can uninstall TrustPort Mobile Security from application manager (Settings of phone - Apps) like any other application just find Mobile Security and in App info choose option Uninstall. Remember that in settings of mobile security you can disable this action so there ca n be needed to allow uninstallation in settings Protect from uninstallation option. 8

9 3 User Interface and basic settings 3.1 Running Interface It can be launched easily by taping on the shortcut at home screen or from the list of application. Just find the green Mobile Security icon. 3.2 Setup Wizard In case you start Mobile Security for the first time the Setup Wizard is automatically started. You can also skip the wizard and run it anytime later under application settings option Settings > Wizard. Remember that all settings can be change anytime later under application settings option Settings. At first page choose your registration method probably you have activation code so fill it and choose next. As second option you can use already created Web Control account if you have one. Or you can run Mobile Security in trial version. At next page choose your password this password can be used for protection of application itself, and also for remote commands like geo-location, remote wipe and lock of mobile phone (later you can change password if you want - see 3.5 Setting of Password for Mobile Security). If you choose Protect from uninstallation option for Mobile Security application it need special permission Device administrator in this case choose activate at ask page. At next page you can enable Web Control function it allows you to control your mobile device directly from anywhere using your own account at our website. Please fill your correctly the password must have at least 6 characters and from security reason should be different than the one used for remote commands. The filling of your phone number of your device is necessary if you want to use remote commands from the web account remember to save phone number in internacional 9

10 format of phone number (with international prefix like 420 for Czech Republic, 91 for India, 44 for Great Britain. For details see chapter 3.6 Mobile Security Web Control At last page you can choose which features should be enabled in your mobile phone some of them need special permission Device administrator in this case choose activate at ask page. 10

11 3.3 Registration and Licensing You can register the product (if you did not do that in wizard during isntallation) under Application settings > Product license. (If there is missing Product license tab you have probably installed the version from Google Play store, so please install the one described described in part 2.1 Step by step guide on how to install the APK files manually on your Android device). Please fill in your activation code in app Settings>Product license in format TP-NZYX-MTGT-MZTJ-TTJH- XXXXXXXX and your address. Store this information for case of lost your activation code. All other items like Company and State are optional. After it use green C heck mark at top-right corner of the screen. It will be followed by note about successful registration. After it you have available all premium functions see 3.4 Pemium functions. Note that during registration process your device must be connected to the Internet. You can anytime later check the validity of your license at main page of Mobile Security. 11

12 3.4 Premium version After first installation of TrustPort Mobile Security all users have activated Premium versions. After demo-period expiration there is need to use Activation code to activate Premium version (or buy product using Google play only for versions installed from Google play store!). In other case premium functions are disabled. Premium functions are for example: Scan applications Scan external storages Scan whole cell phone (Scan applications + Scan external storages) At main screen of the application you can check if your version is Premium one and in case of demo period using how many days of premium functionality left. In case of expired version/license there will appear note about it. 12

13 3.5 Password protection of Mobile Security You can set the program password under application settings option Settings > Set a new password. This password will be required to access the program menu if you check option Protect whole application. Password is also used for authorization for Geo-location and all anti-theft functions like Remote Wipe. (Password can be changed any time later using option Change or delete password ). 13

14 4 TrustPort Web Control By using Web Control account you can have your mobile under control from any other PC or mobile device. See overview of your mobile phones and even send remote command for example if you need to locate your device. 4.1 Accessing Web Control account If you create account for Web control in chapter 3.2 Setup Wizard you can log with your and password at Dashboard Here you can see overview of your mobile devices with most important informations. At left side there is your profile setting: notification: enable sending notification for registration confirmation and remote commands. At your will be sent a copy with results of remote commands e.g. location of your mobile or confirmation that your phone has been locked. Registering new devices: under web control account you can have multiple devices as is show at next picture. By disabling this option all new registration will be disabled. Change password: possibility to change password to your Web Control account. At dashboard you can also switch between your devices this is important especially when you are sending remote command. The inactive device is grayed out. 14

15 4.3 Remote Command At remote command tab you can locate, lock or wipe your device in similar way like in chapter 10 Anti- Theft Functions. Just mark the remote command and use Send command to device option. In case of wipe command there is need to choose between wiping of device only (partial) or wiping of device together with SD card (Complete). Remember that remote command must be allowed in settings of you device - in Mobile Security software in another cases some options will be grayed out in web control. For example at next picture you can see that only sending of location command is allowed. Remember that mobile phone send answer/confirmation SMS to portal (e.g. phone location) and these SMS are charged by your provider as international! 15

16 At left you can find results of previous Remote commands attempts. E.g. map with location of your lost phone or just information that your device has been wiped. In case of Geolocation is important method - the Network method means that location is approximate - find using e.g. mobile network. The GPS method is more accurate. 16

17 5 Antivirus TrustPort Mobile Security is able to scan on demand each installed application or each downloaded file. If you download or update an application, TrustPort Mobile Security scans this application automatically, and if necessary, you are easily able to uninstall such suspicious application. TrustPort Mobile Security offers not only the function of scanning your phone memory on demand, but it also offers a resident shield on access scanning, as main protection against malware. 5.1 Resident Shield The Resident shield steadily checks installation of any new applications or application update. If it finds the infection offer you uninstallation of this application directly from the report. Just tap on the infection in list. 5.2 On demand scanning In case of need you can scan your Android device and find all threads. You can: Scan applications Scan external storages Scan whole cell phone (Scan applications + Scan external storages) The most important is scan of applications because installed infected application can make you harm. In case that some infection is found during scanning you can remove/uninstall the infected application or delete files just by taping on particular infection in the list. The time of scanning can be different according your device type, number of installed application and number of files at your SD card. Additional setting of scanner be find under option Scan > Settings tab. 17

18 5.3 Updating of virus database The TrustPort Mobile Security automatically check for new virus definitions udaptes every day you can change this period under option Scan > Settings > Update period. You can also anytime check if new virus definitions are available under option Scan > Update virus database. Under Setting tab you can also disable/enable automatic updates and use Connection type restriction for example for blocking updates in case you are connect via mobile data and allow it only if you are connected via Wi-Fi. 18

19 6 Web Shield The TrustPort Mobile Security application enables you to browse the internet safely on your phone, because it effectively scans all URL addresses which you visit and it prevents you from accessing websites with malicious codes and phishing websites. 6.1 Using the Safe Browser You can run Safe browser directly from main menu of TrustPort Mobile Security. Once you try to access some suspicious page TrustPort block it and only blocking page info is displayed. 7 Application Manager Thanks to this function, it is possible to end or uninstall a currently running process or application. Application manager also shows the list of all installed applications, or those which are currently running. It will warn you about any dangerous applications, which can possibly jeopardize your smart phone, and enables you to uninstall them. It is also possible to display a full list of all authorizations which will be required by the specific application, meaning you will have a co herent summary of all activities. 7.1 Using the Application Manager This feature can help you to find potentially dangerous application. You can access it from main interface under Application. It allows you to: Check downloaded application Check permissions of applications Check running applications Check running services Check running tasks 19

20 These features are for more experienced users. As example in case you install some game or screenshot s application there should not be requirement of permissions like REA D YOUR CONTACTS or DIRECTLY CALL PHONE NUMBERS. In case that some application required similar permissions it does not necessarily mean that application is malicious. 20

21 8 Data Backup Your contacts will be safe with this feature, because it offers the option of storing all your contacts on a memory card, in an encrypted database. 8.1 Using Data Backup This feature can help you to backup contacts. You can access it from main interface under Backup contacts. You can anytime create encrypted contacts backup by using the + mark at right-top corner. If you wish to restore backup just tap at specific backup and fill the password requested. For complete action choose People (just once). 21

22 The backup files location can be change from the main settings of TrustPort application (application settings > Settings > Backup location). From this location you can download the files also to PC and use them later for example for your new device. (Just browse the files on your SD cards with the help of file browser). 22

23 9 Phone Call and SMS Filter Users can create their own blacklist and whitelist for blocking of outgoing and incoming calls and SMSs according to their own requirements. This feature enables the user to define so -called forbidden dialing codes. This function is especially useful for premium rate SMSs or for expensive phone lines. 9.1 Using Phone Call and SMS Filter For both Incoming and Outgoing calls and SMS can be defined black list and whitelist of phone numbers. So you can block incoming and outgoing SMS according to user's setings: Allow all Disable all - disable all incoming/outgoing calls and SMS Rules - checks incoming and outgoing calls and SMS according to user's settings. Blacklist is a list of disabled phone numbers. Whitelist is a list of allowed phone numbers. Unknown phone numbers are numbers not listed in the phone's directory. Allow all except Blacklist - allow all calls and SMS except phone numbers listed in the Blacklist Block all except Whitelist - block all calls and SMS except those listed in the Whitelist Block Unknown numbers You can anytime add contact to black/white list by using the + mark at right-top corner. Records can be added from your contacts or manually. Remember to hold internacional format of phone number (with international prefix like 001 USA, Czech Republic, 0091 for India, 0044 Great Britain 23

24 10 Testing of TrustPort Mobile Security If you want to test that antivirus shield works fine at your device go to Google play and find application Mobile Security Virus Test from TrustPort company (file is harmful; it is just for testing purposes so there s no need to be worry) direct link is: Once you install it, the resident shield will notice you that the file is infected and offer you uninstallation. Just tap it in List of infection and uninstall it. 24

25 11 Anti-Theft Functions These functions help you in case your phone is lost or theft, when you need to be sure that no one get access to your data. Note: SMSs are normally charged by your provider according your local tariff. One SMS is necessary to be sent from different device and one SMS is sent back to this device from the lost/stolen phone with GPS coordinate or confirmation of lock/wipe of the device Geolocation This feature guards your phone at all times. If you lose your phone, it will find it thanks to the Geolocation function. All you have to do is simply send an SMS to your lost phone number, and you will receive back an SMS with the exact GPS coordinates, where your device is located Prepare the Mobile Phone for Geolocation At your mobile phone in settings of Mobile security you need to set up password under application settings > Settings > Set a new password. See 3.5 Setting of Password for Mobile Security and then enable Geo-location in the same tab (application settings > Settings > Geolocation). The password is used for authorization. Without knowledge of the password no -one can t find out your location Allow Location service and GPS satellites At your mobile phone setting in location settings allow using GPS satellites and/or Google location service (optional). In case that GPS signal is not available Mobile security try to send at least approximate location of the phone using information from e.g. GMS network more details are in chapter Sending remote command for Geolocation. 25

26 Sending remote command for Geolocation There are two possibilities how to send Geolocation command. If you have another mobile phone with TrustPort Mobile Security in main menu go to Remote control. Fill the recipient phone number and password (phone number and password of phone you want to locate). As a command to be sent choose Gather location. As a format of response you can choose from three formats: Text, URL and JSON, described below. For example we choose Text format. And press the green checkmark at right-top corner. The SMS answer you receive is the location of lost mobile in GPS coordinates. As the picture bellow shows NOW is the location latitude and longitude

27 As the second option you can send plain SMS from any phone in format TRUSTEE R TEXT LOC ATION password.for example TRUSTEE R TEXT LOC ATION pass123 Both methods are equivalent - they have the same effect. URL format of response: in this case you receive back link in SMS with position of your device in Google maps. JSON format of response: in this case you receive back SMS with GPS coordinate in JSON format for example: "TRUSTEE A JSON LOC {s:"gps",p:"l",lat: ,long: }" Examples of request send as plain SMS to stolen/lost phone: TRUSTEE R TEXT LOCATION password TRUSTEE R URL LOCATION password TRUSTEE R JSON LOCATION password Examples of answers from stolen/lost phone: Text: Answer with current gps coordinates: TRUSTEE A TEXT LOCATION GPS NOW Answer that last gps position is <value> (for example GPS signal is not available right now but previous position is known). TRUSTEE A TEXT LOCATION GPS LAST-KNOWN

28 Answer that current network is <value> (in case that GPS is not available or enabled but you have enabled network location in your device TrustPort send location obtained from GMS network). TRUSTEE A TEXT LOCATION NETWORK NOW Answer that current network is <value> (similar like previous case but the actual data are not available). TRUSTEE A TEXT LOCATION NETWORK LAST-KNOWN Answer that location is unknown (can happened for example if you are at place without GPS signal). TRUSTEE A TEXT LOCATION UNKNOWN URL: TRUSTEE A URL LOCATION GPS LAST-KNOWN JSON: TRUSTEE A JSON LOCATION {s:"gps",p:"l",lat: ,long: } 11.2 Remote Lock of the Phone You can remotely lock display of your phone against unauthorized access. So no one can open it without knowledge of password. In settings of Mobile security you need to set up password under application settings > Settings > Set a new password see 3.5 Setting of Password for Mobile Security The password is used for authorization of remote commands. Without knowledge of the password noone can t lock your mobile device Sending remote lock command There are two possibilities how to send lock command. If you have another mobile phone with TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and password (phone number and password of device you want to lock). As command to send choose Lock phone. And press the green checkmark in right-top corner. As the second options you can send plain SMS from any phone in format TRUSTEE R LOCK password (Example: TRUSTEE R LOCK pass123). Both methods are equivalent - they have the same effect. 28

29 Once the mobile phone obtain this command it locks it s display operations immediatelly. Until you put correct password the phone is locked and you have no access to its functions. To the sender phone is send confirmation SMS in format TRUSTEE A TEXT LOCKOK. 29

30 Sending remote lock and scream command Instead of lock command (see chapter Sending remote lock command) you can send Lock and scream command. In addition to lock of the phone there is laud sound good way how to find your lost phone at noisy places. The plain SMS has format TRUSTEE R SCREAM password Change of Lock screen message You can modify lock screen of your phone with the message. So if finder wants to contact you and return back your phone he gets the right information. 30

31 11.3 Remote Wipe of the Phone You can remotely wipe your phone as prevention against abusing of the data stored at your device or CD card. No one can use it without knowledge of password. At your mobile phone in settings of Mobile security you need to set the password under application settings > Settings > Set a new password see 3.5 Setting of Password for Mobile Security After it enable remote wipe at the same tab (application settings > Settings > Remote Wipe). (Activate the device administrator). The password is used for authorization of this command. Without knowledge of the password no one can wipe your mobile device. REMEMBER THAT YOU LOST ALL YOUR DATA! Sending remote wipe command There are two ways how to send the wipe command. If you have another mobile device with installed TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and password (phone number and password of phone you want to wipe). To send the command choose option Wipe phone (or Wipe phone and SD card if you want to wipe also SD). The second way how to send this command is plain taxt SMS sent from any phone in format TRUSTEE R WIPE password (example TRUSTEE R WIPE pass123). (In case you want to wipe also SD card the command is TRUSTEE R SDWIPE password). To the sender s phone is send confirmation SMS in format TRUSTEE A TEX T WIPE OK. 31

32 12 Application blocking and Parental control Features enabling parents or teachers to limit child access to the applications running on mobile device and to limit web page access to selected categories with the help of TP Safe Browser. There exist only two possible accounts Administrator for parents enabling to set up system and User for child Enabling Application blocking and Parental control 1. To enable Parental control functionality it is necessary to set up Administrator and User ac counts first. In TP Mobile Security main menu open Account settings. 2. Specify admin password (implicitly this is the same as you have specified in Remote control wizard in chapter 3.2 Setup Wizard) and User password. 32

33 3. Administrator can setup enabling/blocking applications for User by specifying Rules and selecting individual already installed applications. 33

34 4. Administrator can enable to User to use Safe browsing, e.g. TrustPort web browse r that protect user against malware on web pages and web page filtering preventing user to access unwanted web content like pornography. Combination of Safe browsing and blocking all other installed web browsers enable to protect child from dangerous web page content. Enable safe browsing and select of blocked categories can be setup in the Accounts setting menu. 5. Administrator can setup time frame when the User s account is enabled, e.g. when the User can login into his profile. The rest of the time User cannot login and use the mobile device. Enable scheduling and set the period in which the user profile will be enabled can be setup in the Accounts setting menu. 34

35 6. When Administrator leaves the settings and both Administrator and User passwor d are set up, the login window appears. Then any of these 2 users can login, in User case with restrictions applied. 7. In the notification bar (swing gesture from top device bar opens it) appears information on which profile you are logged in, if you tap that notification the login windows appears and you can re -login. 35

36 8. When User try to access blocked application a dialog inform him about it and offer possibility to log in as Administrator to enable it. Similarry when the user try to access blocked web page using our safe browser the information dialog inform him about it. 36

37 13 Alert on SIM change Features enabling warning SMS message and lock of phone once anyone try to change SIM card in your mobile device Enabling Alert on SIM change To enable Alert on SIM change feature go to settings and check Alert on SIM change. For correct function there is need to set also SIM change upervisor s phone number e.g. number of your second phone or phone number of your relative. Once anyone change the SIM in your lost/stolen phone you get SMS directly from new SIM card so you receive it from phone number of finder of the phone. The phone is also automatically locked once anyone change the SIM like is described in chapter 11.2 Remote Lock of the Phone. 37

38 14 GeoFencing Features enabling parents to check area where the child is located. Once the mobile device cross the border of the area then Mobile Security send SMS to parent Enabling GeoFencing To enable GeoFencing feature it is necessary to set up Administrator and User accounts first. See point 1 and 2 in chapter 12.1 Enabling Application blocking and Parental control and after it just check Turn on/off parental lock. After it follow these instructions to set up geofencing: 1) Enable geofencing feature and specify the geofencing area. Once you tap the map you can specify the area using radius. After it you can see radius marked in map. 2) Go back and set geofencing period remember that location cannot be obtained continuously from power saving reason. Recommended value is 5 minutes. The value depends on your battery life and the total time you want to use the GeoFencing feature. 3) Specify the Location providers the GPS method is more precise but consume more battery (there is need to have allowed Allow Location service and GPS satellites see chapter Allow Location service and GPS satellite. The network method is less precise but consumes less battery. 4) Set the notification number once mobile device cross the area the notification SMS is send to this phone. For example phone of the parents. You can see example of SMS bellow it include the link to Google maps with current phone location. 5) Log out from your admin account and log in as user see chapter 12.1 Enabling Application blocking and Parental control from that moment the mobile device is tracked for location. 38

39 39

40 40

41 15 Technical support Thank you for using the TrustPort Mobile Security. If you wish to meet other products of our company, you can find all the necessary information on our web pages. If you have any comments or questions about the TrustPort products, please visit our website If you didn t find answers there, use any of the contacts below. Troubleshooting: If you come across an error in the TrustPort Mobile Security, you can announce it to some of the contacts below. Please, prepare the following information in advance: the exact description of error, the program version including the compile number (you will find this information in the About dialog window), version of Android and type of your Android device. Contact: Address: Web: TrustPort, a.s. Purkynova 2845/ Brno Czech Republic [email protected] 41

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

ESET Mobile Security Business Edition for Windows Mobile

ESET Mobile Security Business Edition for Windows Mobile ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security

More information

Comodo Mobile Security for Android Software Version 3.0

Comodo Mobile Security for Android Software Version 3.0 Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

Installation Instructions

Installation Instructions Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other

More information

ESET MOBILE SECURITY FOR ANDROID

ESET MOBILE SECURITY FOR ANDROID ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation...3

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Kaspersky Endpoint Security 8 for Smartphone for Android OS Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

Avira Free Android Security (version 1.2) HowTo

Avira Free Android Security (version 1.2) HowTo Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

SecuraLive ULTIMATE SECURITY

SecuraLive ULTIMATE SECURITY SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security

More information

Samsung KNOX User Guide KNOX for Consumers Edition

Samsung KNOX User Guide KNOX for Consumers Edition Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung

More information

Notices. Copyright 2016 Malwarebytes. All rights reserved.

Notices. Copyright 2016 Malwarebytes. All rights reserved. Malwarebytes Anti-Malware Mobile User Guide Version 2.0.5 3 May 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

ESET Mobile Security Windows Mobile

ESET Mobile Security Windows Mobile ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3

More information

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0 Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X

Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos

More information

Verizon Wireless Family Locator 4.9 User Guide Contents

Verizon Wireless Family Locator 4.9 User Guide Contents Verizon Wireless Family Locator.9 User Guide Contents Let s get started... Sign up, then activate phones!... Use the Activation Wizard... Set Up an Android... Set Up a BlackBerry... 6 Set Up a Feature...

More information

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

ESET Mobile Security Windows Mobile. Installation Manual and User Guide ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3

More information

Sophos Enterprise Console Help

Sophos Enterprise Console Help Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

How To Use Secureanything On A Mac Or Ipad (For A Mac)

How To Use Secureanything On A Mac Or Ipad (For A Mac) User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is

More information

SMS for Outlook. Installation, Configuration and Usage Guide

SMS for Outlook. Installation, Configuration and Usage Guide SMS for Outlook Installation, Configuration and Usage Guide INTRODUCTION Installing TxTStream s SMS for Outlook is easy and will only take a minute or two. We will be using screen shots from a Windows

More information

F-Secure Mobile Security for Business. Getting Started Guide

F-Secure Mobile Security for Business. Getting Started Guide F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3

More information

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even

More information

Kaspersky Password Manager

Kaspersky Password Manager Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.

More information

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor. Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive

More information

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations.

What is PC Matic?...4. System Requirements...4. Launching PC Matic.5. How to Purchase a PC Matic Subscription..6. Additional Installations. USER Manual Table of Contents Getting Started What is PC Matic?...4 System Requirements....4 Launching PC Matic.5 How to Purchase a PC Matic Subscription..6 Additional Installations. 6 Registration...6

More information

Kaspersky Password Manager USER GUIDE

Kaspersky Password Manager USER GUIDE Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or

More information

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List

KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List KASPERSKY SMALL OFFICE SECURITY (Version 3) Features List Contents Overview... 3 Features list for Personal Computer and File Server... 3 Computer Security... 3 Internet Security... 4 Backup & Restore...

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Charter Business Desktop Security Administrator's Guide

Charter Business Desktop Security Administrator's Guide Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...

More information

Airtel PC Secure Trouble Shooting Guide

Airtel PC Secure Trouble Shooting Guide Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does

More information

Kaspersky Internet Security

Kaspersky Internet Security Kaspersky Internet Security User Guide APPLICATION VERSION: 16.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Sophos Anti-Virus for Mac OS X: Home Edition Help

Sophos Anti-Virus for Mac OS X: Home Edition Help Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

Get Started Guide - PC Tools Internet Security

Get Started Guide - PC Tools Internet Security Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools

More information

AT&T Toggle. 4/23/2014 Page i

AT&T Toggle. 4/23/2014 Page i Page i Go Ahead Bring Your Own Device to Work... 1 Requirements... 1 1: AT&T Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media...

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor Quick Start Guide GMS If you re not using Hyper-V 2012, your screens may vary. Microsoft Hyper-V Hypervisor 2013 Silver Peak Systems, Inc. Before You Begin Comply with the GMS Host System Requirements

More information

How to Use Windows Firewall With User Account Control (UAC)

How to Use Windows Firewall With User Account Control (UAC) Keeping Windows 8.1 safe and secure 14 IN THIS CHAPTER, YOU WILL LEARN HOW TO Work with the User Account Control. Use Windows Firewall. Use Windows Defender. Enhance the security of your passwords. Security

More information

the barricademx end user interface documentation for barricademx users

the barricademx end user interface documentation for barricademx users the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX

More information

Acronis AntiVirus 2010 User's Guide

Acronis AntiVirus 2010 User's Guide User's Guide Acronis AntiVirus 2010 User's Guide Published 2010.02.02 Copyright 2010 Acronis Legal Notice All rights reserved. No part of this book may be reproduced or transmitted in any form or by any

More information

How To Use Senior Systems Cloud Services

How To Use Senior Systems Cloud Services Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To

More information

User's Guide. Copyright 2012 Bitdefender

User's Guide. Copyright 2012 Bitdefender User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

Thank you for choosing Huwei E589 4G Mobile WiFi

Thank you for choosing Huwei E589 4G Mobile WiFi Thank you for choosing Huwei E589 4G Mobile WiFi This guide briefly describes the functions of your Huawei E589 4G Mobile WiFi. For more details, see help on the web management page. See Accessing the

More information

Mobiel Internet Dashboard. Manual

Mobiel Internet Dashboard. Manual Mobiel Internet Dashboard Manual Contents Chapter 1 Welcome to the Mobiel Internet Dashboard support manual Chapter 4 The Mobiel Internet Dashboard interface About this manual 6 Opening the Mobiel Internet

More information

Password Depot for Android

Password Depot for Android Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening

More information

Protection Service for Business

Protection Service for Business Protection Service for Business FAQ Version 4.0 Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for

More information

`````````````````SIRE USER GUIDE

`````````````````SIRE USER GUIDE `````````````````SIRE USER GUIDE Table of Contents INTRODUCTION 3 SYSTEM REQUIREMENTS 4 RUNNING SANDISK BACKUP 5 Setup Your First Backup 6 Create Your Backup 7 Custom Backup 8 Dmailer Online 10 Launch

More information

Your Digital Dollars Online & Mobile Banking

Your Digital Dollars Online & Mobile Banking Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding

More information

Kaspersky Internet Security User Guide

Kaspersky Internet Security User Guide Kaspersky Internet Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Thank you for choosing HUAWEI E5331 Mobile Wi-Fi

Thank you for choosing HUAWEI E5331 Mobile Wi-Fi Thank you for choosing HUAWEI E5331 Mobile Wi-Fi This guide briefly describes the functions of the E5331 Mobile Wi-Fi. Copyright Huawei Technologies Co., Ltd. 2012. All rights reserved. THIS DOCUMENT IS

More information

Sophos Anti-Virus for Mac OS X Help

Sophos Anti-Virus for Mac OS X Help Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5

More information

High Speed Internet - User Guide. Welcome to. your world.

High Speed Internet - User Guide. Welcome to. your world. High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a

More information

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)

AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011) AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This

More information

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016)

AVG Protection. User Manual. Document revision AVG.32 (6/27/2016) AVG Protection User Manual Document revision AVG.32 (6/27/2016) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents 1.

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

10 Quick Tips to Mobile Security

10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22

More information

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29

Contents. Hardware Configuration... 27 Uninstalling Shortcuts Black...29 Contents Getting Started...1 Check your Computer meets the Minimum Requirements... 1 Ensure your Computer is Running in Normal Sized Fonts... 7 Ensure your Regional Settings are Correct... 9 Reboot your

More information

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface Contents 1. Introduction 2. How to Install/Uninstall Business Everywhere 3. The Business Everywhere interface 4. Launching Business Everywhere 5. Connection 6. Business Everywhere management tools 7. Troubleshooting

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)

AVG File Server. User Manual. Document revision 2015.08 (23.3.2015) AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents

More information

ONE Mail Direct for Mobile Devices

ONE Mail Direct for Mobile Devices ONE Mail Direct for Mobile Devices User Guide Version: 2.0 Document ID: 3292 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2014, ehealth Ontario All rights reserved No part of this document

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Kaspersky Small Office Security User Guide

Kaspersky Small Office Security User Guide Kaspersky Small Office Security User Guide APPLICATION VERSION: 4.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1) What does SkyBest Internet Guardian do? Prevents e-mail and image spam from reaching your inbox Halts access to dangerous Web pages Stops Web sites from installing dangerous

More information

Kaspersky Total Security User Guide

Kaspersky Total Security User Guide Kaspersky Total Security User Guide APPLICATION VERSION: 15.0 Dear User, Thank you for choosing our product. We hope that this document will help you in your work and will provide answers regarding this

More information

How To Use Textbuster On Android (For Free) On A Cell Phone

How To Use Textbuster On Android (For Free) On A Cell Phone www.textbuster.com 1 Applications and Account Manager Dashboard User Guide For Android phones www.textbuster.com 2 Downloading the TextBuster applications After the TextBuster device is installed into

More information

Compliance Rule Sets in MaaS360

Compliance Rule Sets in MaaS360 Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in

More information

Bitdefender Total Security 2015 User's Guide

Bitdefender Total Security 2015 User's Guide USER'S GUIDE Bitdefender Total Security 2015 User's Guide Publication date 11/17/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build?

US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build? Ho w to gu ides US Cellular : How Do I Update The Software On My US Cellular SCH-R880 (Acclaim) Phone To Android 2.2 Froyo DL25 Build? Samsung has released this software upgrade for the US Cellular SCH-R880

More information

Cox Business Premium Security Service FAQs

Cox Business Premium Security Service FAQs FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed

More information