Junos Pulse Mobile Security Gateway

Size: px
Start display at page:

Download "Junos Pulse Mobile Security Gateway"

Transcription

1 Junos Pulse Mobile Security Gateway Administration Guide Release 4.1 November 30, 2012 R1 Copyright 2012, Juniper Networks, Inc.

2 Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright 2012, Juniper Networks, Inc. All rights reserved. ii Copyright 2012, Juniper Networks, Inc.

3 Table of Contents About This Guide Audience...v Obtaining Documentation... v Documentation Feedback... v Requesting Technical Support... v Self-Help Online Tools and Resources... vi Opening a Case with JTAC... vi Chapter 1 Getting Started 1 Pulse Mobile Security Overview... 1 Enterprise and Consumer Deployments... 2 Administrators and Roles... 2 Customer Service Roles... 3 New Features in Pulse Mobile Security Release Accessing the Pulse Mobile Security Gateway...4 Using the Pulse Mobile Security Gateway Management Console...5 Chapter 2 Setting Up the Pulse Mobile Security Gateway 7 Add Partners and Enterprises... 7 Adding a Partner... 7 Adding an Enterprise...8 Editing the Default Enterprise Policy Settings...9 Adding Administrator Accounts Adding an Administrator Role Adding a User Account Assigning a Role and User Control List to a User Account...17 Registering Devices...17 Manual Registration of ios Devices...17 Manual Registration of non-ios Devices Automatic Registration Configuring Device Identity Servers Importing Certificates for Device Identity Servers Importing the Certificate for the Pulse Mobile Security Gateway 20 Configuring GCM and System Log Settings Updating Malware Signatures...21 Creating Certificates for the Pulse Mobile Security Gateway...22 Importing Certificates for the Control Center and Signature Update Server...23 Configuring the Control Center Settings...23 Configuring the Signature Update Server...23 v Table of Contents iii

4 JWOS Command Reference Guide Chapter 3 Device Profiles 25 Defining Prohibited Applications Managing MDM Profiles Adding and Editing MDM Profiles Importing and Exporting MDM Profiles Setting the Default MDM Profile Deleting MDM Profiles Managing Firewall Rules and Profiles Adding Firewall Rules Modifying Firewall Rules Deleting Firewall Rules Adding Firewall Profiles Modifying Firewall Profiles...37 Deleting Firewall Profiles...37 Managing Antispam Rules and Profiles...37 Adding Antispam Rules...37 Modifying Antispam Rules Deleting Antispam Rules Adding an Antispam Profile Modifying an Antispam Profile Deleting Antispam Profiles Chapter 4 User Accounts 41 Managing User Accounts Adding a User Account Modifying User Accounts Deleting User Accounts Managing User Groups Chapter 5 Devices 45 Devices Overview Adding Devices Manually...46 Modifying Device Settings...47 Applying MDM Profiles to Devices Sending Device Commands Backing Up and Restoring Personal Data Managing Device Groups Chapter 6 Reports 59 Viewing Reports Removing Applications From Managed Devices Viewing Device Applications, Contacts, Pictures, and Messages Tracking Devices with GPS Viewing the Gateway and Change History Logs Appendix A Summary of Supported Features 65 Pulse Mobile Security Features by Device Type Index 67 iv Table of Contents

5 : About This Guide The Junos Pulse Mobile Security Suite consists of the Pulse client application and the cloud-based Mobile Security Gateway, with its associated management Console and end-user Dashboard. This guide describes how to configure and manage Pulse client devices using the management Console of the Mobile Security Gateway. Audience This guide is intended for: Enterprise security administrators responsible for the setup and/or maintenance of the Junos Pulse Mobile Security Gateway Enterprise security administrators and customer service personnel responsible for providing support for users of the Junos Pulse Mobile Security client and Dashboard Obtaining Documentation To obtain the most current version of all Juniper Networks technical documentation, see the products documentation page on the Juniper Networks Web site at Documentation Feedback We encourage you to provide feedback, comments, and suggestions so that we can improve the documentation. You can send your comments to or fill out the documentation feedback form at If you are using , be sure to include the following information with your comments: Document or topic name URL or page number Software release version (if applicable) Requesting Technical Support Technical product support is available through the Juniper Networks Technical Assistance Center (JTAC). If you are a customer with an active J-Care or JNASC support contract, or are covered under warranty, and need post-sales technical support, you can access our tools and resources online or open a case with JTAC. JTAC policies For a complete understanding of our JTAC procedures and policies, review the JTAC User Guide located at Product warranties For product warranty information, visit Copyright 2012, Juniper Networks, Inc. Audience v

6 JTAC hours of operation The JTAC centers have resources available 24 hours a day, 7 days a week, 365 days a year. Self-Help Online Tools and Resources For quick and easy problem resolution, Juniper Networks has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings Search for known bugs Find product documentation Find solutions and answer questions using our Knowledge Base Download the latest software versions and review release notes Search technical bulletins for relevant hardware and software notifications Join and participate in the Juniper Networks Community Forum Open a case online in the CSC Case Manager To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool Opening a Case with JTAC You can open a case with JTAC on the Web or by telephone. Use the Case Manager tool in the CSC at Call JTAC ( toll free in USA, Canada, and Mexico). For international or direct-dial options in countries without toll-free numbers, visit us at vi Requesting Technical Support Copyright 2012, Juniper Networks, Inc.

7 Chapter 1: Getting Started Chapter 1 Getting Started This chapter provides a brief overview of the Pulse Mobile Security Gateway. Pulse Mobile Security Overview on page 1 Accessing the Pulse Mobile Security Gateway on page 4 Using the Pulse Mobile Security Gateway Management Console on page 5 Pulse Mobile Security Overview The Pulse Mobile Security Gateway lets you centrally manage mobile (handheld) devices that are protected by the Junos Pulse Mobile Security Suite. The Pulse Mobile Security Suite is client software that protects mobile devices from viruses, spyware, identity theft and other threats. Users can install the Pulse client software from the applications store associated with any of the following mobile operating systems: Apple ios RIM Blackberry Google Android Nokia Symbian Windows Mobile For a list of the supported versions of each operating system, see the Junos Pulse Mobile Supported Platforms Guide, which is available at The Layer 3 VPN feature of the Pulse client (not supported by Blackberry) provides secure access to private networks by connecting to a Juniper Networks SA Series SSL VPN appliance. To activate all other security features, and allow the gateway to manage the device, the mobile device must be registered with the Pulse Mobile Security Gateway. The Pulse Mobile Security Suite provides the following features: Antivirus Devices are protected by real-time antivirus and malware protection with automatic updates (non-ios devices only). You can scan files across network connections, perform on-demand scans, and provide virus and malware detection alerts. Note that users can enable the following options on Android devices: Scan Memory Card on Insert The memory card is scanned when it is first installed (if the power is on), not when files are added. Scan application on install Applications are scanned for malware during installation. If the administrator defines any prohibited applications, scanning occurs during installation even if this feature is disabled. Copyright 2012, Juniper Networks, Inc. Pulse Mobile Security Overview 1

8 Android malware detection Android devices receive signatures to detect both malware and suspicious applications, and you can define a list of prohibited applications. Depending on the device type, malware and prohibited applications are deleted automatically or the user is prompted periodically to perform the deletion. Personal firewall Provides inbound and outbound IP address and port filtering. Antispam Provides filtering to block voice and SMS spam and to deny unknown or unwanted calls. Backup and restore The contact list and calendar on non-ios devices can be backed up in a standard format and restored to another device. Loss and theft protection From the gateway, you can perform remote lock, remote wipe, GPS locate and track, remote alarm and notification, and SIM change notification. Device monitoring and control The gateway provides tools for application inventory and removal, monitoring (SMS, MMS, message content, and photos stored on device), and the ability to view the call log and the user s contacts. Consumer Dashboard Allows users to log in to the gateway to locate a lost or stolen device, view reports of device usage, or use other security features. Informational Note: The firewall and antispam features are supported only by the Windows Mobile and Symbian devices. For more information about version support for each device type, see the Junos Pulse Supported Mobile Platforms Guide. Enterprise and Consumer Deployments The features deployed for enterprise and consumer users may differ. For example, a typical enterprise solution may include the Junos Pulse SSL VPN client features, while a typical consumer solution might be comprised of just the Pulse client's anti-malware and anti-theft features. Administrators and Roles Each gateway administrator account requires a role that determines the functions that the user can perform and a user access control list that determines the mobile devices the user can access. User roles and accounts can be defined at each administrative level (Root, Partner, and Enterprise), but most administrators will have an Enterprise account. Each role specifies the permissions (view, add, edit, delete, and move) for the following objects that you manage in the Pulse Mobile Security Gateway: Partner A group of one or more Enterprises. Only Root and Partner administrators can add or view Partners. Enterprise An organization that manages registered mobile devices. Registered devices exist only at the Enterprise level. Each Enterprise has a Consumer or Enterprise license. Enterprise administrators can allow users to log in to the gateway Dashboard to locate a lost phone or use other security features. User An Enterprise user account is created automatically when a mobile device is registered. To create an administrator account, you can add a role and access control list to an existing user account, or manually create a new account. User Group Enterprise user accounts can be organized into user groups, such as by department or business unit. You can then issue commands to the devices associated with the users in one or more groups. 2 Pulse Mobile Security Overview Copyright 2012, Juniper Networks, Inc.

9 Chapter 1: Getting Started Device A device record is created in the appropriate Enterprise when a mobile device is registered. Mobile devices are identified by their MSISD (Mobile Subscriber Integrated Services Digital Network number, which includes the phone number, country code, and area code) and IMEI number (International Mobile Equipment Identity). Device Group Enterprise devices can be organized into device groups. You can then issue commands to the devices in one or more groups or view reports for a selected device group. Profiles Groups of rules that you can assign to an Enterprise or apply to specific devices. Profiles assigned to an Enterprise are applied to each device that registers with the Enterprise. The current profiles are: MDM Profile Defines various settings for ios and Android devices, such as user restrictions, password requirements, and the VPN and Wi-Fi networks that users can access. Firewall Profile Defines Internet access permissions, both inbound and outbound, for Windows Mobile and Symbian devices. Antispam Profile Defines antispam conditions that let you block incoming calls and SMS messages from specific phone numbers on Windows Mobile and Symbian devices. Each role also lets you allow or disallow certain tasks, such as sending commands to devices or viewing specific device reports. If you are not authorized for certain tasks, the related menu items and buttons are hidden or disabled. For each new Enterprise, a Root or Partner administrator must create the Enterprise and add an Enterprise user account and role for use by the Enterprise administrator. Partner administrators can manage all Enterprises associated with the Partner. Root administrators can manage all Partners and Enterprises. For more information about user accounts and roles, see Adding Administrator Accounts on page 14. Customer Service Roles Juniper Networks provides Customer Service personnel with credentials that allow access to all tasks related to the support of Pulse client users. Enterprise tasks regarding groups, profiles, and policies are not performed by support personnel. IMPORTANT!: Each chapter of this guide begins by indicating whether enterprise administrators or customer service personnel typically performs the tasks in that chapter. More specific notes about the tasks relevant to customer service personnel are included in each section, as appropriate. New Features in Pulse Mobile Security Release 4.1 Release 4.1 includes the following new features: Console interface enhancements The management Console has been revised and enhanced. The navigation tree has been removed and separate Roles and Groups tabs have been added. Users with access to multiple Partners and Enterprises can select them from drop-down lists at the top of the page. MDM profiles ios profiles have been replaced with mobile device management (MDM) profiles that apply to both Android and ios devices. The same profile can be used for both device types even though some settings are specific to ios or Android. Copyright 2012, Juniper Networks, Inc. Pulse Mobile Security Overview 3

10 ios configuration files Configurations created with the Apple iphone Configuration Utility (IPCU) can be imported to the Mobile Security gateway and used as MDM profiles for ios devices. The IPCU provides ios configuration options that are not available in MDM profiles created with the gateway. Prohibited applications for Partners and Enterprises Prohibited applications for Android devices can now be defined at the Partner and Enterprise levels, as well as the Root level. The list of prohibited applications applied to a device is a combination of the applications defined at the Enterprise, Partner, and Root levels. GCM support The Google Cloud Messaging (GCM) service replaces C2DM as an alternative to SMS for communicating with Android devices (version 2.2 or later). If the GCM service is not available, SMS is used as the default. Jailbroken/rooted indicator A red icon is displayed in the Status field next to jailbroken ios devices and rooted Android devices. These devices may be less secure because users have full (root) access to the operating system and can install applications from any source. Alert indicator The Pulse client application icon for Android and Blackberry devices changes to indicate the presence of the highest priority alert or notification message. The icons and message priorities can be customized for branded clients. Compatibility with previous releases Release 4.1 of the gateway supports all previous Junos Pulse clients, but requires Pulse 4.1 clients to support the new features in this release. Pulse 4.1 clients are not guaranteed to be compatible with earlier versions of the gateway. Accessing the Pulse Mobile Security Gateway The URL used to access the management Console of a Pulse Mobile Security Gateway depends on whether you are hosting the gateway in your own network. To access the management console of a gateway hosted by Juniper Networks, enter the following URL in your browser: Use the login credentials provided for you. If you are the Root administrator logging in for the first time to a gateway in your own network, use root@smobilesystems.com and password for the username and password. If you are a customer service representative, your login credentials give you access to the appropriate gateway and user accounts. If access to the gateway Dashboard is enabled, users can use their registration address and password to log in to the Dashboard at the following URL to view device reports, locate a missing device, or use other security features, depending on the features purchased or available. The Dashboard URL for a gateway hosted by Juniper Networks is: For Windows Mobile and Symbian users, who can enter just the license key during registration, the IMEI number is used for the address and password. Administrators can change the defaults and notify the user. Informational Note: To use the Pulse Mobile Security Gateway, your browser must be Google Chrome version 6.0, Microsoft Internet Explorer version 7.0 or 8.0, or Mozilla Firefox 3.0, 3.5, or 3.6. JavaScript and cookies must be enabled on the browser. 4 Accessing the Pulse Mobile Security Gateway Copyright 2012, Juniper Networks, Inc.

11 Chapter 1: Getting Started Using the Pulse Mobile Security Gateway Management Console The management Console of the Pulse Mobile Security Gateway has a central data panel and a top panel for additional features, such as search and help. Administrators with access to multiple Partners or Enterprises can select a Partner or Enterprise from the drop-down lists at the top of the page (see Figure 1 on page 5). For Customer service personnel and other administrators who manage a single Enterprise and its associated users and devices, only the Enterprise name is displayed at the top of the page. Figure 1: Pulse Mobile Security Gateway Management Console The top panel provides the following selections: Search Lets you search for device identifiers, or the names of users, Enterprises, user groups, or device groups. The device identifiers include the phone number (MSISD) and the DID, ESN, IMEI, IMSI, and UUID. As you type in a value, a list of matching items is displayed. My Account Lets you change your login account. Help Provides information about software versions, the license, and system uptime, the list of commands that can be sent to managed devices, and the current list of known viruses. The following Tabs are presented below the top panel, depending on the user s access privileges: Reporting Shows a summary of virus and registration activity and provides links to more detailed reports. For more information about reports, see Viewing Reports on page 59. Profiles Lets you define MDM profiles for Android and ios devices, firewall and antispam profiles for Windows Mobile and Symbian devices, and prohibited applications for Android devices. Customer service personnel generally do not define the profiles, but in some cases may need to access these functions (see Device Profiles on page 25). Copyright 2012, Juniper Networks, Inc. Using the Pulse Mobile Security Gateway Management Console 5

12 Users Lists the current user accounts. When a mobile device is registered, the gateway creates a user account that includes the device information. You can edit a user account, reset the password, and assign a user role and access control list to an administrator account. Devices Shows the registered mobile devices in an Enterprise. You can edit the settings for individual devices, apply MDM profiles to Android and ios devices, move devices to a device group, and send commands to selected devices. Groups Lists the user groups and device groups. You can add and delete device and user groups, and send commands to the devices in one or more groups. Roles Lets you to define the roles that specify an administrator s privileges and assign the roles to administrator accounts. Settings Lets you define the default security settings that are applied to devices when they register with an Enterprise. You can also configure the GCM settings for Android devices. Root administrators can configure Device Identity Servers, certificates, and connections to the Control Center and Signature Update Server. Logs Provides access to the gateway logs at the Root and Enterprise levels. You can search the logs and view the log entries to assist in troubleshooting and reporting. 6 Using the Pulse Mobile Security Gateway Management Console Copyright 2012, Juniper Networks, Inc.

13 Chapter 2: Setting Up the Pulse Mobile Security Gateway Chapter 2 Setting Up the Pulse Mobile Security Gateway This chapter contains information for partner and enterprise administrators, and includes topics (indicated by an asterisk in the list below) that are relevant to service providers who install the Pulse Mobile Security Gateway in their own network. Typically, customer service personnel do not perform these tasks and do not have access to these settings. Most setup tasks are performed by Juniper Networks personnel before users install the Junos Pulse client and register with the gateway. Add Partners and Enterprises on page 7 Adding Administrator Accounts on page 14 Registering Devices on page 17 Configuring Device Identity Servers on page 18 * Configuring GCM and System Log Settings on page 20 * Updating Malware Signatures on page 21 * Add Partners and Enterprises The following topics describe how to add Partners and Enterprises (at least one of each is required), and how to move an Enterprise to a different Partner: Adding a Partner on page 7 Adding an Enterprise on page 8 Editing the Default Enterprise Policy Settings on page 9 Adding a Partner A Partner is used to identify a group of Enterprises. At least one Partner is required, and the Default Partner is created automatically. A Root administrator can define new Partners or change the Default Partner. Root administrators can then add one or more Enterprises or create a user account for a Partner administrator who can add the needed Enterprises. To add a Partner: 1. Log in to the gateway as a Root administrator. 2. On the Home tab, click Add Partner. 3. Specify the following properties: Partner Name Typically, the name of the organization. Notes Information such as how to contact the Partner administrator. 4. Click Save to create the Partner. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 7

14 Adding an Enterprise An Enterprise is any organization that manages mobile devices. For each Partner, a Default Enterprise is created automatically. A Root or Partner administrator can define new Enterprises or change the Default Enterprise. Root or Partner administrators can manage each Enterprise or create a user account for an Enterprise administrator who can perform Enterprise-specific management tasks. To add an Enterprise: 1. Log in to the gateway as a Root or Partner administrator. 2. On the Home tab, click the Partner where you want to add an Enterprise, and click Add Enterprise. 3. Specify the following properties: Setting Enterprise Name Enterprise Code License Type License Count License Expiration Date or License Length Require Customer Account Allow Insecure Clients Allow Manual Registration Allow Dashboard Access Notes Products A descriptive name. A code that identifies this Enterprise to managed devices. If the license type is Enterprise, the Enterprise code is used as the license key during registration. The Enterprise code must be unique. Select whether the software is licensed by the Enterprise or by the device (Consumer). Number of licensed devices. For an Enterprise license type, enter or select the license expiration date for the Enterprise and all of its registered devices. For a Consumer license type, enter the number of days that each registered device is licensed to use the software. The expiration date cannot exceed Requires administrators to create a user account before a device can register with the Enterprise. If you do not select this box, a user account is created automatically when a device is registered. Allows gateway access for devices that do not use the latest authentication method (selecting this option is recommended). Allows users to register with the Enterprise by manually entering a license key. Currently, only Android, Blackberry, and ios devices can be registered automatically. Allows users to log in to the gateway Dashboard to locate a lost phone or use other security features. If this check box is cleared, the Enterprise administrator uses the management Console to perform all the tasks available on the Dashboard. Descriptive information about this Enterprise. Select the features enabled in this Enterprise. To change the default settings for each feature, see Editing the Default Enterprise Policy Settings on page 9. Disabling a feature hides the relevant sections of the Enterprise and device settings, as well as the related device commands. Firewall Antispam Antivirus Monitor & Control For Android devices, disabling Antivirus also disables scanning for malware and suspicious applications, but scanning for prohibited applications cannot be disabled. For ios devices, the GPS Update Period can be set in the MDM profile even when Monitor & Control is disabled (see Tracking (ios Devices) on page 33). 8 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

15 Chapter 2: Setting Up the Pulse Mobile Security Gateway 4. Click Save to add the Enterprise to the end of the list of Enterprises on the Partner Home tab. You may have to refresh the page to see the new Enterprise. 5. To change these Enterprise settings, click the Edit icon to the right of the Enterprise. To change the default policy settings for the Enterprise, click the Enterprise Settings icon next to the Edit icon or click the Enterprise and click the Settings tab (see Editing the Default Enterprise Policy Settings on page 9). Editing the Default Enterprise Policy Settings Enterprise administrators can change the default policy settings that are applied to new devices when they register with the Enterprise. After registration, feature settings can be changed for specific devices (see Modifying Device Settings on page 47). Informational Note: The supported features vary by device type. If a device does not support a feature, the feature settings are ignored. For example, the firewall and antispam settings apply only to Symbian and Windows Mobile devices. To view and edit Enterprise settings: 1. To view the basic Enterprise settings, such as the Enterprised code and license, select the Home tab for the Enterprise. To change the basic settings, see Adding an Enterprise on page 8. If you access the Enterprise from another system using SOAP API calls, click Generate UUID to generate a universally unique identifier for the Enterprise. 2. To change the Enterprise policy settings, select the Settings tab, select the General Settings, MDM Settings, or Device Features in the left frame, edit the settings described in the following table, and click Update. Setting General Settings Aggregator Settings Username Password SMS Sender Code API URL The username passed to the SMS provider s gateway API when sending commands. An SMS gateway is required to send commands to non-ios devices. The password passed to the SMS provider s gateway API when sending commands. Reserved for future use. The API key assigned by the aggregator. The key, along with the username and password, provide authentication to the SMS gateway when you send a command to a device. The base URL of the SMS aggregator's API. The Pulse Mobile Security Gateway adds the remainder of the URL when you send a command. Other Settings Software Download URL Update Schedule Android Malware Scan Interval Web page where users can download and install the Pulse client for their device. If you manually add a device, the gateway sends an SMS message or to the device with a link to this URL and a license key. Select how often the settings on the gateway, including virus definitions, are synchronized with the settings on non-ios devices. Select never to disable synchronization with the gateway. If users change the update schedule on the device, it is reset during the next synchronization. Select Hours (1 to 72) or Minutes (1 to 999) and enter the number of hours or minutes between scans for malware on Android devices. To disable malware scanning, enter zero. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 9

16 Setting Default UI Settings (non-ios devices) UI Mode UI Button Mode (service bundle) Indicates the Junos Pulse features available to users of Android and Blackberry devices. Select one of the following: Full UI Includes all features of the Junos Pulse client. Minimal UI Includes only a Splash screen, license screen, and a Home screen with an About button. Detected viruses, malware, and prohibited applications are deleted automatically, and suspicious applications are displayed to the user so they can be deleted or allowed. If a device does not support automatic deletion of applications, the Scan Results page is displayed periodically until the offending applications are deleted manually. Security UI Includes all Junos Pulse features, except the ability to define VPN connections to private networks. Users can scan for viruses and malware, view scan results, back up data, and so on. For Android and Blackberry devices, if the UI Mode is Full UI or Security UI, the following features can be active or inactive and visible or hidden on the device and Dashboard. If a feature is inactive, its associated device commands are hidden (see Sending Device Commands on page 53). Active features can be hidden to simplify the user interface. Inactive/Visible features are grayed out so that users can select them to purchase the feature. Professional Services can customize the URL associated with grayed out buttons or text and assist you with enabling features programmatically through the gateway API. For Windows Mobile and Symbian devices, Active and Inactive settings affect the Dashboard and command list, but not the device. The Hidden and Visible settings are ignored, and the Custom Button does not apply. Select the activation status for each of the following: Anti Virus If Anti Virus is enabled for the Enterprise, the Active/Visible selection displays a Scan/Threats Detected button and a Security Settings selection on the device so that users can start a scan or change the default scan and virus update settings. On the Dashboard home page, an Anti-Virus Activity section is displayed with an event count that users can select to view the list of events. The Active/Hidden selection hides the feature on the device and Dashboard, but viruses, malware, and prohibited applications are detected on the device and deleted automatically or the user is prompted to remove them. Backup The Active/Visible selection displays a Backup button on the device and a Backup and Restore button on the Dashboard. Users can back up their personal contacts and calendar from the device, but they must use the Dashboard (or contact an administrator) to restore the last backup. The Active/Hidden selection has the same effect as Inactive/Hidden. Monitor & Control If Monitor & Control is enabled for the Enterprise, the Active/Visible selection displays the Remote Monitoring button on the device so that users can view which items are monitored and whether GPS tracking is enabled. The Dashboard is updated as follows: The Remote Monitoring section is displayed on the home page with counts of the monitored messages, calls, applications, and photographs that users can select to view lists of each item. The Alert Setup tab allows users to set up alerts based on the message content (if messages are monitored). The Reports tab allows users to view a Text and Monitoring report. 10 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

17 Chapter 2: Setting Up the Pulse Mobile Security Gateway Setting The Settings page allows Dashboard users to change the default monitor and control options for a device. The Active/Hidden selection hides the feature on the device and Dashboard, but allows an administrator to view the device activity logs (see Viewing Device Applications, Contacts, Pictures, and Messages on page 62). Anti Theft The following buttons can be displayed on the Dashboard home page. If any of these buttons is visible, an Anti Theft button is displayed on the device that allows users to view, and optionally change, the status of each feature. Active/Visible features are shown as enabled; Inactive/Visible features are shown as disabled. The Active/Hidden and Inactive/Hidden selections have the same effect. Wipe Device The Active/Visible selection allows Dashboard users to erase personal data from a device, depending on the device type (see Personal Data Erased by Handset Wipe Command on page 66). Lock/Unlock Device The Active/Visible selection allows Dashboard users to lock or unlock a device. Scream Locate The Active/Visible selection allows Dashboard users to enable an alarm to help locate a device in the immediate area. Locate Device The Active/Visible selection allows Dashboard users to enable GPS reporting on a non-ios device and view the device s location on a map. To view the location of an ios device, an administrator must enable GPS reporting on the device. Custom Button The Active/Visible selection displays a customized button on the home page of the device and Dashboard that users can select to purchase or cancel optional features. The Inactive/Visible selection also displays the button. Professional Services can configure the button and its associated URL. MDM Settings ios Default Profile Android Default Profile Device Check-In Period Select the profiles to be applied to ios and Android devices when they register with the Enterprise. The two profiles can be the same, except that an imported profile created with the Apple IPCU utility cannot be used for Android devices. The AutomaticDefault profile (for ios) and the AutomaticAndroidDefault profile, both of which can be changed, are created automatically for each Enterprise. To add or change a profile, click MDM Profiles. You can change a device s profile after the device is registered. Select the number of days between the prompts sent to each ios device to check in with the gateway for profile and updates. Select Disable to stop sending check-in prompts to registered devices. APNS Certificate The status and expiration date is displayed after you upload the Apple Push Notification Service (APNS) certificate. Use the Upload button in the next section. The Upload button in this section is for compatibility with the APNS procedure used in release 3.0. If you are using a Secure Access server, the Host Checker requires the client CA certificate to support ios devices. To dowload the client CA certificate for import to a Secure Access server, click Download CA Certificate. Certificates are valid for one year. When a certificate expires, you can click Delete and upload a new certificate. NOTE: After the new certificate is installed, users who are already registered must uninstall and reinstall the Pulse client. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 11

18 Setting MDM APNS Certificate Signing Request (CSR) Generate To manage ios devices, an APNS certificate must be uploaded to the Enterprise. Without an APNS certificate, ios devices can register, and iphones and ipads with 3G support can report their GPS location (Dashboard users will see only the GPS location), but the certificate is required for all other features. After the certificate is installed, users who are already registered must uninstall and reinstall the Pulse client. Before you begin, note the following: If you do not have an Apple ID, go to to create one. If the Control Center is not configured, see Configuring the Control Center Settings on page 23. To obtain an APNS certificate: 1. To create a CSR, click Generate, and specify the following: Common Name Unique name used to identify the certificate. Organizational unit Name of your department. Organization Legal name of your company/organization. Locality Name of the city where your organization is located. State (fully spelled out) State or province name. Country (2 letter code) Country or region code. 2. Click Generate to have the Control Center sign the CSR. Contact Technical Support if the error MSG Control Center failed to sign certificate request is displayed. 3. Click Download and save the apnscsr.plist file. 4. Click Upload CSR to Apple, log in to the Apple portal, and do the following: a. Click Create a Certificate, accept the terms, and then browse to the location of the apnscsr.plist file, and click Upload. b. Click the Download button next to the generated certificate and save the file locally. The APNS certificate file name is: MDM_<VendorName>_Certificate.pem. 5. On the Enterprise page, click the Upload button, click Browse, select the APNS certificate file, and click Upload. The certificate type must be PEM. The Upload button is hidden after a certificate is uploaded to the Enterprise. Device Features Default Antivirus Settings (non-ios devices) The following settings apply when Anti Virus is enabled in the General Settings Disable Handset Modifications Scan Memory Card Scan Files Scan Inside Archives Optimize Media Scanning Prevents users from changing the antivirus settings on non-ios devices, and the commands to enable or disable file scanning are not persistent. During periodic synchronizations with the gateway, the gateway settings override the settings on the device. Clear the check box to allow the device settings to override the gateway settings during each synchronization. Enables periodic scans of the secure digital (SD) memory card on non-ios devices. Enables periodic scans of the files on non-ios devices. Enables recursive scanning of archive files that are contained within other archive files (Android devices only). The supported archive files are.zip,.gzip, and.jar. Enables media files larger than 1 MB to be skipped if the file has not changed since the previous scan (Android devices only). A file is skipped if the MD5 checksum has not changed. The supported media files are.gpp,.m4a,.mov,.mpg,.mp3,.mp4,.wav,.bmp,.gif,.jpg,.png, and.tif/.tiff. 12 Add Partners and Enterprises Copyright 2012, Juniper Networks, Inc.

19 Chapter 2: Setting Up the Pulse Mobile Security Gateway Setting Default Firewall Settings (Windows Mobile and Symbian devices) Active Disable Handset Modifications Security Level Profile Displays the firewall application on Symbian and Windows Mobile devices. Clear the check box to hide the application. Prevents users from changing the firewall settings on the device. Clear the check box to allow the device settings to override the gateway settings during the periodic synchronizations with the gateway. Choose one of the following: Disable Disables the firewall component. Allow Permits all traffic that is not specifically blocked in the firewall profile rules. Block Blocks all traffic that is not specifically allowed in the firewall profile rules. Set of firewall rules that are applied to devices when they are registered. Use the list box to select a firewall profile. If you have not yet defined profiles, you can edit this setting later. You can also apply profiles to individual devices. Default Antispam Settings (Windows Mobile and Symbian devices) Active Disable Handset Modifications Block Short Codes Profile Displays the antispam application on Symbian and Windows Mobile devices. Clear the check box to hide the application. Prevents users from changing the antispam settings on the device. Clear the check box to allow the device settings to override the gateway settings during the periodic synchronizations with the gateway. Blocks SMS messages to or from short codes. Short codes are five- or six-digit SMS codes that serve as short phone numbers and are often used by premium SMS services. SMS messages from short codes are more likely to be spam than messages from regular phone numbers. Outgoing SMS messages to short codes can incur phone charges. Short codes are also used for instant messaging (IM) services. Blocking short codes increases security but also limits service to the client. Set of antispam rules that are applied to devices when they are registered. If you have not yet defined profiles, you can edit this setting later. You can also apply profiles to individual devices. Default Monitor and Control Settings (non-ios devices) The following settings apply when Monitor & Control is enabled in the General Settings Log Event Limit Log Size Limit Log Log SMS Log MMS Number of events that are logged on non-ios devices before they are uploaded to the server. An event is an instance of any logged item ( , SMS or MMS message, phone call, or image). Higher values delay server updates, but minimize SMS charges and conserve battery life. Select Off to disable uploads based on the number of events. NOTE: Device logs are uploaded to the gateway over HTTPS, not SMS. Maximum amount of file space used for the event log on non-ios devices (100K is recommended). The log can exceed this value, but if the log becomes full, an attempt to upload the log occurs after each event. Select Off to disable uploads based on the log size. If both the Log Event and Log Size limits are off, uploads occur only when requested from the management Console or user Dashboard. NOTE: By default, log entries for the past three days are retained. Saves all s in the log (not supported on Android and ios devices). Saves all SMS messages in the log on non-ios devices. Saves the text portion of all MMS messages in the log on Blackberry and Symbian devices. Graphics are included only if they are saved on the device and the Log Images option is selected. Copyright 2012, Juniper Networks, Inc. Add Partners and Enterprises 13

20 Setting Log Voice Disable Voice Log Images Log Web Images GPS Update Period Saves a record of each phone call in the log on non-ios devices, including date, time, and remote phone number. Disables the ability to make phone calls (not supported on Blackberry and ios devices). Saves images in the log that are loaded on non-ios devices. Saves images in the log that are accessed with the device Web browser (not supported on Android and ios devices). Select how often a non-ios device reports its GPS location to the gateway, or select Disable Updates to disable GPS reporting. For ios devices (iphones and ipads with 3G support), this setting can be specified in the MDM profile (see Tracking (ios Devices) on page 33). A device s last reported location can be viewed on the GPS Tracking Report (see Tracking Devices with GPS on page 62). Default SIM Change Settings (non-ios devices only) Lock on SIM Change Wipe on SIM Change Locks a non-ios handset if the SIM card is changed after the device is registered. Changing the SIM card changes the phone number, and disables communication with the gateway. This feature helps protect personal data if the phone is lost or stolen. Logging in with the user s registration password unlocks the device and updates the phone number on the gateway. NOTE: For a device registered automatically, the user must replace the SIM to unlock the device. Also, locking the device does not disable active background applications, such as a phone call or the music player. Wipes the user data from a non-ios handset if the SIM card is changed after the device is registered (Lock on SIM Change must be enabled). The data erased depends on the device type (see Personal Data Erased by Handset Wipe Command on page 66). Note the following: On Android 2.2 (or later) devices that have the Device Administrator function enabled, the device is not locked, but a factory reset occurs that removes all applications installed by the user, including Junos Pulse. If the Device Administrator is disabled, the device is locked, and GPS Theft Mode and Monitor & Control logging is enabled. On Android 2.1 devices, the device is locked, and GPS Theft Mode and Monitor & Control logging is enabled. The contacts and history are wiped, but not the SD memory card. Adding Administrator Accounts The Root administrator of the Pulse Mobile Security Gateway can create other administrator accounts at the Root, or for a specific Partner, or Enterprise. A Partner-level account can access only that Partner and one one or more of its Enterprises. An Enterprise-level account can access only that Enterprise. The procedure for creating administrator accounts is the same at each level: create a role that has the administrator permissions, create a user account, and then assign the role and a user control list to the account. Informational Note: Do not change the name of the predefined Root account (root@smobilesystems.com). The Root account is required to configure the Control Center and Malware Signature Server settings for malware signature updates. 14 Adding Administrator Accounts Copyright 2012, Juniper Networks, Inc.

21 Chapter 2: Setting Up the Pulse Mobile Security Gateway Adding an Administrator Role A role is a set of permissions that you can apply to a user account. For example, you can define a role that allows view permission on everything but allows edit permission on only a few objects. For an administrator role, you typically allow all permissions. To define an administrator role: 1. Select the Root, a Partner, or an Enterprise. The role must be created at the same level as the user accounts where you want to apply the role. Informational Note: To allow administrators to add a Partner, the Root level must be selected. 2. Select the Roles tab, and click Add Role. 3. Select the permissions View, Add, Edit, Delete, and Move for each of the following objects. Click Select All to enable all permissions. The following table describes the effect of the View permission, which is required for all other permissions. Object Partner Enterprise Device Identity Server User User Group User Role Device Device Group Firewall Rule MDM Profile Firewall Profile Antispam Rule Antispam Profile Android Prohibited Application Enterprise Settings System Settings of View Permission Displays the list of available Partners on the Home tab for users defined at the Root level. Displays the list of available Enterprises on the Partner Home tab for users defined at the Root or Partner level. For Enterprise-level users, the Home tab displays the basic settings for the Enterprise, such as Enterprise name and license. For Root and Partner users, the Edit permission displays an icon next to each Enterprise that allows the basic settings to be changed. To allow all other Enterprise settings to be viewed or changed, see Enterprise Settings. Displays the Device Identity Servers selection on the Settings tab at the Root, Partner, and Enterprise levels (available only in roles created at the Root level). Displays the Users tab at each level. Displays the User Groups selection on the Groups tab for each Enterprise. Displays the Roles tab at each level. The Add permission allows roles to be defined, but the Assign User Role(s) permission is needed to assign a role to an account (see Step 5). Displays the Devices tab for each Enterprise. Displays the Device Groups selection on the Groups tab for each Enterprise. Displays the Firewall Rules selection on the Profiles tab at each level. Displays the MDM Profiles selection on the Profiles tab for each Enterprise. Displays each selection on the Profiles tab at each level. Displays the Prohibited Applications selection on the Profiles tab at each level. Displays the Enterprise Settings selection for the device-related setings on the Settings tab in each Enterprise. The Edit permission also displays an icon next to each Enterprise on the Partner Home tab. Displays the System Settings selection on the Settings tab at each level. Copyright 2012, Juniper Networks, Inc. Adding Administrator Accounts 15

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 4.0 June 22, 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.1 October 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 3.2 March 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 2.1 Published: 2011-09-26 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net This

More information

JUNIPER NETWORKS PRODUCT BULLETIN

JUNIPER NETWORKS PRODUCT BULLETIN PRODUCT BULLETIN JUNIPER NETWORKS PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.2 What s New for Enterprises and Service Providers Bulletin Date January 24, 2013 Bulletin Number 8000022 Applicable

More information

Web Device Manager Guide

Web Device Manager Guide Juniper Networks EX2500 Ethernet Switch Web Device Manager Guide Release 3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-029704-01,

More information

Pulse Supported Mobile Platforms

Pulse Supported Mobile Platforms Pulse Supported Mobile Platforms Updated: May 15, 2015 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 1 Contents Introduction... 3 Definitions... 3 Qualified Platform... 3 Compatible

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Juniper SRX PCAP Data Release 2014.1 Modified: 2016-03-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Juniper Secure Analytics Release 2014.3 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-10-15 Copyright Notice Copyright 2014 Juniper

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Dec 10, 2013 VERSION: 5.0R1 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform...

More information

JUNOSPHERE RELEASE NOTES

JUNOSPHERE RELEASE NOTES JUNOSPHERE RELEASE NOTES Release 1.1 17 June 2011 These release notes cover Release 1.1 of the Junosphere virtual network. If the information in these release notes differs from the information found in

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 January 2018 2014.8.r12.20171213225424 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r12 Patch.............................................

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.8 October 2017 2014.8.r11.20171013131303 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.8.r11 Patch..............................................

More information

NSM Plug-In Users Guide

NSM Plug-In Users Guide Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2013-07-19 Copyright Notice Copyright 2013

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service IF-MAP Feature Guide Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

EX2500 Ethernet Switch 3.1 Release Notes

EX2500 Ethernet Switch 3.1 Release Notes EX2500 Ethernet Switch 3.1 Release Notes Release 3.1R2 29 January 2010 Revision 3 These release notes accompany Release 3.1R2 of the Juniper Networks EX2500 Ethernet Switches and software. They briefly

More information

JUNOSPHERE RELEASE NOTES

JUNOSPHERE RELEASE NOTES JUNOSPHERE RELEASE NOTES Release 1.6 28 October 2011 These release notes cover Junosphere Release 1.6. If the information in these release notes differs from the information found in the published documentation

More information

Subscriber Traffic Redirection

Subscriber Traffic Redirection Subscriber Traffic Redirection Published: 2014-06-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 2014.5 June 2015 2014.5.r1.20150605140117 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Installing 2014.5.r1 Patch..............................................

More information

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti JUNOS PULSE MOBILE SECURITY SUITE Stallion Winter Seminar 11.3.2011 Jukka Piirainen & Jani Ripatti JUNOS PULSE MOBILE SOLUTION FOR ENTERPRISES MORE MOBILE USERS, MORE PORTABLE DEVICES FOR CORPORATE ACCESS

More information

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc.

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc. Junos Space Reports Release 14.1 Published: 2014-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service Intrusion Detection and Prevention Sensors Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sept 21, 2012 VERSION: 12.09R21.01 Copyright 2010, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

Compliance Manager ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Junos Pulse MSS MSG Release 4.2R1

Junos Pulse MSS MSG Release 4.2R1 Access Solutions Junos Pulse MSS MSG Release 4.2R1 MSS MSG 4.2R1 (4.2.1.229) Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net January

More information

STRM Administration Guide

STRM Administration Guide Security Threat Response Manager Release 20.2 Juniper Networks, Inc. 94 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 204-09-2 Copyright Notice Copyright 20 Juniper

More information

Juniper Secure Analytics Patch Release Notes

Juniper Secure Analytics Patch Release Notes Juniper Secure Analytics Patch Release Notes 7.3.0 January 2018 7.3.0.20171205025101 patch resolves several known issues in Juniper Secure Analytics (JSA). Contents Administrator Notes..................................................

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms Junos Pulse Supported Mobile Platforms Updated: Sep 19, 2013 Copyright 2013, Juniper Networks, Inc. Contents Introduction... 1 Definitions... 1 Qualified Platform... 1 Compatible Platform... 1 Related

More information

Pulse Workspace Appliance. Administration Guide

Pulse Workspace Appliance. Administration Guide Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

VST Hospital Administrator Guide. Version 2.0.4

VST Hospital Administrator Guide. Version 2.0.4 VST Hospital Administrator Guide Version 2.0.4 Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software is licensed,

More information

Sophos Mobile in Central administrator help. Product version: 7.1

Sophos Mobile in Central administrator help. Product version: 7.1 Sophos Mobile in Central administrator help Product version: 7.1 Contents 1 About this help...6 2 Key steps for managing devices with Sophos Mobile...7 3 Dashboard...8 4 Reports...9 5 Tasks...10 5.1 Monitor

More information

Juniper Secure Analytics Virtual Appliance Installation Guide

Juniper Secure Analytics Virtual Appliance Installation Guide Juniper Secure Analytics Virtual Appliance Installation Guide Release 7.3.0 Modified: 2017-09- Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 9089 USA 08-75-2000 www.juniper.net Copyright

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.4 Published: 2014-03-03 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Sophos Mobile Control Administrator guide. Product version: 5.1

Sophos Mobile Control Administrator guide. Product version: 5.1 Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this

More information

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9

Forescout. eyeextend for MobileIron. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Compliance Manager ZENworks Mobile Management 3.0.x January 2015

Compliance Manager ZENworks Mobile Management 3.0.x January 2015 www.novell.com/documentation Compliance Manager ZENworks Mobile Management 3.0.x January 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Verizon MDM UEM Unified Endpoint Management

Verizon MDM UEM Unified Endpoint Management Verizon MDM UEM Unified Endpoint Management Version: 1.0 Last Updated: 3/29/18 Table of Contents Unified Endpoint Management (UEM) Overview... 4 Account Dashboard... 4 Unified Endpoint Management (UEM)

More information

ENTERPRISE MOBILITY USER GUIDE

ENTERPRISE MOBILITY USER GUIDE COMMUNITAKE TECHNOLOGIES ENTERPRISE MOBILITY USER GUIDE Powered by CommuniTake Technologies COMMUNITAKE ENTERPRISE MOBILITY, User Guide Copyright 2017, COMMUNITAKE Technologies Ltd., Yokneam, Israel. All

More information

Dell OpenManage Mobile Version 1.0 User s Guide

Dell OpenManage Mobile Version 1.0 User s Guide Dell OpenManage Mobile Version 1.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

IDP Detector Engine Release Notes

IDP Detector Engine Release Notes IDP Detector Engine Release Notes June 29, 2017 Contents Recent Release History................................................ 2 IDP Detector Engine Overview..........................................

More information

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( )

Oracle Beehive. Before Using Oracle Beehive Client and Communicator. Using BlackBerry with Oracle Beehive Release 2 ( ) Oracle Beehive Using BlackBerry with Oracle Beehive Release 2 (2.0.1.6) November 2011 Document updated November 4, 2011 This document describes how to access Oracle Beehive from your RIM BlackBerry device

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

INTACTPHONE USER GUIDE

INTACTPHONE USER GUIDE COMMUNITAKE TECHNOLOGIES INTACTPHONE USER GUIDE Powered by CommuniTake Technologies COMMUNITAKE IntactPhone, User Guide Copyright 2016, COMMUNITAKE Technologies Ltd., Yokneam, Israel. All rights reserved.

More information

AT&T Toggle. 2/3/2014 Page i

AT&T Toggle. 2/3/2014 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Symantec Mobile Management 7.1 Implementation Guide

Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide Symantec Mobile Management 7.1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Upgrading STRM to

Upgrading STRM to Security Threat Response Manager Release 2013.2 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2015-04-27 Copyright Notice Copyright 2015

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

Contrail Release Release Notes

Contrail Release Release Notes Contrail Release 3.2.2 Release Notes Release 3.2.2 March 2017 Contents Introduction........................................................ 2 New and Changed Features............................................

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes

Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes Symantec Mobile Management for Configuration Manager 7.2 MR1 Release Notes This document includes the following topics: About

More information

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Juniper Networks. Junos Pulse on Mobile Release 2.0. Android build #7687. BlackBerry build #154. Apple ios build #8059. Juniper Networks, Inc.

Juniper Networks. Junos Pulse on Mobile Release 2.0. Android build #7687. BlackBerry build #154. Apple ios build #8059. Juniper Networks, Inc. Juniper Networks Junos Pulse on Mobile Release 2.0 Android build #7687 BlackBerry build #154 Apple ios build #8059 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000

More information

Juniper Networks CTPOS Release 7.0R1 Software Release Notes

Juniper Networks CTPOS Release 7.0R1 Software Release Notes Juniper Networks CTPOS Release 7.0R1 Software Release Notes Release 7.0R1 September 2014 Revision 2 These release notes accompany Release 7.0R1 of the CTPOS software. They describe device documentation

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Sophos Mobile in Central

Sophos Mobile in Central administrator help Product Version: 8 Contents About this help...1 About Sophos Mobile Admin... 2 User interface... 2 Table views... 2 User roles... 3 Key steps for managing devices with Sophos Mobile...4

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902

Integration with Apple Configurator 2. VMware Workspace ONE UEM 1902 Integration with Apple Configurator 2 VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

JUNOSPHERE RELEASE NOTES

JUNOSPHERE RELEASE NOTES JUNOSPHERE RELEASE NOTES Release 2.0 09 February 2012 These release notes cover Junosphere Release 2.0. If the information in these release notes differs from the information found in the published documentation

More information

Supporting ios Devices

Supporting ios Devices Supporting ios Devices 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective owners.

More information

Junos Pulse. Client Customization Developer Guide. Release 5.0. Published: Copyright 2013, Juniper Networks, Inc.

Junos Pulse. Client Customization Developer Guide. Release 5.0. Published: Copyright 2013, Juniper Networks, Inc. Junos Pulse Client Customization Developer Guide Release 5.0 Published: 2013-09-19 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 408-745-2000 www.juniper.net Juniper Networks,

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

KACE GO Mobile App 5.0. Release Notes

KACE GO Mobile App 5.0. Release Notes KACE GO Mobile App 5.0 Release Notes Table of Contents Quest KACE GO 5.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

Sophos Mobile. administrator help. product version: 9

Sophos Mobile. administrator help. product version: 9 administrator help product version: 9 Contents About this help... 1 About...2 About Admin... 3 Dashboard... 3 Table views...4 Prerequisites... 4 User roles... 4 Change your password... 5 Password recovery...

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

Supporting Apple ios Devices

Supporting Apple ios Devices Supporting Apple ios Devices 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Building a BYOD Program Using Jamf Pro. Technical Paper Jamf Pro or Later 2 February 2018

Building a BYOD Program Using Jamf Pro. Technical Paper Jamf Pro or Later 2 February 2018 Building a BYOD Program Using Jamf Pro Technical Paper Jamf Pro 10.2.0 or Later 2 February 2018 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate.

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

STRM Log Manager Administration Guide

STRM Log Manager Administration Guide Security Threat Response Manager STRM Log Manager Administration Guide Release 2010.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2011-10-10

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

KACE GO Mobile App 4.0. Release Notes

KACE GO Mobile App 4.0. Release Notes KACE GO Mobile App 4.0 Release Notes Table of Contents Quest KACE GO 4.0 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance administrators...

More information

Sophos Mobile Control SaaS startup guide. Product version: 6.1

Sophos Mobile Control SaaS startup guide. Product version: 6.1 Sophos Mobile Control SaaS startup guide Product version: 6.1 Document date: September 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Troubleshooting Guide

Troubleshooting Guide Juniper Secure Analytics Release 2014.1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Published: 2014-13-03 Copyright Notice Copyright 2014 Juniper

More information

Dell OpenManage Mobile Version 1.0 User s Guide

Dell OpenManage Mobile Version 1.0 User s Guide Dell OpenManage Mobile Version 1.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates

More information

Sophos Mobile Control SaaS startup guide. Product version: 7

Sophos Mobile Control SaaS startup guide. Product version: 7 Sophos Mobile Control SaaS startup guide Product version: 7 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8 5 Change your login

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management

Lookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.

More information

QuickStart Guide for Mobile Device Management. Version 8.7

QuickStart Guide for Mobile Device Management. Version 8.7 QuickStart Guide for Mobile Device Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

STRM Series to JSA Series

STRM Series to JSA Series STRM Series to JSA Series Migration Guide Published: 2014-06-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Dell OpenManage Mobile Version 1.5 User s Guide (ios)

Dell OpenManage Mobile Version 1.5 User s Guide (ios) Dell OpenManage Mobile Version 1.5 User s Guide (ios) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates

More information