58
February 2011 Revision 1.0 Release 2.0 Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Protection Center Monitoring and Security Guide Consumer OEM Edition

Junos Pulse Mobile Protection Center

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Junos Pulse Mobile Protection Center

Junos Pulse Mobile Protection CenterMonitoring and Security Guide

Consumer OEM Edition

February 2011

Revision 1.0

Release

2.0

Copyright © 2011, Juniper Networks, Inc.

Page 2: Junos Pulse Mobile Protection Center

ii

.

Junos® Pulse Mobile Protection Center

Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, California 94089408-745-2000www.juniper.net

Copyright © Juniper Networks, Inc.February, 2011

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2010, Juniper Networks, Inc. All rights reserved.

Copyright © 2011, Juniper Networks, Inc.

Page 3: Junos Pulse Mobile Protection Center

Table of Contents

Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

What’s In This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Junos Pulse Mobile Protection Center Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2 Adding Devices to the Junos Pulse Mobile Security Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Configure the Mobile Protection Center for Consumers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 3 Installing Junos Pulse On Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Installation Overview - All Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Android Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

BlackBerry Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Windows Mobile Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

Chapter 4 Using the Mobile Protection Center for Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Home Tab Commands and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Settings Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Handset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Reports Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Alerts Setup Tab Information and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Support/Help Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

Chapter 5 Using Junos Pulse Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Android Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

BlackBerry Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Junos Pulse Mobile Protection Center iii

Page 4: Junos Pulse Mobile Protection Center

:

iv

Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Manual Virus Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

OnDemand Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

File Monitor Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Windows Mobile Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

Antispam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Backup Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Chapter 6 Junos Pulse FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

Junos Pulse FAQs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

Copyright © 2011, Juniper Networks, Inc.

Page 5: Junos Pulse Mobile Protection Center

About This Guide

This guide describes how to create security policies using the Junos® Pulse Mobile

Protection Center and how to install and use Junos Pulse software on supported

smartphones.

Audience

This guide is intended for users who wish to configure controls for smartphone users,

providing security features and access control features.

What’s In This Guide

This guide contains the following chapters:

Chapter 1, “Introduction” on page 1

Chapter 2, “Installing Junos Pulse On Smartphones” on page 3

Chapter 3, “Using the Mobile Protection Center for Controls” on page 13

Chapter 4, “Using Junos Pulse Security” on page 21

Typographical Conventions

Table 1 describes the text conventions used throughout this manual.

Contacting Technical Support

Technical product support is available through the Juniper Networks Technical

AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support

contract,or are covered under warranty, and need post-sales technical support, you

can access our tools and resources online or open a case with JTAC.

Table 1: Typographical Conventions

Convention Description Examples

Bold typeface Indicates buttons, field names, dialog names, and other user interface elements.

Use the Scheduling and Appointment tabs to schedule a meeting.

Plain sans serif typeface

Represents:

URLs, file names, and directories

Example:

URL:Download the JRE application from: http://java.sun.com/j2se/

Italics Identifies:

Terms defined in text

Variable elements

Book names

Examples:

Variable element:Use settings in the Users > Roles > Select Role page to configure roles.

Copyright © 2011, Juniper Networks, Inc. Audience v

Page 6: Junos Pulse Mobile Protection Center

JTAC policies—For a complete understanding of our JTAC procedures and policies,

review the JTAC User Guide located at

http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf .

Product warranties—For product warranty information, visit

http://www.juniper.net/support/warranty/ .

JTAC hours of operation—The JTAC centers have resources available 24 hours a day,

7 days a week, 365 days a year.

vi Contacting Technical Support Copyright © 2011, Juniper Networks, Inc.

Page 7: Junos Pulse Mobile Protection Center

Chapter 1

Introduction

The Junos® Pulse Mobile Protection Center collects data from designated

smartphones and uploads that data to the Mobile Protection Center that is accessible

from the Internet with a username and password. Using the Mobile Protection Center,

you can manage registered smartphones and enable features such as remote wipe in

case the smartphone is lost or stolen. You can also configure email alerts for suspicious

messages received by or sent from the smartphone. In this case, messages containing

customized keywords, such as drugs, alcohol, or messages that originate from, or are

destined to specific addresses, are automatically emailed to you.

Junos Pulse Mobile Protection Center Features

The Junos Pulse Mobile Protection center provides both control and security for

registered smartphones.

Control features include:

Monitor activity on the smartphone.

View pictures taken by the smartphone camera and sent or received via text or email.

View the content of all text messages and email messages.

Automatically receive alerts when keywords are found in messages sent or received.

List all applications and software installed on the smartphone.

Display the location of the smartphone in an online map.

Sound an alarm on the smartphone.

Use GPS to help locate a lost or stolen smartphone. (GPS functionality on Verizon

BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive

GPS Longitude and Latitude coordinates of 0.0, this functionality may have been

blocked by the service provider or the smartphone may be out of range of a satellite.)

Security features include:

Antispam—This feature blocks unwanted text messages and voice calls. This is

beneficial for stopping spam, though also useful for blocking communication from

undesirable sources.

Antivirus—This feature provides real-time protection against malware threats by

automatically scanning smartphones to ensure files are not infected with malware.

The on-demand scanning ability lets you scan selected files and folders to ensure the

smartphone and memory card are clean and protected. The automatic update

capability ensures that the smartphone possesses the latest antivirus signatures.

Backup and restore—This feature lets you backup contact and calendar information.

Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Protection Center Features 1

Page 8: Junos Pulse Mobile Protection Center

Firewall—The firewall security features let you block or allow data traffic to and/or

from your smartphone using rule lists that control traffic based on port number and ip

addresses.

Anti−theft—This set of features includes remote commands you can send to the

smartphone if it is lost or stolen. Those commands include: lock handset, wipe

handset, locate handset, and backup handset.

Note that not all features are available on all platforms. See Table 2 on page 21 for

supported platforms and features.

2 Junos Pulse Mobile Protection Center Features Copyright © 2011, Juniper Networks, Inc.

Page 9: Junos Pulse Mobile Protection Center

Chapter 2

Adding Devices to the Junos Pulse Mobile Security Gateway

Before consumers can use Junos® Pulse, you must perform some preliminary tasks to

prepare the Junos Pulse Mobile Protection Center for consumer use.

Configure the Mobile Protection Center for Consumers

Complete the following tasks so that the consumer can access the Mobile Protection

Center and use the available features.

1. Login to the Junos Pulse Mobile Security Gateway by pointing your browser to the

following URL and entering the credentials provided to you.

https://mss.junospulse.juniper.net

2. Once you are logged in, select the Devices tab.

3. Click Add to open the Add Device dialog

4. Specify the following:

Phone Number—Enter the phone number of the device, including the country

code and area code. For example, 16035551212.

5. Click Save. The gateway uses SMS to send a Junos Pulse software download link

and a Consumer license key to the smartphone.

Informational Note: Service providers may create an API that overrides these

distribution instructions. If so, refer to information from the service provider.

When the smartphone user clicks on the provided URL specific to their smartphone

platform, they download Junos Pulse. They must provide their license key to register

the product and they must create a username and password during this registration for

logging into the Mobile Protection Center.

See the Junos Pulse Mobile Security Gateway Administration Guide for more information.

Copyright © 2011, Juniper Networks, Inc. Configure the Mobile Protection Center for Consumers 1

Page 10: Junos Pulse Mobile Protection Center

2 Configure the Mobile Protection Center for Consumers Copyright © 2011, Juniper Networks, Inc.

Page 11: Junos Pulse Mobile Protection Center

Chapter 3

Installing Junos Pulse On Smartphones

This chapter describes the smartphone installation and registration process for each

supported platform.

Installation Overview - All Platforms

For all supported smartphone platforms, as part of the installation and registration

process, you will do the following:

Download the Junos Pulse Security software to the smartphone.

Register the Junos Pulse application in order to use the web-based Mobile Protection

Center features for configuring and deploying parent control and security features.

Create a username and password on the smartphone as part of the Junos Pulse

installation process. You will use this username (the username is an email address)

and password to login to the Mobile Protection Center over the Internet. Since this

username and password effectively allow you to control and monitor the

smartphone, you should not provide this information to the smartphone user.

Additionally, email alerts are sent to the email address provided as the username.

Therefore, this email address should not belong to the smartphone user.

Android Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

Informational Note: Junos Pulse is supported on Google Android 1.6, 2.1 and 2.2. The

Pulse client is available from the Android application store.

1. Using the Android smartphone’s web browser, download the Junos Pulse software

directly to the device.

2. Once the application has been downloaded, select the application for installation.

3. After selecting the application to install, you are prompted to allow the application

to use network communication and phone call components. Select OK. See

Figure 1 on page 4.

Copyright © 2011, Juniper Networks, Inc. Installation Overview - All Platforms 3

Page 12: Junos Pulse Mobile Protection Center

Figure 1: Allow Pulse to use Network Communications

4. Select the Install button to continue. The installation process may take a couple of

minutes to complete

5. Once the installation completes, you begin the registration process. Select the Pulse application icon from the Application menu.

6. The End User License Agreement appears. You must Accept the license to begin

the registration.

7. In the Registration screen, enter a valid Email account. (This is your email

address.)

8. Create a Password. It must be at least five characters in length.

Email and Password are used to set up your Mobile Protection Center account.

This information should not belong to the smartphone user and you should not

provide this information to the smartphone user.

9. Enter the License Code provided to you.

10. If it is not already entered automatically, enter the Phone Number including the

country code. (Include a “1” if you are in the USA. For example: 16145555555. Add a

“+” and the country code if you are outside of the USA. For example,

+4455555555)

11. Select Register. See Figure 2 on page 5.

4 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 13: Junos Pulse Mobile Protection Center

Installing Junos Pulse On Smartphones

Figure 2: Register Pulse

12. Following a successful registration, the application main window appears and the

following features are viewable. See Figure 3 on page 5.

Antivirus provides scanning functions to protect the smartphone data from

malware.

Monitor and Control reflects the settings you’ve chosen (or their defaults) for

monitoring your mobile activities from the Mobile Protection Center. The default

settings may enable all monitoring features: text messages, calls, email, and

pictures.

Backup Data backs up contact and calendar appointment information to the

Mobile Protection Center from the Android smartphone.

Figure 3: Security Features

Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 5

Page 14: Junos Pulse Mobile Protection Center

See “Android Security Features” on page 21 for Android Junos Pulse feature and

configuration information.

BlackBerry Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

Informational Note: Junos Pulse is supported on BlackBerry version 4.2 and later. The

Pulse client is available from BlackBerry App World.

Informational Note: Make sure data services are enabled on the smartphone so that

it can receive settings and virus definition updates.

1. Using the BlackBerry smartphone’s web browser, download the Junos Pulse

software directly to the device.

2. Open the Junos Pulse application from the Application or Download directory.

3. You are prompted to accept a user agreement in order for installation to proceed.

Use the Menu button to access the menu that lets you agree. Once you select I agree, the installation proceeds. See Figure 4 on page 6.

Figure 4: BlackBerry Pulse License Agreement

4. Next, enter your registration information. First, enter the License Key provided to

you when you purchased the product. Click Next. See Figure 5 on page 6.

Figure 5: Enter Licence Key

5. If your phone number has not been prepopulated in the license window, enter the

Phone number, including the country code. (Include a “1” if you are in the USA. For

example: 16145555555. Add a “+” and the country code if you are outside of the

USA. For example, +4455555555). Click Next.

6 BlackBerry Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 15: Junos Pulse Mobile Protection Center

Installing Junos Pulse On Smartphones

Figure 6: Enter Phone Number

6. Next enter a User and Password. The User is a valid email address and the

password requires a minimum of five characters. For your password, we

recommend that it contain lower case letters and/or numbers and that you avoid

using symbols. These fields are used to set up your Mobile Protection Center

account. Click Next.

Figure 7: Enter User and Password

7. Click Finish in the next window to begin the registration process. See Figure 8 on

page 8. You should see the following progress information.

Registering Device...

Downloading Virus Signatures....

Update Completed Successfully

Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 7

Page 16: Junos Pulse Mobile Protection Center

Figure 8: Finish the Registration Process

8. Following a successful registration, you can run the application by selecting the

Pulse icon from the main Applications folder window.

When you open the application, the following features are viewable: See Figure 9

on page 8.

Antivirus provides scanning functions to protect the smartphone data from

malware.

Backup and Restore functions backup your calendar and contact information to

a central server.

Figure 9: Junos Pulse Features

See “BlackBerry Security Features” on page 31 for BlackBerry Junos Pulse feature and

configuration information.

Windows Mobile Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

Informational Note: Junos Pulse is supported on WIndows Mobile 6.0, 6.1, and 6.5.

The Pulse client is available from the Windows Mobile App store.

1. Using the Windows Mobile smartphone’s web browser, download the Junos Pulse

software directly to the device.

Upon download of the application to the smartphone, the .CAB file will appear in

the smartphone’s Program Files folder.

8 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 17: Junos Pulse Mobile Protection Center

Installing Junos Pulse On Smartphones

2. To initiate the installation, locate the installation .CAB file using File Explorer, accessible from the Start menu.

3. Select the .CAB file and respond to the prompt to specify the desired location for

the application, either Store to device or Store to memory card.

After you install Junos Pulse, you are prompted to reboot the phone in order for the

firewall application to work. Once installed, the Junos Pulse icon appears on the Start menu and in the Programs list.

4. Next, you begin the registration process. Select the Junos Pulse application icon.

5. Next, you must accept the license agreement (see Figure 10 on page 9). Select Accept to move on to the Registration screen.

Figure 10: Junos Pulse LIcense Agreement

6. In the Registration screen, enter the following information (see Figure 11 on

page 10):

Enter your Email address.

Enter your Password and Confirm it. This password must be at least 6

characters in length.

Specify the License Code provided when you purchased the product.

Enter the Phone number, including the country code.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 9

Page 18: Junos Pulse Mobile Protection Center

Figure 11: Windows Mobile Registration

7. To complete the registration, select Register. The registration process may take a

few moments.

8. When the smartphone is registered, a window appears indicating that the device

has registered successfully. Click OK on that window to continue.

9. Following a successful registration, you can run the application by selecting the

Junos Pulse icon from the Programs list.

When you open the application, the following features are viewable (see Figure 12

on page 11):

Connection lets you add, edit, and remove network connections.

Intranet provides Web links configured by a network administrator.

Email launches your email application.

Security provides access to the following security features:

Antispam protects your smartphone from unsolicited calls and SMS spam.

Antivirus provides scanning functions to protect the smartphone data from

malware.

Firewall features let you block or allow data traffic to and/or from

smartphone using rule lists that control traffic based on port number, IP

address, and other options.

Monitor and Control reflects the settings you’ve chosen (or their defaults)

for monitoring your mobile activities from the Mobile Protection Center. The

default settings may enable all monitoring features: text messages, calls,

email, and pictures.

Backup Data backs up contact and calendar appointment information to

the Mobile Protection Center from the smartphone

10 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 19: Junos Pulse Mobile Protection Center

Installing Junos Pulse On Smartphones

Status lets you view, delete, and email Junos Pulse log files, which you might

need to do in a troubleshooting operation. The log files show all security

incidents, such as virus scan times and viruses discovered.

About provides version information for Junos Pulse software.

Figure 12: Junos Pulse Main Screen

See “Windows Mobile Security Features” on page 35 for Windows Mobile Junos Pulse

feature and configuration information.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 11

Page 20: Junos Pulse Mobile Protection Center

12 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 21: Junos Pulse Mobile Protection Center

Chapter 4

Using the Mobile Protection Center for Controls

This chapter describes how to access and use the Junos Pulse Mobile Protection Center

to configure monitoring and security features for registered smartphones.

Overview

Once the Junos Pulse application is installed on the smartphone and you have setup an

email address and password as part of the smartphone installation and registration

process, you can use that email address and password to login to the Mobile Protection

Center. You access the Mobile Protection Center by entering the URL you received from

your service provider.See Figure 13 on page 13.

Figure 13: Mobile Protection Center Login Window

Once you login, the Home tab is displayed. See Figure 14 on page 14. From the Home

tab, you can find tabs for each functional area of the Mobile Protection Center. Those

tabs are as follows:

Home—Provides links to logged messages and calls, found viruses, installed applications, and photos. It also provides recent GPS locations.

Copyright © 2011, Juniper Networks, Inc. Overview 13

Page 22: Junos Pulse Mobile Protection Center

Settings—Configure different user accounts and smartphones you wish to monitor

Reports—Look for certain senders or keywords in a range of messages, based on

dates

Alert Settings—Configure parameters for triggering alerts. (You can also find Alert

status and configure alerts by clicking the Alert button in the upper right hand corner

of the Mobile Protection Center window.)

Figure 14: Home Tab

Home Tab Commands and Events

From the Home tab, you can issue commands and access smartphone events as

follows:

Commands

Click any of the following buttons to send the command in question. When you click a

command button, a window appears asking you to verify the command you have

chosen before it is sent.

Lock Device—Locks the smartphone if the device is lost or stolen, or if you wish to

stop the use of the device for any other reason.

Unlock Device—Unlocks the smartphone.

Locate Device—Sends a command to determine the GPS location of the

smartphone, with the result displayed in a map on the Home tab page.

Backup and Restore—Creates a copy of the contact list, calendar and tasks. This is

useful if a smartphone is lost or stolen.

Wipe Device—Removes personal data from the smartphone such as contacts,

calendar events, notes, call history, message folders, and all data on the SD card.

14 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.

Page 23: Junos Pulse Mobile Protection Center

Using the Mobile Protection Center for Controls

Scream Locate—Allows the smartphone user to audibly locate a misplaced device

within hearing distance, even if the speakers and ringer are muted.

Events

When there are events present for any of the listed categories, a view more button

becomes available. See Figure 14 on page 14. You can delete event category items

(messages, voice calls, etc.) from the Mobile Protection Center when you click view more. In the window that appears, select the check box next to the item you want to

remove and click the Delete button. You can also click the Select All button and then

the Delete button to delete all items within that event category.

Messages—View messages (voice, email, text) received on the smartphone.

Click view more (if present) to view all listed messages. See Figure 15 on page 15.

Voice calls—View voice calls received on the smartphone.

Click view more (if present) to view all listed calls.

Antivirus events—View new antivirus events that have occurred.

Click view more (if present) to view all detected viruses.

New applications—View new applications that have been installed on the

smartphone.

Click view more (if present) to open a new window that lists newly installed

applications. You can remotely uninstall an application by selecting the check box

beside the application and click the Uninstall specific application on the handset

button.

New photos—View new photos stored on the smartphone.

Click view more (if present) to open a new window that displays photos as 20

pictures per screen.

Figure 15: Detected Message Events View More Window

Settings Tab Information and Configuration

From the Settings tab, you can configure Account Management and Handset

Management. See Figure 16 on page 18. For example, you can change the email

address to where alerts are sent.

Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 15

Page 24: Junos Pulse Mobile Protection Center

Account Management

You can remove, edit or add a new email address to a smartphone account.

To add an email address and corresponding password,

1. Select the Settings tab.

2. From the Select phone to view pulldown in the top right corner, select the

smartphone you want to manage.

3. To add a new email address for handset account management, enter the email

address in the Username (email) edit field.

4. Enter the new password in the Password edit field.

5. Click the Add User button.

To remove an address, select it and click Remove Selected.

To edit an address, make your edits in the edit field and click Update Email. It is

important to note that changing this address also changes the login username for the

account.

Handset Management

With Handset Management, you can update specific smartphone monitoring functions,

change the GPS update period, control log file size limits, and determine data wipe

parameters. Note that updates are not received until the smartphone reports in at the

next scheduled time.

To update or change the available settings, do the following,

1. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the smartphone you want to manage.

In the Handset Management column on right side of the window, set the following:

2. Next to Email Monitoring, select the check box to enable this feature for the

selected smartphone.

3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable

messaging monitoring for the selected smartphone.

4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to

enable monitoring of messages containing pictures, video, sound or other

multimedia types for the selected smartphone.

5. Next to Voice Monitoring, select the check box to enable this feature for the

selected smartphone. Voice Monitoring provides a time-stamp for a conversation.

6. Next to Log Event Limit, select an available event limit from the pulldown list. We

recommend that you do not set this limit lower than 25.

7. Next to Log Size Limit, select an available size limit from the pulldown list. We

recommend that you do not set this limit to Off.

16 Settings Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 25: Junos Pulse Mobile Protection Center

Using the Mobile Protection Center for Controls

The Log Event Limit and Log Size Limit work together in that whichever setting is

triggered first is the one that takes effect. The event limit causes the smartphone

to send the specified amount of events (email, voice, SMS, MMS) each as one

combined event when the event limit is achieved. This is preferable to sending

each individual event in real-time. If the smartphone sends or receives a large

number of messages, you should set this limit higher rather than lower. Otherwise,

the smartphone could be constantly sending events to the Mobile Protection

Center which could hinder smartphone performance. The Log Size Limit restricts

the amount monitored data this is sent from the smartphone. The limit that is

achieved first is the one that is used.

8. Next to Image Monitoring, select the check box to enable this feature for the

selected smartphone.

9. Next to Web Image Monitoring, select the check box to enable this feature for the

selected smartphone.

10. Next to GPS Update Period, select an available update time frame from the

pulldown list. With this setting, you can configure GPS updates to occur

automatically every fifteen minutes, 30 minutes, hourly, or daily.

11. Next to Lock on SIM Change, select the check box to enable this feature. With this

feature selected, if the SIM is removed, the smartphone switches on GPS Theft

Mode and Locks the smartphone. You can unlock the smartphone with a username

and password.

12. Next to Wipe on SIM Change, select the check box to enable this feature.This

check box is only available when the Lock on SIM Change check box is enabled.

With this feature selected, if the SIM is swapped for another, the smartphone does

all the Lock on SIM Change actions, plus it removes sensitive smartphone

information.

13. Click the Update button to apply your settings.

Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 17

Page 26: Junos Pulse Mobile Protection Center

Figure 16: Settings Tab

Reports Tab Information and Configuration

You can run customized reports against collected smartphone data by entering criteria

into the fields provided in this window.

To run a customized report, enter report criteria in one or more fields described here.

1. Select the Reports tab. See Figure 17 on page 19.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the smartphone on which you want to run a

report.

3. If you want the report to include sender information, enter the Sender email

address or phone number in the corresponding field. Note that the address or

number you enter must match the sender address or number as it appears in the

Messages display.

4. If you want the report to include recipient information, enter the Recipient email

address or phone number in the corresponding field. Note that the address or

number you enter must match the recipient address or number as it appears in the

Messages display.

5. In the Start Date field, enter a start date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

6. In the End Date field, enter an end date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

7. From the Messages pulldown list, select the type of message for which you are

running this report. Your options are All, SMS, MMS, Email, Voice.

8. In the Keyword Search edit field, enter a keyword or phrase you want to search for

within messages. Messages containing this keyword are used to build your report.

9. Click the Search button to run the report.

18 Reports Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 27: Junos Pulse Mobile Protection Center

Using the Mobile Protection Center for Controls

History

On the right side of the Reports window, there is a History column. Here you can view

the last ten commands sent to the smartphone and their send dates.

Figure 17: Reports Tab

Alerts Setup Tab Information and Configuration

By using unique identifiers, such as keywords or addresses, messages that meet a

defined criteria are identified and viewed by clicking on the Alerts box in the top right

corner of the Mobile Protection Center. Alerts can also be configured to be sent via

email to you; for example, an SMS message that contains the keyword you designate

can be automatically emailed to you.

To configure an alert, do the following.

1. Select the Alert Setup tab. See Figure 18 on page 20.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the smartphone for which you want to

configure an alert.

3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this

word is found in a message sent or received by the smartphone. Click the Add

button. The keyword now appears in the Keyword list in the field below.

4. The Keywords field also has a check box that allows you to use suggested

keywords from the column on the right side of the window. These are keywords

that are often used as shorthand in messages. To use suggested keywords in place

of or in addition to keywords you enter, select the Use Suggested Keywords check

box. When this check box is selected, the Suggested Keywords that are enabled

are used as part of the alert.

Copyright © 2011, Juniper Networks, Inc. Alerts Setup Tab Information and Configuration 19

Page 28: Junos Pulse Mobile Protection Center

You can scroll through the Suggested Keywords list and enable check boxes

besides keywords you want to trigger an alert if found.

5. If you are selecting to Send the event as an Email Message by enabling the check

box in the Sender/Recipient Address field, enter the email address or phone

number to check for alerts. Use this feature to flag any communication with a

particular contact as an alert.

6. From the Select what to do with an event options, you can choose to,

Report the event as an Alert message

Send the event as an Email message

Select one or both check boxes.

7. Click the Update button to enable the alert.

Figure 18: Alert Setup Tab

Support/Help Tab Information and Configuration

If you have questions or need technical support, select the Support/Help tab. Enter the

required information in the available fields and click Submit.

20 Support/Help Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 29: Junos Pulse Mobile Protection Center

Chapter 5

Using Junos Pulse Security

This chapter describes the security features available on each supported smartphone.

Overview

Features such as antivirus, antispam, anti−theft, and backup and restore are available

on smartphones with various local controls. Each smartphone platform supports some

or all of the following features:

Table 2: Platforms and Supported Features

Android Security Features

The following sections describe the Junos Pulse features available for the Android

platform.

Status

Select the Junos Pulse icon in the Applications folder to access the available Pulse

features for your smartphone. Select Status to view and send log files. See Figure 19 on

page 22.

In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs

to delete scanning logs.

In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.

Smartphone Antivirus Antispam Firewall

Backup &

Restore Anti-Theft

Android Yes No No Yes Yes

BlackBerry Yes No No Yes Yes

Window Mobile Yes Yes Yes Yes Yes

Copyright © 2011, Juniper Networks, Inc. Overview 21

Page 30: Junos Pulse Mobile Protection Center

Figure 19: Android Junos Pulse Status Window, Show Logs, and Send Logs

Connect

Junos Pulse uses your smartphone’s 3G, 4G, or WiFi connectivity to establish an

authenticated connection to a protected network.You can add a connection for each

different network you connect to. See Figure 20 on page 23. To define a connection:

1. Select Connections.

2. Select Add Connection and specify the connection properties.

Connection name: A descriptive name.

URL: The Web address provided by an enterprise administrator.

Uses Certificate: Select this check box if your administrator has provided you

with a digital certificate, typically via an email attachment or SMS. If you do not

use a certificate, you must provide a username and password when you connect.

Certificate Path: This box is available if you selected the Uses Certificate check

box. Select Pick to browse to the certificate file.

Key Path: This box is available if you selected the Uses Certificate check box.

Enter the network key provided by your administrator.

3. Select Create Connection.

The status of your current connection appears at the bottom of the window in the

status bar.

22 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 31: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 20: Android Junos Pulse Add and Create Connections

Connections

Select the Junos Pulse icon in the Applications folder to access the available Pulse

features for your smartphone. Select Connections to view current connections and to

add new connections.

Email and Intranet

Once you establish a connection to a protected network, Email and Intranet features

become available. See Figure 21 on page 24. The Email and Intranet settings configured

by the administrator of the protected network to which you are connected are

accessible from the Intranet and Email buttons.

Copyright © 2011, Juniper Networks, Inc. Android Security Features 23

Page 32: Junos Pulse Mobile Protection Center

Figure 21: Android Junos Pulse Main Window

Security

Select the Junos Pulse icon in the Applications folder to access the available Pulse

features for your smartphone. Select Security to view and edit the following features.

See Figure 22 on page 25.

24 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 33: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 22: Android Junos Pulse Security Features

Security Settings

Click Security Settings to update all security settings for the smartphone and to

update virus definitions. See Figure 23 on page 26. The following security settings are

available.

Update security settings

Select a time frame for receiving security setting updates. In addition to virus

definitions, security settings include any changes you make to the smartphone from the

Mobile Protection Center. (Security settings do not include the commands you can

send from the Home tab. Those commands are sent immediately.) From the available

pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day,

Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.

Update Now

Click the Update Now button to immediately trigger a manual update of security

settings.

Automatically Scan Device

Select a time frame for automatic virus scans of the smartphone to occur. From the

available pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours,

Every 1 day, Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.

Copyright © 2011, Juniper Networks, Inc. Android Security Features 25

Page 34: Junos Pulse Mobile Protection Center

Figure 23: Android Junos Pulse Security Settings and Update Intervals

Antivirus

Select the Antivirus security feature to view antivirus controls and log file information.

When you open Antivirus, you see controls that let you perform a virus scan on the

memory card, on the entire device, on only files and folders, and to update virus

signatures.

Available Antivirus controls are as follows.

Scan Memory Card on Insert

This features is either Enabled or Disabled.

Virus Definitions updated on

This field lists the time and date of the last update. Click the Update Now button to

trigger a manual virus definition update.

Scan All Files and Folders for viruses

This field lists the time and date of the last scan. Click the Start Now button to trigger a

manual virus scan of the entire device. A scan of the entire device begins. It may take

several minutes to complete.

26 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 35: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 24: Android Junos Pulse Antivirus Settings

Select a Folder or a File to scan for viruses

Rather than scanning the entire smartphone, you can select specific files or folders to

scan. See Figure 25 on page 28.

To perform a manual antivirus scan of the specified files or folders, do the following.

1. From the Antivirus window, click the Select button beside Select a Folder or a File to scan for viruses. This takes you to a window where you can traverse directories

to locate the file or folder in question.

2. To select a directory or file in the current directory, select the directory or file name.

If the selected folder contains subfolders, its contents are displayed. You can

select subfolders by navigating down a folder path until the desired folder or file is

displayed. To move one directory up, click the Up button.

3. When you are finished selecting the path, click the Scan button to initiate the scan.

Copyright © 2011, Juniper Networks, Inc. Android Security Features 27

Page 36: Junos Pulse Mobile Protection Center

Figure 25: Android Junos Pulse Antivirus Scan Folder or File

Scan installed applications for spyware

Click the Start Now button to trigger an application scan for spyware. If spyware is

found, you are prompted to remove it.

View Scan Results

A scan log keeps track of all scans and scan results, including infected files that may

have been found. Click the Open button to view Spyware and Virus Reports. See

Figure 26 on page 29.

Informational Note: A virus scan scans all public data stored on the device for known

infections. A spyware scan scans all installed applications for known malware.

28 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 37: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 26: Android Junos Pulse View Scan Results

Monitor and Control

Select Monitor and Control to view settings for the smartphone in question that have

been enabled from the Mobile Protection Center. For example, you can see a list of

control, security, or anti−theft features with the word Enabled or Disabled beside them.

GPS update period and log limits are also viewable from this window. See Figure 27 on

page 29.

Figure 27: Android Junos Pulse Monitor and Control

Backup and Restore

You can back up contact and calendar appointment information to the Mobile

Protection Center from the Android smartphone.

To back up smartphone data, do the following.

1. Start the Junos Pulse application.

Copyright © 2011, Juniper Networks, Inc. Android Security Features 29

Page 38: Junos Pulse Mobile Protection Center

2. Select Security.

3. Select Backup Data. The backup begins. You are notified on the smartphone when

the backup is complete. See Figure 28 on page 30.

You can only initiate a restore from the Mobile Protection Center. When you initiate a

restore, an SMS command tells the smartphone to contact the server to retrieve the

backup. See “Commands” on page 14.

Figure 28: Android Junos Pulse Successful Backup Confirmation

Anti-Theft

Anti−theft protections are configured for the smartphone from the Mobile Protection

Center.

Anti−theft features include:

Lock Handset—Locks the smartphone until such time that the unlock command is

sent. If the smartphone is password protected, the smartphone will continue to be

locked even if the proper password is entered.

Unlock Handset—Unlocks the smartphone.

Wipe Handset—Deletes the email, scheduling, contact and task information.

Send Backup—If this data is not stored on the server, this feature gathers the

contact, scheduling and task information and emails it to the email address provided

in the registration process.

GPS Location—If your smartphone is equipped with GPS, you can locate your

smartphone. Smartphone location is displayed in a map on the Home tab.

Alarm On and Off—Blares a maximum volume alarm sound to locate the

smartphone in a nearby location.

GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to

fine-tune GPS location if the smartphone is stolen.

SIM Change—Includes 2 settings:

30 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 39: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &

Control logging, and Locks the smartphone. You can unlock the smartphone with

a username and password.

If the SIM is swapped for another, the smartphone does all the preceding

actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone

information automatically.

BlackBerry Security Features

The following sections describe the Junos Pulse features available for the BlackBerry

platform. When you click the main Junos Pulse icon in the Applications folder, you can

access the following security features:

Antivirus

Select the Antivirus security feature to view antivirus controls and log file information.

When you open Antivirus, you see the following information: See Figure 29 on page 31.

Monitor Status: This reads either Enabled or Disabled. The status is Enabled by

default.

Last Updated: View the date of the latest virus definition update.

Licence Expiration: View license expiration information.

By default, the antivirus feature is configured to scan files as it receives them, via any

file transfer mechanism (such as email, SMS/MMS, or Bluetooth). You can initiate a

manual scan, as well.

Figure 29: BlackBerry Junos Pulse Select Antivirus and View Information

Manual Virus Scan

When you click the Menu button on your BlackBerry from the Antivirus window, the

Scan Now option is available.

1. Select Scan Now to perform a full scan of the smartphone. Selecting Scan Now

takes you to the Scan Options window. See Figure 30 on page 32.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 31

Page 40: Junos Pulse Mobile Protection Center

Figure 30: BlackBerry Junos Pulse Scan Options

2. In Scan Options, the first three items are checked by default to perform a full

smartphone scan. Those are Scan applications, Scan internal files, Scan SD Card.

Select the Menu button and choose Start scan to scan those items.

3. Optionally, exclude the scanning of media files by selecting the Exclude media files check box

4. Optionally, perform a custom scan rather than scanning the entire smartphone by

selecting the Custom Scan check box. When you select Custom Scan, you can

choose files or folders to scan. See Figure 31 on page 32.

Figure 31: BlackBerry Junos Pulse Select Custom Scan

5. Under Custom Scan, highlight an available folder and click the Menu button on

your BlackBerry.

6. Choose Select Folder from the menu. See Figure 32 on page 33. To drill down

further keep repeating these steps until you have reached the file or folder you

want to scan.

32 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.

Page 41: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 32: BlackBerry Junos Pulse Select Custom Scan Folder/File

7. Click the Menu button and select Start scan to scan your selected items.

The scanning progress and the scan results when are displayed when the scan finishes.

Quarantined Files

During a scan, found infected files are automatically quarantined. Quarantining lets you

decide whether or not the infected file should be deleted. When you click the Menu

button on your BlackBerry from the Antivirus Monitor Status window, the Quarantine

list is available.

You can delete quarantined files by clicking the Menu button and selecting Delete.

OnDemand Scan

When you click the Menu button on your BlackBerry from the Antivirus Monitor Status

window, the OnDemand Scan Log option is available.The OnDemand ScanLog shows

the details of scans initiated by the you.

File Monitor Log

When you click the Menu button on your BlackBerry from the Antivirus Monitor Status

window, the File Monitor Log option is available. The FileMonitor log shows

timestamps associated with changes to the file monitor setting.

Backup and Restore

The Backup and Restore feature lets you backup the contacts and calendar events

stored on your smartphone.

To back up data:

1. From the Junos Pulse feature list, select Backup & Restore. The Backup & Restore

screen displays the date of the last backup and the last restore.

2. From the Backup & Restore window, click the Menu button.

3. Select Backup Data from the menu. See Figure 33 on page 34. Your information is

sent to the central server.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 33

Page 42: Junos Pulse Mobile Protection Center

Figure 33: BlackBerry Junos Pulse Backup Smartphone Data

4. When the backup is complete, click OK in the Backup Successful window that

appears.

You can only initiate a restore from the Mobile Protection Center. When you initiate a

restore, an SMS command tells the smartphone to contact the server to retrieve the

backup. See “Commands” on page 14.

Settings

From the main Junos Pulse feature list, you click the BlackBerry Menu button to access

security update settings and general information.

1. When you click the Menu button on your BlackBerry from the main Junos Pulse

features window, the Settings option is available.

2. Select Settings. The Pulse Settings window opens.

3. From the Settings window, the Auto-Update Frequency setting is available. By

default, this is set to 12 hours. You can change this from 1 hour to 1 month to Never

by selecting it and scrolling to update frequency you want.

Figure 34: BlackBerry Junos Pulse Update Settings and Frequency

4. From the Settings window, Connection type is available. If the smartphone is

managed by a corporate BlackBerry management server, your administrator

should let you know which method to use (BIZ or BEZ) for the device connection.

Otherwise, you can use the standard APN connection setting.

Anti-Theft

Anti−theft protections are configured for the smartphone from the Mobile Protection

Center.

Anti−theft features include:

34 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.

Page 43: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Lock Handset—Locks the smartphone until such time that the unlock command is

sent. If the smartphone is password protected, the smartphone will continue to be

locked even if the proper password is entered.

Unlock Handset—Unlocks the smartphone.

Wipe Handset—Deletes the email, scheduling, contact and task information.

Send Backup—If this data is not stored on the server, this feature gathers the

contact, scheduling and task information and emails it to the email address provided

in the registration process.

GPS Location—If your smartphone is equipped with GPS, you can locate your

smartphone. Smartphone location is displayed in a map on the Home tab.

Alarm On and Off—Blares a maximum volume alarm sound to locate the

smartphone in a nearby location.

GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to

fine-tune GPS location if the smartphone is stolen.

SIM Change—Includes 2 settings:

If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &

Control logging, and Locks the smartphone. You can unlock the smartphone with

a username and password.

If the SIM is swapped for another, the smartphone does all the preceding

actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone

information automatically.

Windows Mobile Security Features

When you click the Junos Pulse icon in the Programs folder, you can access the

following features:

Status

Select Status to view and send log files. See Figure 35 on page 36.

In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs

to delete scanning logs.

In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.

Connections

Junos Pulse uses your smartphone’s 3G, 4G, or WiFi connectivity to establish an

authenticated connection to a protected network.You can add a connection for each

different network you connect to. See Figure 35 on page 36. To define a connection:

1. Select Connections.

2. Select Add Connection and specify the connection properties.

Connection name: A descriptive name.

URL: The Web address provided by your network administrator.

3. Select Save.

The status of your current connection appears at the bottom of the window in the

status bar.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 35

Page 44: Junos Pulse Mobile Protection Center

Connect

To connect to a connection that has already been configured, do the following:

1. Select Connect.

2. Enter your Username and Password.

3. Click Sign In.

After your username and password have been accepted, you can access Junos Pulse

features provided through your corporate connection.

Email and Intranet

Once you establish a connection to a protected network, Email and Intranet features

become available. The Email and Intranet settings configured by the administrator of

the protected network to which you are connected are accessible from the Intranet and

Email buttons. See Figure 35 on page 36.

Figure 35: Windows Mobile Junos Pulse Main Window

Security

Select the Junos Pulse icon in the Programs folder to access the available Pulse features for your smartphone. Select Security to view and edit the following features. See Figure 36 on page 37.

36 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 45: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 36: Windows Mobile Junos Pulse Security Features

Security Settings

Click Security Settings to update all security settings for the smartphone and to

update device location. Click Save if you make any changes to these settings. See

Figure 37 on page 38. The following security settings are available.

Update security settings and data

Select a time frame for receiving security setting updates. In addition to virus

definitions, security settings include any changes you make to the smartphone from the

Mobile Protection Center. (Security settings do not include the commands you can

send from the Home tab. Those commands are sent immediately.) From the available

pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day,

Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.

Update

Click the Update button to immediately trigger a manual update of security settings.

Device Location

Select a time frame for automatic reporting of the smartphone location: Never, Every 1

hour, Every 4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1 week, Every 2

weeks, and Every 1 month.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 37

Page 46: Junos Pulse Mobile Protection Center

Figure 37: Windows Mobile Junos Pulse Security Settings

Antivirus

Select the Antivirus security feature to view antivirus controls and log file information.

When you open Antivirus, you see controls that let you perform a virus scan on the

memory card, on the entire device, on only files and folders, and to update virus

signatures.

Available Antivirus controls are as follows.

Antivirus Realtime Protection

Antivirus scanning is either Enabled or Disabled.

Scan Memory Card on Insert

This feature is either Enabled or Disabled.

Virus Definitions updated

This field lists the time and date of the last update. Click the Update Now button to

trigger a manual virus definition update.

Scan All Files and Folders for viruses

This field lists the time and date of the last scan. Click the Start Now button to trigger a

manual virus scan of the entire device. A complete scan may take several minutes to

complete.

Scan Custom Folder for viruses

Lets you scan a selected file, folder, or the installed SD card. Click Start Now to open

the component screen and choose a scan target.

Show Quarantine GUI

Select Show to view files that were quarantined by the antivirus scan.

38 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 47: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 38: Windows Mobile Junos Pulse Antivirus Settings

Antispam

The antispam service protects your smartphone from unsolicited calls and SMS spam.

The antispam menu provides options for creating, customizing, and deleting blacklists

that are used in spam filtering. To configure and run antispam features:

1. Select Antispam and configure the following (see Figure 39 on page 40):

Name: Enter the name of the of the person from whom you want calls or

messages blocked.

Number: Enter the number from which you want calls or messages blocked.

Block Calls from this number: Select this check box to block voice calls

originating from the number you entered.

Block SMS messages from this number: Select this check box to block SMS

messages originating from the number you entered.

2. Select Choose from Contacts if you want to use a number from your contact list.

3. Select Save.

Informational Note: Click Add from the Antispam window to add additional numbers

for blocking.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 39

Page 48: Junos Pulse Mobile Protection Center

Figure 39: Windows Mobile Junos Pulse Antispam Settings

Once you enter at least one number into the antispam feature, the Antispam window

changes to allow for adding additional numbers. You can also select to Enable Shortcode Blocking in the Antispam window after you have at least one entry. See

Figure 40 on page 41.

Shortcode blocking is not specific to any entries you add. It blocks all calls from short

codes. Short codes are special telephone numbers that are significantly shorter, five or

fewer digits. Short codes are often used for marketing or promotions and therefore you

may want to block them.

40 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 49: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 40: Windows Mobile Junos Pulse Antispam Shortcode Blocking

Informational Note: You must have at least one number configured for blocking in

order to see the features displayed in the Antispam window in Figure 40 on page 41.

Firewall

The firewall security features let you block or allow data traffic to and/or from the

device using rule lists that control traffic based on port number, IP address, and other

options.To configure firewall features, do the following:

1. Select Firewall and configure the following (see Figure 41 on page 42):

Security Level: Select a security level from the pulldown list. When you select a

level, firewall rules that correspond to that level are added to your active rule list.

You can set the security level as follows.

Low: to block specified items

High: to allow data traffic on only allowed ports and addresses

Off: for no firewall protection

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 41

Page 50: Junos Pulse Mobile Protection Center

Figure 41: Windows Mobile Junos Pulse Main Firewall Window

2. Click the New button to add a new rule to your active firewall rule list. See Figure 42

on page 43. You configure rules to add entries to be blocked or to be allowed.

3. To create a new firewall rule, configure the following:

Select the check box to Enable the rule. You can create a rule and leave it

disabled with the possibility of using it later.

Enter a Description of the rule

Select Block or Allow from the pulldown list.

Select Inbound Traffic or Outbound Traffic from the pulldown list.

You can create this rule to allow/block All IP addresses, Specific IP addresses or

a Range of IP addresses.

If you select specific IPs or a range of IPs enter that information in the IP address

fields provided. (Note that you can use a wildcard entry (*) to indicate blocking

of everything within octet in question.)

You can create this rule to allow/block port addresses. Select To a Range of Ports and enter that port information in the From and To fields provided or

select All Ports.

4. Click Save.

42 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 51: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 42: Windows Mobile Junos Pulse FIrewall Rule Window

When your rule is saved, it appears in the rule list. See Figure 43 on page 43.

Figure 43: Windows Mobile Junos Pulse FIrewall Rule List Window

Informational Note: Select a rule in the rule list and use the Edit and Delete buttons

to make changes to the existing rule and to delete rules from the rule list.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 43

Page 52: Junos Pulse Mobile Protection Center

Monitor and Control

Select Monitor and Control to view settings for the smartphone that have been

enabled from the Mobile Protection Center. For example, you can see a list of control,

security, or anti−theft features with the word Enabled or Disabled beside them. GPS

update period and log limits are also viewable from this window. See Figure 44 on

page 44.

Figure 44: Windows Mobile Junos Pulse Monitor and Control

Backup Data

You can back up contact and calendar appointment information to the Mobile

Protection Center from the Windows Mobile smartphone.

To back up smartphone data, do the following.

1. Select Backup Data.

2. In the Backup Data window, click Backup Contacts and Calendar. A prompt

appears asking you to confirm that you want to start a backup. Click Yes. The

backup begins. You are notified on the smartphone when the backup is complete.

See Figure 45 on page 45.

44 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 53: Junos Pulse Mobile Protection Center

Using Junos Pulse Security

Figure 45: Windows Mobile Junos Pulse Backup Data and Confirm

You can only initiate a restore from the Mobile Protection Center. When you initiate a

restore, an SMS command tells the smartphone to contact the server to retrieve the

backup. See “Commands” on page 14.

Anti-Theft

Anti−theft protections are configured for the smartphone from the Mobile Protection

Center.

Anti−theft features include:

Lock Handset—Locks the smartphone until such time that the unlock command is

sent. If the smartphone is password protected, the smartphone will continue to be

locked even if the proper password is entered.

Unlock Handset—Unlocks the smartphone.

Wipe Handset—Deletes the email, scheduling, contact and task information.

Send Backup—If this data is not stored on the server, this feature gathers the

contact, scheduling and task information and emails it to the email address provided

in the registration process.

GPS Location—If your BlackBerry is equipped with GPS, you can locate your

smartphone. Smartphone location is displayed in a map on the Home tab.

Alarm On and Off—Blares a maximum volume alarm sound to locate the

smartphone in a nearby location.

GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to

fine-tune GPS location if the smartphone is stolen.

SIM Change−—Includes 2 settings:

If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &

Control logging, and Locks the smartphone. You can unlock the handset with a

username and password.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 45

Page 54: Junos Pulse Mobile Protection Center

If the SIM is swapped for another, the smartphone does all the preceding

actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone

information automatically.

46 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.

Page 55: Junos Pulse Mobile Protection Center

Chapter 6

Junos Pulse FAQ

This chapter provides answers to commonly asked questions.

Junos Pulse FAQs

I do not want the smartphone user to see the Junos Pulse application on his/her device. Can I hide it?

We are aware that on some devices icons can be hidden from view, but you cannot hide

the Pulse application. In addition control and monitoring, Junos Pulse provides security

features that require end user access for configuration.

What happens if the smartphone user modifies the Junos Pulse settings on the device?

Depending on the modification made, the modification may not display on the Mobile

Protection Center. For example, if the smartphone user uninstalls Junos Pulse from the

device, this event is not displayed in the Mobile Protection Center. You will simply

notice an absence of events.

Why would my GPS coordinates be inaccurate?

There could be several reasons for this inaccuracy. First, confirm that you have a GPS

enabled smartphone and that GPS is a part of your carrier's data plan. If you do not

have GPS functionality as a part of your network service, the GPS feature will not work.

Also, check the GPS feature on the smartphone to make sure there are no restrictions

and that all features are set to enabled. Calibrate your location with the device through

Google maps from a location with good carrier signal strength. The premier location for

testing is outdoors. GPS can also be gathered via satellite or network, with varying

degrees of accuracy.

What does it mean when the GPS coordinates are 0.0?

Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that

this feature is blocked by the carrier for use by 3rd party applications. (Note that we

cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1

devices.)

Copyright © 2011, Juniper Networks, Inc. Junos Pulse FAQs 47

Page 56: Junos Pulse Mobile Protection Center

How long does it take for the Mobile Protection Center to update with the smartphone user’s activities?

This is configurable from the Mobile Protection Center. See “Handset Management” on

page 16 for information and guidelines. (Note that if the smartphone user sends and

receives a high volume of texts, sending these texts to the Mobile Protection Center in

real-time is not advised.)

Can I use Junos Pulse to monitor or block URLs?

No, Junos Pulse does not provide that functionality at this time.

How many smartphones can I monitor using the Mobile Protection Center?

There is no limit to the number of smartphones you can monitor on an account. To add

a new smartphone to the account, you must first download the software to the

additional device. Once the smartphone registers withe Mobile Protection Center, you

can monitor it.

I want to monitor several smartphones, but each smartphone uses a different carrier.

The carrier does not matter. As long as the smartphone is running a supported

operating system: Android, BlackBerry, Symbian, and Windows Mobile, you can use

Junos Pulse.

48 Junos Pulse FAQs Copyright © 2011, Juniper Networks, Inc.

Page 57: Junos Pulse Mobile Protection Center

Index

A

Account management . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Android

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23license code, registration . . . . . . . . . . . . . . . . . . . . . . . . . .4monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .29security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 37

Anti-Theft

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

Antivirus

custom scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32file monitor log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33full scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31ondemand scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33quarantined files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33settings for Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . .26settings for BlackBerry . . . . . . . . . . . . . . . . . . . . . . .31, 34settings for Windows Mobile . . . . . . . . . . . . . . . . . . . . . .38signature updates. . . . . . . . . . . . . . . . . . . . . . . . . . .26, 38

antivirus events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15

B

Backup and Restore

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44

Backup and restore, Mobile Protection Center . . . . . . . . . . . .14BlackBerry

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31auto-update frequency . . . . . . . . . . . . . . . . . . . . . . . . . .34connection type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Blackberry

backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

C

Connection

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

E

email and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 7email monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

F

Features

by platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21features

control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Firewall

Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

G

GPS update period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

H

Handset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16History

commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

I

Image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17installation

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

K

Keywords, messaging shorthand. . . . . . . . . . . . . . . . . . . . . 19

L

Lock handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Lock on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Copyright © 2011, Juniper Networks, Inc. 49

Page 58: Junos Pulse Mobile Protection Center

50

Product Rev# Book Title

Log event limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Log size limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

M

MMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Mobile Protection Center

account management . . . . . . . . . . . . . . . . . . . . . . . . . . 16alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19handset management . . . . . . . . . . . . . . . . . . . . . . . . . . 16overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Monitor and Control

Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

R

registration

Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

S

Scream Locate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15security features

Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Shortcode blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40SMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

U

Unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14username/password change . . . . . . . . . . . . . . . . . . . . . . . 16

V

view more

events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Voice monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

W

Web image monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Windows Mobile

.CAB file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9antispam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38backup data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Wipe on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

Copyright © 2011, Juniper Networks, Inc.