January 2012
R2
Release
3.0
Copyright © 2011, Juniper Networks, Inc.
Junos Pulse for Google Android
User Guide
ii Copyright © 2011, Juniper Networks, Inc.
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks,
registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any
inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or
licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579,
6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2011, Juniper Networks, Inc. All rights reserved.
M1/10/12
Table of Contents
Downloading and Installing Junos Pulse...........................................................1Available Junos Pulse Features...................................................................1
Adding a Secure Connection ............................................................................2Connecting.......................................................................................................4
Viewing Connection Status Icon ................................................................4Viewing Connection Status Screen.............................................................4
Using Security Features....................................................................................6Registering Security...................................................................................6AntiVirus .................................................................................................10Malware, Prohibited Application, and Suspicious Application Detection ..12Monitor and Control ................................................................................17Back Up Data...........................................................................................18Security Settings ......................................................................................19
Anti−Theft Features.........................................................................................20Uninstalling or Clearing Data .........................................................................21User Interface Modes .....................................................................................22Device Feature Support..................................................................................23Technical Support ..........................................................................................24Known Issues and Limitations .......................................................................24
iii
iv
Installing and Using Junos Pulse for Google Android
Junos Pulse lets you access protected network resources from your Google Android™
device. It also protects your device against viruses and malware, and includes tools to
reduce the inherent risks of a lost or stolen device.
Additional information for Junos Pulse, including information on supported platforms,
can be found at http://www.juniper.net/support/products/pulse/mobile/
Downloading and Installing Junos Pulse
Use the following instructions to download and install Junos Pulse software on Google
Android devices.
Informational Note: The Junos Pulse client is available from the Android Market
application store.
1. From your Android device, download the Junos Pulse software directly to the
device. Once downloaded, Junos Pulse installs automatically.
2. Once the application has been downloaded and installed, the Junos Pulse icon
appears in the applications menu. See Figure 1 on page 1.
Figure 1: Junos Pulse in the Applications Menu
3. The first time you start Junos Pulse, the End User License Agreement appears. You
must Accept the license to begin using Junos Pulse.
Available Junos Pulse Features
Informational Note: Your administrator decides which Junos Pulse features are
available to you. While all available features are described in the following sections,
you may not see them all. Refer to “User Interface Modes” on page 22 to understand
the differ UI modes and their corresponding feature sets for Junos Pulse.
Junos Pulse can include the following features (see Figure 2 on page 2):
Copyright © 2011, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1
Connections: Lets you add, edit, and remove corporate network connections.
Intranet: Provides Web links configured by your administrator.
Email: Launches your email application.
Security: Provides access to security features.
Status: Lets you view, delete, and email log files, which you might need to do in a
troubleshooting operation. The log files show all security incidents, such as virus scan
times and viruses discovered. If you have an established VPN connection, you can
also view the status of that connection from this screen.
About: Provides software version information.
Figure 2: Available Features
Adding a Secure Connection
Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an
authenticated connection to a protected network. You can add a connection for each
different network to which you connect. This is a secure VPN connection to your
corporate network.
To define a connection, do the following:
1. Start Junos Pulse.
2. Select Connections (see Figure 2 on page 2).
3. Select Add Connection (see Figure 3 on page 3).
2 Adding a Secure Connection Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 3: Add a Connection
4. Enter the connection properties as follows (see Figure 4 on page 4):
Connection name: A descriptive name.
URL: The Web address provided by your administrator.
Uses Certificate: Select this check box if your administrator has provided you
with a digital certificate. If you do not use a certificate, you may have to provide a
username and password when you connect.
Certificate Path: This box is available if you selected the Uses Certificate check
box. Select Pick to browse to the certificate file.
Key Path: This box is available if you selected the Uses Certificate check box.
Select Pick to browse to the network key provided by your administrator.
5. Select Create Connection. Your connection is now created and saved.
Copyright © 2011, Juniper Networks, Inc. Adding a Secure Connection 3
Figure 4: Create a Connection
Connecting
Once you have configured your connection, select the Connect button (see Figure 2 on
page 2).
If the Select Connection field does not default to the correct connection, you can
select it from the pulldown menu. You may have to enter additional information
required by your network when you are establishing a connection.
Viewing Connection Status Icon
The status of your current connection also appears at the bottom of the Junos Pulse
window in the form of an icon. The appearance of the icon indicates whether the
connection is active or inactive.
The active connection icon also appears in the status bar at the top of your device
screen. When you close Junos Pulse, that icon remains visible as long as your VPN
connection is active.
Viewing Connection Status Screen
When you have an established, full VPN connection (not all devices support full VPN
capability), selecting the Status button in the main screen (see Figure 2 on page 2)
displays VPN information similar to that shown in Figure 5 on page 5.
Active Connection No Session
4 Connecting Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 5: VPN Connection Status Screen
From the Notification bar, the following notification also appears when you have an
active VPN connection. See Figure 6 on page 6.
Copyright © 2011, Juniper Networks, Inc. Connecting 5
Figure 6: VPN Notification
Using Security Features
The Junos Pulse Mobile Security Suite provides access to features that protect your
device from malware and viruses and it allows you to backup your device’s calendar
and contact information to a central server. Junos Pulse Mobile Security is an optional
feature that is enabled by your administrator. When it is enabled for your device, you
must register your device with the Mobile Security Gateway before you can access the
security feature set.
Registering Security
Your administrator can configure security registration for your device as automatic URL
registration or as a manual registration process.
Automatic URL Registration
Automatic URL registration requires you to select a URL provided by your administrator.
Once you click the URL, you are prompted to verify that the URL comes from a trusted
source. When you click Yes from this prompt, the automated security registration
process takes place.
To register security features automatically, do the following:
1. Start Junos Pulse.
2. Select the registration URL provided to you by your administrator via email, text
message, or Web site.
3. Because the automatic registration changes the security settings on your device,
you should verify the validity of the URL. If you are certain the URL is trusted, select
Yes when prompted (see Figure 7 on page 7).
6 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Once you select Yes, your device is automatically registered for security features.
Figure 7: Automatic URL Registration Prompt
Manual Registration
In some cases, manual registration may also require you to select a URL provided by
your administrator. Once you select the URL, you are prompted to verify that the URL
has comes from a trusted source (see Figure 8 on page 8). When you click Yes in the
registration prompt, the manual registration screen appears.
The registration screen requires that you to enter information such as a license code
provided to you by the administrator.
Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no
cellular service), the phone number field does not appear in the registration window.
See Figure 9 on page 9.
To manually register security, do the following:
1. Start Junos Pulse.
1. Select the URL provided by your administrator via email, text message, or Web site.
2. Verify the URL is trusted and click Yes when prompted. The registration screen
appears (see Figure 8 on page 8).
3. Optionally, enter an Email address and Password. (Email and password
information is not used at this time.)
4. Specify the License Code provided by your administrator.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 7
5. Your device’s phone number appears in the Phone Number box. If the number
does not appear, enter it manually including Country Code and Area Code without
the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or
special characters. Valid phone numbers are between 11 and 15 digits (including
country code).
6. Select Register.
Figure 8: Manual URL Registration Prompt and Registration Screen
8 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 9: WIFI only Device Manual Registration Example
Copyright © 2011, Juniper Networks, Inc. Using Security Features 9
Once you’ve successfully registered security features, the available features appear
(see Figure 10 on page 10) and are now accessible from the Security button (see
Figure 2 on page 2). Those features are as follows:
AntiVirus (and Malware Detection): Control antivirus activities and detect installed
malware.
Monitor and Control: View monitoring settings.
Backup Data: Back up contacts and calendar information.
Security Settings: Set scan intervals.
Informational Note: Your administrator can enable or disable security features.
Figure 10: Security Features
AntiVirus
The AntiVirus feature protects your device by scanning all files and scanning secure
digital (SD) cards to prevent device infections from malware that may have been
stored on the card. To configure and run antivirus features:
1. Start Junos Pulse.
2. Select Security.
3. Select AntiVirus and configure the following (see Figure 11 on page 12):
Scan Memory Card on Insert: Scans the memory card for malware and viruses.
Select the available button to Enable this feature.
Scan application on install: Scans the files downloaded at /sdcard/download
for malware. Select the available button to Enable this feature.
10 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Virus Definitions updated on: Definitions are loaded when you register, and they
are updated on a schedule set by the administrator. Select Update Now to
update definitions manually.
Last scanned for viruses: This field may display one of the following results:
− Never: This is the scan status when a complete scan was never initiated.
− Blank: This is the scan status when a complete scan was initiated and it was
cancelled or it is in progress.
− Timestamp: The timestamp of the last scan appears here when a scan has
been completed successfully.
Scan all Files and Folders for viruses: Select Start Now to start a complete scan
of device data.
Select a File or Folder to scan for viruses: You can scan a selected file, folder, or
the installed SD card. Click Select to open the component section screen, and
choose a scan target.
Scan installed applications for malware: Select Start Now to scan applications
for malware.
View Scan Results: Select Open to view the results of the most recent virus and
malware scans. This button takes you to the Scan Results screen described in
“Scan Results Screen” on page 12.
View Allowed Suspicious App: Select Open to view the list of applications
labeled suspicious that you have allowed. From this screen, you can change your
mind and choose to not allow the listed applications. For more information, see
page 16.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 11
Figure 11: AntiVirus Configuration
Malware, Prohibited Application, and Suspicious Application Detection
Junos Pulse detects application malware by using blacklists containing known
malware and by using heuristics to detect possible suspicious applications. Virus and
malware device scans take place at regular intervals determined by your administrator.
Scans also detect applications that are not in compliant with corporate policies. These
are applications that have been prohibited by your network administrator.
Scan Results Screen
If your administrator has enabled Antivirus for your device, the Scan Results screen lists
the viruses, malware, suspicious applications and prohibited applications found on your
device. If your device does not have Antivirus enabled, you only see the prohibited
applications found on your device.
Each available tab displays the files or applications that fall into the corresponding
detection category. You can access the Scan Results screen in one of the following
ways:
From the AntiVirus screen (see Figure 11 on page 12): Click the View Scan Results
Open button.
From the notification icon: The notification icon is present at the top
of the Junos Pulse screen when any viruses or malware are visible in
the Scan Results screen. Select the notification when it is present to
open the Scan Results screen.
From a device scan: When a scan finishes, if any viruses or malware are found, the
Scan Results screen displays at the end of the scan.
12 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Scan Results Tabs
A scan may detect and label an application as any of the following in the Scan Results
screen:
Prohibited: This tab (see Figure 12 on page 13) lists the applications installed on your
device that have been prohibited by your administrator. To remove a prohibited
application, select the radio button beside the application name and click the
Uninstall button. If you do not uninstall applications that are prohibited, the
notification icon continues to appear at the top of the Junos Pulse screen.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are prohibited.
Figure 12: Scan Results Prohibited Tab
Copyright © 2011, Juniper Networks, Inc. Using Security Features 13
Malware: This tab (see Figure 13 on page 14) lists the applications installed on your
device that are known to be malware. To remove malware, select the radio button
beside the application name and click the Uninstall button. If you do not uninstall
applications that are found to be malware, the notification icon continues to appear
at the top of the Junos Pulse screen.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are found to be malware.
Figure 13: Scan Results Malware Tab
14 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Suspicious: This tab (see Figure 14 on page 15) lists the applications installed on your
device that appear to be suspicious. The suspicious label is applied to an application
when a set of heuristics determine that the application may be malware. For
suspicious applications, you are given the option of allowing the application or
uninstalling it. To allow a suspicious application, select the radio button beside the
application name and click the Allow button. You must also click Yes to confirm the
Allow action. To uninstall a suspicious application, select the radio button beside the
application and click the Uninstall button. If you do not uninstall or allow
applications that are found to be suspicious, the notification icon continues to
appear at the top of the Junos Pulse screen.
Figure 14: Scan Results Suspicious Tab and Allow Prompt
Copyright © 2011, Juniper Networks, Inc. Using Security Features 15
Allowed Suspicious applications: When you allow a suspicious application, you are
provided with a separate screen from which to manage suspicious applications in
case you change your mind and want to uninstall an allowed application at a later
time (see Figure 15 on page 16). By selecting the check box beside the application
name and clicking the Do not allow button, you can move the allowed application
back to the Suspicious tab. The allowed applications screen is accessible from the
AntiVirus screen View Allowed Suspicious App Open button. (see Figure 11 on
page 12).
Figure 15: Allowed Suspicious Applications Screen
16 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Viruses: This tab (see Figure 16 on page 17) lists the viruses found during the last
scan. It is recommended that you delete viruses when they appear here.To delete the
virus from your device, select the check box beside the virus name and click the
Delete button. To delete multiple viruses at one time, select the Check All button
and then the Delete button.
Figure 16: Scan Results Viruses Tab
Monitor and Control
The Monitor and Control screen lets you view your current Junos Pulse settings as well
as events and log files. To use Monitor and Control:
1. Start Junos Pulse.
2. Select Security.
3. Select Monitor and Control (see Figure 10 on page 10).
The Monitor and Control screen shows the following settings.
Monitoring
SMS: Inbound and outbound SMS messages are logged, including the sender,
receiver and contents of each message.
MMS: Inbound and outbound MMS messages are logged, including the sender,
receiver and contents of each message (not including multimedia).
Voice: Call history events are logged, such as initiated outgoing calls and received
incoming calls (call duration is not recorded, but the remote phone number is noted.)
Copyright © 2011, Juniper Networks, Inc. Using Security Features 17
Log images/pictures: If enabled from the server, the images downloaded or captured
on the device are turned into thumbnail images and uploaded to the server. This
occurs immediately and is not dependent on log limits.
Logs:
Event limit: When the total number of events (SMS, email, voice, MMS) crosses this
threshold, the full suite of logs is uploaded to the server.
File size limit: When the total combined file size of all logs (SMS, email, voice, MSS)
crosses this threshold, the full suite of logs is uploaded to the server. Note that SMS
messages are generally several hundred bytes in size. Emails are usually 2KB or larger
(no attachments included). And voice messages are typically 200 hundred bytes.
Control:
Periodic GPS updates: This update period is configured on the server. This setting
periodically queries the device position and uploads that information to the server for
tracking purposes.
Block calls: When enabled, blocks all outbound calls.
Back Up Data
Junos Pulse Mobile Security backs up contact and calendar appointment information
to a central location.
To restore data, you must contact your administrator. The administrator initiates a
restore in the form of an SMS command that tells your device to contact the server to
retrieve your backup.
To back up device data:
1. Start Junos Pulse.
2. Select Security.
3. Select Backup Data (see Figure 10 on page 10). The backup begins (see Figure 17
on page 19).
To restore device data, contact your administrator.
18 Using Security Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 17: Backing Up Data
Security Settings
Security settings are configured by your administrator, and changes are downloaded to
your device. You may change security setting updates and scanning intervals by doing
the following:
1. Start Junos Pulse.
2. Select Security.
3. Select Security Settings (see Figure 10 on page 10).
4. Optionally set the following (see Figure 18 on page 20):
Update security settings: You can specify how often your device contacts the
Junos Pulse server for updated settings. To perform an immediate update, select
Update Now.
Automatically scan device: This setting is configured by the administrator and
you cannot change it.
Copyright © 2011, Juniper Networks, Inc. Using Security Features 19
Figure 18: Security Settings
Anti-Theft Features
There are a number of measures that can be taken to protect your device if it is lost or
stolen. To activate anti-theft features, contact your administrator. Those features
include:
Lock Handset, Unlock Handset, Wipe Handset— These features perform differently
on different Android OS versions as follows:
On Android OS 2.2 and higher
Lock and Unlock Handset —If the Device Administrator function is activated, the
only way to unlock the device is to send an unlock command from the server. If
the Device Administrator function is not activated, the device can be unlocked
when an unlock command is sent from the server or by entering the password
configured during manual registration.
− Emergency Call Button—When the device is locked, an Emergency Call
button is available from the unlock screen. You can make an emergency call,
to 911 for example, when you select this button and enter an emergency
number.
SIM Change or Removal—If the Device Administrator function is activated and
Wipe is enabled, a wipe command sets the device back to factory settings. No
lock is performed. If the Device Administrator function is not activated and the
SIM card is removed or changed, the device switches on GPS Theft Mode,
Monitor & Control logging, and the device is locked.
20 Anti−Theft Features Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Wipe Handset—If the Device Administrator function is activated, a wipe
command sent from the server sets the device back to factory settings. If the
Device Administrator function is not activated, a wipe command deletes
scheduling, contact and task information, SMS messages, and the memory card.
On Android OS 2.1
Lock and Unlock Handset —Locks the device until such time that an unlock
command is sent from the server or by entering the password configured during
manual registration.
− Emergency Call Button—When the device is locked, an Emergency Call
button is available from the unlock screen. You can make an emergency call,
to 911 for example, when you select this button and enter an emergency
number.
SIM Change or Removal—If the SIM is removed, the device switches on GPS
Theft Mode, Monitor & Control logging, and the device is locked. If the SIM is
swapped for another, the device does all the preceding actions, plus checks if
Wipe is enabled, and can wipe sensitive device information automatically.
Wipe Handset—Deletes scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the backup
information from the device and emails it to the email address provided in the
registration process.
GPS Location—If your device is equipped with GPS, your administrator can locate
your device. Device location is displayed on the Junos Pulse server.
Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a
nearby location.
GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5
minute period to fine-tune GPS location if the device is stolen.
Uninstalling or Clearing Data
When you register your device for security features, you are registering with the Junos
Pulse Mobile Security Gateway. In some cases, you may need to register your device
with a different Junos Pulse Mobile Security Gateway after the initial registration or you
may need to clear your devices’ Junos Pulse settings for another reason. You can
accomplish this by uninstalling Junos Pulse or by manually clearing all settings as
follows.
1. From the main menu, select Settings > Applications > Manage Applications >
Junos Pulse.
2. To uninstall Junos Pulse, select the Uninstall button (see Figure 19 on page 22).
or
3. To clear all Junos Pulse data, select the Clear data button.
If the Device Administrator function is activated, you can uninstall Junos Pulse by
doing the following:
1. From the main menu, select Settings> Location & Security (or just Security on
some devices).
Copyright © 2011, Juniper Networks, Inc. Uninstalling or Clearing Data 21
2. Select Device Administrator and uncheck the Junos Pulse check box. Now you
can begin the regular uninstall process.
Your administrator provides instructions for reregistering Junos Pulse.
Figure 19: Junos Pulse Application Info Screen
User Interface Modes
Your administrator can deploy Junos Pulse to your device with varying features sets
available to you through the Junos Pulse UI. You can have a full UI with all possible
Junos Pulse features visible to you or you can have a minimal or security UI that
includes a subset of Junos Pulse features that are visible to you. The possible UI modes
that your administrator can deploy to your device are as follows:
Full UI: The full UI includes all available Junos Pulse features as described in this
manual.
Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a
Home screen that provides an About button. For supported devices only, detected
viruses, malware, and suspicious applications are deleted automatically. If your
device does not support automatic deletion, prompts are displayed periodically until
you manually delete or uninstall the virus, malware, or suspicious application.
Security UI: The security UI includes only the Junos Pulse security features and does
not provide the ability to make VPN connections.
22 User Interface Modes Copyright © 2011, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Device Feature Support
The following features are supported for Junos Pulse on Android Devices.
Table 1: Junos Pulse Feature Support for Android
Feature Supported for Android
Alarm On/Off Yes
Antispam No
Antivirus Yes
Application Inventory Yes
Application Removal Yes
Automatic Registration Yes
Backup/Restore Contacts & Calendar Yes
Contacts Log Yes
Device Identity Servers Yes
Enterprise VPN support Yes
Enterprise Web Portal Yes
Exchange provisioning No
Firewall No
GPS Location/Tracking Yes
GPS Theft On/Off Yes
Log Email No
Log Images Yes
Log MMS Messages No
Log SMS Messages Yes
Log Web Images No
Log Event/Size Limits Yes
Lock/Unlock Device Yes
Lock on SIM Change Yes
Malware Scan Interval Yes
Monitor and Control Report Yes
Passcode Requirements No
Policy Based Client UI Yes
Prohibited Applications Yes
Restrictions on device usage No
Scan card Yes
Scan device Yes
SCEP server support No
Update Profile Yes
Update Virus Definitions Yes
Voice Log Yes
VPN provisioning No
VPN strong authentication (PKI or 2FA) Yes
Wi-Fi provisioning No
Copyright © 2011, Juniper Networks, Inc. Device Feature Support 23
Table 2: Android Device Personal Data Erased by Junos Pulse Handset Wipe Command
Technical Support
For technical issues, contact your administrator.
Known Issues and Limitations
Android has limitations in its support for certificates. If you experience the "No cert"
error, or if Junos Pulse closes unexpectedly when you try to connect, contact your
administrator.
At this time, you can only send log files to the administrator using email. No other
methods are supported.
Although Photo and Video Share appears as an option when you select Send Logs, it
is not a valid method for sending logs. You should not select that option when
sending log files to the administrator.
When the device is locked by either the Handset Lock command or the Lock on SIM
Change command, you may still be able to access the device’s Home screen and the
Notifications screen.
If a device does not have cell service, it cannot receive commands. For example, if a
device is connected only through WiFi, commands such as Lock and Wipe are not
received by the device.
If the Device Administrator is not activated, automatic removal of malware and
prohibited applications, as well as the automatic application removal feature, are
only available on certain Samsung devices. Please refer to the Junos Pulse
Supported Platforms Guide for details.
Wipe Device Yes
Wipe on SIM Change Yes
Personal Data Wiped on Android
Appointments No
Calendar Memos No
Calendar ToDos No
Call History Yes
Contacts Yes
Email Boxes No
Memory Card Yes
Notes No
SMS and MMS SMS only
Tasks No
Feature Supported for Android
24 Technical Support Copyright © 2011, Juniper Networks, Inc.
Index
Aallowed suspicious applications . . . . . . . . . . . . . . . . . . . . .11allowed suspicious applications screen . . . . . . . . . . . . . . . .16anti-theft features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
alarm on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21emergency call button . . . . . . . . . . . . . . . . . . . . . . . . . .20GPS location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21GPS theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21lock handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20send backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21sim change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20, 21unlock handset. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20wipe handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10definitions update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11last scanned for viruses . . . . . . . . . . . . . . . . . . . . . . . . . .11scan file or folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11view allowed suspicious app . . . . . . . . . . . . . . . . . . . . . .11view scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
automatic application removal . . . . . . . . . . . . . . . . . . . . . .13automatic URL registration . . . . . . . . . . . . . . . . . . . . . . . . . .6available features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
B
back up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
C
clear data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21connecting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2, 4
add a connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3status icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4status screen, full VPN . . . . . . . . . . . . . . . . . . . . . . . . . . .4URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
D
download application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
E
emergency call button . . . . . . . . . . . . . . . . . . . . . . . . . . . .20EULA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
F
feature support chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
I
installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
L
license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
M
malware applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14malware detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
N
notifications icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
P
prohibited applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
R
restore data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
S
scan results
malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14prohibited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13prohibited applications. . . . . . . . . . . . . . . . . . . . . . . . . . 13suspicious . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
scan results screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 12secure connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10automatic URL registration. . . . . . . . . . . . . . . . . . . . . . . . 6license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7register for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19suspicious applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
allowed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
U
uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Copyright © 2011, Juniper Networks, Inc. Index 1
2 Inde
user interface modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
V
viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
W
WIFI only devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
x Copyright © 2011, Juniper Networks, Inc.