Junos Pulse for Google Android



Similar documents
Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision , Juniper Networks, Inc.

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

U.S. Cellular Mobile Data Security. User Guide Version 00.01

Android App User Guide

Comodo Mobile Security for Android Software Version 3.0

3. Security Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

ESET Mobile Security Business Edition for Windows Mobile

Sophos Mobile Control user help. Product version: 6.1

Cloud Services MDM. ios User Guide

AT&T Toggle. 4/23/2014 Page i

Kaseya 2. User Guide. Version 1.0

Administrator's Guide

TrustPort Mobile Security

Norton Mobile Privacy Notice

Compliance Rule Sets in MaaS360

Avira Antivirus Security. HowTo

Sophos Mobile Control User guide for Apple ios. Product version: 4

PULSE SECURE FOR GOOGLE ANDROID

MiVoice Integration for Salesforce

Installation Instructions

F-Secure Mobile Security. Android

Sophos Mobile Control User guide for Apple ios

Comodo Mobile Security for Android Software Version 2.5

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

Egnyte App for Android Quick Start Guide

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Accessing TP SSL VPN

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

ONE Mail Direct for Mobile Devices

Avira Free Android Security (version 1.2) HowTo

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices

Quick Start Guide. Version R9. English

Mobile Device Management Solution Hexnode MDM

Zipit Chat. Functional Specification / User Manual

COMMUNITAKE TECHNOLOGIES MOBILE DEVICE MANAGEMENT FROM BELL USER GUIDE

Using MioNet Senvid Inc. User Manual Version 1.07

Advanced Configuration Steps

Bell Mobile Device Management (MDM)

Copyright 2013, 3CX Ltd.

VPN Web Portal Usage Guide

BlackBerry Desktop Software User Guide

ESET MOBILE SECURITY FOR ANDROID

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

Mobile Device Management Version 8. Last updated:

Juniper Networks Management Pack Documentation

Sophos Mobile Control Startup guide. Product version: 3

ESET Mobile Security Windows Mobile

Sophos Mobile Control User guide for Android

Kaspersky Endpoint Security 8 for Smartphone for Android OS

Sophos Mobile Control Startup guide. Product version: 3.5

NHSmail mobile configuration guide Android mobile devices

Sophos Mobile Control User guide for Android. Product version: 4

Notices. Copyright 2016 Malwarebytes. All rights reserved.

WE VoIP User Guide For OfficeServ 7000 Series

Symbian User Guide for Cisco AnyConnect Secure Mobility Client, Release 2.4

Sophos Mobile Control User guide for Apple ios. Product version: 2 Document date: December 2011

Mobile Iron User Guide

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

Kaseya 2. User Guide. Version 7.0. English

Frequently Asked Questions: Cisco Jabber 9.x for Android

Quick Start Guide: Iridium GO! Advanced Portal

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Zenprise Device Manager 6.1.5

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

avast! Mobile Security User Guide avast! Mobile Security User Guide

USER GUIDE: MaaS360 Services

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

NetSuite OpenAir Mobile for Android User Guide Version 1.3

Sophos for Microsoft SharePoint startup guide

Samsung KNOX User Guide KNOX for Consumers Edition

Secure Work Space for Android. User Guide

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Verizon Wireless Field Force Manager. Windows Mobile Devices

Getting Started with Microsoft Office Live Meeting. Published October 2007 Last Update: August 2009

Sophos Mobile Control User guide for Windows Mobile

Configuring, Customizing, and Troubleshooting Outlook Express

TABLE OF CONTENTS. Legend:

Getting Started with Microsoft Office Live Meeting. Published October 2007

Sophos Enterprise Console Help

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

Sophos Mobile Control Administrator guide. Product version: 3

This guide describes features that are common to most models. Some features may not be available on your tablet.

CareSentinel Set Up Guide for Android Devices

Manage Mobile Devices

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Contents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface

User Guide PUSH TO TALK PLUS. For Android

Copyright 2013, 3CX Ltd.

Sophos Mobile Control SaaS startup guide. Product version: 6

Mobility Manager 9.5. Users Guide

Novell Filr 1.0.x Mobile App Quick Start

Android support for Microsoft Exchange in pure Google devices

Vodafone Plus. User Guide for Windows Mobile

Transcription:

Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc.

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright 2012, Juniper Networks, Inc. All rights reserved. M10/30/12 ii Copyright 2012, Juniper Networks, Inc.

Table of Contents Downloading and Installing Junos Pulse...1 Available Junos Pulse Features...1 Registering Security...2 The Mobile Security Dashboard...3 Email Address Validation...3 Using Security Features...3 Scan/Threats detected...4 Backup...6 Remote Monitoring...7 Web Security...8 Settings...8 Security Settings...8 Support Info...9 Update...9 Anti Theft Features...9 Password Policies and Storage Encryption...11 Scream Dismiss...11 Custom Button...11 Uninstalling or Clearing Data...12 Adding a Secure Connection...12 Connecting...13 Viewing Connection Status Icon...13 Viewing Connection Status Window...13 Limited Access...14 User Interface Modes...14 Known Issues and Limitations...14 iii

iv

Installing and Using Junos Pulse for Google Android Junos Pulse lets you access protected network resources from your Google Android device. It also protects your device against viruses and malware, and includes tools to reduce the inherent risks of a lost or stolen device. Additional information for Junos Pulse, including information on supported platforms, can be found at http://www.juniper.net/support/products/pulse/mobile/ Downloading and Installing Junos Pulse Use the following instructions to download and install Junos Pulse software on Google Android devices. Informational Note: The Junos Pulse client is available from the Google Play application store. 1. From your Android device, download the Junos Pulse software directly to the device. Once downloaded, Junos Pulse installs automatically. 2. Once the application has been downloaded and installed, the Junos Pulse icon appears in the applications menu. 3. The first time you start Junos Pulse, the End User License Agreement appears. You must Accept the license to begin using Junos Pulse. Available Junos Pulse Features Informational Note: Junos Pulse can be deployed with all available features or with a subset of features based on your usage needs. You may not have all of the Junos Pulse features described here on your device. Junos Pulse can include the following features: Security Tab Scan/Threats Detected: Lists threats that have been found on the device and gives you the ability to allow or remove suspicious applications. When no threats are found this button reads Scan. When threats are found, this button reads Threats Detected. Backup: Lets you backup Contacts and Calendar events. Remote Monitoring: Provides information on what device activities are being monitored. Anti Theft: Lists the anti theft features that are activated on your device. Custom Button: Provides a link to a customized URL which takes you to a web page that is set up by your service provider Copyright 2012, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1

VPN Tab Informational Note: This service is only offered if you are accessing your corporate network resources securely. Connections: Lets you add, edit, and remove corporate network connections. Intranet: Provides Web links configured by your administrator. (Note that on Android 4.0, when VPN is enabled, the Intranet and Email buttons will be disabled. This is due to the way the mobile client communicates with the SA gateway.) Email: Launches your email application. (Note that on Android 4.0, when VPN is enabled, the Intranet and Email buttons will be disabled. This is due to the way the mobile client communicates with the SA gateway.) Status: Lets you view, delete, and email log files, which you might need to do in a troubleshooting operation. The log files show all security incidents, such as virus scan times and viruses discovered. If you have an established VPN connection, you can also view the status of that connection from this window. Registering Security The Junos Pulse Mobile Security Suite provides access to features that protect your device from malware and viruses and it allows you to backup your device s calendar and contact information to a central server. You must register your device before you can access the security feature set. Your can register with automatic URL registration or using a manual registration process. Automatic URL Registration Automatic URL registration requires you to select a URL provided by your administrator or service provider. Once you select the URL, you are prompted to verify that the URL comes from a trusted source. When you tap Yes from this prompt, the automated security registration process takes place. To register security features automatically, do the following: 1. Start Junos Pulse. 2. Select the registration URL provided to you via email, text message, or Web site. 3. Because the automatic registration changes the security settings on your device, you should verify the validity of the URL. If you are certain the URL is trusted, select Yes when prompted. Once you select Yes, your device is automatically registered for security features. Manual Registration In some cases, manual registration may also require you to select a URL. Once you select the URL, you are prompted to verify that the URL has comes from a trusted source. When you tap Yes in the registration prompt, the manual registration window appears. The registration window requires that you to enter information such as a license code provided to you by your administrator or service provider. Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no cellular service), the phone number field does not appear in the registration window. 2 Registering Security Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android To manually register security features, do the following: 1. Start Junos Pulse. 1. Select the URL provided via email, text message, or Web site. 2. Verify the URL is trusted and tap Yes when prompted. The registration window appears. 3. Enter an Email address and Password. 4. Specify the License Code. 5. Your device s phone number appears in the Phone Number box. If the number does not appear, enter it manually including Country Code and Area Code without the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special characters. Valid phone numbers are between 11 and 15 digits (including country code). 6. Select Register. The Mobile Security Dashboard The dashboard is one of the servers with which you register your device. If you are given access to the dashboard (This access is optionally given by an administrator or service provider.), you can login to monitor your device, control some security settings, and change your email address and password. You can access the dashboard web interface using a URL provided to you. For dashboard login and configuration details, please refer to the Junos Pulse Mobile Security Dashboard documentation. Email Address Validation After you first login to the dashboard, you receive an email requesting that you validate your email address. This email contains a link that you must click to validate your email address. After you click the link, a web page notification appears informing you that your email address has been validated. Using Security Features Once you have successfully registered, if your device is running Android 2.2 or higher, the Activate device administrator prompt appears. Informational Note: If you do not activate the Device Administrator, some features behave differently. See the following sections for details: Anti Theft Features on page 9 and Uninstalling or Clearing Data on page 12. When security features are registered, the available features appear and are now accessible from the Security tab. Those features are as follows: Scan/Threats Detected: Lists threats (viruses and malware) that have been found on the device and gives you the ability to allow or remove suspicious applications. When no threats are found this button reads Scan. You can tap it go to the Scan window. When threats are found, this button reads Threats Detected. You can tap it to view the detected threats. Backup: Lets you backup Contacts and Calendar events. Copyright 2012, Juniper Networks, Inc. Using Security Features 3

Remote Monitoring: Provides information on what device activities are being monitored. Settings: Available from the Menu key. Settings allows you to set scan intervals, view support information and application logs, update virus signatures and update Junos Pulse software. Scan/Threats detected Anti Virus and malware detection protects your device by scanning all files and scanning secure digital (SD) cards to prevent device infections. To view threats and configure settings for threat detection: 1. Start Junos Pulse. 2. Select the Security tab. 3. If threats have been found, tap the Threats detected button. This takes you to the Scan Results window. 4. The Scan Results window lists the viruses, malware, suspicious applications and prohibited applications found on your device. If your device does not have Threat detection enabled, you only see the prohibited applications found on your device. Informational Note: From the Notification bar, the following notification appears when you have a detected threat. Detections Tab Each detected item is displayed in the Detections tab. You can select the orange button beside the detected item to view more information about the detection and see the available actions. Detection types and available actions are as follows: Prohibited Application: This is an application that has been prohibited. To remove a prohibited application, select the orange button beside the application name and tap the available Uninstall button. If you do not uninstall applications that are prohibited, the notification icon continues to appear at the top of the Junos Pulse window. Informational Note: On some devices, Junos Pulse can automatically uninstall applications that are prohibited. 4 Using Security Features Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is known to be malware. To remove malware, select the orange button beside the application name and tap the available Uninstall button. If you do not uninstall applications that are found to be malware, the notification icon continues to appear at the top of the Junos Pulse window. Informational Note: On some devices, Junos Pulse can automatically uninstall applications that are found to be malware. Suspicious Application: This is an application installed on your device that appears to be suspicious. The suspicious label is applied to an application when a set of heuristics determine that the application may be malware. For suspicious applications, you are given the option of allowing the application (adding it to your While list) or uninstalling it. To allow a suspicious application, select the orange button beside the application name and tap the available Allow button. You must also tap Yes to confirm the Allow action and then tap OK to confirm that you realize this action may put your device at risk. (You can choose to hide the last dialog so it does not appear again.) To uninstall a suspicious application, select the orange button beside the application and tap the Uninstall button. If you do not uninstall or allow applications that are found to be suspicious, the notification icon continues to appear at the top of the Junos Pulse window. Tap the View Detail button to access more information on the suspicious applications. You can also Allow or Uninstall the application from the details window. Virus: Viruses found during the last scan are listed in the Detections tab. It is recommended that you delete viruses when they appear here. To delete the virus from your device, select the orange button beside the virus name and tap the Remove button. Tap the View Detail button to access more information on the detected virus. You can also Remove the virus from the details window. Copyright 2012, Juniper Networks, Inc. Using Security Features 5

Scan button: The Scan button at the top of the Detections tab displays the how long ago the most recent device scan occurred. You can tap the Scan button to open a window which allows you to initiate one of three types of available device scans. Select one of the following scan options and tap OK to start the scan. Application scan: Scans all non system applications. Application and SD card scan: Scans all non system applications and the SD card. Full device scan: Scans all files, non system applications, and the SD card. Informational Note: When you manually initiate a full device scan, a Battery usage warning may appear. It is to inform you that scans can use large amounts of battery life. Therefore, you may want to have your device charging during the scan. White list Tab When you allow a detected suspicious application, it appears in your White list tab. From the White list tab, you can manage suspicious applications in case you change your mind and want to uninstall an allowed application at a later time. By selecting the orange button beside the application name and taping the available Uninstall button, you can uninstall the white listed application. You can also tap the View Detail button to view more information about the application and then Uninstall the application from the detail window. Backup Junos Pulse Mobile Security backs up contact and calendar appointment information to a central location. To restore data, you must contact your administrator or access the dashboard. A restore occurs in the form of an SMS command that tells your device to contact the server to retrieve your backup. To back up device data: 1. Start Junos Pulse. 2. Select the Security tab. 3. Select Backup. The time of the last backup is displayed on the Backup button. 4. From the Backup window, the number of Contacts and Calendar events previously backed up is displayed. To initiate a backup, tap the Backup button at the top of the window. The backup immediately begins. 6 Using Security Features Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Remote Monitoring The Remote Monitoring window lets you view the device event types and activities that are being monitored. To view the Remote Monitoring window, do the following: 1. Start Junos Pulse. 2. Select the Security tab. 3. Select Remote Monitoring. The Remote Monitoring window may display one or more of the following monitored activities: Monitoring SMS: Inbound and outbound SMS messages are logged, including the sender, receiver and contents of each message. MMS: Logging MMS messages is not supported at this time. Voice: Call history events are logged, such as initiated outgoing calls and received incoming calls (call duration is not recorded, but the remote phone number is noted.) Log images/pictures: If enabled from the server, the images downloaded or captured on the device are turned into thumbnail images and uploaded to the server. This occurs immediately and is not dependent on log limits. Logs: Event limit: When the total number of events (SMS, email, voice) crosses this threshold, the full suite of logs is uploaded to the server. File size limit: When the total combined file size of all logs (SMS, email, voice) crosses this threshold, the full suite of logs is uploaded to the server. Note that SMS messages are generally several hundred bytes in size. Emails are usually 2KB or larger (no attachments included). And voice messages are typically 200 hundred bytes. Control: Periodic GPS updates: This update period is configured on the server. This setting periodically queries the device position and uploads that information to the server for tracking purposes. Block calls: When enabled, blocks all outbound calls. Copyright 2012, Juniper Networks, Inc. Using Security Features 7

Web Security If Web Security is enabled on your device, URLs that you are attempting to access may be blocked or monitored. If a URL is blocked by the security policy on the device, the web browser displays a page informing you that the web site you are attempting to view is blocked. When Web Security is active on your device, a notification at the bottom of the Junos Pulse screen informs you of this. Settings From the Settings window, you can configure security settings such as scanning options and virus signature update intervals. You can also view support information and log files. From within the Junos Pulse application, you can access the Settings window through the Settings button. Locate the Settings button by doing the following: Select the three vertical dots on the right side of the Action bar (for Android 4.0 and later) to access the menu. Select Settings from the menu. Select the Menu button (Android 3.0 and earlier) to access the menu. Select Settings from the menu. Action bar button Menu button From the Settings window, you can access the following: Security Settings Security settings are configured by your administrator or service provider, and changes are downloaded to your device. You may change security settings by selecting the orange arrow beside the Security Settings to access the following: Scan applications on install: When enabled, a scan is initiated on an application when it is installed. A malware scan also takes place on files downloaded to /sdcard/download. When disabled, a scan only occurs at the scheduled interval or when manually initiated. Select the check box to enable this feature. Scan SD Card on Insert: Scans the SD card for malware and viruses. Select the check box to enable this feature. 8 Settings Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Scan inside archives: Scans the contents of compressed files such as.zip and.apk files. Optimize media scanning: Allows for faster scanning of photos, media, and music files by not re scanning large files that have already been scanned (unless those files have changed). Full device scan: Displays the time interval in which a full device scan occurs. A full device scan scans all files, the SD card, and non system applications. Select the arrow beside the time interval to change the scan interval. Profile update: Virus definitions are loaded when you register, and they are updated on a preset schedule. Select the arrow beside the time interval to change the update interval. Support Info You can view device and Junos Pulse application information as well as view and send logs by selecting the orange arrow beside Support Info in the Settings window. This takes you the Support Info window where you can do the following: Tap the View Logs button to see the log file data. From this data window, you can select which log type to view from the pulldown list and you can clear the log file by tapping the Clear Logs button. Tap the Send Logs button to select an application from which to send the log file. Informational Note: You can only send log files using an email application. No other methods are supported at this time. Update You can update the virus list and the Junos Pulse application (if updates exist for both) by selecting the orange arrow beside Update in the Settings window. This takes you to the Update window. From here you can check for updates for the following: Virus List: If there is an update available, tap the Update button to update your virus list. If there is no Update button, your list is likely up to date. An available Check button allows you to check for updates. Application: If there is an update available for Junos Pulse, tap the Update button to update your software. If there is no Update button, your software is likely up to date. An available Check button allows you to check for updates. Anti-Theft Features There are a number of measures that can be taken to protect your device if it is lost or stolen. If your Junos Pulse deployment makes these features visible to you, an Anti Theft button appears on your Junos Pulse home screen. When you tap this button, the anti theft features that are activated on your device are listed. You can tap the Manage Anti-Theft Features button from the Anti Theft window to go to your service provider s web site to purchase or view more anti theft features. Anti theft features include: Copyright 2012, Juniper Networks, Inc. Anti Theft Features 9

Lock Handset and Unlock Handset Locks the device until an unlock command is sent from the server or by entering a device password that matches the device password policy. When a lock command is sent from the server to the device, a new password can be generated, as well. This password may be sent via email to you and you can modify it. When the lock command is triggered with this newly generated password, the following occurs on various devices: If the Device Administrator is enabled and the device already has a password configured: When a lock command is sent with a new password, the device is locked with the existing password. The new password from the server is not used. When a lock command is sent with an empty password, the device is locked with the existing password. The password from the server is not used. If the Device Administrator is enabled and the device does not have a password configured: When a lock command is sent with a new password, the device is locked with this new password. When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is automatically registered: When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. If the Device Administrator is disabled and the device is registered manually: When a lock command is sent with a new password, the device is locked with this new password. (Irrespective of password configured on the device.) When a lock command is sent with an empty password, the device is NOT locked. Emergency Call Button When the device is locked, an Emergency Call button is available from the unlock window. You can make an emergency call, to 911 for example, when you select this button and enter an emergency number. SIM Change (On Android OS 2.2 and later) If the Device Administrator function is activated and Wipe is enabled, a wipe command sets the device back to factory settings. No lock is performed. If the Device Administrator function is not activated and the SIM card is changed, the device switches on GPS Theft Mode and the device is locked. SIM Change (On Android OS 2.1) The device switches on GPS Theft Mode and the device is locked. If Wipe is enabled, sensitive device information is wiped automatically. Wipe Handset (On Android OS 2.2 and later) If the Device Administrator function is activated, a wipe command sent from the server sets the device back to factory settings. If the Device Administrator function is not activated, a wipe command deletes scheduling, contact and task information, SMS messages, and the memory card. 10 Anti Theft Features Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Wipe Handset (On Android OS 2.1) Deletes scheduling, contact and task information. Send Backup If this data is not stored on the server, this feature gathers the backup information from the device and emails it to the email address provided in the registration process. GPS Location If your device is equipped with GPS, your administrator can locate your device. Device location is displayed on the Junos Pulse server. Alarm On and Off (Scream locate) Blares a maximum volume alarm sound to locate the device in a nearby location. GPS Theft On and Off Sends GPS updates to the Junos Pulse server on a 2 to 5 minute period to fine-tune GPS location if the device is stolen. Password Policies and Storage Encryption Junos Pulse can enforce password and storage encryption policies on your device. This means that you are required to use a device password and set up device data encryption that meets the criteria of the Junos Pulse security policy. A password policy can include but is not limited to requirements such as the number of required characters, the frequency in which you must change your password, the number of failed password entry attempts that can occur before the device is wiped, and the amount of time your device can remain idle before an auto lock occurs. Also, your password can be remotely reset and sent to you via email. For example, if your device is remotely locked, an unlock command may reset your password with the new password being sent to you in an email. If you have not set a device password or if your password does not meet the password policy requirements, you are prompted to reset your password so that it meets those requirements. As part of your device security policy, you may be required to encrypt your application data. If this is the case, a prompt will inform you of this requirement. You are continually prompted until you set the data encryption feature on your device. If you fail to meet the security policy requirements within a given period of time, it is possible for your device to be remotely locked or wiped. Scream Dismiss From the dashboard, a scream command can be sent to your device which allows you to audibly locate the device if it s within hearing distance, even if the speakers and ringer are muted. Once you locate the device, you can turn off the scream from the Notification bar. Select the Scream activated notification to dismiss the scream. Custom Button If your Junos Pulse deployment makes this feature visible to you, an additional button customized by your service provider, appears on your home screen. When you tap this button, a customized URL takes you to a web page that is set up by your service provider. This page may offer the purchase of additional features or it may provide additional information. This will vary by service provider. Copyright 2012, Juniper Networks, Inc. Anti Theft Features 11

Uninstalling or Clearing Data You may need to re register your device after the initial registration or you may need to clear your devices Junos Pulse settings for another reason. You can accomplish this by uninstalling Junos Pulse or by manually clearing all settings as follows. 1. From the main menu, select Settings > Applications > Manage Applications > Junos Pulse. 2. To uninstall Junos Pulse, select the Uninstall button. or 3. To clear all Junos Pulse data, select the Clear data button. If the Device Administrator function is activated, you can uninstall Junos Pulse by doing the following: 1. From the main menu, select Settings> Location & Security (or just Security on some devices). 2. Select Device Administrator and uncheck the Junos Pulse check box. Now you can begin the regular uninstall process. Adding a Secure Connection Informational Note: This service is only offered if you are accessing your corporate network resources securely. Junos Pulse uses your device s 3G, 4G, Edge or WiFi connectivity to establish an authenticated connection to a protected network. You can add a connection for each different network to which you connect. This is a secure VPN connection to your corporate network or a core access SSL channel to web bookmarks configured by your administrator. To define a connection, do the following: 1. Start Junos Pulse. 2. From the VPN tab, select Connections. 3. Select Add Connection. 4. Enter the connection properties as follows: Connection name: A descriptive name. URL: The Web address provided by your administrator. (Note that Connection name and URL are the only required fields when creating a connection profile. All other fields are optional.) Username: Enter your username. Realm: If your administrator has provided this information, enter the realm value. Role: If your administrator has provided this information, enter the role value. Uses Certificate: Select this check box if your administrator has provided you with a digital certificate. If you do not use a certificate, you may have to provide a username and password when you connect. 12 Uninstalling or Clearing Data Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Certificate Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the certificate file. (Note that this field is required if you have selected Uses Certificate.) Key Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the network key provided by your administrator. (Note that this field is required if you have selected Uses Certificate.) 5. Select Create Connection. Your connection is now created and saved. Connecting Once you have configured your connection, select the Connect button. If the Select Connection field does not default to the correct connection, you can select it from the pulldown menu. You may have to enter additional information required by your network when you are establishing a connection. Viewing Connection Status Icon The status of your current connection also appears at the bottom of the Junos Pulse window in the form of an icon. The appearance of the icon indicates whether the connection is active, inactive, or limited by policy non compliance (see Limited Access on page 14). Active Connection No Session Limited Access The active connection icon also appears in the status bar at the top of your device window. When you close Junos Pulse, that icon remains visible as long as your VPN connection is active. Viewing Connection Status Window When you have an established, full VPN connection (not all devices support full VPN capability), selecting the Status button in the main window displays the following VPN information: VPN Status: Connected or Disconnected Server: Server URL Duration Bytes Sent Bytes Received Address From the Notification bar, the following notification also appears when you have an active VPN connection. Informational Note: If you only have access to web bookmarks (Core Access rather than VPN access) the VPN status is Disconnected but the Junos Pulse connection icon will appear at the bottom of the Junos Pulse window. Copyright 2012, Juniper Networks, Inc. Connecting 13

Limited Access To ensure the integrity of mobile devices that are accessing network resources, an administrator can enforce a security policy with which mobile devices must comply in order to connect to the network. If a device is found to be non compliant when attempting a secure network connection, only limited network access may be granted. When your device is non compliant, you are prompted with this information and you may be presented with a Continue button which you can tap to obtain limited network access. Reasons for non compliance may include the following: Your device has been rooted. Your device is running an operating system that is not allowed by the security policy. Your device is not actively registered with the appropriate Mobile Security Gateway (MSG) and/or Junos Pulse Mobile Security Suite is not active on your device. You must remedy the non compliance issue on your device before you can establish a full network connection. User Interface Modes Your administrator or service provider can deploy Junos Pulse to your device with varying features sets available to you through the Junos Pulse UI. You can have a full UI with all possible Junos Pulse features visible to you or you can have a minimal or security UI that includes a subset of Junos Pulse features that are visible to you. The possible UI modes that your administrator can deploy to your device are as follows: Full UI: The full UI includes all available Junos Pulse features as described in this manual. Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a Home screen that provides an About menu. For supported devices only, detected viruses, malware, and prohibited applications are deleted automatically. For malware and prohibited applications, a notification is displayed when an application removal occurs. When you tap on the notification, a screen appears which provides information on the application that was removed. You can tap the Clear button remove the notification. Security UI: The security UI includes only the Junos Pulse security features and does not provide the ability to make VPN connections. Known Issues and Limitations Android has limitations in its support for certificates. If you experience the "No cert" error, or if Junos Pulse closes unexpectedly when you try to connect, contact your administrator. At this time, you can only send log files using email. No other methods are supported. Although Photo and Video Share appears as an option when you select Send Logs, it is not a valid method for sending logs. You should not select that option when sending log files. 14 User Interface Modes Copyright 2012, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android When the device is locked by either the Handset Lock command or the Lock on SIM Change command, you may still be able to access the device s Home window and the Notifications window. If a device does not have cell service, it cannot receive commands. For example, if a device is connected only through WiFi, commands such as Lock and Wipe are not received by the device. If the Device Administrator is not activated, automatic removal of malware and prohibited applications, as well as the automatic application removal feature, are only available on certain Samsung devices. Please refer to the Junos Pulse Supported Platforms Guide for details. If your device registers with the MSG using automatic registration, and Lock on SIM change is enabled, and you change the SIM, the only way to unlock the device is to put the original SIM back in or to send an unlock command to the device from the dashboard. Copyright 2012, Juniper Networks, Inc. Known Issues and Limitations 15

16 Known Issues and Limitations Copyright 2012, Juniper Networks, Inc.

Index Index A anti-theft features................................9 alarm on and off, scream locate....................11 emergency call button..........................10 GPS location.................................11 GPS theft....................................11 lock handset, new passcode set...................10 send backup..................................11 SIM change..................................10 unlock handset, new passcode set..................10 antivirus.......................................4 automatic application removal.......................4 automatic URL registration..........................2 available features.................................1 B back up data....................................6 C clear data.....................................12 connecting..................................12, 13 add a connection..............................12 certificate...................................13 key........................................13 realm.......................................12 role........................................12 status icon...................................13 status screen, full VPN..........................13 URL........................................12 username....................................12 custom button..................................11 D dashboard......................................3 Detections tab...................................4 device administrator...............................3 download application..............................1 E email address validation............................3 emergency call button............................10 EULA..........................................1 I installation.....................................1 L license code.................................... 3 limited access, non-compliance..................... 14 M malware applications............................. 5 manual registration............................... 2 Mobile Security Dashboard.......................... 3 O optimize media scanning........................... 9 P password policy................................ 11 profile update................................... 9 prohibited applications............................ 4 R remote monitoring................................ 7 S scan button..................................... 6 scan inside archives............................... 9 scan results malware..................................... 5 prohibited.................................... 4 prohibited applications........................... 4 suspicious.................................... 5 viruses...................................... 5 scream dismiss................................. 11 secure connection............................... 13 security features................................. 2 antivirus, malware detection....................... 4 automatic URL registration........................ 2 manual registration............................. 2 register for.................................... 2 security settings................................. 8 send logs...................................... 9 settings....................................... 8 storage encryption............................... 11 support info.................................... 9 suspicious applications............................ 5 T threats detected................................. 4 U uninstall...................................... 12 Copyright 2012, Juniper Networks, Inc. Index 1

update........................................ 9 user interface modes............................. 14 V validate email address............................. 3 view logs...................................... 9 viruses........................................ 5 W web security.................................... 8 WIFI only devices................................. 2 2 Index Copyright 2012, Juniper Networks, Inc.