Post on 13-Apr-2022
Junos Pulse Mobile Security Dashboard
Administration Guide
December 2011
R2
Release
3.0
Copyright © 2011, Juniper Networks, Inc.
ii
.
Junos® Pulse Mobile Security Dashboard
Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, California 94089408-745-2000www.juniper.net
Copyright © Juniper Networks, Inc.December, 2011
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2011, Juniper Networks, Inc. All rights reserved.
Copyright © 2011, Juniper Networks, Inc.
Table of Contents
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
What’s In This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Junos Pulse Mobile Security Dashboard Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2 Adding Devices to the Junos Pulse Mobile Security Dashboard (for Service Providers) . . . . . . . . . . 1
Configure the Junos Pulse Mobile Security Dashboard for Consumers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 3 Installing and Registering Junos Pulse On Mobile Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Installation Overview - All Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Android Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Automatic URL Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
BlackBerry Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Automatic Registration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Available Junos Pulse Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
iOS Installation and Registration Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Windows Mobile Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Chapter 4 Using the Mobile Security Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Home Tab Commands and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Commands for iOS Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Events for iOS Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Settings Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Handset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Reports Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Alerts Setup Tab Information and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Support/Help Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Chapter 5 Using Junos Pulse on Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Android Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
Adding a Secure Connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Junos Pulse Mobile Protection Center iii
:
iv
Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Viewing Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Viewing Connection Status Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Using Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Automatic URL Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
AntiVirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Malware, Prohibited Application, and Suspicious Application Detection . . . . . . . . . . . . . . . . . . . . 42
Scan Results Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Scan Results Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Back Up Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Anti−Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Uninstalling or Clearing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
BlackBerry Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Manual Virus Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
OnDemand Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
File Monitor Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Anti-Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
iOS Security Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Connecting with Junos Pulse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Adding a Secure Connection Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Viewing Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Windows Mobile Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Using Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Antispam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Backup Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Anti-Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Chapter 6 Junos Pulse FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Junos Pulse FAQs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
Copyright © 2011, Juniper Networks, Inc.
About This Guide
This guide describes how to create security policies using the Junos® Pulse Mobile
Security Dashboard and how to install and use Junos Pulse software on supported
devices.
Audience
This guide is intended for users who wish to configure controls for device users,
providing security features and access control features.
What’s In This Guide
This guide contains the following chapters:
Chapter 1, “Introduction” on page 1
Chapter 2, “Installing and Registering Junos Pulse On Mobile Devices” on page 3
Chapter 3, “Using the Mobile Security Dashboard” on page 21
Chapter 4, “Using Junos Pulse on Mobile Devices” on page 31
Typographical Conventions
Table 1 describes the text conventions used throughout this manual.
Contacting Technical Support
Technical product support is available through the Juniper Networks Technical
AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support
contract,or are covered under warranty, and need post-sales technical support, you
can access our tools and resources online or open a case with JTAC.
Table 1: Typographical Conventions
Convention Description Examples
Bold typeface Indicates buttons, field names, dialog names, and other user interface elements.
Use the Scheduling and Appointment tabs to schedule a meeting.
Plain sans serif typeface
Represents:
URLs, file names, and directories
Example:
URL:Download the JRE application from: http://java.sun.com/j2se/
Italics Identifies:
Terms defined in text
Variable elements
Book names
Examples:
Variable element:Use settings in the Users > Roles > Select Role page to configure roles.
Copyright © 2011, Juniper Networks, Inc. Audience v
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.
Product warranties—For product warranty information, visit
http://www.juniper.net/support/warranty/.
JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
vi Contacting Technical Support Copyright © 2011, Juniper Networks, Inc.
Chapter 1
Introduction
The Junos® Pulse Mobile Security Dashboard collects data from designated mobile
devices and uploads that data to the dashboard that is accessible from the Internet
with a username and password. Using the Junos Pulse Mobile Security Dashboard, you
can manage registered mobile devices and enable features such as remote wipe in
case a device is lost or stolen. You can also configure email alerts for suspicious
messages received by or sent from the device. In this case, messages containing
customized keywords, such as drugs, alcohol, or messages that originate from, or are
destined to specific addresses, are automatically emailed to you.
Junos Pulse Mobile Security Dashboard Features
The Junos Pulse Mobile Security Dashboard provides both control and security for
registered mobile devices.
Control features include:
Monitor activity on the device.
View pictures taken by the device camera and sent or received via text or email.
View the content of all text messages and email messages.
Automatically receive alerts when keywords are found in messages sent or received.
List all applications and software installed on the device.
Display the location of the device in an online map.
Sound an alarm on the device.
Use GPS to help locate a lost or stolen device. (GPS functionality on Verizon
BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive
GPS Longitude and Latitude coordinates of 0.0, this functionality may have been
blocked by the service provider or the device may be out of range of a satellite.)
Security features include:
Antivirus—This feature provides real-time protection against malware threats by
automatically scanning devices to ensure files are not infected with malware. The
on-demand scanning ability lets you scan selected files and folders to ensure the
device and memory card are clean and protected. The automatic update capability
ensures that the device possesses the latest antivirus signatures.
Backup and restore—This feature lets you backup contact and calendar information.
Firewall—The firewall security features let you block or allow data traffic to and/or
from your device using rule lists that control traffic based on port number and ip
addresses.
Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard Features 1
Anti−theft—This set of features includes remote commands you can send to the
device if it is lost or stolen. Those commands include: lock device, wipe device, locate
device, and backup device.
2 Junos Pulse Mobile Security Dashboard Features Copyright © 2011, Juniper Networks, Inc.
Chapter 2
Adding Devices to the Junos Pulse Mobile Security Dashboard (for Service Providers)
Before consumers can use Junos® Pulse, you must perform some preliminary tasks to
prepare the Junos Pulse Mobile Security Dashboard for consumer use.
Configure the Junos Pulse Mobile Security Dashboard for Consumers
Complete the following tasks so that the consumer can access the dashboard and use
the available features.
1. Login to the Junos Pulse Mobile Security Dashboard by pointing your browser to
the following URL and entering the credentials provided to you.
https://mss.junospulse.juniper.net
2. Once you are logged in, select the Devices tab.
3. Click Add to open the Add Device dialog
4. Specify the following:
Phone Number—Enter the phone number of the device, including the country
code and area code. For example, 16035551212.
5. Click Save. The gateway uses SMS to send a Junos Pulse software download link
and a Consumer license key to the device.
Informational Note: Service providers may create an API that overrides these
distribution instructions. If so, refer to information from the service provider.
When the user clicks on the provided URL specific to their device platform, they
download Junos Pulse. They must provide their license key to register the product and
they must create a username and password during this registration for logging into the
Mobile Security Dashboard.
See the Junos Pulse Mobile Security Gateway Administration Guide for more information.
Copyright © 2011, Juniper Networks, Inc. Configure the Junos Pulse Mobile Security Dashboard for Consumers 1
2 Configure the Junos Pulse Mobile Security Dashboard for Consumers Copyright © 2011, Juniper Networks, Inc.
Chapter 3
Installing and Registering Junos Pulse On Mobile Devices
This chapter describes the Junos Pulse installation and registration process for each
supported platform.
Installation Overview - All Platforms
For all supported mobile platforms, as part of the installation and registration process,
you will do the following:
Download the Junos Pulse Security software to the mobile device.
Register the Junos Pulse application in order to use the web-based Mobile Security
Dashboard features for configuring and deploying monitor, control and security
features.
Create a username and password on the device as part of the Junos Pulse
installation process. You will use this username (the username is an email address)
and password to login to the Mobile Security Dashboard over the Internet. Since this
username and password effectively allow you to control and monitor the device, you
should not provide this information to the device user. Additionally, email alerts are
sent to the email address provided as the username. Therefore, this email address
should not belong to the device user.
Android Installation and Registration Instructions
Use the following instructions to download and install Junos Pulse software on Google
Android devices.
Informational Note: The Junos Pulse client is available from the Android Market
application store.
1. From your Android device, download the Junos Pulse software directly to the
device. Once downloaded, Junos Pulse installs automatically.
2. During installation, you are prompted to allow the application to use network
communication and phone call components. Select OK. See Figure 1 on page 4.
Copyright © 2011, Juniper Networks, Inc. Installation Overview - All Platforms 3
Figure 1: Allow Pulse to use Network Communications
Once the application has been downloaded and installed, the Junos Pulse icon appears
in the applications menu. See Figure 2 on page 4.
Figure 2: Junos Pulse in the Applications Menu
The first time you start Junos Pulse, the End User License Agreement appears. You must Accept the license to begin using Junos Pulse.
Registering Security
Your administrator can configure security registration for your device as automatic URL
registration or as a manual registration process.
Automatic URL Registration
Automatic URL registration requires you to select a URL provided by your administrator.
Once you click the URL, you are prompted to verify that the URL comes from a trusted
source. When you click Yes from this prompt, the automated security registration
process takes place.
To register security features automatically, do the following:
1. Start Junos Pulse.
4 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
2. Select the registration URL provided to you by your administrator via email, text
message, or Web site.
3. Because the automatic registration changes the security settings on your device,
you should verify the validity of the URL. If you are certain the URL is trusted, select
Yes when prompted (see Figure 3 on page 5).
Once you select Yes, your device is automatically registered for security features.
Figure 3: Automatic URL Registration Prompt
Manual Registration
In some cases, manual registration may also require you to select a URL provided by
your administrator. Once you select the URL, you are prompted to verify that the URL
has comes from a trusted source (see Figure 4 on page 6). When you click Yes in the
registration prompt, the manual registration screen appears.
The registration screen requires that you to enter information such as a license code
provided to you by the administrator.
Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no
cellular service), the phone number field does not appear in the registration window.
See Figure 5 on page 7.
To manually register security, do the following:
1. Start Junos Pulse.
1. Select the URL provided by your administrator via email, text message, or Web site.
2. Verify the URL is trusted and click Yes when prompted. The registration screen
appears (see Figure 4 on page 6).
Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 5
3. Optionally, enter an Email address and Password. (Email and password
information is not used at this time.)
4. Specify the License Code provided by your administrator.
5. Your device’s phone number appears in the Phone Number box. If the number
does not appear, enter it manually including Country Code and Area Code without
the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or
special characters. Valid phone numbers are between 11 and 15 digits (including
country code)
6. Select Register.
Figure 4: Manual URL Registration Prompt and Registration Screen
6 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
Figure 5: WIFI only Device Manual Registration Example
Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 7
Once you’ve successfully registered security features, the available features appear
(see Figure 6 on page 8) and are now accessible from the Security button (see Figure 7
on page 9). Those features are as follows:
AntiVirus (and Malware Detection): Control antivirus activities and detect installed
malware.
Monitor and Control: View monitoring settings.
Backup Data: Back up contacts and calendar information.
Security Settings: Set scan intervals.
Your administrator can enable or disable security features.
Figure 6: Available Features
8 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
Figure 7: Security Features
See “Android Security Features” on page 31 for Android Junos Pulse feature and
configuration information.
BlackBerry Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
Informational Note: Make sure data services are enabled on the device so that it can
receive settings and virus definition updates.
1. Using the BlackBerry device’s web browser, download the Junos Pulse software
directly to the device.
2. Open the Junos Pulse application from the Application or Download directory.
3. You are prompted to accept a user agreement in order for installation to proceed.
Use the Menu button to access the menu that lets you agree. Once you select I agree, the installation and registration proceeds. See Figure 8 on page 10.
Registering Security
Once you agree to EULA, you must register for security features. Your administrator
configures what type of registration your device requires: automatic registration or
manual registration.
Automatic Registration
If you are registering automatically for security features, once you accept the EULA, the
registration process starts immediately with no user prompts. See Figure 8 on page 10.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 9
Figure 8: Auto Registration
Manual Registration
If you are registering manually for security features, once you accept the EULA, you are
prompted to do the following:
1. Enter an Email address and Password. (User and password information is not
used at this time.) See Figure 9 on page 11.
2. Re-enter your password in the Confirm Password field.
3. Enter the License Code provided by your administrator.
4. Enter your Phone Number and click Finish. In some cases, this field is
prepopulated. If the number does not appear, enter it manually including Country
Code and Area Code without the international dialing prefixes: '00' or '+'. Do not
use spaces, parentheses, or special characters.
10 BlackBerry Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
Figure 9: Manual Registration
Once the application is installed and registered, the Junos Pulse icon appears in the
Applications folder.
Available Junos Pulse Features
Your administrator decides which Junos Pulse features are available to you.
Junos Pulse can include the following features (see Figure 6 on page 8):
AntiVirus (and Malware Detection): Controls antivirus activities and detects
installed malware.
Monitor and Control: View monitoring settings.
Backup and Restore Data: Backup contacts and calendar information.
Figure 10: Junos Pulse Features
Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 11
See “BlackBerry Security Features” on page 51 for BlackBerry Junos Pulse feature and
configuration information.
iOS Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
Junos Pulse VPN features and Junos Pulse security features are available through the
Junos Pulse app, which is available from the Apple App Store. The security features are
available only after you register your iOS device.
1. Downloading and installing Junos Pulse is the same as installing any iOS app. You
can download Junos Pulse and import it into iTunes in order to install it on your iOS
device. Once you install Junos Pulse, do the following to automatically register
Junos Pulse and begin using VPN and security features.
2. After the application has been downloaded and installed, browse to the
registration URL provided by your administrator in an email or in a text message.
3. Clicking the registration URL brings up the Junos Pulse EULA agreement. Tap
Accept to continue. See Figure 11 on page 12.
Figure 11: Accept EULA
4. Next, you are prompted to Enable Junos Pulse. Tap the Enable button to continue.
See Figure 12 on page 13.
12 iOS Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
Figure 12: Enable Junos Pulse
5. You are next prompted to register for security features. Tap Yes to register your iOS
device for Junos Pulse security features. See Figure 13 on page 13.
Informational Note: If you have previously registered Junos Pulse using this device,
you must delete the old security profile before you can register for a new security
profile.
Figure 13: Register Security
6. Once Junos Pulse is enabled, you are prompted to install the Junos Pulse security
profile. Tap the Install button. See Figure 14 on page 14.
Copyright © 2011, Juniper Networks, Inc. iOS Installation and Registration Instructions 13
Figure 14: Install Profile
7. A screen appears informing you that installing this profile allows your administrator
to remotely control and access certain aspects of your device. This is necessary to
provide security features such as remote lock and remote wipe. Tap the Install button to continue. See Figure 15 on page 14.
Figure 15: Install Profile Warning
14 iOS Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
8. A screen displays informing you that the security profile has installed successfully.
See Figure 16 on page 15. Security features are now in place for your iOS device.
Figure 16: Profile Installed Successfully
9. When you relaunch Junos Pulse, if your administrator has configured GPS location
tracking services for your device, you are prompted to permit GPS location tracking
using your current location. Click OK to allow this service. Click Don’t Allow to
decline. See Figure 17 on page 15.
Figure 17: Allow GPS Tracking
Copyright © 2011, Juniper Networks, Inc. iOS Installation and Registration Instructions 15
Informational Note: If your iOS device does not have Location Services turned on, the
following prompt appears (see Figure 18 on page 16):
Figure 18: Turn On Location Services
Informational Note: Tap the Settings button (see Figure 18 on page 16) to go to the
Location Services screen where you can turn the service on. You must then relaunch
Junos Pulse to enable the GPS tracking report.
Caution: Once you select Don’t Allow or OK for GPS location services, your selection is
remembered if you uninstall and reinstall Junos Pulse. You are not prompted again and
your previous selection is used. If you want to reset this feature to change your
selection, on your iOS device, navigate to Settings > General > Reset Location
Warnings. This resets all of the location warnings for all your applications.
Windows Mobile Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
1. Using the Windows Mobile device’s web browser, download the Junos Pulse
software directly to the device.
Upon download of the application to the device, the .CAB file will appear in the
device’s Program Files folder.
2. To initiate the installation, locate the installation .CAB file using File Explorer, accessible from the Start menu.
3. Select the .CAB file and respond to the prompt to specify the desired location for
the application, either Store to device or Store to memory card.
After you install Junos Pulse, you are prompted to reboot the phone in order for the
firewall application to work. Once installed, the Junos Pulse icon appears on the Start menu and in the Programs list.
4. Next, you begin the registration process. Select the Junos Pulse application icon.
16 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
5. Next, you must accept the license agreement (see Figure 19 on page 17). Select Accept to move on to the Registration screen.
Figure 19: Junos Pulse LIcense Agreement
6. In the Registration screen, enter the following information (see Figure 20 on
page 18):
Enter your Email address.
Enter your Password and Confirm it. This password must be at least 6
characters in length.
Specify the License Code provided when you purchased the product.
Enter the Phone number, including the country code.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 17
Figure 20: Windows Mobile Registration
7. To complete the registration, select Register. The registration process may take a
few moments.
8. When the device is registered, a window appears indicating that the device has
registered successfully. Click OK on that window to continue.
9. Following a successful registration, you can run the application by selecting the
Junos Pulse icon from the Programs list.
When you open the application, the following features are viewable (see Figure 21
on page 19):
Connection lets you add, edit, and remove network connections.
Intranet provides Web links configured by a network administrator.
Email launches your email application.
Security provides access to the following security features:
Antispam protects your device from unsolicited calls and SMS spam.
Antivirus provides scanning functions to protect the device data from
malware.
Firewall features let you block or allow data traffic to and/or from the device
using rule lists that control traffic based on port number, IP address, and
other options.
Monitor and Control reflects the settings you’ve chosen (or their defaults)
for monitoring your mobile activities from the dashboard. The default
settings may enable all monitoring features: text messages, calls, email, and
pictures.
Backup Data backs up contact and calendar appointment information to
the dashboard from the device.
18 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing and Registering Junos Pulse On Mobile Devices
Status lets you view, delete, and email Junos Pulse log files, which you might
need to do in a troubleshooting operation. The log files show all security
incidents, such as virus scan times and viruses discovered.
About provides version information for Junos Pulse software.
Figure 21: Junos Pulse Main Screen
See “Windows Mobile Security Features” on page 51 for Windows Mobile Junos Pulse
feature and configuration information.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 19
20 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Chapter 4
Using the Mobile Security Dashboard
This chapter describes how to access and use the Junos Pulse Mobile Security
Dashboard to configure monitoring and security features for registered devices.
Overview
Once the Junos Pulse application is installed on the device and you have setup an email
address and password as part of the device installation and registration process, you
can use that email address and password to login to the dashboard. You access the
dashboard by entering the URL you received from your service provider.See Figure 22 on
page 21.
Figure 22: Mobile Security Dashboard Login Window
Once you login, the Home tab is displayed. See Figure 23 on page 22. Next to the Home
tab, you can find tabs for each functional area of the dashboard. Those tabs are as
follows:
Home—Provides links to logged messages and calls, found viruses, installed applications, and photos. It also provides recent GPS locations.
Settings—Configure different user accounts and devices you wish to monitor
Copyright © 2011, Juniper Networks, Inc. Overview 21
Reports—Look for certain senders or keywords in a range of messages, based on
dates
Alert Settings—Configure parameters for triggering alerts. (You can also find Alert
status and configure alerts by clicking the Alert button in the upper right hand corner
of the dashboard window.)
Informational Note: Note that Alert Settings are not available for iOS devices
Figure 23: Home Tab
Home Tab Commands and Events
From the Home tab, you can issue commands and access device events as follows:
Commands
Click any of the following buttons to send the command in question. When you click a
command button, a window appears asking you to verify the command you have
chosen before it is sent.
Informational Note: A different set of commands are available for iOS devices. See
“Commands for iOS Devices” on page 23.
Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of
the device for any other reason.
Unlock Device—Unlocks the device.
Locate Device—Sends a command to determine the GPS location of the device, with
the result displayed in a map on the Home tab page.
Backup and Restore—Creates a copy of the contact and calendar information. This
is useful if a device is lost or stolen.
22 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Security Dashboard
Wipe Device—Removes personal data from the device such as contacts, calendar
events, notes, call history, message folders, and all data on the SD card.
Scream Locate—Allows the device user to audibly locate a misplaced device within
hearing distance, even if the speakers and ringer are muted.
Commands for iOS Devices
For iOS devices, the commands available from the Home tab are as follows (see
Figure 24 on page 23):
Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of
the device for any other reason.
Unlock Device—Unlocks the device.
Retrieve App List—Updates the list of installed applications on the device.
Wipe Device—Sets device back to factory settings.
Informational Note: There are no commands available for iOS devices that do not
have an associated APNS certificate. When no APNS certificate is present, GPS
location is only available feature.
Informational Note: GPS is not supported on the iPod Touch and on iOS devices that
do not have cell service.
Figure 24: Home Tab for iOS Devices
Events
When there are events present for any of the listed categories, a view more button
becomes available. See Figure 23 on page 22. You can delete event category items
(messages, voice calls, etc.) from the dashboard when you click view more. In the
window that appears, select the check box next to the item you want to remove and
click the Delete button. You can also click the Select All button and then the Delete
button to delete all items within that event category.
Copyright © 2011, Juniper Networks, Inc. Home Tab Commands and Events 23
Informational Note: Different events are available for iOS devices. See “Events for
iOS Devices” on page 24.
Messages—View messages (voice, email, text) received on the device.
Click view more (if present) to view all listed messages. See Figure 25 on page 24.
Voice calls—View voice calls received on the device.
Click view more (if present) to view all listed calls.
Anti-Virus events—View new antivirus events that have occurred.
Click view more (if present) to view all detected viruses.
New applications—View new applications that have been installed on the device.
Click view more (if present) to open a new window that lists newly installed
applications. You can remotely uninstall an application by selecting the check box
beside the application and click the Uninstall specific application on the handset
button.
New photos—View new photos stored on the device.
Click view more (if present) to open a new window that displays photos as 20
pictures per screen.
Figure 25: Detected Message Events View More Window
Events for iOS Devices
New applications is the only event available for iOS at this time. Click view more (if
present) to open a new window that lists newly installed applications (see Figure 26 on
page 25).
24 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Security Dashboard
Figure 26: Detected Application Installation Events View More Window
Settings Tab Information and Configuration
From the Settings tab, you can configure Account Management and Handset
Management. See Figure 27 on page 27. For example, you can change the email
address to where alerts are sent.
Account Management
You can remove, edit or add a new email address to a device account.
To add an email address and corresponding password,
1. Select the Settings tab.
2. From the Select phone to view pulldown in the top right corner, select the device
you want to manage.
3. To add a new email address for handset account management, enter the email
address in the Username (email) edit field.
4. Enter the new password in the Password edit field.
5. Click the Add User button.
To remove an address, select it and click Remove Selected.
To edit an address, make your edits in the edit field and click Update Email. It is
important to note that changing this address also changes the login username for the
account.
Handset Management
With Handset Management, you can update specific device monitoring functions,
change the GPS update period, control log file size limits, and determine data wipe
parameters. Note that updates are not received until the device reports in at the next
scheduled time.
Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 25
Informational Note: Handset Management is not available for iOS devices. From the
Settings tab, you can view Handset Information for the selected iOS device such as
phone number, device type, device name and UDID. See Figure 28 on page 27.
To update or change the available settings, do the following,
1. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the device you want to manage.
In the Handset Management column on right side of the window, set the following:
2. Next to Email Monitoring, select the check box to enable this feature for the
selected device.
3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable
messaging monitoring for the selected device.
4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to
enable monitoring of messages containing pictures, video, sound or other
multimedia types for the selected device.
5. Next to Voice Monitoring, select the check box to enable this feature for the
selected device. Voice Monitoring provides a time-stamp for a conversation.
6. Next to Log Event Limit, select an available event limit from the pulldown list. We
recommend that you do not set this limit lower than 25.
7. Next to Log Size Limit, select an available size limit from the pulldown list. We
recommend that you do not set this limit to Off.
The Log Event Limit and Log Size Limit work together in that whichever setting is
triggered first is the one that takes effect. The event limit causes the device to send
the specified amount of events (email, voice, SMS, MMS) each as one combined
event when the event limit is achieved. This is preferable to sending each individual
event in real-time. If the device sends or receives a large number of messages, you
should set this limit higher rather than lower. Otherwise, the device could be
constantly sending events to the dashboard which could hinder device
performance. The Log Size Limit restricts the amount monitored data this is sent
from the device. The limit that is achieved first is the one that is used.
8. Next to Image Monitoring, select the check box to enable this feature for the
selected device.
9. Next to Web Image Monitoring, select the check box to enable this feature for the
selected device.
10. Next to GPS Update Period, select an available update time frame from the
pulldown list. With this setting, you can configure GPS updates to occur
automatically every fifteen minutes, 30 minutes, hourly, or daily.
11. Next to Lock on SIM Change, select the check box to enable this feature. With this
feature selected, if the SIM is removed, the device switches on GPS Theft Mode
and Locks the device. You can unlock the device with a username and password.
12. Next to Wipe on SIM Change, select the check box to enable this feature.This
check box is only available when the Lock on SIM Change check box is enabled.
With this feature selected, if the SIM is swapped for another, the device does all the
Lock on SIM Change actions, plus it removes sensitive device information.
13. Click the Update button to apply your settings.
26 Settings Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Security Dashboard
Figure 27: Settings Tab
Figure 28: Settings Tab for iOS Devices
Reports Tab Information and Configuration
You can run customized reports against collected device data by entering criteria into
the fields provided in this window.
To run a customized report, enter report criteria in one or more fields described here.
1. Select the Reports tab. See Figure 29 on page 28.
2. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the device on which you want to run a report.
Copyright © 2011, Juniper Networks, Inc. Reports Tab Information and Configuration 27
3. If you want the report to include sender information, enter the Sender email
address or phone number in the corresponding field. Note that the address or
number you enter must match the sender address or number as it appears in the
Messages display.
4. If you want the report to include recipient information, enter the Recipient email
address or phone number in the corresponding field. Note that the address or
number you enter must match the recipient address or number as it appears in the
Messages display.
5. In the Start Date field, enter a start date parameter for the report you are creating.
Format the date as Year-Month-Day as in the following example: 2010-11-24.
6. In the End Date field, enter an end date parameter for the report you are creating.
Format the date as Year-Month-Day as in the following example: 2010-11-24.
7. From the Messages pulldown list, select the type of message for which you are
running this report. Your options are All, SMS, MMS, Email, Voice.
8. In the Keyword Search edit field, enter a keyword or phrase you want to search for
within messages. Messages containing this keyword are used to build your report.
9. Click the Search button to run the report.
History
On the right side of the Reports window, there is a History column. Here you can view
the last ten commands sent to the device and their send dates.
Figure 29: Reports Tab
Alerts Setup Tab Information and Configuration
By using unique identifiers, such as keywords or addresses, messages that meet a
defined criteria are identified and viewed by clicking on the Alerts box in the top right
corner of the dashboard. Alerts can also be configured to be sent via email to you; for
example, an SMS message that contains the keyword you designate can be
automatically emailed to you.
28 Alerts Setup Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Security Dashboard
To configure an alert, do the following.
1. Select the Alert Setup tab. See Figure 30 on page 30.
2. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the device for which you want to configure an
alert.
3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this
word is found in a message sent or received by the device. Click the Add button.
The keyword now appears in the Keyword list in the field below.
4. The Keywords field also has a check box that allows you to use suggested
keywords from the column on the right side of the window. These are keywords
that are often used as shorthand in messages. To use suggested keywords in place
of or in addition to keywords you enter, select the Use Suggested Keywords check
box. When this check box is selected, the Suggested Keywords that are enabled
are used as part of the alert.
You can scroll through the Suggested Keywords list and enable check boxes
besides keywords you want to trigger an alert if found.
5. If you are selecting to Send the event as an Email Message by enabling the check
box in the Sender/Recipient Address field, enter the email address or phone
number to check for alerts. Use this feature to flag any communication with a
particular contact as an alert.
6. From the Select what to do with an event options, you can choose to,
Report the event as an Alert message
Send the event as an Email message
Select one or both check boxes.
7. Click the Update button to enable the alert.
Copyright © 2011, Juniper Networks, Inc. Alerts Setup Tab Information and Configuration 29
Figure 30: Alert Setup Tab
Support/Help Tab Information and Configuration
If you have questions or need technical support, select the Support/Help tab. Enter the
required information in the available fields and click Submit.
Figure 31: Support/Help Tab
30 Support/Help Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Chapter 5
Using Junos Pulse on Mobile Devices
This chapter describes the security and connection features available on each
supported device.
Android Security Features
Your administrator decides which Junos Pulse features are available to you. You may
see more features once you establish a connection to your network. (See “Adding a
Secure Connection” on page 33 for instructions.)
Junos Pulse can include the following features (see Figure 32 on page 32):
Connections: Lets you add, edit, and remove corporate network connections.
Intranet: Provides Web links configured by your administrator.
Email: Launches your email application.
Security: Provides access to security features.
Status: Lets you view, delete, and email log files, which you might need to do in a
troubleshooting operation. The log files show all security incidents, such as virus scan
times and viruses discovered. If you have an established VPN connection, you can
also view the status of that connection from this screen.
About: Provides software version information.
Copyright © 2011, Juniper Networks, Inc. Android Security Features 31
Figure 32: Available Features
Status
Select the Junos Pulse icon in the Applications folder to access the available Pulse
features for your device. Select Status to view and send log files. See Figure 33 on
page 33.
In the Status window, you can view, delete, and email log files, which you might need
to do in a troubleshooting operation. The log files show all security incidents, such as
virus scan times and viruses discovered. If you have an established VPN connection,
you can also view the status of that connection from this screen.
In the Status window, click Send Logs to send logs by email or SMS.
32 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 33: Android Junos Pulse Status Window, Show Logs, and Send Logs
Adding a Secure Connection
Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an
authenticated connection to a protected network. You can add a connection for each
different network to which you connect. This is a secure VPN connection to your
corporate network.
To define a connection, do the following:
1. Start Junos Pulse.
2. Select Connections (see Figure 32 on page 32).
3. Select Add Connection (see Figure 34 on page 34).
Copyright © 2011, Juniper Networks, Inc. Adding a Secure Connection 33
Figure 34: Add a Connection
4. Enter the connection properties as follows (see Figure 35 on page 35):
Connection name: A descriptive name.
URL: The Web address provided by your administrator.
Uses Certificate: Select this check box if your administrator has provided you
with a digital certificate. If you do not use a certificate, you may have to provide a
username and password when you connect.
Certificate Path: This box is available if you selected the Uses Certificate check
box. Select Pick to browse to the certificate file.
Key Path: This box is available if you selected the Uses Certificate check box.
Select Pick to browse to the network key provided by your administrator.
5. Select Create Connection. Your connection is now created and saved.
34 Adding a Secure Connection Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 35: Create a Connection
Connecting
Once you have configured your connection, select the Connect button (see Figure 32
on page 32).
If the Select Connection field does not default to the correct connection, you can
select it from the pulldown menu. You may have to enter additional information
required by your network when you are establishing a connection.
Viewing Connection Status
The status of your current connection also appears at the bottom of the Junos Pulse
window in the form of an icon. The appearance of the icon indicates whether the
connection is active or inactive.
The active connection icon also appears in the status bar at the top of your device
screen. When you close Junos Pulse, that icon remains visible as long as your VPN
connection is active.
Viewing Connection Status Screen
When you have an established, full VPN connection (not all devices support full VPN
capability), selecting the Status button in the main screen (see Figure 32 on page 32)
displays VPN information similar to that shown in Figure 36 on page 36.
Active Connection No Session
Copyright © 2011, Juniper Networks, Inc. Connecting 35
Figure 36: VPN Connection Status Screen
From the Notification bar, the following notification also appears when you have an
active VPN connection. See Figure 37 on page 37.
36 Connecting Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 37: VPN Notification
Using Security Features
The Junos Pulse Mobile Security Suite provides access to features that protect your
device from malware and viruses and it allows you to backup your device’s calendar
and contact information to a central server. Junos Pulse Mobile Security is an optional
feature that is enabled by your administrator. When it is enabled for your device, you
must register your device with the Mobile Security Gateway before you can access the
security feature set.
Registering Security
Your administrator can configure security registration for your device as automatic URL
registration or as a manual registration process.
Automatic URL Registration
Automatic URL registration requires you to select a URL provided by your administrator.
Once you click the URL, you are prompted to verify that the URL comes from a trusted
source. When you click Yes from this prompt, the automated security registration
process takes place.
To register security features automatically, do the following:
1. Start Junos Pulse.
2. Select the registration URL provided to you by your administrator via email, text
message, or Web site.
3. Because the automatic registration changes the security settings on your device,
you should verify the validity of the URL. If you are certain the URL is trusted, select
Yes when prompted (see Figure 38 on page 38).
Copyright © 2011, Juniper Networks, Inc. Using Security Features 37
Once you select Yes, your device is automatically registered for security features.
Figure 38: Automatic URL Registration Prompt
Manual Registration
In some cases, manual registration may also require you to select a URL provided by
your administrator. Once you select the URL, you are prompted to verify that the URL
has comes from a trusted source (see Figure 39 on page 39). When you click Yes in the
registration prompt, the manual registration screen appears.
The registration screen requires that you to enter information such as a license code
provided to you by the administrator.
Informational Note: If you are using a WIFI-only device and do not have access to a
cellular network, some fields such as phone number, will not appear.
To manually register security, do the following:
1. Start Junos Pulse.
1. Select the URL provided by your administrator via email, text message, or Web site.
2. Verify the URL is trusted and click Yes when prompted. The registration screen
appears (see Figure 39 on page 39).
3. Optionally, enter an Email address and Password. (Email and password
information is not used at this time.)
4. Specify the License Code provided by your administrator.
38 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
5. Your device’s phone number appears in the Phone Number box. If the number
does not appear, enter it manually including Country Code and Area Code without
the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or
special characters. Valid phone numbers are between 11 and 15 digits (including
country code)
6. Select Register.
Figure 39: Manual URL Registration Prompt and Registration Screen
Copyright © 2011, Juniper Networks, Inc. Using Security Features 39
Once you’ve successfully registered security features, the available features appear
and are now accessible from the Security button (see Figure 40 on page 40). Those
features are as follows:
AntiVirus (and Malware Detection): Control antivirus activities and detect installed
malware.
Monitor and Control: View monitoring settings.
Backup Data: Back up contacts and calendar information.
Security Settings: Set scan intervals.
Informational Note: Your administrator can enable or disable security features.
Figure 40: Available Features and Security Features
About: Provides software version information.
AntiVirus
The AntiVirus feature protects your device by scanning all files and scanning secure
digital (SD) cards to prevent device infections from malware that may have been
stored on the card. To configure and run antivirus features:
1. Start Junos Pulse.
2. Select Security.
3. Select AntiVirus and configure the following (see Figure 41 on page 42):
Scan Memory Card on Insert: Scans the memory card for malware and viruses.
Select the available button to Enable this feature.
Scan application on install: Scans the files downloaded at /sdcard/download
for malware. Select the available button to Enable this feature.
40 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Virus Definitions updated on: Definitions are loaded when you register, and they
are updated on a schedule set by the administrator. Select Update Now to
update definitions manually.
Last scanned for viruses: This field may display one of the following results:
− Never: This is the scan status when a complete scan was never initiated.
− Blank: This is the scan status when a complete scan was initiated and it was
cancelled or it is in progress.
− Timestamp: The timestamp of the last scan appears here when a scan has
been completed successfully.
Scan all Files and Folders for viruses: Select Start Now to start a complete scan
of device data.
Select a File or Folder to scan for viruses: You can scan a selected file, folder, or
the installed SD card. Click Select to open the component section screen, and
choose a scan target.
Scan installed applications for malware: Select Start Now to scan applications
for malware.
View Scan Results: Select Open to view the results of the most recent virus and
malware scans. This button takes you to the Scan Results screen described in
“Scan Results Screen” on page 42.
View Allowed Suspicious App: Select Open to view the list of applications
labeled suspicious that you have allowed. From this screen, you can change your
mind and choose to not allow the listed applications. For more information, see
page 46.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 41
Figure 41: AntiVirus Configuration
Malware, Prohibited Application, and Suspicious Application Detection
Junos Pulse detects application malware by using blacklists containing known
malware and by using heuristics to detect possible suspicious applications. Virus and
malware device scans take place at regular intervals determined by your administrator.
Scans also detect applications that are not in compliant with corporate policies. These
are applications that have been prohibited by your network administrator.
Scan Results Screen
If your administrator has enabled Antivirus for your device, the Scan Results screen lists
the viruses, malware, suspicious applications and prohibited applications found on your
device. If your device does not have Antivirus enabled, you only see the prohibited
applications found on your device.
Each available tab displays the files or applications that fall into the corresponding
detection category. You can access the Scan Results screen in one of the following
ways:
From the AntiVirus screen (see Figure 41 on page 42): Click the View Scan Results
Open button.
From the notification icon: The notification icon is present at the top
of the Junos Pulse screen when any viruses or malware are visible in
the Scan Results screen. Select the notification when it is present to
open the Scan Results screen.
From a device scan: When a scan finishes, if any viruses or malware are found, the
Scan Results screen displays at the end of the scan.
42 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Scan Results Tabs
A scan may detect and label an application as any of the following in the Scan Results
screen:
Prohibited: This tab (see Figure 42 on page 43) lists the applications installed on
your device that have been prohibited by your administrator. To remove a prohibited
application, select the radio button beside the application name and click the
Uninstall button. If you do not uninstall applications that are prohibited, the
notification icon continues to appear at the top of the Junos Pulse screen.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are prohibited.
Figure 42: Scan Results Prohibited Tab
Copyright © 2011, Juniper Networks, Inc. Using Security Features 43
Malware: This tab (see Figure 43 on page 44) lists the applications installed on your
device that are known to be malware. To remove malware, select the radio button
beside the application name and click the Uninstall button. If you do not uninstall
applications that are found to be malware, the notification icon continues to appear
at the top of the Junos Pulse screen.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are found to be malware.
Figure 43: Scan Results Malware Tab
44 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Suspicious: This tab (see Figure 44 on page 45) lists the applications installed on
your device that appear to be suspicious. The suspicious label is applied to an
application when a set of heuristics determine that the application may be malware.
For suspicious applications, you are given the option of allowing the application or
uninstalling it. To allow a suspicious application, select the radio button beside the
application name and click the Allow button. You must also click Yes to confirm the
Allow action. To uninstall a suspicious application, select the radio button beside the
application and click the Uninstall button. If you do not uninstall or allow
applications that are found to be suspicious, the notification icon continues to
appear at the top of the Junos Pulse screen.
Figure 44: Scan Results Suspicious Tab and Allow Prompt
Copyright © 2011, Juniper Networks, Inc. Using Security Features 45
Allowed Suspicious applications: When you allow a suspicious application, you are
provided with a separate screen from which to manage suspicious applications in
case you change your mind and want to uninstall an allowed application at a later
time (see Figure 45 on page 46). By selecting the check box beside the application
name and clicking the Do not allow button, you can move the allowed application
back to the Suspicious tab. The allowed applications screen is accessible from the
AntiVirus screen View Allowed Suspicious App Open button. (see Figure 41 on
page 42).
Figure 45: Allowed Suspicious Applications Screen
46 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Viruses: This tab (see Figure 46 on page 47) lists the viruses found during the last
scan. It is recommended that you delete viruses when they appear here.To delete the
virus from your device, select the check box beside the virus name and click the
Delete button. To delete multiple viruses at one time, select the Check All button
and then the Delete button.
Figure 46: Scan Results Viruses Tab
Monitor and Control
The Monitor and Control screen lets you view your current Junos Pulse settings as well
as events and log files. To use Monitor and Control:
1. Start Junos Pulse.
2. Select Security.
3. Select Monitor and Control (see Figure 40 on page 40).
The Monitor and Control screen shows the settings that are currently in effect along
with the log file size limit and the event count limit. If the data volume exceeds the
specified limits, the data in question is uploaded to the server.
Back Up Data
Junos Pulse Mobile Security backs up contact and calendar appointment information
to a central location.
To restore data, you must contact your administrator. The administrator initiates a
restore in the form of an SMS command that tells your device to contact the server to
retrieve your backup.
To back up device data:
Copyright © 2011, Juniper Networks, Inc. Using Security Features 47
1. Start Junos Pulse.
2. Select Security.
3. Select Backup Data (see Figure 40 on page 40). The backup begins (see Figure 47
on page 48).
To restore device data, contact your administrator.
Figure 47: Backing Up Data
Security Settings
Security settings are configured by your administrator, and changes are downloaded to
your device. You may change security setting updates and scanning intervals by doing
the following:
1. Start Junos Pulse.
2. Select Security.
3. Select Security Settings (see Figure 40 on page 40).
4. Optionally set the following (see Figure 48 on page 49):
Update security settings: You can specify how often your device contacts the
Junos Pulse server for updated settings. To perform an immediate update, select
Update Now.
Automatically scan device: This setting is configured by the administrator and
you cannot change it.
48 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 48: Security Settings
Anti-Theft Features
There are a number of measures that can be taken to protect your device if it is lost or
stolen. To activate anti-theft features, contact your administrator. Those features
include:
Lock Handset, Unlock Handset, Wipe Handset— These features perform differently
on different Android OS versions as follows:
On Android OS 2.2 and higher
Lock and Unlock Handset —If the Device Administrator function is activated, the
only way to unlock the device is to send an unlock command from the server. If
the Device Administrator function is not activated, the device can be unlocked
when an unlock command is sent from the server or by entering the password
configured during manual registration.
− Emergency Call Button—When the device is locked, an Emergency Call
button is available from the unlock screen. You can make an emergency call,
to 911 for example, when you select this button and enter an emergency
number.
SIM Change or Removal—If the Device Administrator function is activated and
Wipe is enabled, a wipe command sets the device back to factory settings. No
lock is performed. If the Device Administrator function is not activated and the
SIM card is removed or changed, the device switches on GPS Theft Mode,
Monitor & Control logging, and the device is locked.
Wipe Handset—If the Device Administrator function is activated, a wipe
command sent from the server sets the device back to factory settings. If the
Device Administrator function is not activated, no wipe function will take place.
On Android OS 2.1
Copyright © 2011, Juniper Networks, Inc. Using Security Features 49
Lock and Unlock Handset —Locks the device until such time that an unlock
command is sent from the server or by entering the password configured during
manual registration.
− Emergency Call Button—When the device is locked, an Emergency Call
button is available from the unlock screen. You can make an emergency call,
to 911 for example, when you select this button and enter an emergency
number.
SIM Change or Removal—If the SIM is removed, the device switches on GPS
Theft Mode, Monitor & Control logging, and the device is locked. If the SIM is
swapped for another, the device does all the preceding actions, plus checks if
Wipe is enabled, and can wipe sensitive device information (such as email
contacts) automatically.
Wipe Handset—Deletes the email, scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the backup
information from the device and emails it to the email address provided in the
registration process.
GPS Location—If your device is equipped with GPS, your administrator can locate
your device. Device location is displayed on the Junos Pulse server.
Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a
nearby location.
GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5
minute period to fine-tune GPS location if the device is stolen.
SIM Change—Includes 2 settings:
If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control
logging, and locks the device.
If the SIM is swapped for another, the device does all the preceding actions, plus
checks if the Wipe flag is set, and can wipe sensitive device information
automatically.
Uninstalling or Clearing Data
When you register your device for security features, you are registering with the Junos
Pulse Mobile Security Gateway. In some cases, you may need to register your device
with a different Junos Pulse Mobile Security Gateway after the initial registration or you
may need to clear your devices’ Junos Pulse settings for another reason. You can
accomplish this by uninstalling Junos Pulse or by manually clearing all settings as
follows.
1. From the main menu, select Settings > Applications > Manage Applications >
Junos Pulse.
2. To uninstall Junos Pulse, select the Uninstall button (see Figure 49 on page 51).
or
3. To clear all Junos Pulse data, select the Clear data button.
Your administrator provides instructions reregistering Junos Pulse.
50 Uninstalling or Clearing Data Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 49: Junos Pulse Application Info Screen
BlackBerry Security Features
The following sections describe the Junos Pulse features available for the BlackBerry
platform. When you click the main Junos Pulse icon in the Applications folder, you can
access the following security features:
Antivirus
Select the Antivirus security feature to view antivirus controls and log file information.
When you open Antivirus, you see the following information: See Figure 50 on page 52.
Monitor Status: This reads either Enabled or Disabled. The status is Enabled by
default.
Last Updated: View the date of the latest virus definition update.
Licence Expiration: View license expiration information.
By default, the antivirus feature is configured to scan files as it receives them, via any
file transfer mechanism (such as email, SMS/MMS, or Bluetooth). You can initiate a
manual scan, as well.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 51
Figure 50: BlackBerry Junos Pulse Select Antivirus and View Information
Manual Virus Scan
When you click the Menu button on your BlackBerry from the Antivirus window, the
Scan Now option is available.
1. Select Scan Now to perform a full scan of the device. Selecting Scan Now takes
you to the Scan Options window. See Figure 51 on page 52.
Figure 51: BlackBerry Junos Pulse Scan Options
2. In Scan Options, the first three items are checked by default to perform a full
device scan. Those are Scan applications, Scan internal files, Scan SD Card.
Select the Menu button and choose Start scan to scan those items.
3. Optionally, exclude the scanning of media files by selecting the Exclude media files check box
4. Optionally, perform a custom scan rather than scanning the entire device by
selecting the Custom Scan check box. When you select Custom Scan, you can
choose files or folders to scan. See Figure 52 on page 53.
52 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 52: BlackBerry Junos Pulse Select Custom Scan
5. Under Custom Scan, highlight an available folder and click the Menu button on
your BlackBerry.
6. Choose Select Folder from the menu. See Figure 53 on page 53. To drill down
further keep repeating these steps until you have reached the file or folder you
want to scan.
Figure 53: BlackBerry Junos Pulse Select Custom Scan Folder/File
7. Click the Menu button and select Start scan to scan your selected items.
The scanning progress and the scan results when are displayed when the scan finishes.
Quarantined Files
During a scan, found infected files are automatically quarantined. Quarantining lets you
decide whether or not the infected file should be deleted. When you click the Menu
button on your BlackBerry from the Antivirus Monitor Status window, the Quarantine
list is available.
You can delete quarantined files by clicking the Menu button and selecting Delete.
OnDemand Scan
When you click the Menu button on your BlackBerry from the Antivirus Monitor Status
window, the OnDemand Scan Log option is available.The OnDemand ScanLog shows
the details of scans initiated by the you.
File Monitor Log
When you click the Menu button on your BlackBerry from the Antivirus Monitor Status
window, the File Monitor Log option is available. The FileMonitor log shows
timestamps associated with changes to the file monitor setting.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 53
Monitor and Control
The Monitor and Control screen lets you view your current Junos Pulse settings as well
as events and log files. To use Monitor and Control:
1. Start Junos Pulse.
2. Select Monitor and Control (see Figure 50 on page 52).
The Monitor and Control screen shows the settings that are currently in effect along
with the log file size limit and the event count limit. If the data volume exceeds the
specified limits, the data in question is uploaded to the server.
Backup and Restore
The Backup and Restore feature lets you backup the contacts and calendar events
stored on your device.
To back up data:
1. From the Junos Pulse feature list, select Backup & Restore. The Backup & Restore
screen displays the date of the last backup and the last restore.
2. From the Backup & Restore window, click the Menu button.
3. Select Backup Data from the menu. See Figure 54 on page 54. Your information is
sent to the central server.
Figure 54: BlackBerry Junos Pulse Backup Device Data
4. When the backup is complete, click OK in the Backup Successful window that
appears.
You can only initiate a restore from the dashboard. When you initiate a restore, an SMS
command tells the device to contact the server to retrieve the backup. See
“Commands” on page 22.
Settings
From the main Junos Pulse feature list, you click the BlackBerry Menu button to access
security update settings and general information.
1. When you click the Menu button on your BlackBerry from the main Junos Pulse
features window, the Settings option is available.
2. Select Settings. The Pulse Settings window opens.
3. From the Settings window, the Auto-Update Frequency setting is available. By
default, this is set to 12 hours. You can change this from 1 hour to 1 month to Never
by selecting it and scrolling to update frequency you want.
54 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 55: BlackBerry Junos Pulse Update Settings and Frequency
4. From the Settings window, Connection type is available. If the device is managed
by a corporate BlackBerry management server, your administrator should let you
know which method to use (BIZ or BEZ) for the device connection. Otherwise, you
can use the standard APN connection setting.
Anti-Theft Features
Anti−theft protections are configured for the device from the dashboard.
Anti−theft features include:
Lock and Unlock Handset —If the device is locked, it can be unlocked when an
unlock command is sent from the server or by entering the password configured
during manual registration.
Emergency Call Button—When the device is locked, an Emergency Call button is
available from the unlock screen. You can make an emergency call, to 911 for
example, when you select this button and enter an emergency number.
Wipe Handset—A wipe command sent from the server deletes contacts, events,
tasks, and emails. Text messages are not deleted. If the device email account is set
to sync with server(the default), the deletion synchronization may delete emails from
server, as well.
Send Backup—If this data is not stored on the server, this feature gathers the backup
information from the device and emails it to the email address provided in the
registration process.
GPS Location—If your device is equipped with GPS, your administrator can locate
your device. Device location is displayed on the Junos Pulse server.
Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a
nearby location.
GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5
minute period to fine-tune GPS location if the device is stolen.
SIM Change—Includes 2 settings:
If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control
logging, and locks the device.
If the SIM is swapped for another, the device does all the preceding actions, plus
checks if the Wipe flag is set, and can wipe sensitive device information
automatically.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 55
iOS Security Features
Junos Pulse lets you access protected network resources from your Apple iOS™ device
through a secure VPN connection. The security component, Junos Pulse Mobile
Security Suite, includes the following tools to reduce the risks of a lost or stolen device:
Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of
the device for any other reason.
Unlock Device—Unlocks the device.
Retrieve App List—Updates the list of installed applications on the device.
Wipe Device—Sets device back to factory settings.
Connecting with Junos Pulse
In addition to the security features already described, you can use Junos Pulse to
establish a secure VPN connection to your corporate network using your device’s 3G,
4G, Edge or WiFi connectivity. Once a VPN connection is established, Junos Pulse can
include the following features (see Figure 32 on page 32):
Intranet: Launches connections to internal site configured by your administrator.
Email: Launches your email application.
Status: Lets you view, delete, and email log files, which you might need to do in a
troubleshooting operation. The log files show all security incidents, such as virus scan
times and viruses discovered. If you have an established VPN connection, you can
also view the status of that connection from this screen.
About: Provides software version information.
Informational Note: Screens for different iOS devices may vary.
56 iOS Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 56: Available Features as they appear for iPhone
Figure 57: Available Features as they appear for iPad
Adding a Secure Connection Profile
You can add a VPN connection for each different network to which you connect. To
define a connection profile, do the following:
1. Start Junos Pulse.
Copyright © 2011, Juniper Networks, Inc. Connecting with Junos Pulse 57
2. Tap Configuration.
3. If you have already set up one connection profile and you are adding an additional
profile, tap Edit.
4. Tap Add New Connection. The Add window opens. See Figure 58 on page 58.
Informational Note: Screens for different iOS devices may vary.
Figure 58: Add Connection iPhone
Figure 59: Add Configuration iPad
5. Specify the connection profile properties.
Name: The name or description for this connection profile.
58 Connecting with Junos Pulse Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
URL: The Web address provided by your network administrator.
Certificate: If your network administrator has provided you with a digital
certificate (typically via an e-mail attachment or SMS), tap Certificate. When the
Identities window opens, select the certificate you want to use with this profile.
If you do not use a certificate, you must provide a username and password when
you use this connection profile.
6. Tap Configuration to return to the main Junos Pulse window.
Connecting
Once you have configured your connection, do the following to connect.
1. Start Junos Pulse.
2. Tap Connect.
3. When the Connect window opens, enter your login Username and Password. See
Figure 60 on page 59.
4. Tap Sign In.
Figure 60: Connect
Viewing Connection Status
The status of your current connection also appears at the bottom of the Junos Pulse
window in the form of an icon. The appearance of the icon indicates whether the
connection is active or inactive. See also Figure 32 on page 32.
Windows Mobile Security Features
When you click the Junos Pulse icon in the Programs folder, you can access the
following features:
Active Connection No Session
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 59
Status
Select Status to view and send log files. See Figure 61 on page 61.
In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs
to delete scanning logs.
In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.
Connecting
Junos Pulse uses your device’s 3G, 4G, Edge, or WiFi connectivity to establish an
authenticated connection to a protected network.You can add a connection for each
different network you connect to. See Figure 61 on page 61. To define a connection:
1. Select Connections.
2. Select Add Connection and specify the connection properties.
Connection name: A descriptive name.
URL: The Web address provided by your network administrator.
3. Select Save.
The status of your current connection appears at the bottom of the window in the
status bar.
Connect
To connect to a connection that has already been configured, do the following:
1. Select Connect.
2. Enter your Username and Password.
3. Click Sign In.
After your username and password have been accepted, you can access Junos Pulse
features provided through your corporate connection.
Email and Intranet
Once you establish a connection to a protected network, Email and Intranet features
become available. The Email and Intranet settings configured by the administrator of
the protected network to which you are connected are accessible from the Intranet and
Email buttons. See Figure 61 on page 61.
60 Connecting Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 61: Windows Mobile Junos Pulse Main Window
Using Security Features
Select the Junos Pulse icon in the Programs folder to access the available Pulse features for your device. Select Security to view and edit the following features. See Figure 62 on page 62.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 61
Figure 62: Windows Mobile Junos Pulse Security Features
Security Settings
Click Security Settings to update all security settings for the device and to update
device location. Click Save if you make any changes to these settings. See Figure 63 on
page 63. The following security settings are available.
Update security settings and data: Select a time frame for receiving security setting
updates. In addition to virus definitions, security settings include any changes you
make to the device from the dashboard. (Security settings do not include the
commands you can send from the Home tab. Those commands are sent
immediately.) From the available pulldown, you can select: Never, Every 1 hour, Every
4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1 week, Every 2 weeks, and
Every 1 month.
Update: Click the Update button to immediately trigger a manual update of security
settings.
Device Location: Select a time frame for automatic reporting of the device location:
Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1
week, Every 2 weeks, and Every 1 month.
62 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 63: Windows Mobile Junos Pulse Security Settings
Antivirus
Select the Antivirus security feature to view antivirus controls and log file information.
When you open Antivirus, you see controls that let you perform a virus scan on the
memory card, on the entire device, on only files and folders, and to update virus
signatures. Available Antivirus controls are as follows.
Antivirus Scanning: Antivirus scanning is either Enabled or Disabled.
Scan Memory Card on Insert: This feature is either Enabled or Disabled.
Virus Definitions updated: This field lists the time and date of the last update. Click
the Update Now button to trigger a manual virus definition update.
Scan All Files and Folders for viruses: This field lists the time and date of the last
scan. Click the Start Now button to trigger a manual virus scan of the entire device. A
complete scan may take several minutes to complete.
Scan Custom Folder for viruses: Lets you scan a selected file, folder, or the installed
SD card. Click Start Now to open the component screen and choose a scan target.
Show Quarantine GUI: Select Show to view files that were quarantined by the
antivirus scan.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 63
Figure 64: Windows Mobile Junos Pulse Antivirus Settings
Antispam
The antispam service protects your device from unsolicited calls and SMS spam. The
antispam menu provides options for creating, customizing, and deleting blacklists that
are used in spam filtering. To configure and run antispam features:
1. Select Antispam and configure the following (see Figure 65 on page 65):
Name: Enter the name of the of the person from whom you want calls or
messages blocked.
Number: Enter the number from which you want calls or messages blocked.
Block Calls from this number: Select this check box to block voice calls
originating from the number you entered.
Block SMS messages from this number: Select this check box to block SMS
messages originating from the number you entered.
2. Select Choose from Contacts if you want to use a number from your contact list.
3. Select Save.
Informational Note: Click Add from the Antispam window to add additional numbers
for blocking.
64 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 65: Windows Mobile Junos Pulse Antispam Settings
Once you enter at least one number into the antispam feature, the Antispam window
changes to allow for adding additional numbers. You can also select to Enable Shortcode Blocking in the Antispam window after you have at least one entry. See
Figure 66 on page 66.
Shortcode blocking is not specific to any entries you add. It blocks all calls from short
codes. Short codes are special telephone numbers that are significantly shorter, five or
fewer digits. Short codes are often used for marketing or promotions and therefore you
may want to block them.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 65
Figure 66: Windows Mobile Junos Pulse Antispam Shortcode Blocking
Informational Note: You must have at least one number configured for blocking in
order to see the features displayed in the Antispam window in Figure 66 on page 66.
Firewall
The firewall security features let you block or allow data traffic to and/or from the
device using rule lists that control traffic based on port number, IP address, and other
options.To configure firewall features, do the following:
1. Select Firewall and configure the following (see Figure 67 on page 67):
Security Level: Select a security level from the pulldown list. When you select a
level, firewall rules that correspond to that level are added to your active rule list.
You can set the security level as follows.
Low: to block specified items
High: to allow data traffic on only allowed ports and addresses
Off: for no firewall protection
66 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Figure 67: Windows Mobile Junos Pulse Main Firewall Window
2. Click the New button to add a new rule to your active firewall rule list. See
Figure 68 on page 68. You configure rules to add entries to be blocked or to be
allowed.
3. To create a new firewall rule, configure the following:
Select the check box to Enable the rule. You can create a rule and leave it
disabled with the possibility of using it later.
Enter a Description of the rule
Select Block or Allow from the pulldown list.
Select Inbound Traffic or Outbound Traffic from the pulldown list.
You can create this rule to allow/block All IP addresses, Specific IP addresses or
a Range of IP addresses.
If you select specific IPs or a range of IPs enter that information in the IP address
fields provided. (Note that you can use a wildcard entry (*) to indicate blocking
of everything within octet in question.)
You can create this rule to allow/block port addresses. Select To a Range of Ports and enter that port information in the From and To fields provided or
select All Ports.
4. Click Save.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 67
Figure 68: Windows Mobile Junos Pulse FIrewall Rule Window
When your rule is saved, it appears in the rule list. See Figure 69 on page 68.
Figure 69: Windows Mobile Junos Pulse FIrewall Rule List Window
Informational Note: Select a rule in the rule list and use the Edit and Delete buttons
to make changes to the existing rule and to delete rules from the rule list.
68 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
Monitor and Control
Select Monitor and Control to view settings for the device that have been enabled
from the dashboard. For example, you can see a list of control, security, or anti−theft
features with the word Enabled or Disabled beside them. GPS update period and log
limits are also viewable from this window. See Figure 70 on page 69.
Figure 70: Windows Mobile Junos Pulse Monitor and Control
Backup Data
You can back up contact and calendar appointment information to the dashboard
from the Windows Mobile device.
To back up device data, do the following.
1. Select Backup Data.
2. In the Backup Data window, click Backup Contacts and Calendar. A prompt
appears asking you to confirm that you want to start a backup. Click Yes. The
backup begins. You are notified on the device when the backup is complete. See
Figure 71 on page 70.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 69
Figure 71: Windows Mobile Junos Pulse Backup Data and Confirm
You can only initiate a restore from the device. When you initiate a restore, an SMS
command tells the device to contact the server to retrieve the backup. See
“Commands” on page 14.
Anti-Theft Features
Anti−theft protections are configured for the device from the device.
Anti−theft features include:
Lock Handset—Locks the device until such time that the unlock command is sent. If
the device is password protected, the device will continue to be locked even if the
proper password is entered.
Unlock Handset—Unlocks the device.
Wipe Handset—Deletes the email, scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the backup
information and emails it to the email address provided in the registration process.
GPS Location—If your BlackBerry is equipped with GPS, you can locate your device.
Device location is displayed in a map on the Home tab.
Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a
nearby location.
GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to
fine-tune GPS location if the device is stolen.
SIM Change−—Includes 2 settings:
If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control
logging, and Locks the device. You can unlock the handset with a username and
password.
70 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse on Mobile Devices
If the SIM is swapped for another, the device does all the preceding actions, plus
checks if the Wipe flag is set, and can wipe sensitive device information
automatically.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 71
72 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Chapter 6
Junos Pulse FAQ
This chapter provides answers to commonly asked questions.
Junos Pulse FAQs
I do not want the device user to see the Junos Pulse application on his/her device. Can I hide it?
We are aware that on some devices icons can be hidden from view, but you cannot hide
the Junos Pulse application. In addition control and monitoring, Junos Pulse provides
security features that require end user access for configuration.
What happens if the device user modifies the Junos Pulse settings on the device?
Depending on the modification made, the modification may not display on the Mobile
Security Dashboard. For example, if the device user uninstalls Junos Pulse from the
device, this event is not displayed in the Mobile Security Dashboard. You will simply
notice an absence of events.
Why would my GPS coordinates be inaccurate?
There could be several reasons for this inaccuracy. First, confirm that you have a GPS
enabled device and that GPS is a part of your carrier's data plan. If you do not have GPS
functionality as a part of your network service, the GPS feature will not work. Also,
check the GPS feature on the device to make sure there are no restrictions and that all
features are set to enabled. Calibrate your location with the device through Google
maps from a location with good carrier signal strength. The premier location for testing
is outdoors. GPS can also be gathered via satellite or network, with varying degrees of
accuracy.
What does it mean when the GPS coordinates are 0.0?
Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that
this feature is blocked by the carrier for use by 3rd party applications. (Note that we
cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1
devices.)
Copyright © 2011, Juniper Networks, Inc. Junos Pulse FAQs 73
How long does it take for the Mobile Security Dashboard to update with the device user’s activities?
This is configurable from the dashboard. See “Handset Management” on page 25 for
information and guidelines. (Note that if the device user sends and receives a high
volume of texts, sending these texts to the dashboard in real-time is not advised.)
Can I use Junos Pulse to monitor or block URLs?
No, Junos Pulse does not provide that functionality at this time.
How many devices can I monitor using the Mobile Security Dashboard?
There is no limit to the number of devices you can monitor on an account. To add a new
device to the account, you must first download the software to the additional device.
Once the device registers with the dashboard, you can monitor it.
I want to monitor several devices, but each device uses a different carrier.
The carrier does not matter. As long as the device is running a supported operating
system, you can use Junos Pulse.
74 Junos Pulse FAQs Copyright © 2011, Juniper Networks, Inc.
Index
AAccount management . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28allowed suspicious applications
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41Android screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46
Android
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40automatic registration. . . . . . . . . . . . . . . . . . . . . . . . . . .37connecting securely . . . . . . . . . . . . . . . . . . . . . . . . . . . .35install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38manual registration. . . . . . . . . . . . . . . . . . . . . . . . . . . . .38monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .47security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
Anti-Theft
Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70anti-theft features . . . . . . . . . . . . . . . . . . . . . . . . . . . .49, 55
alarm on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55emergency call button, Android . . . . . . . . . . . . . . . . . . . .49emergency call button, BlackBerry . . . . . . . . . . . . . . . . . .55GPS location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55GPS theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55lock and unlock, BlackBerry . . . . . . . . . . . . . . . . . . . . . . .55lock handset, Android . . . . . . . . . . . . . . . . . . . . . . . . . . .49send backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55sim change . . . . . . . . . . . . . . . . . . . . . . . . . . . .49, 50, 55unlock handset, Android . . . . . . . . . . . . . . . . . . . . . . . . .49wipe handset, Android . . . . . . . . . . . . . . . . . . . . . . . . . .49
Antivirus
settings for Windows Mobile . . . . . . . . . . . . . . . . . . . . . .63signature updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40custom scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . .52definitions update, Android . . . . . . . . . . . . . . . . . . . . . . .41file monitor log, BlackBerry . . . . . . . . . . . . . . . . . . . . . . .53full scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . .52last scanned for viruses . . . . . . . . . . . . . . . . . . . . . . . . . .41manual scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . .52ondemand scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . .53
quarantined files, BlackBerry. . . . . . . . . . . . . . . . . . . . . . 53scan file or folder, Android . . . . . . . . . . . . . . . . . . . . . . . 41settings for BlackBerry . . . . . . . . . . . . . . . . . . . . . . . 52, 54view allowed suspicious app, Android . . . . . . . . . . . . . . . 41view scan results, Android . . . . . . . . . . . . . . . . . . . . . . . 41
antivirus events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24APNS certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23automatic URL registration. . . . . . . . . . . . . . . . . . . . . . . . . . 4
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
B
back up data
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Backup and Restore
Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22BlackBerry
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51auto-update frequency . . . . . . . . . . . . . . . . . . . . . . . . . 54backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54connection type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
C
clear data
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22commands, iOS devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 23connecting
add a connection, Android . . . . . . . . . . . . . . . . . . . . . . . 33Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33, 35certificate, Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34certificate, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56, 59key, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34name, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58status icon, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35status screen, full VPN, Android . . . . . . . . . . . . . . . . . . . 35
Copyright © 2011, Juniper Networks, Inc. 75
76
status, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58URL, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Connection
Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
E
ed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43email monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26emergency call button, Android . . . . . . . . . . . . . . . . . . . . . 49emergency call button, BlackBerry . . . . . . . . . . . . . . . . . . . 55EULA
Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9iOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
F
features
control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Firewall
Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
G
GPS
location tracking for iOS. . . . . . . . . . . . . . . . . . . . . . . . . 15support information for iOS . . . . . . . . . . . . . . . . . . . . . . 23update period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
H
Handset management. . . . . . . . . . . . . . . . . . . . . . . . . . . . 25History
commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
I
Image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26installation
Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9iOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
iOS
automatic URL registration . . . . . . . . . . . . . . . . . . . . . . 12connect securely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56enable Junos Pulse . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12GPS location tracking . . . . . . . . . . . . . . . . . . . . . . . . . . 15security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56security profile install . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
K
Keywords, messaging shorthand . . . . . . . . . . . . . . . . . . . . 29
L
license code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
locate device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22lock device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22, 23, 56Lock on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Log event limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Log size limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
M
malware applications
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44malware detection
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42manual registration
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5, 38MMS monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Mobile Security Dashboard
account management . . . . . . . . . . . . . . . . . . . . . . . . . .25alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28handset management . . . . . . . . . . . . . . . . . . . . . . . . . .25overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
Monitor and Control
Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69
N
notifications icon
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42
P
prohibited applications
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
R
registration
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
registration URL
iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27restore data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48retrieve app list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23, 56
S
scan results
malware, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44prohibited applications, Android . . . . . . . . . . . . . . . . . . .43suspicious, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Copyright © 2011, Juniper Networks, Inc.
viruses, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47scan results screen
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41, 42scream locate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23secure connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35security features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4, 31, 37antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11automatic URL registration . . . . . . . . . . . . . . . . . . . . . . . .4automatic URL registration, Android. . . . . . . . . . . . . . . . .37backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9, 11, 51iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6license code, Android . . . . . . . . . . . . . . . . . . . . . . . . . . .38lock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56manual registration, Android . . . . . . . . . . . . . . . . . . . .5, 38monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .11register for, Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4register for, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . .9register, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37retrieve app list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
security settings
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Shortcode blocking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65SMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26status
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32suspicious applications
allowed, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
U
uninstall
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22, 23, 56username/password change . . . . . . . . . . . . . . . . . . . . . . . .25
V
view more
events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23viruses
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
Voice monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
W
Web image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . .26WIFI only devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Windows Mobile
.CAB file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16antispam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63backup data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23, 56Wipe on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Copyright © 2011, Juniper Networks, Inc. 77
78
Copyright © 2011, Juniper Networks, Inc.