Junos Pulse for Google Android

Similar documents
Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Gateway

Junos Pulse Mobile Security Gateway

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Wireless LAN. SmartPass Quick Start Guide. Release 9.0. Published: Copyright 2013, Juniper Networks, Inc.

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Features. Product Highlights. Not just an app, but a friend for your phone. Optimization. Speed. Battery. Storage. Data Usage

JUNIPER NETWORKS PRODUCT BULLETIN

Pulse Supported Mobile Platforms

JUNOS PULSE MOBILE SECURITY SUITE. Stallion Winter Seminar Jukka Piirainen & Jani Ripatti

Quick Heal Mobile Security. Anti-Theft Security. Real-Time Protection. Safe Online Banking & Shopping.

Network Configuration Example

AT&T Toggle. 2/3/2014 Page i

Juniper Networks. Junos Pulse on Mobile Release 2.0. Android build #7687. BlackBerry build #154. Apple ios build #8059. Juniper Networks, Inc.

Pulse Workspace Appliance. Administration Guide

AT&T Toggle. 12/12/2013 Page i

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

Junos Pulse Supported Mobile Platforms

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Pulse Secure Mobile Android

Mobile Security for Android devices

SRX110 Services Gateway Quick Start

ANDROID PRIVACY & SECURITY GUIDE ANDROID DEVICE SETTINGS

Table of Contents... ii. GO AHEAD BRING YOUR OWN DEVICE TO WORK... 1 Requirements... 1

Table of Contents... ii. Go Ahead Bring Your Own Device to Work... 1 Requirements... 1

Web Device Manager Guide

Junos Pulse Mobile Security Gateway

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

ESET Mobile Security for Windows Mobile. Installation Manual and User Guide - Public Beta

USER GUIDE KASPERSKY MOBILE SECURITY 8.0

Conversion Instructions for SSG 300M-series Security Devices and J-series Services Routers

Junos Pulse Secure Access Service

How to install Internet Security for Android app

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Sophos Mobile. user help. product version: 8.6

ESET ENDPOINT SECURITY FOR ANDROID

Dell OpenManage Mobile Version 1.0 User s Guide

3CX Mobile Device Manager

Comodo Mobile Security for Android Software Version 2.5

Google 2 factor authentication User Guide

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

NotifyMDM Device Application User Guide Installation and Configuration for Android

Safety and Security. April 2015

Installation Manual. and User Guide

SRX240 Services Gateway Quick Start

Sophos Mobile Control Administrator guide. Product version: 5.1

How to Set Up Your SRX320 Services Gateway

Enterprise Security Solutions by Quick Heal. Seqrite.

Conversion Instructions for SSG 500M-series Security Devices and J-series Services Routers

Aventail Connect Client with Smart Tunneling

Junos Pulse Supported Mobile Platforms

AT&T Global Network Client for Android

Pulse Mobile. Android for Work Guide. Product Release 5.1R3. Document Revision 1.0 Published:

How to Set Up Your SRX300 Services Gateway

Junos Pulse Secure Access Service

Junos Pulse Supported Mobile Platforms

JUNOSPHERE RELEASE NOTES

Junos Pulse Supported Mobile Platforms

Junos Pulse Supported Mobile Platforms

Pulse Secure Mobile Android Release 6.3.0


Ayers Token User Manual

Pulse Secure Client for Chrome OS

Multi device User Guide

Juniper Secure Analytics

Mobility Manager 9.5. Users Guide

Network Configuration Example

Kaspersky Mobile Security 9. Reviewer s Guide

Compliance Manager ZENworks Mobile Management 2.7.x August 2013

ENTERPRISE MOBILITY USER GUIDE

F-Secure Mobile Security

FAQ for KULT Basic. Connections. Settings. Calls. Apps. Media

How to Set Up Your SRX4100 Services Gateway

Network Configuration Example

ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE

ipass Open Mobile 2.10.x for Android Quick Start Guide

NotifySync 4.7. Notify Technology Corporation

White paper. April Security

Bitdefender Mobile Security & Antivirus User's Guide

Juniper Secure Analytics Quick Start Guide


STRM Administration Guide

ipass Open Mobile 2.8.x for Android Quick Start Guide


The purpose of this document is to help you to get started with your ipad to access Lilly resources such as , calendar, Lilly apps and more.

Sophos Mobile Security

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

How to Set Up Your SRX340 Services Gateway

Kaspersky Mobile Security

Studio 5.5. User Manual

TREND MICRO Mobile Security 2.0 for ios Product Guide

Dell OpenManage Mobile Version 1.5 User s Guide (ios)

Network Configuration Example

Partition Splitting. Release Juniper Secure Analytics. Juniper Networks, Inc.

SETTING UP A JSA SERVER

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

STUDIO 7.0 USER MANUAL

Quick Start Guide. Microsoft Windows 7 / Vista / XP / 2000 / 2003 / 2008

Transcription:

Junos Pulse for Google Android User Guide Release 2.1 November 2011 R3 Copyright 2011, Juniper Networks, Inc.

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright 2011, Juniper Networks, Inc. All rights reserved. M11/2/11 ii Copyright 2011, Juniper Networks, Inc.

Table of Contents Downloading and Installing Junos Pulse...1 Available Junos Pulse Features...1 Adding a Secure Connection...2 Connecting...4 Viewing Connection Status...4 Using Security Features...5 Registering Security...5 AntiVirus...8 Malware, Prohibited Application, and Suspicious Application Detection...9 Monitor and Control...15 Back Up Data...15 Security Settings...16 Anti Theft Features...17 Uninstalling or Clearing Data...18 Technical Support...19 Known Issues and Limitations...19 iii

iv

Installing and Using Junos Pulse for Google Android Junos Pulse lets you to access protected network resources from your Google Android device. It also protects your device against viruses and malware, and includes tools to reduce the inherent risks of a lost or stolen device. Additional information for Junos Pulse, including information on supported platforms, can be found at http://www.juniper.net/support/products/pulse/mobile/ Downloading and Installing Junos Pulse Use the following instructions to download and install Junos Pulse software on Google Android devices. Informational Note: The Junos Pulse client is available from the Android Market application store. 1. From your Android device, download the Junos Pulse software directly to the device. Once downloaded, Junos Pulse installs automatically. 2. Once the application has been downloaded and installed, the Junos Pulse icon appears in the applications menu. See Figure 1 on page 1. Figure 1: Junos Pulse in the Applications Menu 3. The first time you start Junos Pulse, the End User License Agreement appears. You must Accept the license to begin using Junos Pulse. Available Junos Pulse Features Your administrator decides which Junos Pulse features are available to you. You may see more features once you establish a connection to your network. (See Adding a Secure Connection on page 2 for instructions.) Junos Pulse can include the following features (see Figure 2 on page 2): Copyright 2011, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1

Connections: Lets you add, edit, and remove corporate network connections. Intranet: Provides Web links configured by your administrator. Email: Launches your email application. Security: Provides access to security features. Status: Lets you view, delete, and email log files, which you might need to do in a troubleshooting operation. The log files show all security incidents, such as virus scan times and viruses discovered. If you have an established VPN connection, you can also view the status of that connection from this screen. About: Provides software version information. Figure 2: Available Features Adding a Secure Connection Junos Pulse uses your device s 3G, 4G, Edge or WiFi connectivity to establish an authenticated connection to a protected network. You can add a connection for each different network to which you connect. This is a secure VPN connection to your corporate network. To define a connection, do the following: 1. Start Junos Pulse. 2. Select Connections (see Figure 2 on page 2). 3. Select Add Connection (see Figure 3 on page 3). 2 Adding a Secure Connection Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Figure 3: Add a Connection 4. Enter the connection properties as follows (see Figure 4 on page 4): Connection name: A descriptive name. URL: The Web address provided by your administrator. Uses Certificate: Select this check box if your administrator has provided you with a digital certificate. If you do not use a certificate, you may have to provide a username and password when you connect. Certificate Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the certificate file. Key Path: This box is available if you selected the Uses Certificate check box. Select Pick to browse to the network key provided by your administrator. 5. Select Create Connection. Your connection is now created and saved. Copyright 2011, Juniper Networks, Inc. Adding a Secure Connection 3

Figure 4: Create a Connection Connecting Once you have configured your connection, select the Connect button (see Figure 2 on page 2). If the Select Connection field does not default to the correct connection, you can select it from the pulldown menu. You may have to enter additional information required by your network when you are establishing a connection. Viewing Connection Status The status of your current connection also appears at the bottom of the Junos Pulse window in the form of an icon. The appearance of the icon indicates whether the connection is active or inactive. Active Connection No Session The active connection icon also appears in the status bar at the top of your device screen. When you close Junos Pulse, that icon remains visible as long as your VPN connection is active. 4 Connecting Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Using Security Features The Junos Pulse Mobile Security Suite provides access to features that protect your device from malware and viruses and it allows you to backup your device s calendar and contact information to a central server. Junos Pulse Mobile Security is an optional feature that is enabled by your administrator. When it is enabled for your device, you must register your device with the Mobile Security Gateway before you can access the security feature set. Registering Security Your administrator can configure security registration for your device as automatic URL registration or as a manual registration process. Automatic URL Registration Automatic URL registration requires you to select a URL provided by your administrator. Once you click the URL, you are prompted to verify that the URL comes from a trusted source. When you click Yes from this prompt, the automated security registration process takes place. To register security features automatically, do the following: 1. Start Junos Pulse. 2. Select the registration URL provided to you by your administrator via email, text message, or Web site. 3. Because the automatic registration changes the security settings on your device, you should verify the validity of the URL. If you are certain the URL is trusted, select Yes when prompted (see Figure 5 on page 6). Copyright 2011, Juniper Networks, Inc. Using Security Features 5

Once you select Yes, your device is automatically registered for security features. Figure 5: Automatic URL Registration Prompt Manual Registration In some cases, manual registration may also require you to select a URL provided by your administrator. Once you select the URL, you are prompted to verify that the URL has comes from a trusted source (see Figure 6 on page 7). When you click Yes in the registration prompt, the manual registration screen appears. The registration screen requires that you to enter information such as a license code provided to you by the administrator. To manually register security, do the following: 1. Start Junos Pulse. 1. Select the URL provided by your administrator via email, text message, or Web site. 2. Verify the URL is trusted and click Yes when prompted. The registration screen appears (see Figure 6 on page 7). 3. Optionally, enter an Email address and Password. (Email and password information is not used at this time.) 4. Specify the License Code provided by your administrator. 5. Your device s phone number appears in the Phone Number box. If the number does not appear, enter it manually including Country Code and Area Code without the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special characters. 6 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android 6. Select Register. Figure 6: Manual URL Registration Prompt and Registration Screen Copyright 2011, Juniper Networks, Inc. Using Security Features 7

Once you ve successfully registered security features, the available features appear (see Figure 7 on page 8) and are now accessible from the Security button (see Figure 2 on page 2). Those features are as follows: AntiVirus (and Malware Detection): Control antivirus activities and detect installed malware. Monitor and Control: View monitoring settings. Backup Data: Back up contacts and calendar information. Security Settings: Set scan intervals. Informational Note: Your administrator can enable or disable security features. Figure 7: Security Features AntiVirus The AntiVirus feature protects your device by scanning all files and scanning secure digital (SD) cards to prevent device infections from malware that may have been stored on the card. To configure and run antivirus features: 1. Start Junos Pulse. 2. Select Security. 3. Select AntiVirus and configure the following (see Figure 8 on page 9): Scan Memory Card on Insert: Scans the memory card for malware and viruses. Select the available button to Enable this feature. Scan application on install: Scans applications you are trying to install for malware. Select the available button to Enable this feature. 8 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Virus Definitions updated on: Definitions are loaded when you register, and they are updated on a schedule set by the administrator. Select Update Now to update definitions manually. Scan all Files and Folders for viruses: Select Start Now to start a complete scan of device data. Select a File or Folder to scan for viruses: You can scan a selected file, folder, or the installed SD card. Click Select to open the component section screen, and choose a scan target. Scan installed applications for malware: Select Start Now to scan applications for malware. View Scan Results: Select Open to view the results of the most recent virus and malware scans. This button takes you to the Scan Results screen described in Scan Results Screen on page 10. View Allowed Suspicious App: Select Open to view the list of applications labeled suspicious that you have allowed. From this screen, you can change your mind and choose to not allow the listed applications. For more information, see page 14. Figure 8: AntiVirus Configuration Malware, Prohibited Application, and Suspicious Application Detection Junos Pulse detects application malware by using blacklists containing known malware and by using heuristics to detect possible suspicious applications. Virus and malware device scans take place at regular intervals determined by your administrator. Copyright 2011, Juniper Networks, Inc. Using Security Features 9

Scans also detect applications that are not in compliant with corporate policies. These are applications that have been prohibited by your network administrator. Scan Results Screen If your administrator has enabled Antivirus for your device, the Scan Results screen lists the viruses, malware, suspicious applications and prohibited applications found on your device. If your device does not have Antivirus enabled, you only see the prohibited applications found on your device. Each available tab displays the files or applications that fall into the corresponding detection category. You can access the Scan Results screen in one of the following ways: From the AntiVirus screen (see Figure 8 on page 9): Click the View Scan Results Open button. From the notification icon: The notification icon is present at the top of the Junos Pulse screen when any viruses or malware are visible in the Scan Results screen. Select the notification when it is present to open the Scan Results screen. From a device scan: When a scan finishes, if any viruses or malware are found, the Scan Results screen displays at the end of the scan. Scan Results Tabs A scan may detect and label an application as any of the following in the Scan Results screen: 10 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Prohibited: This tab (see Figure 9 on page 11) lists the applications installed on your device that have been prohibited by your administrator. To remove a prohibited application, select the radio button beside the application name and click the Uninstall button. If you do not uninstall applications that are prohibited, the notification icon continues to appear at the top of the Junos Pulse screen. Figure 9: Scan Results Prohibited Tab Copyright 2011, Juniper Networks, Inc. Using Security Features 11

Malware: This tab (see Figure 10 on page 12) lists the applications installed on your device that are known to be malware. To remove malware, select the radio button beside the application name and click the Uninstall button. If you do not uninstall applications that are found to be malware, the notification icon continues to appear at the top of the Junos Pulse screen. Figure 10: Scan Results Malware Tab 12 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Suspicious: This tab (see Figure 11 on page 13) lists the applications installed on your device that appear to be suspicious. The suspicious label is applied to an application when a set of heuristics determine that the application may be malware. For suspicious applications, you are given the option of allowing the application or uninstalling it. To allow a suspicious application, select the radio button beside the application name and click the Allow button. You must also click Yes to confirm the Allow action. To uninstall a suspicious application, select the radio button beside the application and click the Uninstall button. If you do not uninstall or allow applications that are found to be suspicious, the notification icon continues to appear at the top of the Junos Pulse screen. Figure 11: Scan Results Suspicious Tab and Allow Prompt Copyright 2011, Juniper Networks, Inc. Using Security Features 13

Allowed Suspicious applications: When you allow a suspicious application, you are provided with a separate screen from which to manage suspicious applications in case you change your mind and want to uninstall an allowed application at a later time (see Figure 12 on page 14). By selecting the check box beside the application name and clicking the Do not allow button, you can move the allowed application back to the Suspicious tab. The allowed applications screen is accessible from the AntiVirus screen View Allowed Suspicious App Open button. (see Figure 8 on page 9). Figure 12: Allowed Suspicious Applications Screen 14 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Viruses: This tab (see Figure 13 on page 15) lists the viruses found during the last scan. It is recommended that you delete viruses when they appear here.to delete the virus from your device, select the check box beside the virus name and click the Delete button. To delete multiple viruses at one time, select the Check All button and then the Delete button. Figure 13: Scan Results Viruses Tab Monitor and Control The Monitor and Control screen lets you view your current Junos Pulse settings as well as events and log files. To use Monitor and Control: 1. Start Junos Pulse. 2. Select Security. 3. Select Monitor and Control (see Figure 7 on page 8). The Monitor and Control screen shows the settings that are currently in effect along with the log file size limit and the event count limit. If the data volume exceeds the specified limits, the data in question is uploaded to the server. Back Up Data Junos Pulse Mobile Security backs up contact and calendar appointment information to a central location. To restore data, you must contact your administrator. The administrator initiates a restore in the form of an SMS command that tells your device to contact the server to retrieve your backup. To back up device data: Copyright 2011, Juniper Networks, Inc. Using Security Features 15

1. Start Junos Pulse. 2. Select Security. 3. Select Backup Data (see Figure 7 on page 8). The backup begins (see Figure 14 on page 16). To restore device data, contact your administrator. Figure 14: Backing Up Data Security Settings Security settings are configured by your administrator, and changes are downloaded to your device. You may change security setting updates and scanning intervals by doing the following: 1. Start Junos Pulse. 2. Select Security. 3. Select Security Settings (see Figure 7 on page 8). 4. Optionally set the following (see Figure 15 on page 17): Update security settings: You can specify how often your device contacts the Junos Pulse server for updated settings. To perform an immediate update, select Update Now. Automatically scan device: This setting is configured by the administrator and you cannot change it. 16 Using Security Features Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Figure 15: Security Settings Anti-Theft Features There are a number of measures that can be taken to protect your device if it is lost or stolen. To activate anti-theft features, contact your administrator. Those features include: Lock Handset, Unlock Handset, Wipe Handset These features perform differently on different Android OS versions as follows: On Android OS 2.2 and higher Lock and Unlock Handset If the Device Administrator function is activated, the only way to unlock the device is to send an unlock command from the server. If the Device Administrator function is not activated, the device can be unlocked when an unlock command is sent from the server or by entering the password configured during manual registration. Emergency Call Button When the device is locked, an Emergency Call button is available from the unlock screen. You can make an emergency call, to 911 for example, when you select this button and enter an emergency number. Wipe Handset If the Device Administrator function is activated, a wipe command sent from the server sets the device back to factory settings. If the Device Administrator function is not activated, no wipe function will take place. On Android OS 2.1 Lock and Unlock Handset Locks the device until such time that an unlock command is sent from the server or by entering the password configured during manual registration. Copyright 2011, Juniper Networks, Inc. Anti Theft Features 17

Emergency Call Button When the device is locked, an Emergency Call button is available from the unlock screen. You can make an emergency call, to 911 for example, when you select this button and enter an emergency number. Wipe Handset Deletes the email, scheduling, contact and task information. Send Backup If this data is not stored on the server, this feature gathers the contact, scheduling and task information from the device and emails it to the email address provided in the registration process. GPS Location If your device is equipped with GPS, your administrator can locate your device. Device location is displayed on the Junos Pulse server. Alarm On and Off Blares a maximum volume alarm sound to locate the device in a nearby location. GPS Theft On and Off Sends GPS updates to the Junos Pulse server on a 2 to 5 minute period to fine-tune GPS location if the device is stolen. SIM Change Includes 2 settings: If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control logging, and locks the device. If the SIM is swapped for another, the device does all the preceding actions, plus checks if the Wipe flag is set, and can wipe sensitive device information automatically. Uninstalling or Clearing Data When you register your device for security features, you are registering with the Junos Pulse Mobile Security Gateway. In some cases, you may need to register your device with a different Junos Pulse Mobile Security Gateway after the initial registration or you may need to clear your devices Junos Pulse settings for another reason. You can accomplish this by uninstalling Junos Pulse or by manually clearing all settings as follows. 1. From the main menu, select Settings > Applications > Manage Applications > Junos Pulse. 2. To uninstall Junos Pulse, select the Uninstall button (see Figure 16 on page 19). or 3. To clear all Junos Pulse data, select the Clear data button. Your administrator provides instructions reregistering Junos Pulse. 18 Uninstalling or Clearing Data Copyright 2011, Juniper Networks, Inc.

Installing and Using Junos Pulse for Google Android Figure 16: Junos Pulse Application Info Screen Technical Support For technical issues, contact your administrator. Known Issues and Limitations Android has limitations in its support for certificates. If you experience the "No cert" error, or if Junos Pulse closes unexpectedly when you try to connect, contact your administrator. Copyright 2011, Juniper Networks, Inc. Technical Support 19

20 Known Issues and Limitations Copyright 2011, Juniper Networks, Inc.

Index A allowed suspicious applications......................9 allowed suspicious applications screen................14 anti-theft features...............................17 alarm on and off...............................18 emergency call button..........................17 GPS location.................................18 GPS theft....................................18 lock handset.................................17 send backup..................................18 sim change..................................18 unlock handset................................17 wipe handset.................................17 antivirus.......................................8 definitions update...............................9 scan file or folder...............................9 view allowed suspicious app.......................9 view scan results...............................9 automatic URL registration..........................5 available features.................................1 B back up data...................................15 C clear data.....................................18 connecting....................................2, 4 add a connection...............................2 certificate....................................3 key.........................................3 status.......................................4 URL.........................................3 D download application..............................1 E emergency call button............................17 EULA..........................................1 I installation.....................................1 L license code.................................... 6 M malware applications............................ 12 malware detection................................ 9 manual registration............................... 6 monitor and control.............................. 15 N notifications icon................................ 10 P prohibited applications........................... 11 R restore data................................... 16 S scan results malware.................................... 12 prohibited................................... 11 prohibited applications.......................... 11 suspicious................................... 13 viruses..................................... 15 scan results screen............................ 9, 10 secure connection................................ 4 security features................................. 5 antivirus..................................... 8 automatic URL registration........................ 5 license code.................................. 6 manual registration............................. 6 register for.................................... 5 security settings................................ 16 suspicious applications........................... 13 allowed..................................... 14 U uninstall...................................... 18 V viruses....................................... 15 Copyright 2011, Juniper Networks, Inc. Index 1

2 Index Copyright 2011, Juniper Networks, Inc.