TREND MICRO Mobile Security 6.0 for Android Product Guide

Size: px
Start display at page:

Download "TREND MICRO Mobile Security 6.0 for Android Product Guide"

Transcription

1 H TREND MICRO Mobile Security 6.0 for Android Product Guide QR Code: TMMS 6.0 GLOBAL (US, ANZ, Canada, Mexico, Brazil, Taiwan) V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A Phone: +1 (817) Toll-free: (888)

2 Trend Micro Incorporated reserves the right to make changes to this document and to the service described herein without notice. Before implementing the service, please review the readme file and the latest version of the applicable user documentation. Trend Micro, the Trend Micro t-ball logo, and Worry-Free are trademarks or registered trademarks of Trend Micro, Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright 2014 Trend Micro Incorporated, Consumer Technical Product Marketing. All rights reserved. Trend Micro Mobile Security 6.0 for Android Product Guide provides help for analysts, reviewers, potential customers, and users who are evaluating, reviewing, or using Trend Micro Mobile Security for Android. At Trend Micro, we are always seeking to improve our documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at You can also evaluate this document on the following web site: For Mobile Security for Android support, go to: DOCUMENT PROFILE: Product Name: Trend Micro Mobile Security 6.0 for Android Document Title: Trend Micro Mobile Security 6.0 for Android - Product Guide Document Filename: PG - Mobile Security 6.0 Android - Product Guide GL v1.0 Document Release Date: September 16, 2014 Team: Consumer Technical Product Marketing 2

3 Table of Contents Trend Micro Mobile Security Quick Overview... 4 Chapter 1: Introducing Trend Micro Mobile Security... 5 Key Features... 5 System Requirements... 7 Incompatible Software... 8 Internet 3G-4G Connection... 8 Recommended Environment... 8 Target Market... 8 Availability... 8 Contacting Trend Micro... 8 Consumer Support Line and Chat Support... 9 Premium Services... 9 Chapter 2: Getting Started with Trend Micro Mobile Security Download and Install Trend Micro Mobile Security Chapter 3: Exploring Trend Micro Mobile Security Overview of the Mobile Security Console Virus Scanner Privacy Scanner Safe Surfing & Parental Controls Call & Text Blocking Lost Device Protection Backup & Restore Between Android and ios Devices Scan Facebook System Tuner Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security On Your Android Tablet Appendix: QR Codes to Google Play or Amazon About Trend Micro

4 Trend Micro Mobile Security Quick Overview Trend Micro Mobile Security for Android protects your Android device from privacy threats, loss, data theft, and viruses. Utilizing Trend Micro s cloud-based security via the Smart Protection Network and the Mobile App Reputation Service (MARS), Trend Micro Mobile Security stops threats before they reach you. Installing easily from the Google Play Store onto your Android smartphone or tablet, Trend Micro Mobile Security 6.0 provides the following essential features: Mobile Security Console. Check Actions Required, scan your device, check total files scanned in the last X days, scan for privacy risks, view your current backups and Lost Device Protection status. Additionally, users have easy access to all features via the Console (Free Service = FS; Premium Service = PS): Virus Scanner. New apps are checked from the cloud for threats. New! Pre-Installation Scan (coming soon for most Android devices) blocks bad apps and malware before download before they re installed. (PS) Privacy Scanner. Warns you of apps that potentially steal your private information. New apps are automatically checked for privacy risks upon download. (PS) Safe Surfing. Web filtering provides protection from malicious URLs (fake websites that try to steal your information) while you surf the Internet. Parental controls block kids from viewing inappropriate content. (PS) Call & Text Blocking. Annoying calls from unknown numbers can be blocked and disconnected. Annoying text messages coming from an unknown number can be blocked by keywords that you select. (PS) Lost Device Protection. From a personal online portal, you can locate a lost device, trigger an alarm, remotely lock it, or even wipe the device clean to protect your personal information. (PS) Backup & Restore. Backup data on your device to the cloud via Mobile Backup & Restore. Contacts can be backed up and restored across Android and ios. (50MB FS; 6GBs PS) Scan Facebook. Scan your Facebook privacy settings. Adjust them to increase your privacy and to protect from data theft. Links to the Facebook Privacy Scanner app. (FS) New! System Tuner. Optimize your device s Battery and Memory use. Clean your Web Browser History, Google Play Search History, and Clipboard Data. (PS) Figure 1. Console Scrolled Up Figure 2. Console Scrolled Down 4

5 Chapter 1: Introducing Trend Micro Mobile Security This chapter introduces you to Trend Micro Mobile Security 6.0 for Android. The topics discussed in this chapter include: Key Features System Requirements Incompatible Software Internet 3-G-4G Connection Recommended Environment Target Market Availability Contacting Trend Micro Key Features All features of Mobile Security are available during the 30-day trial. When the trial has expired, many key features are only available to paying customers, indicated below. O After 30-day trial, only available to paying customers o Available for all customers - Not available Table 1. Trend Micro Mobile Security Feature Comparison Protection Android ios Kindle Virus Scanner: Apps Scans apps you download and install to filter out virus and malicious apps that can steal your information and cost you money. New! Virus Scanner: Pre-Installation Scan Pre-installation scan blocks bad apps and malware before they re downloaded and installed. (Coming soon for most Android devices.) Virus Scanner: Updates Unlimited updates to virus protection files. Virus Scanner: Cloud Features unlimited cloud scanning connections to ensure continuous protection. Privacy Scanner Detects spyware by scanning all apps with Mobile App Reputation to identify ones that collect and potentially steal private information. o O o O - - o O o o O o O - O 5

6 Table 2. Trend Micro Mobile Security Feature Comparison (Con t) Protection Android ios Kindle Safe Surfing Uses the Trend Micro Smart Protection Network to block malicious websites. Safe Surfing: Parental Controls Filters inappropriate websites with age-based restrictions. Call and Text Blocking Filters calls and texts with whitelist and blacklist. Lost Device Protection: Remote Locate / Scream Helps you find your devices on a Google map using GPS, cell towers, or Wi-Fi / Enables you to trigger an alarm on your device even if it is in silent mode. O O O O - O O - - O O - Lost Device Protection: Remote Lock / Wipe Enables you to remotely lock your device (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code) / Allows you to perform a factory reset of the device from the web portal to erase all your personal data. O - - Lost Device Protection: SIM Card Protection Automatically locks your device if the SIM card is removed (Accessing the phone again will require that you insert your Trend Micro password or a unique unlock code). O - - Cross-Platform Backup and Restore Backup your photos, contacts*, calendar, videos, voice memos, music (up to 50 MB for Free, 5GB for Premium). (*Cross-platform Backup and Restore of Contacts between ios and Android.) Privacy Scanner for Facebook Trend Micro Privacy Scanner verifies your Facebook privacy settings, recommends enhancements, and facilitates the changes. Uninstall Protection Prevents unauthorized removal of the app (Uninstalling Mobile Security will require that you insert your Trend Micro password). New! Battery Status and Optimizer Maximizes your battery s life. New! Just-a-Phone Turns off power-draining features and apps. New! Auto Just-a-Phone Turns off power-draining features and apps automatically. New! Memory Status and Optimizer Helps free up memory and CPU to maximize performance. o o - o O - O - O o - - o - - O - - o 6

7 Table 3. Trend Micro Mobile Security Feature Comparison (Con t) Protection Android ios Kindle New! History Cleaner Cleans out old files to protect your privacy. New! Malware Cleaner Removes malware and restores your smartphone s normal settings. New! Smart Power Saver Intelligently manages and disables the network connection when it is not in use to maximize the battery life. New! Data Usage Monitor Helps users manage their data plan usage and costs. No Advertising Removes third party ads from displaying in app. (Note: ios and Kindle do not display ads.) Online Technical Support Offers support provided via online forums, knowledgebase, and . o - - O - - O O - O - - O O O System Requirements Table 4. Mobile Security System Requirements Requirements Description Operating Systems Android OS 2.3 and above* ios 7.0, 7.1, or later Device Space 13MB Android 24MB ios Memory 18-65MB Android 30-50MB ios Other 3G/4G (LTE) Wi-Fi Internet Connection *SMS blocking functions are not supported on Android OS 4.4 *Compatible with Kindle Fire, Fire HD, HD 8.0, HDX, HDX 8.9; not compatible with Kindle Paperwhite and Amazon Fire Phone *Compatible with iphone 4 and above, ipad 2 and above, ipad Mini 1 and 2, ipod Touch 5th Gen 7

8 Incompatible Software To identify software that you should remove from the device before installing Trend Micro Mobile Security, please refer to the following Web site: Internet 3G-4G Connection Trend Micro Mobile Security uses a Wi-Fi Internet or 3G-4G connection for activating the program online, checking the expiration date, downloading updates, sending Trend Micro URL/web queries and logs to the portal, logging into the management portal, and browsing knowledge-based pages on the Trend Micro Web site. 3G-4G data connections fees are usually charged on a monthly basis, using a fixed allocation with an upper limit. If you exceed this limit, you will be charged additional fees for the amount of time connected or for the amount of data downloaded. Testers are therefore encouraged to use a Wi-Fi router-based connection to the Internet whenever possible. Recommended Environment This Product Guide assumes that you are using Trend Micro Mobile Security in conjunction with a PC or Mac, so you can log in to the Trend Micro Mobile Security Portal easily at and review your Lost Device Protection settings and execute certain actions. Target Market Trend Micro Mobile Security is targeted to mobile users who wish to secure their Android, ios, and Kindle smart phones and tablets from malicious applications, web threats to them and their family, unwanted calls and messages, and device loss. Availability September 16, 2014 Google Play Store, App Store (Apple), and Amazon App Store Contacting Trend Micro Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas U.S.A. Phone: +1 (817) Toll-free: (888) Consumer Support Line (800) Monday - Friday, 5:00AM - 8:00PM Pacific 8

9 and Chat Support Paid users of Mobile Security may obtain free , chat, and community forum support. For more information, contact esupport at: Premium Services Trend Micro offers Premium Services for a wide variety of technical issues including installation, virus and spyware removal, PC Tune-ups, and more. For more information, visit 9

10 Chapter 2: Getting Started with Trend Micro Mobile Security This chapter gets you started with Trend Micro Mobile Security. Topics discussed in this chapter include: Downloading and Installing Trend Micro Mobile Security Buying / Activating a License Registering to your Trend Micro Account Transferring an Existing License to a New Device Note: Trend Micro Mobile Security is included with Trend Micro Maximum Security and Premium Security. To download the bundled software, users of these editions can simply launch the Trend Micro Security Console. A Protect Another Device link to the Mobile Security download is available in the Console. Download and Install Trend Micro Mobile Security To download and install Trend Micro Mobile Security: 1. Open your browser on your Android device and type ecuritydownload, or scan the QR Code on the cover of this guide or in the Appendix. 2. This takes you directly to the Google Play Store page for Trend Micro Mobile Security & Antivirus. 3. Alternately, tap the Google Play Store icon on your Android device to load it. 4. The Google Play Store screen appears. 5. Tap the Spyglass icon at the top to load the search field. The Search Google Play field appears and your Android keyboard pops up. Figure 3. Google Play Store Figure 4. Search Google Play 10

11 6. Type Trend Micro Mobile Security in the search field and when Mobile Security & Antivirus appears in the list, tap the listing. The Trend Micro Mobile Security & Antivirus install page appears. 7. Tap Install. The App Permissions screen appears, indicating the access permissions Trend Micro Mobile Security & Antivirus needs on your device. 8. If you accept, tap Accept. Trend Micro Mobile Security & Antivirus downloads and installs. 9. When installation is complete, you re presented with a screen to Open or Uninstall the app. Tap Open. A License Agreement screen appears. Figure 5. Trend Micro Mobile Security Figure 6. Install Figure 7. Accept Figure 8. Open 11

12 10. Read the License Agreement. If you accept the terms of the agreement, tap Accept. The TMMS Console appears, with a Welcome screen advising you to tap the Menu key on your device to go to Settings to sign into or set up your Trend Micro account. 11. Tap the Menu key on your device, then tap Settings. The Settings screen appears. 12. Note the Account & Subscription section, where you can: Set up account. Tap here to Sign in or Create a Trend Micro account. Trial Expires. You have 30 days to try the TMMS Premium features for free before they expire. Once they do, you can buy a paid subscription. 13. OPTION 1: Buy / Activate. Tap here to buy a 1-Year, 2-Year, or Yearly Subscription. The purchase page is loaded in the Google Play Store, along with your Google account and credit card details. Note: For purchases, you should have previously set up your Google Play Account and credit card details in Google. Figure 9. License Agreement Figure 11. Settings Figure 10. Welcome Figure 12. Account & Subscription 12

13 14. Tap the subscription you wish to purchase. Your Google account presents your payment credentials and the amount. 15. If you accept, tap Accept and Buy. Your subscription is activated. See below for instructions on how to register the activation to a Trend Micro account. 16. OPTION 2: Alternately, if you want to use a license you already own on this new device, in the Buy / Activate screen tap Want to transfer a license? to sign into your Trend Micro account and begin the license transfer. A Sign In screen appears. 17. Enter the address and password for the Trend Micro account that holds the license you wish to transfer and tap Sign In. The Transfer License screen appears. 18. Tap the license that you want to transfer to this device. A popup appears, letting you complete the transfer of your existing license. 19. Tap OK to transfer the license. Your purchased protection is immediately disabled on the old device and activated on this new one. Figure 13. Buy / Activate Figure 15. Sign In Figure 14. Accept & Buy Figure 16. Transfer License Figure 17. Transfer Existing License(s) 13

14 20. OPTION 3: If you have already purchased an Activation Code, in the Buy / Activate screen tap Use Activation Code. A screen appears for you to enter the activation code; then tap OK. Your subscription is activated. 21. REGISTERING TO AN ACCOUNT: Back in the Settings screen (Figure 12), tap Set up account. The Sign In screen appears. 22. REGISTRATION OPTION A: For those without an account, tap Create Account. The Create Account screen appears. 23. Enter your First and Last Names and the Address you wish to use (your Google account is inserted by default); then using the popup menu, select your Country and tap Next. A confirmation screen appears. 24. Confirm this is the address you wish to use to sign in and manage your Trend Micro subscription. Figure 18. Use Activation Code Figure 20. Create Account #1 Figure 19. Sign In Figure 21. Create Account #2 14

15 25. Enter and confirm a password for this account. If you wish, check I want to subscribe for Trend Micro updates, then tap Create Account. Your account is created. 26. REGISTRATION OPTION B: For those who already have a Trend Micro account, back in the Sign In screen (Figure 19), enter your Address and Password and tap Sign In. 27. If you re updating TMMS and you already have a subscription to a previous version of TMMS, a popup appears with Subscription Available, asking if you wish use it on this device or Buy a new one. 28. Tap Buy New to take you to the Buy / Activate screen, or tap Yes to use the subscription on this device. This takes you to the TMMS Console, where you can now begin using TMMS. Figure 22. Subscription Available 15

16 Chapter 3: Exploring Trend Micro Mobile Security This chapter provides an overview of Trend Micro Mobile Security (TMMS). Topics discussed in this chapter include: Overview of the Mobile Security Console Virus Scanner Privacy Scanner Safe Surfing & Parental Controls Call & Text Blocking Lost Device Protection Backup and Restore Between Android and ios Devices Scan Facebook System Tuner Password Uninstall Protection Transferring Licenses Between Devices Settings Mobile Security on your Android Tablet 16

17 Overview of the Mobile Security Console Once installed, Trend Micro Mobile Security (TMMS) appears in your Applications list on your Android mobile device and you can put a shortcut on your screen. To use the Mobile Security Console: 1. Tap the Trend Micro Mobile Security icon on your mobile device and the Mobile Security Console appears. 2. Simply tap a button or panel to access the Console functions. Tap, hold and scroll to see functions lower down in the list. 3. For example, tap Scan Device in the Status Banner to do a dual scan for Threats and Privacy Risks. 4. Or tap the Action Required numbered dropdown menu in the Status Banner; then tap the dropdown panels to remove a threat. The Virus Scan Result screen appears. 5. In the Virus Scan Result screen, tap the trashcan beside the virus or malware to delete it. 6. Or tap any panel in the Console, such as Virus Scanner (Figure 23), to configure its settings. See the following sections to get more details. Figure 23. Console Figure 25. Remove Threat Now Figure 24. Scanning Device Figure 26. Virus Scan Result 17

18 Virus Scanner To use the Virus Scanner: 1. Tap Virus Scanner in the TMMS Console. The Virus Scanner settings screen appears, with the Scan tab selected by default. 2. Tap Scan Now to conduct a virus scan on demand. The Virus Scanner does a viruscentered scan and returns the result. 3. Scan options include: Real-Time Scan. This option is checked by default and provides a real-time scan of all downloaded apps. Pre-Installation Scan. Checks apps upon download before they re installed. Scan Memory Card. This option checks the memory card for security threats. Scan Option. Check Scan Memory Card, then tap to set Scan only app files (default) or Scan all files. 4. Tap the Pre-Installation panel to activate this type of scan. The Pre-Installation Scan screen appears. 5. Tap the right side of the toggle to turn it on. A screen appears, asking if you want to create a VPN connection, which intercepts all network traffic. 6. Check I trust this application, and then OK. Figure 27. Virus Scanner Figure 29. Pre-Installation Scan Toggle Figure 28. Scan Now Pre- Installation Scan Figure 30. VPN Creation 18

19 7. A popup appears for you to name the CA certificate of trust. Accept the default name or provide your own and tap OK. 8. To test the Pre-Installation Scan feature, users can attempt to download and install the pseudo-virus Eicar from Google Play. (Eicar will not harm your device.) 9. Simply search for the app(s) and proceed through the normal download and install process. When you do, a popup will appear, notifying you the app is malicious. 10. Cancel the download/install to abort the process. 11. If you trust this app, check the checkbox and tap Download. The app downloads and installs. Figure 31. CA Certificate Figure 32. Test Pseudo-Virus Eicar Figure 33. Test Eicar Free 19

20 12. Tap the Update tab in the Virus Scanner screen. The Update options appear. 13. Tap the Update button to manually update the pattern file. Mobile Security updates. 14. Variously check Auto Update, Auto Update Using Wi-Fi Only. 15. Tap Auto Update Schedule and a popup appears to choose your Update Interval: Daily, Weekly, or Monthly. 16. Below that, check Automatic Scan to scan after a successful update (not shown). 17. Tap the History tab, then Virus Scanner or Updates to obtain a history of threats found or updates conducted. Figure 34. Virus Scanner Update Figure 35. Virus Scanner History 20

21 Privacy Scanner To conduct a Privacy Scan: 1. Tap Privacy Scanner in the TMMS console. The Privacy Scanner settings screen appears. 2. Tap Scan Now to conduct a Privacy Scan. When the scan is complete, a Privacy Risk Scan Result screen displays, providing you the results of the scan. Figure 36. Privacy Scanner Figure 37. Scan Now 3. If the Privacy Risk Scan Result screen shows risks, you can tap any app in the list to address them. The resulting Details screen lets you Uninstall or Trust this app. Tapping Trust this app automatically puts it in the list of Trusted Apps. 4. Scan options include Realtime Scan (checked by default) and Scan Memory Card (check to enable). Tap History to obtain a history of privacy risks found. Figure 38. Privacy Risk Scan Result Figure 39. Details 21

22 5. Back in the main screen, tap the Trusted Apps tab to view or add trusted apps that do not need to be scanned by the Privacy Scanner. (This shortens the length of the scan.) 6. Tap Add an App to add apps to the Trusted Apps list. The Add From popup appears, letting you select apps from the Privacy Scan History or from the Installed apps list. 7. For the latter option, when the list appears, check the Installed APPs you wish to add to the Trusted Apps list, then tap the Add (+) button. 8. When the popup appears, tap Add. The apps are added to your Trusted Apps list. Figure 40. Trusted Apps Figure 41. Add From Figure 42. Add Figure 43. Apps Added to Trusted Apps list 22

23 Safe Surfing & Parental Controls Note: SafeSurfing & Parental Controls work on the Android default browser and Chrome browser only. To ensure Safe Surfing: 1. Back in the main TMMS Console functions panel, tap Safe Surfing. The Safe Surfing & Parental Controls screen displays, with the Safe Surfing tab selected and surfing protection turned on by default. 2. Select your Safe Surfing Protection Level: High. Blocks sites showing any signs of fraud or malicious software. Normal. Provides balanced protection without blocking minor risks. This is chosen by default. Low. Blocks only sites confirmed as fraudulent or dangerous. 3. To add a URL to the Blocked or Approved Lists, tap the name of the respective list; e.g., Blocked List. The Add screen appears. 4. Tap Add. A popup appears. Type the name the item and the URL and tap Save. The URL is added to the Blocked or Approved List. Figure 44. Safe Surfing Figure 45. Protection Level Figure 46. Add URL to Blocked List Figure 47. Add specific URL 23

24 To enable Parental Controls: 1. Tap the Parental Controls tab or scroll right to access its settings. The Parental Controls tab appears, with the function off by default. 2. Tap the Parental Controls slider to the right to turn on the function. A Password Required popup appears, asking you to provide your password to save changes. 3. Enter your Trend Micro account password and tap OK. 4. Set your Protection Level: Child. Provides filtering for children 9 or younger. Pre-teen. Provides filtering for children between 10 and 13. Teen. Provides filtering for young adults between 14 and 18. Figure 48. Parental Controls Figure 49. Password Required Figure 51. Protection Level 24

25 5. Scroll down to access Uninstall Protection, then tap the slider to the right to turn on the function. The Activate Device Administrator screen displays. Activating device administrator will allow TMMS to erase all data when you use the web portal. It does not delete any data upon activation. 6. Tap Activate. A popup appears, indicating Device Administrator Activated. You must now use your device s Security Settings to deactivate Device Administrator for TMMS if you wish to uninstall the app. Tap OK. 7. Add URLs to the Blocked or Approved Lists, as you did with Safe Surfing. 8. Using your Web browser, surf to a site prohibited by TMMS Parental Controls. A message will appear, indicating the site has been blocked by Mobile Security s Parental Controls. Figure 52. Uninstall Protection Figure 54. Device Administrator Activated Figure 53. Activate Device Administrator Figure 55. Blocked by Parental Controls 25

26 9. When Parental Controls are activated, if your browser contains prohibited bookmarks, TMMS will periodically present a popup allowing you to Delete All prohibited bookmarks, or Add all to Approved Sites. 10. Tap the History tab to obtain a history of all Websites blocked by Safe Surfing or Parental Controls, then tap the respective blocked category for details on what was blocked. Figure 56. Periodic Delete Popup Figure 57. History Figure 58. Parental Controls History 26

27 Call & Text Blocking To block unwanted calls: 1. Back in the main TMMS Console screen, tap Call & Text Blocking. The Call & Text Blocking screen displays, with the Call tab selected by default and both Call and Text Blocking enabled. Tap the sliders to the left to disable the functions. 2. Tap Filtering Method to change the filtering option in the popup: Stop only blocked callers Allow only approved callers Figure 59. Call & Text Blocking Figure 60. Call Allow approved and anonymous callers 3. Tap Action to change the action to be performed in the popup. Reject call Silence device Reject call + send reply 4. Tap Reject call + send reply and you re given three preset options for Automatic Reply. Figure 61. Filtering Method Figure 62. Action 27

28 5. Edit the reply text for the chosen option by selecting it, tapping the Edit button, and typing the alternate text. Tap Save to save your changes. 6. Check Block Annoying Calls from unknown numbers to disconnect them within three seconds. 7. Tap History to review your Call and Text Blocked History. Figure 63. Edit Reply Text Figure 64. Call and Text Blocked History To block unwanted text: Note: Because of certain Android limitations, Text Blocking is not available for Android 4.4 or above. 1. In the Call & Text Blocking screen, tap the Text tab to access the settings. The Text Blocking options display. 2. Tap Filtering Method to change the option. Stop only blocked senders Allow only approved senders 3. Tap Action to set the action to be performed. Block message Figure 65. Text Blocking Figure 66. Filtering Method 28

29 Block and delete message Block message and reply 8. Tap Block message + reply and you have three options for Automatic Reply (Figure 67). 9. Edit the reply text for the chosen option by selecting it, tapping the Edit icon, then typing the alternate text. Tap Save to save your changes. 10. Check Block Annoying Texts, then tap Filter Keywords to block texts containing the keyword(s). The Block Annoying Texts entry screen appears, letting you type your keyword entries. Tap Save to save the keywords. 11. Enter contacts into the Blocked or Approved Lists, as previously described. 12. Tap the History tab to access the Call and Text Blocked Histories. Figure 67. Action Figure 69. Edit Method Figure 68. Automatic Reply Figure 70. Enter Passwords 29

30 Lost Device Protection To enable Lost Device Protection: 1. Back in the main Console, tap Lost Device Protection. The Lost Device Protection screen appears, with the Protection tab selected by default and three options displayed: Find My Android. Locates this device in Google Map. This option is enabled by default. SIM Card Lock. Lock this device if the SIM card is changed or removed. Device Name. Click the Edit icon to change the device name. 2. Check SIM Card Lock if you wish to lock your device when the SIM card is changed or removed. 3. A Password Required screen appears. Enter your password and tap OK. SIM Card Lock is enabled. 4. Tap the Remote Lock tab to access the message that appears when your device is locked and someone tries to use it. The message is displayed. 5. Tap the message to edit it. The Edit Message screen appears. Figure 71. Lost Device Protection Figure 72. Protection Figure 73. Password Required Figure 74. Remote Lock 30

31 6. Edit your message using the device popup keyboard and tap Save. 7. Tap the Remote Wipe tab to access the feature. The Remote Wipe screen appears, with Partial Remote Wipe selected by default. This deletes you contacts, call history, text messages, account info, and SD card contents in the event your device is lost or stolen. 8. Tap Full Remote Wipe to enable the function. The Activate Device Administrator screen appears. This allows Mobile Security to perform a complete erase of your device s content. 9. Tap Activate to enable the function. A screen appears indicating Device Administrator Activated, informing you that if you need to uninstall Mobile Security, you must use the uninstall option in the Setting menu on the action bar. 10. Reselect Partial Remote Wipe to revert to it. 11. Note that to change any Lost Device Protection settings, you must enter your password to make the changes. 12. Manage your protection in the Lost Device Protection Portal. See below for details. Figure 75. Edit Message Figure 77. Activate Device Administrator Figure 76. Remote Wipe Figure 78. Device Administrator Activated 31

32 Lost Device Protection Portal To access the Lost Device Protection Portal: 1. Launch your browser on your PC and type ostdevice into the search field, and hit Enter. The Lost Device Protection Portal webpage appears. 2. Tap Find Now or Sign in to sign into your Trend Micro account. The Sign In page appears. 3. Type the address and password you used to create your Trend Micro account and click Sign in. The Lost Device Protection Portal appears. Figure 79. Lost Device Protection Portal Sign In Figure 80. Sign In 32

33 4. Click Share to share the device s location with a trusted friend. 5. Click Scream to sound a oneminute alarm on your missing mobile device, even if it has been set to silent mode. 6. Click Refresh to refresh the Google Map. 7. Click Lock to stop anyone from using your missing mobile device. When you recover your device, click Unlock to unlock it, then use the Unlock Key provided or your Trend Micro password to complete the unlock. 8. Click Device Detail (below the device icon) to view the unlock code that can be entered into the device interface to unlock the device instead of the master account password. This key can also be ed to you at your account address by taping Yourself an Unlock Key on the device once it s found. 9. Click Wipe to permanently delete all the data stored on your missing mobile device. A warning appears. If you wish to wipe your device, click OK. Warning: Using this feature will perform a factory reset of your device. For testing or review purposes, please ensure you are using a test device or have a complete backup of your information. Once reset, TMMS will be removed from the device and the location feature will no longer function. Figure 81. Lost Device Protection Options Figure 83. Device Unlock Figure 82. Unlock Figure 84. Wipe Warning 33

34 Backup & Restore Between Android and ios Devices Trend Micro Mobile Security is integrated with Trend Micro Mobile Backup and Restore (MBR), available on the Google Play Store. It provides an overview of the files you ve currently backed up, as well as direct linked access to the MBR app. Using MBR, you can back up all the key data on your device and restore that data to it or another device. To Back Up Your Data: 1. Tap Backup & Restore in the TMMS Console. The Free Download screen appears. 2. Tap Free Download to download Mobile Backup and Restore (MBR). The app appears in Google Play. 3. Tap Install to install MBR. The App Permissions screen appears. 4. Read the list of permissions. If you accept them, tap Accept. The app downloads and installs and a shortcut is placed on your device. Figure 85. Backup and Restore Figure 86. Free Download Figure 87. Mobile Backup & Restore Figure 88. Accept 34

35 5. Tap Open to open MBR. The MBR Create an Account appears. 6. Since you ve already created an account for TMMS, tap Sign In to sign into your account. 7. The License Agreement appears. Read the License Agreement. If you agree, tap Accept. The Sign In screen appears. 8. Enter the address and password you used to create your account and tap Sign In. Figure 89. Open Figure 90. Create an Account Sign In Figure 91. License Agreement Figure 92. Sign In 35

36 9. The MBR Demo screen appears. 10. Tap Start. The MBR Console appears. 11. Tap Back Up Now. MBR scans your device for items to back up. 12. When the scan is done, choose the items you wish to back up, then tap Start Backup. 13. If your device is not plugged in, MBR advises you Before You Continue to plug it in during the backup to not drain your battery. Figure 93. Demo Figure 94. Back Up Now Figure 95. Choose Items to Back Up Figure 96. Before You Continue 36

37 14. Tap Continue. MBR backs up your device. When the backup is complete, a popup notifies you Backup Complete. 15. Tap Ok, and you re returned to the main Backup screen. 16. Tap Settings and you re taken to the Backup Settings screen, where you can set Backup Frequency (Time and Repeat interval), Wireless and network backup (Wi-Fi, when plugged in, not while roaming), and what items you want to have Automatically backed up (Contacts, Calendar, Call History, Text History, Photos, Music, Videos). 17. Note that, while you re in Mobile Backup & Restore, you can simply tap the Settings menu on your smartphone to return to the Automatic Backup Settings screen. Figure 97. Backing Up Figure 98. Backup Complete Figure 99. Backup Screen Figure 100. Backup Settings 37

38 To Restore Your Data Between Android and ios Devices: 1. At any time, you can restore a backup from this or another Android or ios device. To begin, tap Restore in the MBR Console. The Restore screen appears. 2. Scroll to the right or left to Choose a Backup to Restore. For example, choose an iphone backup, if you include an iphone in your Trend Micro account. 3. Tap Restore to restore the backup to your Android device. The Provide Password screen appears. 4. Provide your Trend Micro Account password, then tap Continue. The Choose Items to Restore screen appears. 5. Select the items you wish to restore (if it s an iphone backup, it will be Contacts), then tap Restore Selected. A Restore Contacts? popup appears, asking if you re sure you want to restore the contacts, with details on what to expect. 6. Tap Continue. If your device is not plugged in, a dialog appears, recommending you plug it in to save your battery. 7. Tap Continue. Mobile Backup & Restore restores your Contacts. Figure 101. Restore Figure 103. Choose Items to Restore Figure 102. Provide Password Figure 104. Restore Contacts? 38

39 8. When the Restore is complete, a dialog appears, saying Restore Complete. 9. Tap OK to close the dialog. Your Contacts have been restored. Figure 105. Before You Continue Figure 106. Restoring Figure 107. Restore Complete 39

40 To Manage Your Backups: 1. At any time, you can delete backups to recover space in your online storage. In the MRB Console, tap More. A list of your backups appears, along with your Online Storage Status and an option to Get More Storage (up to 5GBs for subscribers). 2. Tap the backup you wish to delete. A screen appears, listing details about the backup (e.g., Count and Size). 3. Tap Delete Selected Backup. A Delete Selected Backup? dialog appears, asking if you re sure you want to delete the backup. 4. Tap Delete. After a few moments, the backup is deleted from your list of backups. Figure 108. Online Storage Status Figure 109. Delete Selected Backup Figure 110. Delete Selected Backup? Figure 111. Backup Deleted 40

41 Scan Facebook Trend Micro Mobile Security also includes the Trend Micro Facebook Privacy Scanner, (also available as an independent app, Privacy Scanner for Facebook, on the Google Play Store). Using Scan Facebook from your Console, you can scan and easily edit your Facebook privacy settings. To access Privacy Scanner: 1. Tap Scan Facebook in the main TMMS Console. The Facebook Privacy Scanner screen appears. 2. Tap Sign into Facebook to check your privacy settings. The Facebook Login screen appears. Figure 112. Scan Facebook Figure 113. Facebook Privacy Scanner 3. Enter the address and password you use to sign into Facebook and tap Log In. Facebook Privacy Scanner checks your privacy settings. 4. When it s done checking, it presents you with the analysis. Figure 114. Enter Facebook Address and Password Figure 115. Checking Your Privacy Settings 41

42 5. Tap each item in the list to reset it to the recommended setting. A popup appears, letting you make the change. 6. Check the recommended Privacy Setting and tap OK. Privacy Scanner makes the change, saying Great! You fixed this concern. 7. Repeat for any remaining privacy concerns. 8. Since Facebook periodically changes its privacy policies or adds new features to the social network, you should periodically rescan your privacy settings to ensure your privacy. Figure 116. Two Privacy Concerns Figure 117. Editing Privacy Setting Figure 118. Great! You Fixed This Concern. 42

43 System Tuner Mobile Security s System Tuner lets you optimize the battery and memory settings on your device, as well as to clean up your clipboard data, web browser and Google Play search histories. Battery optimization tools include Just-a-Phone Mode, to manually or automatically turn off many settings to save battery power when it s especially low; and the Smart Power Saver, to automatically change Wi-Fi, 3G/4G, and Bluetooth connections upon idle to also save power. To use System Tuner: 1. Tap System Tuner in the Mobile Security Console. System Tuner scans active apps in memory and returns the result, indicating the minimum of memory you can save by optimizing. 2. Tap Optimize to free up memory. System Tuner optimizes your device and returns the result. 3. System Tuner shows the percentage of memory in use, memory regained, and extra battery time available on your device because of the optimization. Tap Done. 4. Tap the Battery tab in the System Tuner to begin to optimize your settings for increased battery use. System Tuner automatically scans your settings and returns the result. 5. Tap Optimize to optimize your batteryrelated settings. Figure 119. System Tuner Figure 120. Optimize Figure 121. Memory Optimized Figure 122. Battery 43

44 6. System Tuner optimizes your battery settings, indicating how much battery time and memory has been gained by optimizing. 7. Tap Done to close the screen. 8. Tap the History Cleaner tab to clean up your history records. System Tuner automatically checks for items it can clean up and returns the result. 9. Tap Clean Up to clean up to clean up your web browser or Google Play Search history and clipboard data. System Tuner cleans up your system and returns the result, including Records cleaned now and Total records cleaned. 10. Tap Done to close the screen. Figure 123. Battery Optimized Figure 124. History Cleaner Figure 125. History Cleaned 44

45 To use Just-a-Phone Mode: 1. Tap the Battery tab again to access its settings. 2. Tap the Just-a-Phone Mode toggle to the right to turn it on. The Ready for Just-a-Phone Mode screen appears. 3. Tap Enable to enable Just-a-Phone Mode. The Just-a-Phone Mode is enabled according to the Just-a-Phone Options (including Screen Brightness and Sleep options not shown below). 4. To adjust those options, tap Auto Just-a-Phone. The Auto Just-a-Phone screen appears. 5. Tap Auto Activate and Auto Activate Threshold to enable those functions. 6. Tap Set Schedule to adjust the schedule Start and Stop times. Figure 126. Just-a-Phone Mode Figure 127. Ready for Just-a- Phone Mode Figure 128. Auto Just-a- Phone Figure 129. Set Schedule Time 45

46 7. Tap Set Threshold to set the battery threshold at which Auto Just-a-Phone is activated. 8. Check or uncheck the various Just-a-Phone Options to switch On/Off 3G/4G, Wi-Fi, Bluetooth, or stop running apps. 9. Tap the Screen Brightness panel to set the percentage of brightness Just-a-Phone Mode will set when it s enabled. 10. Tap the Sleep panel to set how soon after idle when Just-a-Phone Mode will put your device to sleep. Figure 130. Battery Power Threshold Figure 131. Screen Brightness To enable Smart Power Saver: 1. Tap the Smart Power Saver toggle on the right to turn it on. 2. Tap the Smart Power Saver panel to access its settings. The Smart Power Saver settings screen appears. Figure 132. Sleep Figure 133. Smart Power Saver 46

47 3. Check/uncheck the settings to enable the changes to W-Fi, 3G/4G, and Bluetooth to save power. 4. If you still want to get or messages, check that option to maintain your 3G/4G connection, even when Smart Power Saver is on. 5. For Smart Standby, set how long after the screen darkens to switch-off 3G/4G and Bluetooth. 6. Also for Smart Standby, set at what intervals 3G/4G will switch on again to make a connection for /text messages. 7. For Smart Wi-Fi, set the interval to switch off Wif- Fi. Figure 134. Enable Smart Power Saver Figure 135. Switch off 3G/4G and Bluetooth Figure 136. Switch On 3G/4G Figure 137. Switch Off Wi-Fi 47

48 8. Again, for Smart Wi-Fi, set the interval when it will switch on again to make a connection. Figure 138. Switch on Wi-Fi Password Uninstall Protection Enabling password protection stops unauthorized changes to Parental Controls and Trend Micro Mobile Security s Anti-Theft feature. The master account password is also used when unlocking the device following a Remote Find, Remote Wipe, or Simcard change. Finally, Uninstall Protection is ensured by activating the Device Administrator; deactivating this protection also requires the master password. Using Password Protection: 1. Enabling Parental Controls requires a password. In the main screen, tap Safe Surfing and the screen appears. 2. Tap the Parental Controls slider on the right to turn it on. The Password screen appears. 3. Enter your password and Parental Controls is enabled. 4. Similarly, to change the settings on Lost Device Protection, tap it in the main screen. The Lost Figure 139. Password Protection Required Figure 140. Parental Controls Slider 48

49 Device Protection screen appears. 5. To enable or disable a feature, tap Find My Android or SIM Card Lock to check/uncheck the checkbox(es). The Password Required screen again appears. 6. Enter your password to allow the change to Find My Android or SIM Card Lock. Figure 141. Password Required Figure 142. Enable or Disable Find My Android or SIM Card Lock Using Device Administration for Uninstall Protection: 1. When you activate Parental Controls, you re also given the option to activate Uninstall Protection using Device Administration. 2. In the Safe Surfing & Parental Control screen, tap the Uninstall Protection slider on the right to enable it. A screen appears, asking if you wish to Activate Device Administrator. 3. Click Activate. Uninstall Protection is activated. Figure 143. Uninstall Protection Figure 144. Activate Device Administrator? 49

50 4. A Device Administrator Activated popup appears, providing directions if you ever need to uninstall Mobile Security. 5. Wait approximately ten minutes after enabling Uninstall Protection to test disabling the function and its password protection, as TMMS maintains a grace period to ensure easy editing for users. 6. To disable Uninstall Protection, tap the Uninstall Protection slider on the left to deactivate it. 7. A popup appears, requiring you to enter your password. 8. Enter your password to deactivate Uninstall Protection. 9. Uninstall Protection is deactivated. Figure 145. Device Administrator Activated Figure 146. Deactivate Uninstall Protection Figure 147. Password Required Figure 148. Uninstall Protection Deactivated Note: Device Administration is automatically deactivated when your subscription expires. 50

51 Transferring Licenses Between Devices Trend Micro Mobile Security allows you to transfer licenses between devices, whether they re ios or Android. The option is available for active or expired Trial accounts when you re signed in, or for expired Paid accounts when you re signed in. To Transfer a License: 1. Tap Mobile Security on our device to launch the Console. 2. Tap the Settings icon on your device and when the menu appears, select Settings. The Mobile Security Settings screen appears. 3. Tap Buy / Activate in the Settings Screen. The Buy Activate screen appears. 4. At the top of the screen, tap Want to transfer a subscription / license? The Sign-In screen appears. 5. Enter the address and password for your Trend Micro account and tap Sign In. A list of available licenses appears in the Transfer License screen. 6. Tap the license you wish to transfer. Figure 149. Buy / Activate Figure 150. Want To Transfer A License? Figure 151. Sign In Figure 152. Transfer License 51

52 7. A Transfer Existing License(s) dialog appears, asking if you wish to transfer the license to this device. 8. Tap OK. The license is transferred and your subscription is updated. Figure 153. Transfer Existing License(s) Figure 154. Your Subscription Has Been Updated Settings Trend Micro Mobile Security provides system settings for application management. 1. Tap Mobile Security on your device to open the Console. 2. Tap the Settings menu on your device to open the popup. 3. Here, you have access to various options. Settings. Access various system-level settings. Renew / Activate. Renew or activate a subscription. Share. Send friends or associates a recommendation to use Trend Micro Mobile Security. Trend Micro Apps. Get access to other Trend Micro apps for your mobile device. Love This App. Provide a rating and review on Google Play. Help. Get Online Help with Mobile Security. Figure 155. Settings Popup Menu (Device) 52

53 4. Tap Settings to access system-level options. The Settings screen appears, with the list of options available. Scroll down to view the options. Trend Micro Account. Account you re registered to. Expiration Date. Date your subscription expires. Serial Number. 20 character key code. Renew / Activate. Purchase/renew or activate a subscription. Sign Out. Disconnect your Trend Micro account Check your Trend Micro Account. Manage your account and subscriptions. Set up alternate addresses. Send from an unlock key from the lock screen to your Trend Micro account and the address you set up here. Display App Icon on Status Bar. Make it visible in the pull-down menu. Uninstall. Uninstall Mobile Security. About. Product details and version number. Help. Access Online Help. Start collecting log. Collect logs to troubleshoot and send to Trend Micro. Diagnostic logs history. Check the token and report to Trend Micro Help us improve our product. Share device information anonymously with Trend Micro. Figure 156. Settings (1) Figure 157. Settings (2) 53

54 Mobile Security On Your Android Tablet Trend Micro Mobile Security works much the same way on your Android tablet as it does on your Android smartphone, minus Call and Text Blocking, which is a specific set of functions for smartphones. Whether you re holding your tablet vertically or horizontally, the Console displays the same functions, it just distributes them differently. Figure 158. Mobile Security on Tablet (Vertical View) 54

55 Figure 159. Mobile Security on Tablet (Horizontal View) 55

56 Appendix: QR Codes to Google Play or Amazon The QR Codes below can be scanned to take you to the appropriate page in Google Play or Amazon to download Trend Micro Mobile Security (TMMS) for Android or Kindle. TMMS 6.0 GLOBAL (US, ANZ, Canada, Mexico, Brazil, Taiwan) TMMS 6.0 EMEA 56

57 TMMS 6.0 APAC Amazon TMMS (Kindle) - QR Code US, CANADA: 57

58 About Trend Micro Trend Micro, a global leader in security software and solutions, strives to make the world safe for exchanging digital information. For the past 25+ years, its employees have been inspired to protect individuals, families, businesses and governments as they look to harness the potential of emerging technologies and new ways of sharing information. In today s organizations, information has become the most strategic asset; embodying competitive advantage and powering operational excellence. With the explosion of mobile, social and cloud technologies, protecting this information has become more challenging than ever. Organizations need smart protection of information, with technology that is simple to deploy and manage, and security that fits an evolving ecosystem. Trend Micro solutions enable a smart protection strategy for organizations. Smart. Simple. Security that fits. Trend Micro provides layered content security for mobile devices, endpoints, gateways, servers and the cloud. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks. All of our solutions are powered by cloud-based global threat intelligence, the Trend Micro Smart Protection Network, and are supported by over 1,200 threat experts around the globe. For additional information, visit 58

TREND MICRO Mobile Security 2.0 for ios Product Guide

TREND MICRO Mobile Security 2.0 for ios Product Guide H TREND MICRO Mobile Security 2.0 for ios Product Guide (QR Code: US, CAN, AU, NZ) V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A Phone:

More information

TREND MICRO Mobile Security 9.0 for Android Product Guide

TREND MICRO Mobile Security 9.0 for Android Product Guide H TREND MICRO Mobile Security 9.0 for Android Product Guide V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900

More information

TREND MICRO Mobile Security 10.0 for Android Product Guide

TREND MICRO Mobile Security 10.0 for Android Product Guide H TREND MICRO Mobile Security 10.0 for Android Product Guide V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900

More information

TREND MICRO Mobile Security 6.0 for ios - Product Guide

TREND MICRO Mobile Security 6.0 for ios - Product Guide H TREND MICRO Mobile Security 6.0 for ios - Product Guide V1.0 Trend Micro, Incorporated US Headquarters 224 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 - USA Phone: +1 (817) 569-8900 Toll-free:

More information

Trend Micro Antivirus for Mac 2015

Trend Micro Antivirus for Mac 2015 H Trend Micro Antivirus for Mac 2015 Product Guide V1.2 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Password Manager Product Guide for Mac and ios

Password Manager Product Guide for Mac and ios H Password Manager Product Guide for Mac and ios Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763 www.trendmicro.com

More information

Password Manager. Product Guide. for PC (v3.8) and Android (v5.0) V1.0

Password Manager. Product Guide. for PC (v3.8) and Android (v5.0) V1.0 H Password Manager for PC (v3.8) and Android (v5.0) Product Guide V1.0 Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that

More information

Mobile Security for Android devices

Mobile Security for Android devices Mobile Security for Android 2.2 3.2 devices 1 Swisscom Mobile Security for Android 2.2 3.2 devices This guide covers mobile devices (smartphones, tablets) that use the Android operating system (version

More information

Password Manager. Product Guide. for PC (3.7) and Android (3.8) V1.0

Password Manager. Product Guide. for PC (3.7) and Android (3.8) V1.0 H Password Manager for PC (3.7) and Android (3.8) Product Guide V1.0 Trend Micro Inc. 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888) 762-8763

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Quick Heal Mobile Security Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights Complete protection for your Android device that simplifies security

More information

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage PRO Not just an app, but a friend for your phone. Product Highlights Fonetastic is an all-in-one app for Android devices. Built with multiple productivity and security features, it enhances your device

More information

Password Manager. Product Guide. for Mac (3.8) and ios (5.0) V1.0

Password Manager. Product Guide. for Mac (3.8) and ios (5.0) V1.0 H Password Manager for Mac (3.8) and ios (5.0) Product Guide V1.0 Trend Micro Incorporated 225 E. John Carpenter Freeway, Suite 1500 Irving, Texas 75062 U.S.A. Phone: +1 (817) 569-8900 Toll-free: (888)

More information

DirectPass Password Manager for PC

DirectPass Password Manager for PC H Trend Micro DirectPass Password Manager for PC Product Guide Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro Incorporated

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

Comodo Mobile Security for Android Software Version 2.5

Comodo Mobile Security for Android Software Version 2.5 Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile

More information

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that simplifies security and significantly

More information

Multi device User Guide

Multi device User Guide Multi device User Guide Version 1.03 Quick Heal Technologies Ltd. www.quickheal.com Fonetastic-Multi device User guide Version 1.03 Copyright & License Information Copyright 2017 Quick Heal Technologies

More information

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Free protection for your Android phone against virus attacks, unwanted calls, and theft. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Quick Heal AntiVirus for Mobile User Guide

Quick Heal AntiVirus for Mobile User Guide Quick Heal AntiVirus for Mobile User Guide Version 1.0 Quick Heal Technologies Ltd. www.quickheal.com Copyright & License Information Copyright & License Information Copyright 2018 Quick Heal Technologies

More information

Trend Micro Security 2015 Product Guide

Trend Micro Security 2015 Product Guide H Trend Micro Security 2015 Product Guide Trend Micro Antivirus+ Security Trend Micro Internet Security Trend Micro Maximum Security Trend Micro Premium Security Trend Micro Incorporated 225 E. John Carpenter

More information

IdeaTab A1000L-F. User Guide V1.0. Please read the Important safety and handling information in the supplied manuals before use.

IdeaTab A1000L-F. User Guide V1.0. Please read the Important safety and handling information in the supplied manuals before use. IdeaTab A1000L - UserGuide IdeaTab A1000L-F User Guide V1.0 Please read the Important safety and handling information in the supplied manuals before use. file:///c /Users/xieqy1/Desktop/EN UG/index.html[2013/8/14

More information

Qustodio. User Guide. Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017.

Qustodio. User Guide. Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017. Qustodio User Guide Copyright Qustodio Technologies S.L. All rights reserved. Revised on June 2017. Table of Contents 1. INTRODUCTION... 3 1.1. WHAT IS QUSTODIO?... 3 1.2. FEATURES AND BENEFITS... 4 2.

More information

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from your mobile

More information

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media FAQ for KULT Basic 1. What do the Icons mean that can be found in notifications bar at the top of my screen? 2. How can I move an item on the home screen? 3. How can I switch between home screens? 4. How

More information

CCloud for ios Devices

CCloud for ios Devices CCloud for ios Devices User Guide Guide Version 3.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. CCloud for ios - Introduction... 3 1.1.Starting Comodo Cloud...

More information

ESET ENDPOINT SECURITY FOR ANDROID

ESET ENDPOINT SECURITY FOR ANDROID ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Endpoint Security 1.1 Installation...3

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information

Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it.

Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it. www.moochies.com Thank you for purchasing your new Moochies Watch. We hope you, and more importantly your kids will love it as much as we did creating it. This manual will take you through all the steps

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta ESET Mobile Security for Windows Mobile Installation Manual and User Guide - Public Beta Contents...3 1. Installation of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

PrinterOn Embedded Agent for Samsung Printers and MFPs. Setup Guide for PrinterOn Hosted

PrinterOn Embedded Agent for Samsung Printers and MFPs. Setup Guide for PrinterOn Hosted PrinterOn Embedded Agent for Samsung Printers and MFPs Setup Guide for PrinterOn Hosted Contents Chapter 1: Introduction... 3 Overview: Setting up the PrinterOn Embedded Agent... 4 PrinterOn service prerequisites...

More information

Welcome to CSB on Command Frequently Asked Questions

Welcome to CSB on Command Frequently Asked Questions Welcome to CSB on Command Frequently Asked Questions General How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Sophos Mobile Security

Sophos Mobile Security Help Product Version: 8.5 Contents About Sophos Mobile Security...1 Dashboard... 2 Scanner... 3 Web Filtering... 4 App Protection...5 Call Blocking...6 Loss & Theft...7 Configure Loss & Theft... 8 Wi-Fi

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, please review the readme files,

More information

Kaspersky Mobile Security 9. Reviewer s Guide

Kaspersky Mobile Security 9. Reviewer s Guide Kaspersky Mobile Security 9 Reviewer s Guide The purpose of this document is to provide an introduction to Kaspersky Mobile Security 9 (KMS 9). KMS 9 is a product that has been designed to protect the

More information

Quick Start Guide PC, Mac, ios, and Android

Quick Start Guide PC, Mac, ios, and Android Quick Start Guide PC, Mac, ios, and Android Installation for PC Please refer to the ReadMe file on the installation disc or the Trend Micro website for detailed system requirements. You can also download

More information

Safety and Security. April 2015

Safety and Security. April 2015 Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.

More information

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard Junos Pulse Mobile Security Dashboard User Guide Release 4.1 October 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue

More information

Sectigo Accounts Management

Sectigo Accounts Management Sectigo Accounts Management Software Version 7.0 User Guide Guide Version 7.0.030414 2018 Sectigo. All rights reserved. Table of Contents 1. Introduction To Sectigo Accounts Management...3 2. My Account...5

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2014 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google, Google Now, Google Play,

More information

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios

More information

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security

More information

Created by Eugene Stephens ios 8.2

Created by Eugene Stephens ios 8.2 ios 8.2 Physical Buttons - Sleep / Wake Used to turn the device on /off or wake / sleep. Located on the top, right corner (iphone 6 located on right side). - Ring / Silent Used to turn off the ringer.

More information

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

USER GUIDE KASPERSKY MOBILE SECURITY 8.0 USER GUIDE KASPERSKY MOBILE SECURITY 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.

More information

Welcome to First Security Mobile

Welcome to First Security Mobile Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled

More information

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS ANDROID PRIVACY & SECURITY GUIDE WESNET The Women s Services Network Smartphones store a lot of personal information, including email or social media accounts, reminders and notes, the number of steps

More information

AT&T Toggle. 2/3/2014 Page i

AT&T Toggle. 2/3/2014 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Data Usage App... 3 Media... 4 AT&T

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

High-Speed Internet Quick Start Guide

High-Speed Internet Quick Start Guide High-Speed Internet Quick Start Guide Connect Your World. NEED HELP? 1.800.239.4430 Frontier.com/HelpCenter FTR02536_FR_HSI_QSG_ENG_0916_F.indd 1 Contents PART 1: Wi-Fi Router Setup 4 PART 2: Configure

More information

This guide describes features that are common to most models. Some features may not be available on your tablet.

This guide describes features that are common to most models. Some features may not be available on your tablet. User Guide Copyright 2013 Hewlett-Packard Development Company, L.P. Bluetooth is a trademark owned by its proprietor and used by Hewlett-Packard Company under license. Google is a trademark of Google Inc.

More information

Simpli.Fi. App for wifi DK series cameras OWNER'S MANUAL. APP DSE Simpli.Fi for Wi-Fi DK series cameras. Product description. Download DSE Simpli.

Simpli.Fi. App for wifi DK series cameras OWNER'S MANUAL. APP DSE Simpli.Fi for Wi-Fi DK series cameras. Product description. Download DSE Simpli. Page: 1 Simpli.Fi App for wifi DK series cameras Product description Simpli.Fi is THE app to control all our WIFI hidden cameras to investigate Series DK. Our investigation for cameras are IP cameras to

More information

Getting to know your ipad exploring the settings, App store, Mail

Getting to know your ipad exploring the settings, App store, Mail Getting to know your ipad exploring the settings, App store, Mail Exploring the settings Open the settings app from your homepage Wi-Fi Turn Wi-Fi on/off Add new Wi-Fi Connection Enter Network Name, any

More information

COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES

COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES COMMUNITAKE ENTERPRISE MOBILITY: USE GUIDELINES INTRODUCTION The CommuniTake Enterprise Mobility (CEM) solution is part of the CommuniTake Mobility solutions suite. It is aimed at organizations that look

More information

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 4.1 November 30, 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are

More information

Installation guide Swisscom Mobile Security for Android Devices

Installation guide Swisscom Mobile Security for Android Devices Security for 1 Installation of Mobile Security...2 1.1 operating system devices with preinstalled Mobile Security program...2 1.2 operating system devices with preinstalled Swisscom Security Launcher...2

More information

mycloud GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device Introduction WiseMo Host module on your computer or device

mycloud GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device Introduction WiseMo Host module on your computer or device mycloud GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Browser Guest module on your PC, Mac or Linux WiseMo Host module on your computer or device Introduction WiseMo

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

The best for everyday PC users

The best for everyday PC users The best for everyday PC users 2019 ESET Internet Security delivers rock-solid protection for everyday web users, built on ESET s trademark best mix of detection, speed and usability. Legendary antivirus

More information

WiFi Security User Guide

WiFi Security User Guide WiFi Security User Guide Copyright Copyright 2018 Webroot. All rights reserved. Webroot WiFi Security User Guide Information in this document is subject to change without notice. The software described

More information

Bitdefender Mobile Security & Antivirus User's Guide

Bitdefender Mobile Security & Antivirus User's Guide USER'S GUIDE Bitdefender Mobile Security & Antivirus User's Guide Publication date 01/30/2018 Copyright 2018 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Comodo IT and Security Manager Software Version 5.4

Comodo IT and Security Manager Software Version 5.4 Comodo IT and Security Manager Software Version 5.4 End User Guide Guide Version 5.4.090716 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

AT&T Toggle. 12/12/2013 Page i

AT&T Toggle. 12/12/2013 Page i Page i GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Toggle Overview... 1 Personal Icon... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle Messaging...

More information

F-Secure Mobile Security

F-Secure Mobile Security F-Secure Mobile Security for S60 User s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or

More information

User Guide for Consumer & Business Clients

User Guide for Consumer & Business Clients Online Banking from Capital City Bank User Guide for Consumer & Business Clients Revised September 2015 www.ccbg.com/upgrade Contents Overview... 4 Exploring the Home Page... 5 Menu... 6 Accounts... 7

More information

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0

NETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA USA. August v1.0 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-03 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,

More information

CleanMyPC User Guide

CleanMyPC User Guide CleanMyPC User Guide Copyright 2017 MacPaw Inc. All rights reserved. macpaw.com CONTENTS Overview 3 About CleanMyPC... 3 System requirements... 3 Download and installation 4 Activation and license reset

More information

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709 Xerox App Gallery App Gallery User Guide Version 5.0 September 2018 702P06709 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 Table of Contents... ii GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1 1: Start Using Toggle... 1 Personal... 2 ToggleHub... 2 AT&T Toggle Browser... 2 Downloads... 2 Media... 3 AT&T Toggle

More information

Basics. screen? CALLS. In call. Missed call. Speakerphone on. Mute your microphone. Make another call. Turn on the speakerphone

Basics. screen? CALLS. In call. Missed call. Speakerphone on. Mute your microphone. Make another call. Turn on the speakerphone Basics 1. What do the Icons mean that can be found in notifications bar at the top of my screen? CALLS In call Missed call Speakerphone on Mute your microphone Show the dial pad Put a call on hold Make

More information

Mobile Banking FAQs. Frequently Asked Questions. Contact Us. Security. Signing In

Mobile Banking FAQs. Frequently Asked Questions. Contact Us. Security. Signing In Effective May 24, 2016 Contact Us Who do I call for help? For help with Online or Mobile Banking, please call 888-217-1265 (Consumer) or 877-650-0095 (Business). If you are having technical issues with

More information

CAS Quick Deployment Guide January 2018

CAS Quick Deployment Guide January 2018 CAS January 2018 Page 2 of 18 Trend Micro CAS January 2018 This document is to guide TrendMicro SE and Solution Architect team run a successful Cloud App Security POC with prospective customers. It is

More information

Frequently Asked Questions. OTA (Firmware Upgrades) & Parental Registration

Frequently Asked Questions. OTA (Firmware Upgrades) & Parental Registration Frequently Asked Questions OTA (Firmware Upgrades) & Parental Registration Q: What is OTA? Why is this important for me to know? A: OTA is a firmware upgrade to your Meep! that brings the Meep! to the

More information

IdeaTab S6000. User Guide V1.0. Please read the safety precautions and important notes in the supplied manual before use.

IdeaTab S6000. User Guide V1.0. Please read the safety precautions and important notes in the supplied manual before use. IdeaTab S6000 User Guide V1.0 Please read the safety precautions and important notes in the supplied manual before use. Chapter 01 IdeaTab S6000 Overview *Specific models only 1-1 IdeaTab Appearance 1-2

More information

Backup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started

Backup everything to cloud / local storage. CloudBacko Pro. Essential steps to get started CloudBacko Pro Essential steps to get started Last update: September 22, 2017 Index Step 1). Configure a new backup set, and trigger a backup manually Step 2). Configure other backup set settings Step

More information

Introduction. Package Checklist. Minimum System Requirements. Registering Your Product. More Help

Introduction. Package Checklist. Minimum System Requirements. Registering Your Product. More Help Introduction Keep a watch on your family, pet, home or office 24/7, even when you re not there. Creative Live! Cam IP SmartHD gives you a live update on your phone, wherever you are. Get activity alerts,

More information

BlackVue C App Manual

BlackVue C App Manual BlackVue C App Manual BlackVue C App Manual Contents Connecting to BLACKVUE CLOUD... 3 (A) Create an account... 3 (B) Register your dashcam with your account... 3 (C) Connect your BlackVue dashcam to a

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Quick Start Guide. PC, Mac, Android & ios

Quick Start Guide. PC, Mac, Android & ios Quick Start Guide PC, Mac, Android & ios Installation for PC Please refer to the ReadMe file on the installation disc or to the Trend Micro website for detailed system requirements. If you encounter difficulties

More information

Welcome to United Bank - Mobile Banking!

Welcome to United Bank - Mobile Banking! Questions Welcome to United Bank - Mobile Banking! General Questions How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a text message or data plan? I'm not

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Built without compromise for users who want it all

Built without compromise for users who want it all Built without compromise for users who want it all 2019 Enjoy your digital life, secured by ESET s ultimate multilayered antimalware protection for all internet users, built on ESET s trademark best mix

More information

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway Junos Pulse Mobile Security Gateway Administration Guide Release 4.0 June 22, 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered

More information

Version 5.0 September P Xerox App Gallery. App Gallery User Guide

Version 5.0 September P Xerox App Gallery. App Gallery User Guide Version 5.0 September 2018 702P06709 Xerox App Gallery App Gallery User Guide 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Sophos Mobile. user help. product version: 8.6

Sophos Mobile. user help. product version: 8.6 user help product version: 8.6 Contents About this help... 1 About...2 Set up on your device... 3 Enrollment steps for Android devices... 3 Enrollment steps for ios devices...3 Enrollment steps for Macs...

More information

Comodo cwatch Office Software Version 1.0

Comodo cwatch Office Software Version 1.0 rat Comodo cwatch Office Software Version 1.0 Administrator Guide Guide Version 1.0.121517 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo cwatch

More information

<,W,EϬϱ E USER MANUAL

<,W,EϬϱ E USER MANUAL USER MANUAL GETTING STARTED To get started with the Agora handset, please take both the phone and the battery out of the box. On the rear of the phone you will find a plastic backing cover with a small

More information

This handbook contains important security measures and product information, to help avoid accidents. Please

This handbook contains important security measures and product information, to help avoid accidents. Please MANUAL Attention: This handbook contains important security measures and product information, to help avoid accidents. Please make sure to read the manual carefully before using the device. Do not store

More information

UQ mobile User Guide Set-up Guide From Getting Started to Option Settings

UQ mobile User Guide Set-up Guide From Getting Started to Option Settings UQ mobile User Guide Set-up Guide From Getting Started to Option Settings Vol. C08 FUJITV KIDS Contents Introduction Contract Plan Details, Set-up Items Once you receive your SIM card/set-up Process Basic

More information

User Help

User Help ginlo @work User Help 19 June 2018 Contents Get started... 5 System requirements for the ginlo @work app... 5 Recommended browsers for ginlo websites... 6 Supported languages... 6 Navigation in ginlo @work...

More information

Downloaded from manuals search engine. Quick Start

Downloaded from   manuals search engine. Quick Start Quick Start Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using

More information

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection.

Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. Thank you for purchasing the Mobile WiFi. This Mobile WiFi brings you a high speed wireless network connection. This document will help you understand your Mobile WiFi so you can start using it right away.

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Mobile phone setup guide

Mobile phone setup guide Mobile phone setup guide Introduction The purpose of this guide is to help staff set up their new mobile phone (either provided by PU or personal) by installing their SIM card, connecting to the University

More information