Junos Pulse Mobile Security Gateway

Size: px
Start display at page:

Download "Junos Pulse Mobile Security Gateway"

Transcription

1 Junos Pulse Mobile Security Gateway Administration Guide Release 4.0 June 22, 2012 R1 Copyright 2012, Juniper Networks, Inc.

2 Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright 2012, Juniper Networks, Inc. All rights reserved. ii Copyright 2012, Juniper Networks, Inc.

3 Table of Contents About This Guide v Audience...v Obtaining Documentation... v Documentation Feedback... v Requesting Technical Support... v Self-Help Online Tools and Resources... vi Opening a Case with JTAC... vi Chapter 1 Getting Started 1 Pulse Mobile Security Overview... 1 Enterprise and Consumer Deployments... 2 Administrators and Roles... 2 Customer Service Roles... 3 New Features in Pulse Mobile Security Release Accessing the Pulse Mobile Security Gateway...4 Using the Pulse Mobile Security Gateway Management Console...5 Chapter 2 Setting Up the Pulse Mobile Security Gateway 7 Add Partners and Enterprises... 7 Adding a Partner... 7 Adding an Enterprise...8 Editing the Default Enterprise Policy Settings...9 Moving an Enterprise to Another Partner Adding Administrator Accounts Adding an Administrator Role Adding a User Account...17 Assigning a Role and User Control List to a User Account...17 Registering Devices Manual Registration of ios Devices Manual Registration of non-ios Devices Automatic Registration Configuring Device Identity Servers Importing Certificates for Device Identity Servers Importing the Certificate for the Pulse Mobile Security Gateway 20 Configuring C2DM and System Log Settings...21 Updating Malware Signatures...22 Creating Certificates for the Pulse Mobile Security Gateway...22 Importing Certificates for the Control Center and Signature Update Server...23 Configuring the Control Center Settings Configuring the Signature Update Server Table of Contents iii

4 JWOS Command Reference Guide Chapter 3 Device Profiles 27 Defining Prohibited Applications...27 Managing Profiles for ios Devices Adding and Editing ios Profiles Setting the Default ios Profile Deleting ios Profiles Managing Firewall Rules and Profiles Adding Firewall Rules Modifying Firewall Rules Deleting Firewall Rules...37 Adding Firewall Profiles...37 Modifying Firewall Profiles...37 Deleting Firewall Profiles...37 Managing Antispam Rules and Profiles Adding Antispam Rules Modifying Antispam Rules Deleting Antispam Rules Adding an Antispam Profile Modifying an Antispam Profile Deleting Antispam Profiles Chapter 4 User Accounts 41 Managing User Accounts Adding a User Account Modifying User Accounts Deleting a User Account Managing User Groups Chapter 5 Devices 45 Devices Overview Adding Devices Manually...46 Modifying Device Settings...46 Applying ios Profiles to Devices Sending Device Commands Backing Up and Restoring Personal Data Managing Device Groups Chapter 6 Reports 57 Viewing Reports...57 Removing Applications From Managed Devices Viewing the Applications, Contacts, Pictures, and Messages on Managed Devices...60 Tracking Devices with GPS...60 Viewing the Gateway and Change History Logs Appendix A Summary of Supported Features 63 Pulse Mobile Security Features by Device Type Index 65 iv Table of Contents

5 About This Guide The Junos Pulse Mobile Security Suite consists of the Pulse client application and the cloud-based Mobile Security Gateway, with its associated management Console and end-user Dashboard. This guide describes how to configure and manage Pulse client devices using the management Console of the Mobile Security Gateway. Audience This guide is intended for: Enterprise security administrators responsible for the setup and/or maintenance of the Junos Pulse Mobile Security Gateway Enterprise security administrators and customer service personnel responsible for providing support for users of the Junos Pulse Mobile Security client and Dashboard Obtaining Documentation To obtain the most current version of all Juniper Networks technical documentation, see the products documentation page on the Juniper Networks Web site at Documentation Feedback We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can send your comments to or fill out the documentation feedback form at If you are using , be sure to include the following information with your comments: Document or topic name URL or page number Software release version (if applicable) Requesting Technical Support Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC). If you are a customer with an active J-Care or JNASC support contract, or are covered under warranty, and need post-sales technical support, you can access our tools and resources online or open a case with JTAC. JTAC policies For a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at Copyright 2012, Juniper Networks, Inc. Audience v

6 Product warranties For product warranty information, visit JTAC hours of operation The JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings Search for known bugs Find product documentation Find solutions and answer questions using our Knowledge Base Download the latest versions of software and review your release notes Search technical bulletins for relevant hardware and software notifications Join and participate in the Juniper Networks Community Forum Open a case online in the CSC Case Manager To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool Opening a Case with JTAC You can open a case with JTAC on the Web or by telephone. Use the Case Manager tool in the CSC at Call JTAC ( toll free in USA, Canada, and Mexico). For international or direct-dial options in countries without toll-free numbers, visit us at vi Requesting Technical Support Copyright 2012, Juniper Networks, Inc.

7 Chapter 1 Getting Started This chapter provides a brief overview of the Pulse Mobile Security Gateway. Pulse Mobile Security Overview on page 1 Accessing the Pulse Mobile Security Gateway on page 4 Using the Pulse Mobile Security Gateway Management Console on page 5 Pulse Mobile Security Overview The Pulse Mobile Security Gateway lets you centrally manage mobile (handheld) devices that are protected by the Junos Pulse Mobile Security Suite. The Pulse Mobile Security Suite is client software that protects mobile devices from viruses, spyware, identity theft and other threats. Users can install the Pulse client software from the applications store associated with any of the following mobile operating systems: Apple ios RIM Blackberry Google Android Nokia Symbian Windows Mobile For a list of the supported versions of each operating system, see the Junos Pulse Mobile Supported Platforms Guide, which is available at The Layer 3 VPN feature of the Pulse client (not supported by Blackberry) provides secure access to private networks by connecting to a Juniper Networks SA Series SSL VPN appliance. To activate all other security features, and allow the gateway to manage the device, the mobile device must be registered with the Pulse Mobile Security Gateway. The Pulse Mobile Security Suite provides the following features: Antivirus Devices are protected by real-time antivirus and malware protection with automatic updates (non-ios devices only). You can scan files across network connections, perform on-demand scans, and provide virus and malware detection alerts. Note that users can enable the following options on Android devices: Scan Memory Card on Insert The memory card is scanned when it is first installed (if the power is on), not when files are added. Scan application on install Applications are scanned for malware during installation. If the administrator defines any prohibited applications, scanning occurs during installation even if this feature is disabled. Copyright 2012, Juniper Networks, Inc. Pulse Mobile Security Overview 1

8 Android malware detection Android devices receive signatures to detect both malware and suspicious applications, and you can define a list of prohibited applications. Depending on the device type, malware and prohibited applications are deleted automatically or the user is prompted periodically to perform the deletion. Personal firewall Provides inbound and outbound IP address and port filtering. Antispam Provides filtering to block voice and SMS spam and to deny unknown or unwanted calls. Backup and restore The contact list and calendar on non-ios devices can be backed up in a standard format and restored to another device. Loss and theft protection From the gateway, you can perform remote lock, remote wipe, GPS locate and track, remote alarm and notification, and SIM change notification. Device monitoring and control The gateway provides tools for application inventory and removal, monitoring (SMS, MMS, message content, and photos stored on device), and the ability to view the call log and the user s contacts. Consumer Dashboard Allows users to log in to the gateway to locate a lost or stolen device, view reports of the device usage, or use other security features. Informational Note: The firewall and antispam features are supported only by the Windows Mobile and Symbian devices. For more information about version support for each device type, see the Junos Pulse Supported Mobile Platforms Guide. Enterprise and Consumer Deployments The features deployed for enterprise and consumer users may differ. For example, a typical enterprise solution may include the Junos Pulse SSL VPN client features, while a typical consumer solution might be comprised of just the Pulse client's anti-malware and anti-theft features. Administrators and Roles Each gateway administrator account requires a role that determines the functions that the user can perform and a user access control list that determines the mobile devices the user can access. User roles and accounts can be defined at each administrative level (Root, Partner, and Enterprise), but most administrators will have an Enterprise account. Each role specifies the permissions (view, add, edit, delete, and move) for the following objects that you manage in the Pulse Mobile Security Gateway: Partner A group of one or more Enterprises. Only Root and Partner administrators can add or view Partners. Enterprise An organization that manages registered mobile devices. Registered devices exist only at the Enterprise level. Each Enterprise has a Consumer or Enterprise license. Enterprise administrators can allow users to log in to the gateway Dashboard to locate a lost phone or use other security features. User An Enterprise user account is created automatically when a mobile device is registered. To create an administrator account, you can add a role and access control list to an existing user account, or manually create a new account. User Group Enterprise user accounts can be organized into user groups, such as by department or business unit. You can then issue commands to the devices associated with the users in one or more groups. 2 Pulse Mobile Security Overview Copyright 2012, Juniper Networks, Inc.

9 Chapter 1: Getting Started Device A device record is created in the appropriate Enterprise when a mobile device is registered. Mobile devices are identified by their MSISD (Mobile Subscriber Integrated Services Digital Network number, which includes the phone number, country code, and area code) and IMEI number (International Mobile Equipment Identity). Device Group Enterprise devices can be organized into device groups. You can then issue commands to the devices in one or more groups or view reports for a selected device group. Profiles Groups of rules that you can assign to an Enterprise or apply to specific devices. Profiles assigned to an Enterprise are applied to each device that registers with the Enterprise. The current profiles are: ios Profile Defines various settings on ios devices, such as user restrictions, password requirements, and the VPN and Wi-Fi networks that users can access. Firewall Profile Defines Internet access permissions, both inbound and outbound, for Windows Mobile and Symbian devices. Antispam Profile Defines antispam conditions that let you block incoming calls and SMS messages from specific phone numbers on Windows Mobile and Symbian devices. Each role also lets you allow or disallow certain tasks, such as sending commands to devices or viewing specific device reports. If you are not authorized for certain tasks, the related menu items and buttons are hidden or disabled. For each new Enterprise, a Root or Partner administrator must create the Enterprise and add an Enterprise user account and role for use by the Enterprise administrator. Partner administrators can manage all Enterprises associated with the Partner. Root administrators can manage all Partners and Enterprises. For more information about user accounts and roles, see Adding Administrator Accounts on page 15. Customer Service Roles Juniper Networks provides Customer Service personnel with credentials that allow access to all tasks related to the support of Pulse client users. Enterprise tasks regarding groups, profiles, and policies are not performed by support personnel. IMPORTANT!: Each chapter of this guide begins by indicating whether enterprise administrators or customer service personnel typically performs the tasks in that chapter. More specific notes about the tasks relevant to customer service personnel are included in each section, as appropriate. New Features in Pulse Mobile Security Release 4.0 Release 4.0 includes the following new features: Service Bundles for Android and Blackberry devices Services such as Antivirus, Backup/Restore, Monitoring and Control, and Anti-Theft can be enabled in any combination on the consumer Dashboard and Android and Blackberry devices. Inactive services can be grayed out and assigned an appropriate URL so that users can add or change the active services. As noted earlier, the solution deployed for an enterprise or consumer can be comprised of various features. Feature bundles may be offered in certain combinations to enterprise or consumer users, and support or store personnel can help users enable the desired services. Copyright 2012, Juniper Networks, Inc. Pulse Mobile Security Overview 3

10 Pulse Client enhancements The Junos Pulse client for Android and Blackberry devices has been redesigned with a more consumer-oriented interface. The new client interfaces support service bundles, and allow users to disable an alarm (Scream) that is enabled remotely to help locate the device. Dashboard enhancements The consumer Dashboard has also been redesigned and includes support for service bundles, plus the following new login features: Users can log in to the Dashboard using either a device s address or phone number as the username. Users can change a device s address from the Dashboard. When a device is registered or the address is changed, users receive an with a URL that they can select to confirm the new address. A reminder is displayed on the Dashboard until the new address is confirmed. Users who do not know their password can reset the password on the Dashboard login page. An is sent to the user with a login URL and a temporary password. Lock/Unlock commands The Lock command issued from the management Console or Dashboard now generates a passcode that can be ed to the users of Android and Blackberry devices. The Unlock command can be used to unlock a device or change the password for an Android or Blackberry device. Web filtering for Android devices The Pulse Mobile Security Gateway can be configured to use a Websense server to look up the category of each URL accessed from Android devices. Dashboard users can block or monitor selected categories of websites and define lists of URLs that are always allowed or blocked. C2DM support The Cloud to Device Messaging (C2DM) service can be configured as an alternative to SMS for communicating with Android devices (version 2.2 or later). If the C2DM service is not available, SMS is used as the default. Compatibility with previous releases Release 4.0 of the gateway supports all previous Junos Pulse clients, but requires Pulse 4.0 clients to support the new features in this release. Pulse 4.0 clients are not guaranteed to be compatible with earlier versions of the gateway. Accessing the Pulse Mobile Security Gateway The URL used to access the management Console of a Pulse Mobile Security Gateway depends on whether you are hosting the gateway in your own network. To access the management console of a gateway hosted by Juniper Networks, enter the following URL in your browser: Use the login credentials provided for you. If you are the Root administrator logging in for the first time to a gateway in your own network, use root@smobilesystems.com and password for the username and password. If you are a customer service representative, your login credentials give you access to the appropriate gateway and user accounts. If access to the gateway Dashboard is enabled, users can use their registration address and password to log in to the Dashboard at the following URL to view device reports, locate a missing device, or use other security features, depending on the features purchased or available. 4 Accessing the Pulse Mobile Security Gateway Copyright 2012, Juniper Networks, Inc.

11 Chapter 1: Getting Started The Dashboard URL for a gateway hosted by Juniper Networks is: For Windows Mobile and Symbian users, who can enter just the license key during registration, the IMEI number is used for the address and password. Administrators can change the defaults and notify the user. Informational Note: To use the Pulse Mobile Security Gateway, your browser must be Google Chrome version 6.0, Microsoft Internet Explorer version 7.0 or 8.0, or Mozilla Firefox 3.0, 3.5, or 3.6. JavaScript and cookies must be enabled on the browser. Using the Pulse Mobile Security Gateway Management Console The management Console of the Pulse Mobile Security Gateway has a navigation panel on the left, a central data panel, and a top panel for additional features, such as search and help. For enterprise or partner administrators, the navigation panel displays a hierarchy of the Partners and Enterprises. Most administrators manage a single Enterprise and its associated users and devices (see Figure 1 on page 5). Customer service personnel do not see a hierarchy, but are logged in to the appropriate gateway for the users that they support. Informational Note: Administrators must select the appropriate item in the navigation panel before performing an operation. Each action is applied to the selected Partner, Enterprise, or group. For example, select a device group to view reports for just the devices in that group. Figure 1: Pulse Mobile Security Gateway Management Console Copyright 2012, Juniper Networks, Inc. Using the Pulse Mobile Security Gateway Management Console 5

12 The top panel provides the following selections: Search Lets you search for device identifiers, or the names of users, Enterprises, user groups, or device groups. The device identifiers include the phone number (MSISD) and the DID, ESN, IMEI, IMSI, and UUID. My Account Lets you change your login account. Admin Lets you to define and assign user roles. Root administrators can also configure certificates and the connections to the Control Center and the Signature Update Server. Help Provides information about software versions, the license, and system uptime, the list of commands that can be sent to managed devices, and the current list of known viruses. The following Tabs are presented below the top panel. These tabs apply to an enterprise that is selected by an administrator, or automatically selected for a customer service representative. Reporting Shows a summary of virus and registration activity and provides links to more detailed reports. For more information about reports, see Viewing Reports on page 57. Profiles Allows enterprise or partner administrators to define profiles for ios devices and firewall and antispam profiles for Windows Mobile and Symbian devices in the Enterprise. In addition, a Root administrator can define a list of prohibited applications for the Android devices in all Enterprises. Customer service personnel generally do not define the profiles, but in some cases may need to access these functions (see Device Profiles on page 27). Users Lists the current user accounts. When a mobile device is registered, the gateway creates a user account that includes the device information. You can edit user records to reset the password or make other changes. Devices Shows each registered mobile device. Depending on your role and associated access permissions, you can edit the settings for individual devices, apply profiles to ios devices, move devices into a device group, and send commands to selected devices. You can also add and delete device groups, and send commands to the devices in one or more groups. Settings Provides a summary of the Enterprise settings and lets the enterprise administrator define the default security settings that are applied to mobile devices when they register with the Enterprise. Logs Provides access to the gateway logs. You can search the logs and view the log entries to assist in troubleshooting and reporting. 6 Using the Pulse Mobile Security Gateway Management Console Copyright 2012, Juniper Networks, Inc.

13 Chapter 2 Setting Up the Pulse Mobile Security Gateway This chapter contains information for partner and enterprise administrators, and includes topics (indicated by an asterisk in the list below) that are relevant to service providers who install the Pulse Mobile Security Gateway in their own network. Typically, customer service personnel do not perform these tasks and do not have access to these settings. Most setup tasks are performed by Juniper Networks personnel before users install the Junos Pulse client and register with the gateway. Add Partners and Enterprises on page 7 Adding Administrator Accounts on page 15 Registering Devices on page 18 Configuring Device Identity Servers on page 19 * Configuring C2DM and System Log Settings on page 21 * Updating Malware Signatures on page 22 * Add Partners and Enterprises The following topics describe how to add Partners and Enterprises (at least one of each is required), and how to move an Enterprise to a different Partner: Adding a Partner on page 7 Adding an Enterprise on page 8 Editing the Default Enterprise Policy Settings on page 9 Moving an Enterprise to Another Partner on page 15 Adding a Partner A Partner is used to identify a group of Enterprises. At least one Partner is required, and the Default Partner is created automatically. A Root administrator can define new Partners or change the Default Partner. Root administrators can then add one or more Enterprises or create a user account for a Partner administrator who can add the needed Enterprises. To add a Partner: 1. Log in to the gateway as a Root administrator. 2. On the Home page, click Add Partner. 3. Specify the following properties: Partner Name Typically, the name of the organization. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 7

14 Notes Information such as how to contact the Partner administrator. 4. Click Save to create the Partner. Adding an Enterprise An Enterprise is any organization that manages mobile devices. For each Partner, a Default Enterprise is created automatically. A Root or Partner administrator can define new Enterprises or change the Default Enterprise. Root or Partner administrators can manage each Enterprise or create a user account for an Enterprise administrator who can perform Enterprise-specific management tasks. To add an Enterprise: 1. Log in to the gateway as a Root or Partner administrator. 2. On the navigation panel, select the Partner where you want to add an Enterprise, and click Add Enterprise. 3. Specify the following properties: Setting Enterprise Name Enterprise Code License Type License Count License Expiration Date or License Length Require Customer Account Allow Insecure Clients Allow Manual Registration Allow Dashboard Access Notes Products A descriptive name. A code that identifies this Enterprise to managed devices. If the license type is Enterprise, the Enterprise code is used as the license key during registration. The Enterprise code must be unique. Select whether the software is licensed by the Enterprise or by the device (Consumer). Number of licensed devices. For an Enterprise license type, enter or select the license expiration date for the Enterprise and all of its registered devices. For a Consumer license type, enter the number of days that each registered device is licensed to use the software. The expiration date cannot exceed Requires administrators to create a user account before a device can register with the Enterprise. If you do not select this box, a user account is created automatically when a device is registered. Allows gateway access for devices that do not use the latest authentication method (selecting this option is recommended). Allows users to register with the Enterprise by manually entering a license key. Currently, only Android, Blackberry, and ios devices can be registered automatically. Allows users to log in to the gateway Dashboard to locate a lost phone or use other security features. If this check box is cleared, the Enterprise administrator uses the management Console to perform all the tasks available on the Dashboard. Descriptive information about this Enterprise. Select the features enabled in this Enterprise. To change the default settings for each feature, see Editing the Default Enterprise Policy Settings on page 9. Note that disabling Antivirus also disables scanning for malware and suspicious applications on Android devices. However, scanning for prohibited applications on Android devices cannot be disabled. Firewall Antispam Antivirus Control (antitheft and monitoring) 8 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

15 Chapter 2: Setting Up the Pulse Mobile Security Gateway 4. Click Save to add the Enterprise to the end of the list of Enterprises on the Partner page. You may have to refresh the page to see the new Enterprise. 5. To change the general Enterprise settings, click the Edit icon to the right of the Enterprise. To change the default policy settings for the Enterprise, click the Enterprise Settings icon next to the Edit icon or select the Enterprise and click the Settings tab (see Editing the Default Enterprise Policy Settings on page 9). Editing the Default Enterprise Policy Settings Enterprise administrators can change the default policy settings that are applied to new devices when they register with the Enterprise. After registration, feature settings can be changed by sending commands to specific devices. Informational Note: The supported features vary by device type. If a device does not support a feature, the feature settings are ignored. For example, the firewall and antispam settings apply only to Symbian and Windows Mobile devices. To view and edit Enterprise settings: 1. Select the Enterprise in the navigation panel. 2. Select the Settings tab. 3. Review the general settings. To change the general settings, see Adding an Enterprise on page 8. If you access the Enterprise from another system using SOAP API calls, click Generate UUID to generate a universally unique identifier for the Enterprise. 4. To view or change the policy settings, click Enterprise Settings. 5. Edit the following settings as needed, and click Update. Setting Aggregator Settings Username Password SMS Sender Code API URL The username passed to the SMS provider s gateway API when sending commands. An SMS gateway is required to send commands to non-ios devices. The password passed to the SMS provider s gateway API when sending commands. Reserved for future use. The API key assigned by the aggregator. The key, along with the username and password, provide authentication to the SMS gateway when you send a command to a device. The base URL of the SMS aggregator's API. The Pulse Mobile Security Gateway adds the remainder of the URL when you send a command. Other Settings Software Download URL Update Schedule Android Malware Scan Interval Web page where users can download and install the Pulse client for their device. If you manually add a device, the gateway sends an SMS message or to the device with a link to this URL and a license key. Select how often the settings on the gateway, including virus definitions, are synchronized with the settings on non-ios devices. Select never to disable synchronization with the gateway. If users change the update schedule on the device, it is reset during the next synchronization. Select Hours (1 to 72) or Minutes (1 to 999) and enter the number of hours or minutes between scans for malware on Android devices. To disable malware scanning, enter zero. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 9

16 Setting Default UI Settings UI Mode UI Button Mode (service bundle) Indicates the Junos Pulse features available to users of Android and Blackberry devices. Select one of the following: Full UI Includes all features of the Junos Pulse client. Minimal UI Includes only a Splash screen, license screen, and a Home screen with an About button. Detected viruses, malware, and prohibited applications are deleted automatically, and suspicious applications are displayed to the user so they can be deleted or allowed. If a device does not support automatic deletion of applications, the Scan Results page is displayed periodically until the offending applications are deleted manually. Security UI Includes all Junos Pulse features, except the ability to define VPN connections to private networks. Users can scan for viruses and malware, view scan results, back up data, and so on. For Android and Blackberry devices, if the UI Mode is Full UI or Security UI, the following features can be active or inactive, and visible or hidden on the device and Dashboard. Active features can be hidden to simplify the user interface. Inactive/Visible features are grayed out so that users can select them to purchase the feature. Professional Services can customize the URL associated with grayed out buttons or text and assist you with enabling features programmatically through the gateway API. Select the activation status for each of the following: Anti Virus The Active/Visible selection displays a Scan/Threats Detected button and a Security Settings selection on the device so that users can start a scan or change the default scan and virus update settings. On the Dashboard home page, an Anti-Virus Activity section is displayed with an event count that users can select to view the list of events. The Active/Hidden selection hides the feature on the device and Dashboard, but viruses, malware, and prohibited applications are detected on the device and deleted automatically or the user is prompted to remove them. Backup The Active/Visible selection displays a Backup button on the device and a Backup and Restore button on the Dashboard. Users can back up their personal contacts and calendar from the device, but they must use the Dashboard (or contact an administrator) to restore the last backup. The Active/Hidden selection has the same effect as Inactive/Hidden. Monitor & Control The Active/Visible selection displays the Remote Monitoring button on the device so that users can view which items are monitored and whether GPS tracking is enabled. The Dashboard is updated as follows: The Remote Monitoring section is displayed on the home page with counts of the monitored messages, calls, applications, and photographs that users can select to view lists of each item. The Alert Setup tab allows users to set up alerts based on the message content (if messages are monitored). The Reports tab allows users to view a Text and Monitoring report. The Settings page allows Dashboard users to change the default monitor and control options for a device. The Active/Hidden selection hides the feature on the device and Dashboard, but allows an administrator to view the device activity logs (see Viewing the Applications, Contacts, Pictures, and Messages on Managed Devices on page 60). 10 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

17 Chapter 2: Setting Up the Pulse Mobile Security Gateway Setting Anti Theft The following buttons can be displayed on the Dashboard home page. If any of these buttons is visible, an Anti Theft button is displayed on the device that allows users to view, and optionally change, the status of each feature. Active/Visible features are shown as enabled; Inactive/Visible features are shown as disabled. The Active/Hidden and Inactive/Hidden selections have the same effect. Wipe Device The Active/Visible selection allows Dashboard users to erase personal data from a device, depending on the device type (see Personal Data Erased by Handset Wipe Command on page 64). Lock/Unlock Device The Active/Visible selection allows Dashboard users to lock or unlock a device. Scream Locate The Active/Visible selection allows Dashboard users to enable an alarm to help locate a device in the immediate area. Locate Device The Active/Visible selection allows Dashboard users to enable GPS reporting on a non-ios device and view the device s location on a map. To view the location of an ios device, an administrator must enable GPS reporting on the device. Custom Button The Active/Visible selection displays a customized button on the home page of the device and Dashboard that users can select to purchase or cancel optional features. The Inactive/Visible selection also displays the button. Professional Services can configure the button and its associated URL. Android Password Policy and Control Encryption Require encryption on device Require passcode on device Auto-lock Maximum number of failed attempts Allow simple value Require alphanumeric value Minimum passcode length Minimum number of complex characters Passcode history Maximum passcode age Prompts the user to enable encryption of application data on Android devices (if encryption is disabled). If a passcode is not defined on the device, PasswordNotSufficient is written to the Enterprise log, and the user is not prompted to enable encryption. Prompts the user to set a passcode on Android devices. Locks the device after the selected number of minutes (1 to 5) of inactivity. Select to disable the feature. Erases all data on the device after the selected number of login attempts fails (4 to 16). Select to disable the feature. Allows a passcode with repeated, ascending, or descending characters. Requires the passcode to have at least one letter. Requires the passcode to have the selected number of characters (1 to 16) Requires a passcode to have the selected number of special characters (1 to 4), such and &. Select to disable the requirement. Requires the specified number of unique passcodes (1 to 50) before a passcode can be repeated. Enter a zero to disable the requirement. Prompts the user to change the passcode after the selected number of days (1 to 730). Enter a zero to disable the prompt. ios Settings ios Default Profile Device Check-In Period Select the profile that is applied to ios devices when they register with the Enterprise. The predefined AutomaticDefault profile, which can be changed, is created automatically for each Enterprise. To add or change a profile, click ios Profiles. You can also apply profiles to selected devices after they are registered. Select the number of days between the prompts sent to each ios device to check in with the gateway for profile and updates. Select Disable to stop sending check-in prompts to registered devices. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 11

18 Setting MDM APNS Certificate Signing Request (CSR) Generate To manage ios devices, an Apple Push Notification Service (APNS) certificate must be uploaded to the Enterprise. Without an APNS certificate, ios devices can register, and iphones and ipads with 3G support can report their GPS location (Dashboard users will see only the GPS location), but the certificate is required for all other features. After the certificate is installed, users who are already registered must uninstall and reinstall the Pulse client. Before you begin, note the following: If you do not have an Apple ID, go to to create one. If the Control Center is not configured, see Configuring the Control Center Settings on page 24. To obtain an APNS certificate: 1. To create a CSR, click Generate, and specify the following: Common Name Unique name used to identify the certificate. Organizational unit Name of your department. Organization Legal name of your company/organization. Locality Name of the city where your organization is located. State (fully spelled out) State or province name. Country (2 letter code) Country or region code. 2. Click Generate to have the Control Center sign the CSR. Contact Technical Support if the error MSG Control Center failed to sign certificate request is displayed. 3. Click Download and save the apnscsr.plist file. 4. Click Upload CSR to Apple, log in to the Apple portal, and do the following: a. Click Create a Certificate, accept the terms, and then browse to the location of the apnscsr.plist file, and click Upload. b. Click the Download button next to the generated certificate and save the file locally. The APNS certificate file name is: MDM_<VendorName>_Certificate.pem. 5. On the Enterprise page, click the Upload button, click Browse, select the APNS certificate file, and click Upload. The certificate type must be PEM. The Upload button is hidden after a certificate is uploaded to the Enterprise. APNS Certificate After you upload the APNS certificate, the certificate status and expiration date is displayed. Certificates are valid for one year. When a certificate expires, you can click Delete and upload a new certificate. NOTE: Use the Upload button in the previous section. The Upload button in this section is for compatibility with the APNS procedure used in release 3.0. After the new certificate is installed, users who are already registered must uninstall and reinstall the Pulse client. Default Antivirus Settings Disable Handset Modifications Prevents users from changing the antivirus settings on non-ios devices, and the commands to enable or disable file scanning are not persistent. During periodic synchronizations with the gateway, the gateway settings override the settings on the device. Clear the check box to allow the device settings to override the gateway settings during each synchronization. 12 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

19 Chapter 2: Setting Up the Pulse Mobile Security Gateway Setting Scan Memory Card Scan Files Scan Inside Archives Optimize Media Scanning Enables periodic scans of the secure digital (SD) memory card on non-ios devices. Enables periodic scans of the files on non-ios devices. Enables recursive scanning of archive files that are contained within other archive files (Android devices only). The supported archive files are.zip,.gzip, and.jar. Enables media files larger than 1 MB to be skipped if the file has not changed since the previous scan (Android devices only). A file is skipped if the MD5 checksum has not changed. The supported media files are.gpp,.m4a,.mov,.mpg,.mp3,.mp4,.wav,.bmp,.gif,.jpg,.png, and.tif/.tiff. Default Firewall Settings (Win Mobile and Symbian only) Active Disable Handset Modifications Security Level Displays the firewall application on Symbian and Windows Mobile devices. Clear the check box to hide the application. Prevents users from changing the firewall settings on the device. Clear the check box to allow the device settings to override the gateway settings during the periodic synchronizations with the gateway. Choose one of the following: Disable Disables the firewall component. Allow Permits all traffic that is not specifically blocked in the firewall profile rules. Block Blocks all traffic that is not specifically allowed in the firewall profile rules. Profile Set of firewall rules that are applied to devices when they are registered. Use the list box to select a firewall profile. If you have not yet defined profiles, you can edit this setting later. You can also apply profiles to individual devices. Default Antispam Settings (Win Mobile and Symbian only) Active Disable Handset Modifications Block Short Codes Profile Displays the antispam application on Symbian and Windows Mobile devices. Clear the check box to hide the application. Prevents users from changing the antispam settings on the device. Clear the check box to allow the device settings to override the gateway settings during the periodic synchronizations with the gateway. Blocks SMS messages to or from short codes. Short codes are five- or six-digit SMS codes that serve as short phone numbers and are often used by premium SMS services. SMS messages from short codes are more likely to be spam than messages from regular phone numbers. Outgoing SMS messages to short codes can incur phone charges. Short codes are also used for instant messaging (IM) services. Blocking short codes increases security but also limits service to the client. Set of antispam rules that are applied to devices when they are registered. If you have not yet defined profiles, you can edit this setting later. You can also apply profiles to individual devices. Default Monitor and Control Settings Log Event Limit Number of events that are logged on non-ios devices before they are uploaded to the server. An event is an instance of any logged item ( , SMS or MMS message, phone call, or image). Higher values delay server updates, but minimize SMS charges and conserve battery life. Select off to disable uploads based on the number of events. NOTE: Device logs are uploaded to the gateway over HTTPS, not SMS. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 13

20 Setting Log Size Limit Log Log SMS Log MMS Log Voice Disable Voice Log Images Log Web Images GPS Update Period Maximum amount of file space used for the event log on non-ios devices (100K is recommended). The log can exceed this value, but if the log becomes full, an attempt to upload the log occurs after each event. Select off to disable uploads based on the log size. If both the Log Event and Log Size limits are off, uploads occur only when requested from the management Console or user Dashboard. Saves all s in the log (not supported on Android and ios devices). Saves all SMS messages in the log on non-ios devices. Saves the text portion of all MMS messages in the log on Blackberry and Symbian devices. Graphics are included only if they are saved on the device and the Log Images option is selected. Saves a record of each phone call in the log on non-ios devices, including date, time, and remote phone number. Disables the ability to make phone calls (not supported on Blackberry and ios devices). Saves images in the log that are loaded on non-ios devices. Saves images in the log that are accessed with the device Web browser (not supported on Android and ios devices). Select how often a device reports its GPS location to the gateway, or select Disable Updates to disable GPS reporting. For ios devices (iphones and ipads with 3G support), this setting does not override the ios profile. The device s last reported location can be viewed on the GPS Tracking Report (see Tracking Devices with GPS on page 60). Default SIM Change Settings Lock on SIM Change Wipe on SIM Change Locks a non-ios handset if the SIM card is changed after the device is registered. Changing the SIM card changes the phone number, and disables communication with the gateway. This feature helps protect personal data if the phone is lost or stolen. Logging in with the user s registration password unlocks the device and updates the phone number on the gateway. NOTE: For a device registered automatically, the user must replace the SIM to unlock the device. Also, locking the device does not disable active background applications, such as a phone call or the music player. Wipes the user data from a non-ios handset if the SIM card is changed after the device is registered (Lock on SIM Change must be enabled). The data erased depends on the device type (see Personal Data Erased by Handset Wipe Command on page 64). Note the following: On Android 2.2 (or later) devices that have the Device Administrator function enabled, the device is not locked, but a factory reset occurs that removes all applications installed by the user, including Junos Pulse. If the Device Administrator is disabled, the device is locked, and GPS Theft Mode and Monitor & Control logging is enabled. On Android 2.1 devices, the device is locked, and GPS Theft Mode and Monitor & Control logging is enabled. The contacts and history are wiped, but not the SD memory card. 14 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

21 Chapter 2: Setting Up the Pulse Mobile Security Gateway Moving an Enterprise to Another Partner An Enterprise can be moved to another Partner on the same gateway or a different gateway. Moving an Enterprise moves all of its associated data, including users, devices, and profiles. To move an Enterprise to another Partner on the same gateway, you must export the Enterprise from the current Partner, delete the Enterprise, and then import the Enterprise to the new Partner. To move an Enterprise within the same gateway: 1. Log in to the gateway as a Root or Partner administrator. 2. Select the Partner that has the Enterprise to be moved, and click Export Enterprise. 3. Select the Enterprise from the list, and click Export. 4. Click Home, select the check box next to the exported Enterprise, and click Delete. 5. Select the Partner where you want to move the Enterprise, and click Import Enterprise. 6. Select the Enterprise from the list of exported Enterprises, and click Import. To move an Enterprise to another gateway, contact Professional Services. Adding Administrator Accounts The Root administrator of the Pulse Mobile Security Gateway can create other administrator accounts at the Root, or for specific Partners and Enterprises. The procedure for creating administrators is the same at each level. Select the Root, Partner, or Enterprise in the navigation panel, create a role that has the administrator permissions, create a user account that uses the role, and then assign a user control list to the account. Informational Note: Do not change the name of the predefined Root account (root@smobilesystems.com). The Root account is required to configure the Control Center and Malware Signature Server settings for malware signature updates. Adding an Administrator Role A role is a set of permissions that you can apply to a user account. For example, you can define a role that allows view permission on everything but allows edit permission on only a few objects. For an administrator role, you typically allow all permissions. To define an administrator role: 1. In the navigation panel, select the Root, a Partner, or an Enterprise. The role must be created at the same level as the user accounts where you want to apply the role. Informational Note: To allow administrators to add a Partner, the Root level must be selected. 2. At the top of the page, click Admin. Root administrators must select Admin > User Roles. 3. On the Roles tab, click Add Role. Copyright 2012, Juniper Networks, Inc. Moving an Enterprise to Another Partner 15

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 4.1 November 30, 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.1 October 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 3.2 March 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 2.1 Published: 2011-09-26 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This

More information

Web Device Manager Guide

Web Device Manager Guide Juniper Networks EX2500 Ethernet Switch Web Device Manager Guide Release 3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-029704-01,

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

Pulse Supported Mobile Platforms

Pulse Supported Mobile Platforms Pulse Supported Mobile Platforms Updated: May 15, 2015 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 1 Contents Introduction... 3 Definitions... 3 Qualified Platform... 3 Compatible

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Dec 10, 2013 VERSION: 5.0R1 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 January 2018 2014.8.r12.20171213225424 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r12 Patch.............................................

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Juniper SRX PCAP Data Release 2014.1 Modified: 2016-03-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 October 2017 2014.8.r11.20171013131303 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r11 Patch..............................................

More information

JUNOSPHERE RELEASE NOTES

JUNOSPHERE RELEASE NOTES JUNOSPHERE RELEASE NOTES Release 1.1 17 June 2011 These release notes cover Release 1.1 of the Junosphere virtual network. If the information in these release notes differs from the information found in

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.5 June 2015 2014.5.r1.20150605140117 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.5.r1 Patch..............................................

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-10-15 Copyright Notice Copyright 2014 Juniper

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service Intrusion Detection and Prevention Sensors Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

JUNOSPHERE RELEASE NOTES

JUNOSPHERE RELEASE NOTES JUNOSPHERE RELEASE NOTES Release 1.6 28 October 2011 These release notes cover Junosphere Release 1.6. If the information in these release notes differs from the information found in the published documentation

More information

EX2500 Ethernet Switch 3.1 Release Notes

EX2500 Ethernet Switch 3.1 Release Notes EX2500 Ethernet Switch 3.1 Release Notes Release 3.1R2 29 January 2010 Revision 3 These release notes accompany Release 3.1R2 of the Juniper Networks EX2500 Ethernet Switches and software. They briefly

More information

Subscriber Traffic Redirection

Subscriber Traffic Redirection Subscriber Traffic Redirection Published: 2014-06-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service IF-MAP Feature Guide Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc.

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc. Junos Space Reports Release 14.1 Published: 2014-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sep 19, 2013 Copyright 2013, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform... 1 Related

More information

Junos Pulse MSS MSG Release 4.2R1

Junos Pulse MSS MSG Release 4.2R1 Access Solutions Junos Pulse MSS MSG Release 4.2R1 MSS MSG 4.2R1 (4.2.1.229) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net January

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 7.3.0 January 2018 7.3.0.20171205025101 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Administrator Notes..................................................

More information

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti JUNOS PULSE MOBILE SECURITY SUITE Stallion Winter Seminar 11.3.2011 Jukka Piirainen & Jani Ripatti JUNOS PULSE MOBILE SOLUTION FOR ENTERPRISES MORE MOBILE USERS, MORE PORTABLE DEVICES FOR CORPORATE ACCESS

More information

STRM Administration Guide

STRM Administration Guide Security Threat Response Manager Release 20.2 Juniper Networks, Inc. 94 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 204-09-2 Copyright Notice Copyright 20 Juniper

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Pulse Workspace Appliance. Administration Guide

Pulse Workspace Appliance. Administration Guide Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sept 21, 2012 VERSION: 12.09R21.01 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.4 Published: 2014-03-03 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

AT&T Toggle. 2/3/2014 Page i

AT&T Toggle. 2/3/2014 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Juniper Secure Analytics Virtual Appliance Installation Guide

Juniper Secure Analytics Virtual Appliance Installation Guide Juniper Secure Analytics Virtual Appliance Installation Guide Release 7.3.0 Modified: 2017-09- Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 9089 USA 08-75-2000 www.juniper.net Copyright

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Symantec Mobile Management 7.1 Implementation Guide

Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

IDP Detector Engine Release Notes

IDP Detector Engine Release Notes IDP Detector Engine Release Notes June 29, 2017 Contents Recent Release History................................................ 2 IDP Detector Engine Overview..........................................

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

ipad in Business Mobile Device Management

ipad in Business Mobile Device Management ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management

More information

Compliance Manager ZENworks Mobile Management 3.0.x January 2015

Compliance Manager ZENworks Mobile Management 3.0.x January 2015 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 3.0.x January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( )

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( ) Oracle Beehive Using BlackBerry with Oracle Beehive Release 2 (2.0.1.6) November 2011 Document updated November 4, 2011 This document describes how to access Oracle Beehive from your RIM BlackBerry device

More information

STRM Series to JSA Series

STRM Series to JSA Series STRM Series to JSA Series Migration Guide Published: 2014-06-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Sophos Mobile in Central administrator help. Product version: 7.1

Sophos Mobile in Central administrator help. Product version: 7.1 Sophos Mobile in Central administrator help Product version: 7.1 Contents 1 About this help...6 2 Key steps for managing devices with Sophos Mobile...7 3 Dashboard...8 4 Reports...9 5 Tasks...10 5.1 Monitor

More information

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

Upgrading STRM to

Upgrading STRM to Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-04-27 Copyright Notice Copyright 2015

More information

INTACTPHONE USER GUIDE

INTACTPHONE USER GUIDE COMMUNITAKE TECHNOLOGIES INTACTPHONE USER GUIDE Powered by CommuniTake Technologies COMMUNITAKE IntactPhone, User Guide Copyright 2016, COMMUNITAKE Technologies Ltd., Yokneam, Israel. All rights reserved.

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Contrail Release Release Notes

Contrail Release Release Notes Contrail Release 3.2.2 Release Notes Release 3.2.2 March 2017 Contents Introduction........................................................ 2 New and Changed Features............................................

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Sophos Mobile. startup guide. Product Version: 8.1

Sophos Mobile. startup guide. Product Version: 8.1 Sophos Mobile startup guide Product Version: 8.1 Contents About this guide... 1 Sophos Mobile licenses... 2 Trial licenses...2 Upgrade trial licenses to full licenses... 2 Update licenses... 2 What are

More information

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902 Integration with Apple Configurator 2 VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

ENTERPRISE MOBILITY USER GUIDE

ENTERPRISE MOBILITY USER GUIDE COMMUNITAKE TECHNOLOGIES ENTERPRISE MOBILITY USER GUIDE Powered by CommuniTake Technologies COMMUNITAKE ENTERPRISE MOBILITY, User Guide Copyright 2017, COMMUNITAKE Technologies Ltd., Yokneam, Israel. All

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Verizon MDM UEM Unified Endpoint Management

Verizon MDM UEM Unified Endpoint Management Verizon MDM UEM Unified Endpoint Management Version: 1.0 Last Updated: 3/29/18 Table of Contents Unified Endpoint Management (UEM) Overview... 4 Account Dashboard... 4 Unified Endpoint Management (UEM)

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments

VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments VMware AirWatch Integration with Apple Configurator 2 Guide Using Apple Configurator 2 and AirWatch to simplify mass deployments AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Juniper Networks CTPOS Release 7.0R1 Software Release Notes

Juniper Networks CTPOS Release 7.0R1 Software Release Notes Juniper Networks CTPOS Release 7.0R1 Software Release Notes Release 7.0R1 September 2014 Revision 2 These release notes accompany Release 7.0R1 of the CTPOS software. They describe device documentation

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices

VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices VMware AirWatch Symbian Platform Guide Deploying and managing Symbian devices AirWatch v8.1 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Troubleshooting Guide

Troubleshooting Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-13-03 Copyright Notice Copyright 2014 Juniper

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Insight Pro Mobile App and Cloud Portal User Manual

Insight Pro Mobile App and Cloud Portal User Manual Insight Pro Mobile App and Cloud Portal User Manual July 2018 202-11916-01 350 E. Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. You can visit www.netgear.com/support

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Sophos Central Self Service Portal help

Sophos Central Self Service Portal help Sophos Central Self Service Portal help Contents 1 About this Help...3 2 Email...4 2.1 Manage Quarantined Email...4 2.2 Emergency Inbox...4 3 Mobile Control...5 3.1 Set up Sophos Mobile Control on your

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Jun 04, 2012 VERSION: 12.06R04.01 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...

More information

Account Management Settings section. Service Request Settings section

Account Management Settings section. Service Request Settings section WebEx Site Configuration Audit Log The following settings are included in the CSV export of changes to the Configuration > Common Site Settings > Options page of WebEx Site Administration. Account Management

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

Dell OpenManage Mobile Version 1.0 User s Guide

Dell OpenManage Mobile Version 1.0 User s Guide Dell OpenManage Mobile Version 1.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

AT&T Business Messaging Account Management

AT&T Business Messaging Account Management Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Sophos Mobile in Central

Sophos Mobile in Central administrator help Product Version: 8 Contents About this help...1 About Sophos Mobile Admin... 2 User interface... 2 Table views... 2 User roles... 3 Key steps for managing devices with Sophos Mobile...4

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Workspace Secure Container for Mobile Devices

Workspace Secure Container for Mobile Devices Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Secure Messaging Plus

Secure Messaging Plus Secure Messaging Plus for Android Handhelds User s Guide While every attempt is made to ensure both accuracy and completeness of information included in this document, errors can occur, and updates or

More information