Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
March 2012
R1
Release
3.2
Copyright © 2012, Juniper Networks, Inc.
Junos Pulse for Google Android
User Guide
ii Copyright © 2012, Juniper Networks, Inc.
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks,
registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any
inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or
licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579,
6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2012, Juniper Networks, Inc. All rights reserved.
M3/23/12
Table of Contents
Downloading and Installing Junos Pulse...........................................................1Available Junos Pulse Features...................................................................1
Adding a Secure Connection ............................................................................2Connecting.......................................................................................................4
Viewing Connection Status Icon ................................................................4Viewing Connection Status Screen.............................................................4Limited Access...........................................................................................6
Using Security Features....................................................................................6Registering Security...................................................................................7AntiVirus .................................................................................................10Malware, Prohibited Application, and Suspicious Application Detection ..12Monitor and Control ................................................................................17Back Up Data...........................................................................................18Security Settings ......................................................................................19
Anti−Theft Features.........................................................................................20Uninstalling or Clearing Data .........................................................................21User Interface Modes .....................................................................................22Device Feature Support..................................................................................23Technical Support ..........................................................................................25Known Issues and Limitations .......................................................................25
iii
iv
Installing and Using Junos Pulse for Google Android
Junos Pulse lets you access protected network resources from your Google Android™
device. It also protects your device against viruses and malware, and includes tools to
reduce the inherent risks of a lost or stolen device.
Additional information for Junos Pulse, including information on supported platforms,
can be found at http://www.juniper.net/support/products/pulse/mobile/
Downloading and Installing Junos Pulse
Use the following instructions to download and install Junos Pulse software on Google
Android devices.
Informational Note: The Junos Pulse client is available from the Google Play
application store.
1. From your Android device, download the Junos Pulse software directly to the
device. Once downloaded, Junos Pulse installs automatically.
2. Once the application has been downloaded and installed, the Junos Pulse icon
appears in the applications menu. See Figure 1 on page 1.
Figure 1: Junos Pulse in the Applications Menu
3. The first time you start Junos Pulse, the End User License Agreement appears. You
must Accept the license to begin using Junos Pulse.
Available Junos Pulse Features
Informational Note: Your administrator decides which Junos Pulse features are
available to you. While all available features are described in the following sections, you
may not see them all. Refer to “User Interface Modes” on page 22 to understand the
different UI modes and their corresponding feature sets for Junos Pulse.
Junos Pulse can include the following features (see Figure 2 on page 2):
Copyright © 2012, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1
Connections: Lets you add, edit, and remove corporate network connections.
Intranet: Provides Web links configured by your administrator.
Email: Launches your email application.
Security: Provides access to security features.
Status: Lets you view, delete, and email log files, which you might need to do in a
troubleshooting operation. The log files show all security incidents, such as virus scan
times and viruses discovered. If you have an established VPN connection, you can
also view the status of that connection from this screen.
About: Provides software version information.
Figure 2: Available Features
Adding a Secure Connection
Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an
authenticated connection to a protected network. You can add a connection for each
different network to which you connect. This is a secure VPN connection to your
corporate network.
To define a connection, do the following:
1. Start Junos Pulse.
2. Select Connections (see Figure 2 on page 2).
3. Select Add Connection (see Figure 3 on page 3).
2 Adding a Secure Connection Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 3: Add a Connection
4. Enter the connection properties as follows (see Figure 4 on page 4):
Connection name: A descriptive name.
URL: The Web address provided by your administrator.
Uses Certificate: Select this check box if your administrator has provided you
with a digital certificate. If you do not use a certificate, you may have to provide a
username and password when you connect.
Certificate Path: This box is available if you selected the Uses Certificate check
box. Select Pick to browse to the certificate file.
Key Path: This box is available if you selected the Uses Certificate check box.
Select Pick to browse to the network key provided by your administrator.
5. Select Create Connection. Your connection is now created and saved.
Copyright © 2012, Juniper Networks, Inc. Adding a Secure Connection 3
Figure 4: Create a Connection
Connecting
Once you have configured your connection, select the Connect button (see Figure 2 on
page 2).
If the Select Connection field does not default to the correct connection, you can select
it from the pulldown menu. You may have to enter additional information required by
your network when you are establishing a connection.
Viewing Connection Status Icon
The status of your current connection appears at the bottom of the Junos Pulse window
in the form of an icon. The appearance of that icon indicates whether the connection is
active, inactive, or limited by policy non−compliance (see Limited Access on page 6).
The active connection icon also appears in the status bar at the top of your device
screen. When you close Junos Pulse, that icon remains visible as long as your VPN
connection is active.
Viewing Connection Status Screen
When you have an established, full VPN connection (not all devices support full VPN
capability), selecting the Status button in the main screen (see Figure 2 on page 2)
displays VPN information similar to that shown in Figure 5 on page 5.
Active Connection No Session Limited Access
4 Connecting Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 5: VPN Connection Status Screen
From the Notification bar, the following notification also appears when you have an
active VPN connection. See Figure 6 on page 5.
Figure 6: VPN Notification
Copyright © 2012, Juniper Networks, Inc. Connecting 5
Limited Access
To ensure the integrity of mobile devices that are accessing network resources, an
administrator can enforce a security policy with which mobile devices must comply in
order to connect to the network. If a device is found to be non−compliant when
attempting a secure network connection, only limited network access may be granted.
When your device is non−compliant, you are prompted with this information (see
Figure 7 on page 6) and you may be presented with a Continue button which you can
tap to obtain limited network access.
Reasons for non−compliance may include the following:
Your device has been rooted.
Your device is running an operating system that is not allowed by the security policy.
Your device is not actively registered with the appropriate Mobile Security Gateway
(MSG) and/or Junos Pulse Mobile Security Suite is not active on your device.
You must remedy the non−compliance issue on your device before you can establish a
full network connection.
Figure 7: Non-compliance Prompt and Limited Connection
Using Security Features
The Junos Pulse Mobile Security Suite provides access to features that protect your
device from malware and viruses and it allows you to backup your device’s calendar and
contact information to a central server. Junos Pulse Mobile Security is an optional
feature that is enabled by your administrator. When it is enabled for your device, you
must register your device with the Mobile Security Gateway before you can access the
security feature set.
6 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Registering Security
Your administrator can configure security registration for your device as automatic URL
registration or as a manual registration process.
Automatic URL Registration
Automatic URL registration requires you to select a URL provided by your administrator.
Once you click the URL, you are prompted to verify that the URL comes from a trusted
source. When you click Yes from this prompt, the automated security registration
process takes place.
To register security features automatically, do the following:
1. Start Junos Pulse.
2. Select the registration URL provided to you by your administrator via email, text
message, or Web site.
3. Because the automatic registration changes the security settings on your device,
you should verify the validity of the URL. If you are certain the URL is trusted, select
Yes when prompted (see Figure 8 on page 7).
Once you select Yes, your device is automatically registered for security features.
Figure 8: Automatic URL Registration Prompt
Manual Registration
In some cases, manual registration may also require you to select a URL provided by
your administrator. Once you select the URL, you are prompted to verify that the URL
has comes from a trusted source (see Figure 9 on page 8). When you click Yes in the
registration prompt, the manual registration screen appears.
Copyright © 2012, Juniper Networks, Inc. Using Security Features 7
The registration screen requires that you to enter information such as a license code
provided to you by the administrator.
Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no
cellular service), the phone number field does not appear in the registration window.
See Figure 10 on page 9.
To manually register security features, do the following:
1. Start Junos Pulse.
1. Select the URL provided by your administrator via email, text message, or Web site.
2. Verify the URL is trusted and click Yes when prompted. The registration screen
appears (see Figure 9 on page 8).
3. Enter an Email address and Password.
4. Specify the License Code provided by your administrator.
5. Your device’s phone number appears in the Phone Number box. If the number does
not appear, enter it manually including Country Code and Area Code without the
international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special
characters. Valid phone numbers are between 11 and 15 digits (including country
code).
6. Select Register.
Figure 9: Manual URL Registration Prompt and Registration Screen
8 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 10: WIFI only Device Manual Registration Example
Once you have successfully registered, if your device is running Android 2.2 or higher, the
Activate device administrator prompt appears.
Informational Note: If you do not activate the Device Administrator, some features
behave differently. See the following sections for details: “Anti−Theft Features” on
page 20 and “Uninstalling or Clearing Data” on page 21.
Copyright © 2012, Juniper Networks, Inc. Using Security Features 9
When security features are registered, the available features appear (see Figure 11 on
page 10) and are now accessible from the Security button (see Figure 2 on page 2).
Those features are as follows:
AntiVirus (and Malware Detection): Control antivirus activities and detect installed
malware.
Monitor and Control: View monitoring settings.
Backup Data: Back up contacts and calendar information.
Security Settings: Set scan intervals.
Informational Note: Your administrator can enable or disable security features.
Figure 11: Security Features
AntiVirus
The AntiVirus feature protects your device by scanning all files and scanning secure
digital (SD) cards to prevent device infections from malware that may have been stored
on the card. To configure and run antivirus features:
1. Start Junos Pulse.
2. Select Security.
3. Select AntiVirus and configure the following (see Figure 12 on page 12):
Scan Memory Card on Insert: Scans the memory card for malware and viruses.
Select the available button to Enable this feature.
Scan application on install: When enabled, a scan is initiated on an application
when it is installed. A malware scan also takes place on files downloaded to
/sdcard/download. When disabled, a scan only occurs at the scheduled interval
or when manually initiated. Select the available button to Enable this feature.
10 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Virus Definitions updated on: Definitions are loaded when you register, and they
are updated on a schedule set by the administrator. Select Update Now to
update definitions manually.
Last scanned for viruses: This field may display one of the following results:
− Never: This is the scan status when a complete scan was never initiated.
− Blank: This is the scan status when a complete scan was initiated, but it was
cancelled by the user or the scan exited unexpectedly.
− Timestamp: The timestamp of the last scan appears here when a scan has
been completed successfully.
Scan all Files and Folders for viruses: Select Start Now to start a complete scan
of device data.
Select a File or Folder to scan for viruses: You can scan a selected file, folder, or
the installed SD card. Click Select to open the component section screen, and
choose a scan target.
Scan installed applications for malware: Select Start Now to scan applications
for malware.
View Scan Results: Select Open to view the results of the most recent virus and
malware scans. This button takes you to the Scan Results screen described in
“Scan Results Screen” on page 12.
View Allowed Suspicious App: Select Open to view the list of applications
labeled suspicious that you have allowed. From this screen, you can change your
mind and choose to not allow the listed applications. For more information, see
page 16.
Copyright © 2012, Juniper Networks, Inc. Using Security Features 11
Figure 12: AntiVirus Configuration
Malware, Prohibited Application, and Suspicious Application Detection
Junos Pulse detects application malware by using blacklists containing known malware
and by using heuristics to detect possible suspicious applications. Virus and malware
device scans take place at regular intervals determined by your administrator.
Scans also detect applications that are not in compliant with corporate policies. These
are applications that have been prohibited by your network administrator.
Scan Results Screen
If your administrator has enabled Antivirus for your device, the Scan Results screen lists
the viruses, malware, suspicious applications and prohibited applications found on your
device. If your device does not have Antivirus enabled, you only see the prohibited
applications found on your device.
Each available tab displays the files or applications that fall into the corresponding
detection category. You can access the Scan Results screen in one of the following
ways:
From the AntiVirus screen (see Figure 12 on page 12): Click the View Scan Results
Open button.
From the notification icon: The notification icon is present at the top
of the Junos Pulse screen when any viruses or malware are visible in
the Scan Results screen. Select the notification when it is present to
open the Scan Results screen.
From a device scan: When a scan finishes, if any viruses or malware are found, the
Scan Results screen displays at the end of the scan.
12 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Scan Results Tabs
A scan may detect and label an application as any of the following in the Scan Results
screen:
Prohibited: This tab (see Figure 13 on page 13) lists the applications installed on your
device that have been prohibited by your administrator. To remove a prohibited
application, select the radio button beside the application name and click the
Uninstall button. You must also click OK to confirm the Uninstall action. Once the
prohibited application is uninstalled, the Prohibited tab shows “No Detections.”
If you do not uninstall applications that are prohibited, the notification icon continues
to appear at the top of the Junos Pulse screen and you are prompted with the
Prohibited applications detection screen each time a scan is performed.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are prohibited.
Figure 13: Scan Results Prohibited Tab
Copyright © 2012, Juniper Networks, Inc. Using Security Features 13
Malware: This tab (see Figure 14 on page 14) lists the applications installed on your
device that are known to be malware. To remove malware, select the radio button
beside the application name and click the Uninstall button. If you do not uninstall
applications that are found to be malware, the notification icon continues to appear
at the top of the Junos Pulse screen.
Informational Note: On some devices, Junos Pulse can automatically uninstall
applications that are found to be malware.
Figure 14: Scan Results Malware Tab
14 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Suspicious: This tab (see Figure 15 on page 15) lists the applications installed on your
device that appear to be suspicious. The suspicious label is applied to an application
when a set of heuristics determine that the application may be malware. For
suspicious applications, you are given the option of allowing the application or
uninstalling it. To allow a suspicious application, select the radio button beside the
application name and click the Allow button. You must also click Yes to confirm the
Allow action. To uninstall a suspicious application, select the radio button beside the
application and click the Uninstall button. If you do not uninstall or allow
applications that are found to be suspicious, the notification icon continues to appear
at the top of the Junos Pulse screen.
Figure 15: Scan Results Suspicious Tab and Allow Prompt
Copyright © 2012, Juniper Networks, Inc. Using Security Features 15
Allowed Suspicious applications: When you allow a suspicious application, you are
provided with a separate screen from which to manage suspicious applications in
case you change your mind and want to uninstall an allowed application at a later
time (see Figure 16 on page 16). By selecting the check box beside the application
name and clicking the Do not allow button, you can move the allowed application
back to the Suspicious tab. The allowed applications screen is accessible from the
AntiVirus screen View Allowed Suspicious App Open button. (see Figure 12 on
page 12).
Figure 16: Allowed Suspicious Applications Screen
16 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Viruses: This tab (see Figure 17 on page 17) lists the viruses found during the last scan.
It is recommended that you delete viruses when they appear here.To delete the virus
from your device, select the check box beside the virus name and click the Delete
button. To delete multiple viruses at one time, select the Check All button and then
the Delete button.
Figure 17: Scan Results Viruses Tab
Monitor and Control
The Monitor and Control screen lets you view your current Junos Pulse settings as well
as events and log files. To use Monitor and Control:
1. Start Junos Pulse.
2. Select Security.
3. Select Monitor and Control (see Figure 11 on page 10).
The Monitor and Control screen shows the following settings.
Monitoring
SMS: Inbound and outbound SMS messages are logged, including the sender, receiver
and contents of each message.
MMS: Logging MMS messages is not supported at this time.
Voice: Call history events are logged, such as initiated outgoing calls and received
incoming calls (call duration is not recorded, but the remote phone number is noted.)
Log images/pictures: If enabled from the server, the images downloaded or captured
on the device are turned into thumbnail images and uploaded to the server. This
occurs immediately and is not dependent on log limits.
Copyright © 2012, Juniper Networks, Inc. Using Security Features 17
Logs:
Event limit: When the total number of events (SMS, email, voice) crosses this
threshold, the full suite of logs is uploaded to the server.
File size limit: When the total combined file size of all logs (SMS, email, voice) crosses
this threshold, the full suite of logs is uploaded to the server. Note that SMS messages
are generally several hundred bytes in size. Emails are usually 2KB or larger (no
attachments included). And voice messages are typically 200 hundred bytes.
Control:
Periodic GPS updates: This update period is configured on the server. This setting
periodically queries the device position and uploads that information to the server for
tracking purposes.
Block calls: When enabled, blocks all outbound calls.
Back Up Data
Junos Pulse Mobile Security backs up contact and calendar appointment information to
a central location.
To restore data, you must contact your administrator. The administrator initiates a
restore in the form of an SMS command that tells your device to contact the server to
retrieve your backup.
To back up device data:
1. Start Junos Pulse.
2. Select Security.
3. Select Backup Data (see Figure 11 on page 10). The backup begins (see Figure 18 on
page 19).
To restore device data, contact your administrator.
18 Using Security Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 18: Backing Up Data
Security Settings
Security settings are configured by your administrator, and changes are downloaded to
your device. You may change security setting updates and scanning intervals by doing
the following:
1. Start Junos Pulse.
2. Select Security.
3. Select Security Settings (see Figure 11 on page 10).
4. Optionally set the following (see Figure 19 on page 20):
Update security settings: You can specify how often your device contacts the
Junos Pulse server for updated settings. To perform an immediate update, select
Update Now.
Automatically scan device: This setting is configured by the administrator and
you cannot change it.
Copyright © 2012, Juniper Networks, Inc. Using Security Features 19
Figure 19: Security Settings
Anti-Theft Features
There are a number of measures that can be taken to protect your device if it is lost or
stolen. To activate anti-theft features, contact your administrator. Those features
include:
Informational Note: SIM Change or Removal and Wipe Handset— These features
perform differently on different Android OS versions as follows:
On Android OS 2.2 and higher
SIM Change or Removal—If the Device Administrator function is activated and
Wipe is enabled, a wipe command sets the device back to factory settings. No
lock is performed. If the Device Administrator function is not activated and the
SIM card is removed or changed, the device switches on GPS Theft Mode,
Monitor & Control logging, and the device is locked.
Wipe Handset—If the Device Administrator function is activated, a wipe
command sent from the server sets the device back to factory settings. If the
Device Administrator function is not activated, a wipe command deletes
scheduling, contact and task information, SMS messages, and the memory card.
On Android OS 2.1
SIM Change or Removal—If the SIM is removed, the device switches on GPS
Theft Mode, Monitor & Control logging, and the device is locked. If the SIM is
swapped for another, the device does all the preceding actions, plus checks if
Wipe is enabled, and can wipe sensitive device information automatically.
Wipe Handset—Deletes scheduling, contact and task information.
20 Anti−Theft Features Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Lock and Unlock Handset —Locks the device until such time that an unlock
command is sent from the server or by entering the screen lock PIN, password, or
pattern (if one has been set). If no screen lock PIN, password, or pattern has been set,
the only way to unlock the device is to send an unlock command from the server.
− Emergency Call Button—When the device is locked, an Emergency Call button is
available from the unlock screen. You can make an emergency call, to 911 for
example, when you select this button and enter an emergency number.
Send Backup—If this data is not stored on the server, this feature gathers the backup
information from the device and emails it to the email address provided in the
registration process.
GPS Location—If your device is equipped with GPS, your administrator can locate
your device. Device location is displayed on the Junos Pulse server.
Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a
nearby location.
GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5
minute period to fine-tune GPS location if the device is stolen.
Uninstalling or Clearing Data
When you register your device for security features, you are registering with the Junos
Pulse Mobile Security Gateway. In some cases, you may need to register your device
with a different Junos Pulse Mobile Security Gateway after the initial registration or you
may need to clear your devices’ Junos Pulse settings for another reason. You can
accomplish this by uninstalling Junos Pulse or by manually clearing all settings as
follows.
1. From the main menu, select Settings > Applications > Manage Applications >
Junos Pulse.
2. To uninstall Junos Pulse, select the Uninstall button (see Figure 20 on page 22).
or
3. To clear all Junos Pulse data, select the Clear data button.
If the Device Administrator function is activated, you can uninstall Junos Pulse by doing
the following:
1. From the main menu, select Settings> Location & Security (or just Security on
some devices).
2. Select Device Administrator and uncheck the Junos Pulse check box. Now you can
begin the regular uninstall process.
Your administrator provides instructions for reregistering Junos Pulse.
Copyright © 2012, Juniper Networks, Inc. Uninstalling or Clearing Data 21
Figure 20: Junos Pulse Application Info Screen
User Interface Modes
Your administrator can deploy Junos Pulse to your device with varying features sets
available to you through the Junos Pulse UI. You can have a full UI with all possible
Junos Pulse features visible to you or you can have a minimal or security UI that includes
a subset of Junos Pulse features that are visible to you. The possible UI modes that your
administrator can deploy to your device are as follows:
Full UI: The full UI includes all available Junos Pulse features as described in this
manual.
Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a
Home screen that provides an About button. For supported devices only, detected
viruses, malware, and prohibited applications are deleted automatically. For malware
and prohibited applications, a notification is displayed when an application removal
occurs. When you tap on the notification, a screen appears which provides
information on the application that was removed. You can tap the Clear button
remove the notification. See Figure 21 on page 23.
22 User Interface Modes Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Figure 21: Prohibited Application Removal Notification
If your device does not support automatic deletion, prompts are displayed after each
device scan until you uninstall the malware or prohibited application. For further
details, refer to “Scan Results Tabs” on page 13.
Security UI: The security UI includes only the Junos Pulse security features and does
not provide the ability to make VPN connections.
Device Feature Support
The following features are supported for Junos Pulse on Android Devices.
Table 1: Junos Pulse Feature Support for Android
Feature Supported for Android
Alarm On/Off Yes
Antispam No
Antivirus Yes
Application Inventory Yes
Application Removal Yes
Automatic Registration Yes
Backup/Restore Contacts & Calendar Yes
Contacts Log Yes
Device Identity Servers Yes
Enterprise VPN support Yes
Enterprise Web Portal Yes
Copyright © 2012, Juniper Networks, Inc. Device Feature Support 23
Table 2: Android Device Personal Data Erased by Junos Pulse Handset Wipe Command
Exchange provisioning No
Firewall No
GPS Location/Tracking Yes
GPS Theft On/Off Yes
Log Email No
Log Images Yes
Log MMS Messages No
Log SMS Messages Yes
Log Web Images No
Log Event/Size Limits Yes
Lock/Unlock Device Yes
Lock on SIM Change Yes
Malware Scan Interval Yes
Monitor and Control Report Yes
Passcode Requirements No
Policy Based Client UI Yes
Prohibited Applications Yes
Restrictions on device usage No
Scan card Yes
Scan device Yes
SCEP server support No
Update Profile Yes
Update Virus Definitions Yes
Voice Log Yes
VPN provisioning No
VPN strong authentication (PKI or 2FA) Yes
Wi-Fi provisioning No
Wipe Device Yes
Wipe on SIM Change Yes
Personal Data Wiped on Android
Appointments No
Calendar Memos No
Calendar ToDos No
Call History Yes
Contacts Yes
Email Boxes No
Memory Card Yes
Notes No
SMS and MMS SMS only
Tasks No
Feature Supported for Android
24 Device Feature Support Copyright © 2012, Juniper Networks, Inc.
Installing and Using Junos Pulse for Google Android
Technical Support
For technical issues, contact your administrator.
Known Issues and Limitations
Android has limitations in its support for certificates. If you experience the "No cert"
error, or if Junos Pulse closes unexpectedly when you try to connect, contact your
administrator.
At this time, you can only send log files to the administrator using email. No other
methods are supported.
Although Photo and Video Share appears as an option when you select Send Logs, it
is not a valid method for sending logs. You should not select that option when sending
log files to the administrator.
When the device is locked by either the Handset Lock command or the Lock on SIM
Change command, you may still be able to access the device’s Home screen and the
Notifications screen.
If a device does not have cell service, it cannot receive commands. For example, if a
device is connected only through WiFi, commands such as Lock and Wipe are not
received by the device.
If the Device Administrator is not activated, automatic removal of malware and
prohibited applications, as well as the automatic application removal feature, are
only available on certain Samsung devices. Please refer to the Junos Pulse Supported
Platforms Guide for details.
Copyright © 2012, Juniper Networks, Inc. Technical Support 25
26 Known Issues and Limitations Copyright © 2012, Juniper Networks, Inc.
Index
Index
A
allowed suspicious applications . . . . . . . . . . . . . . . . . . . . .11allowed suspicious applications screen . . . . . . . . . . . . . . . .16anti-theft features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
alarm on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21GPS location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21GPS theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21send backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21sim change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20wipe handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10definitions update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11last scanned for viruses . . . . . . . . . . . . . . . . . . . . . . . . . .11scan file or folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11view allowed suspicious app . . . . . . . . . . . . . . . . . . . . . .11view scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
automatic application removal . . . . . . . . . . . . . . . . . . . . . .13automatic URL registration . . . . . . . . . . . . . . . . . . . . . . . . . .7available features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
B
back up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
C
clear data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21connecting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2, 4
add a connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3status icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4status screen, full VPN . . . . . . . . . . . . . . . . . . . . . . . . . . .4URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
D
device administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9download application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
E
EULA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
F
feature support chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
I
installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
L
license code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
limited access, non-compliance . . . . . . . . . . . . . . . . . . . . . . 6
M
malware applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14malware detection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7minimal UI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
N
notifications icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
P
prohibited applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
R
restore data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
S
scan results
malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14prohibited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13prohibited applications. . . . . . . . . . . . . . . . . . . . . . . . . . 13suspicious . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
scan results screen . . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 12secure connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10automatic URL registration. . . . . . . . . . . . . . . . . . . . . . . . 7license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7register for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19suspicious applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
allowed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
U
uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21user interface modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
V
viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
W
WIFI only devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Copyright © 2012, Juniper Networks, Inc. Index 1
2 Inde
x Copyright © 2012, Juniper Networks, Inc.