22
October 2012 R1 Release 4.0 Copyright © 2012, Juniper Networks, Inc. Junos Pulse for Google Android User Guide

Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

  • Upload
    lamcong

  • View
    243

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

October 2012

R1

Release

4.0

Copyright © 2012, Juniper Networks, Inc.

Junos Pulse for Google Android

User Guide

Page 2: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

ii Copyright © 2012, Juniper Networks, Inc.

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and

other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks,

registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any

inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.

Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or

licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579,

6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2012, Juniper Networks, Inc. All rights reserved.

M10/30/12

Page 3: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Table of Contents

Downloading and Installing Junos Pulse...........................................................1Available Junos Pulse Features...................................................................1

Registering Security .........................................................................................2The Mobile Security Dashboard .................................................................3Email Address Validation...........................................................................3

Using Security Features....................................................................................3Scan/Threats detected ...............................................................................4Backup ......................................................................................................6Remote Monitoring....................................................................................7Web Security .............................................................................................8

Settings ............................................................................................................8Security Settings ........................................................................................8Support Info ..............................................................................................9Update.......................................................................................................9

Anti−Theft Features...........................................................................................9Password Policies and Storage Encryption...............................................11Scream Dismiss .......................................................................................11Custom Button.........................................................................................11

Uninstalling or Clearing Data .........................................................................12Adding a Secure Connection ..........................................................................12Connecting.....................................................................................................13

Viewing Connection Status Icon ..............................................................13Viewing Connection Status Window ........................................................13Limited Access.........................................................................................14

User Interface Modes .....................................................................................14Known Issues and Limitations .......................................................................14

iii

Page 4: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

iv

Page 5: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Junos Pulse lets you access protected network resources from your Google Android™

device. It also protects your device against viruses and malware, and includes tools to

reduce the inherent risks of a lost or stolen device.

Additional information for Junos Pulse, including information on supported platforms,

can be found at http://www.juniper.net/support/products/pulse/mobile/

Downloading and Installing Junos Pulse

Use the following instructions to download and install Junos Pulse software on Google

Android devices.

Informational Note: The Junos Pulse client is available from the Google Play

application store.

1. From your Android device, download the Junos Pulse software directly to the

device. Once downloaded, Junos Pulse installs automatically.

2. Once the application has been downloaded and installed, the

Junos Pulse icon appears in the applications menu.

3. The first time you start Junos Pulse, the End User License

Agreement appears. You must Accept the license to begin using Junos Pulse.

Available Junos Pulse Features

Informational Note: Junos Pulse can be deployed with all available features or with a

subset of features based on your usage needs. You may not have all of the Junos Pulse

features described here on your device.

Junos Pulse can include the following features:

Security Tab

Scan/Threats Detected: Lists threats that have been found on the device and gives

you the ability to allow or remove suspicious applications. When no threats are found

this button reads “Scan.” When threats are found, this button reads “Threats

Detected.”

Backup: Lets you backup Contacts and Calendar events.

Remote Monitoring: Provides information on what device activities are being

monitored.

Anti Theft: Lists the anti−theft features that are activated on your device.

Custom Button: Provides a link to a customized URL which takes you to a web page

that is set up by your service provider

Copyright © 2012, Juniper Networks, Inc. Downloading and Installing Junos Pulse 1

Page 6: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

VPN Tab

Informational Note: This service is only offered if you are accessing your corporate

network resources securely.

Connections: Lets you add, edit, and remove corporate network connections.

Intranet: Provides Web links configured by your administrator. (Note that on Android

4.0, when VPN is enabled, the Intranet and Email buttons will be disabled. This is due

to the way the mobile client communicates with the SA gateway.)

Email: Launches your email application. (Note that on Android 4.0, when VPN is

enabled, the Intranet and Email buttons will be disabled. This is due to the way the

mobile client communicates with the SA gateway.)

Status: Lets you view, delete, and email log files, which you might need to do in a

troubleshooting operation. The log files show all security incidents, such as virus scan

times and viruses discovered. If you have an established VPN connection, you can

also view the status of that connection from this window.

Registering Security

The Junos Pulse Mobile Security Suite provides access to features that protect your

device from malware and viruses and it allows you to backup your device’s calendar and

contact information to a central server. You must register your device before you can

access the security feature set.

Your can register with automatic URL registration or using a manual registration

process.

Automatic URL Registration

Automatic URL registration requires you to select a URL provided by your administrator

or service provider. Once you select the URL, you are prompted to verify that the URL

comes from a trusted source. When you tap Yes from this prompt, the automated

security registration process takes place.

To register security features automatically, do the following:

1. Start Junos Pulse.

2. Select the registration URL provided to you via email, text message, or Web site.

3. Because the automatic registration changes the security settings on your device,

you should verify the validity of the URL. If you are certain the URL is trusted, select

Yes when prompted.

Once you select Yes, your device is automatically registered for security features.

Manual Registration

In some cases, manual registration may also require you to select a URL. Once you

select the URL, you are prompted to verify that the URL has comes from a trusted

source. When you tap Yes in the registration prompt, the manual registration window

appears.

The registration window requires that you to enter information such as a license code

provided to you by your administrator or service provider.

Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no

cellular service), the phone number field does not appear in the registration window.

2 Registering Security Copyright © 2012, Juniper Networks, Inc.

Page 7: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

To manually register security features, do the following:

1. Start Junos Pulse.

1. Select the URL provided via email, text message, or Web site.

2. Verify the URL is trusted and tap Yes when prompted. The registration window

appears.

3. Enter an Email address and Password.

4. Specify the License Code.

5. Your device’s phone number appears in the Phone Number box. If the number does

not appear, enter it manually including Country Code and Area Code without the

international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special

characters. Valid phone numbers are between 11 and 15 digits (including country

code).

6. Select Register.

The Mobile Security Dashboard

The dashboard is one of the servers with which you register your device. If you are given

access to the dashboard (This access is optionally given by an administrator or service

provider.), you can login to monitor your device, control some security settings, and

change your email address and password. You can access the dashboard web interface

using a URL provided to you. For dashboard login and configuration details, please refer

to the Junos Pulse Mobile Security Dashboard documentation.

Email Address Validation

After you first login to the dashboard, you receive an email requesting that you validate

your email address. This email contains a link that you must click to validate your email

address. After you click the link, a web page notification appears informing you that your

email address has been validated.

Using Security Features

Once you have successfully registered, if your device is running Android 2.2 or higher, the

Activate device administrator prompt appears.

Informational Note: If you do not activate the Device Administrator, some features

behave differently. See the following sections for details: “Anti−Theft Features” on

page 9 and “Uninstalling or Clearing Data” on page 12.

When security features are registered, the available features appear and are now

accessible from the Security tab. Those features are as follows:

Scan/Threats Detected: Lists threats (viruses and malware) that have been found

on the device and gives you the ability to allow or remove suspicious applications.

When no threats are found this button reads “Scan.” You can tap it go to the Scan

window. When threats are found, this button reads “Threats Detected.” You can tap it

to view the detected threats.

Backup: Lets you backup Contacts and Calendar events.

Copyright © 2012, Juniper Networks, Inc. Using Security Features 3

Page 8: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Remote Monitoring: Provides information on what device activities are being

monitored.

Settings: Available from the Menu key. Settings allows you to set scan intervals, view

support information and application logs, update virus signatures and update Junos

Pulse software.

Scan/Threats detected

Anti−Virus and malware detection protects your device by scanning all files and scanning

secure digital (SD) cards to prevent device infections. To view threats and configure

settings for threat detection:

1. Start Junos Pulse.

2. Select the Security tab.

3. If threats have been found, tap the Threats detected button. This takes you to the

Scan Results window.

4. The Scan Results window lists the viruses, malware, suspicious applications and

prohibited applications found on your device. If your device does not have Threat

detection enabled, you only see the prohibited applications found on your device.

Informational Note: From the Notification bar, the following

notification appears when you have a detected threat.

Detections Tab

Each detected item is displayed in the Detections tab. You can select the orange button

beside the detected item to view more information about the detection and see the

available actions. Detection types and available actions are as follows:

Prohibited Application: This is an application that has been prohibited. To remove a

prohibited application, select the orange button beside the application name and tap

the available Uninstall button. If you do not uninstall applications that are prohibited,

the notification icon continues to appear at the top of the Junos Pulse window.

Informational Note: On some devices, Junos Pulse can automatically uninstall

applications that are prohibited.

4 Using Security Features Copyright © 2012, Juniper Networks, Inc.

Page 9: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Critical Malware: This is an application installed on your device that is known to be

malware. To remove malware, select the orange button beside the application name

and tap the available Uninstall button. If you do not uninstall applications that are

found to be malware, the notification icon continues to appear at the top of the Junos

Pulse window.

Informational Note: On some devices, Junos Pulse can automatically uninstall

applications that are found to be malware.

Suspicious Application: This is an application installed on your device that appears

to be suspicious. The suspicious label is applied to an application when a set of

heuristics determine that the application may be malware. For suspicious

applications, you are given the option of allowing the application (adding it to your

While list) or uninstalling it. To allow a suspicious application, select the orange button beside the application name and tap the available Allow button. You must

also tap Yes to confirm the Allow action and then tap OK to confirm that you realize

this action may put your device at risk. (You can choose to hide the last dialog so it

does not appear again.)

To uninstall a suspicious application, select the orange button beside the application

and tap the Uninstall button. If you do not uninstall or allow applications that are

found to be suspicious, the notification icon continues to appear at the top of the

Junos Pulse window.

Tap the View Detail button to access more information on the suspicious

applications. You can also Allow or Uninstall the application from the details window.

Virus: Viruses found during the last scan are listed in the Detections tab. It is

recommended that you delete viruses when they appear here. To delete the virus

from your device, select the orange button beside the virus name and tap the

Remove button. Tap the View Detail button to access more information on the

detected virus. You can also Remove the virus from the details window.

Copyright © 2012, Juniper Networks, Inc. Using Security Features 5

Page 10: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Scan button: The Scan button at the top of the Detections tab displays the how long

ago the most recent device scan occurred. You can tap the Scan button to open a

window which allows you to initiate one of three types of available device scans.

Select one of the following scan options and tap OK to start the scan.

− Application scan: Scans all non−system applications.

− Application and SD card scan: Scans all non−system applications and the SD

card.

− Full device scan: Scans all files, non−system applications, and the SD card.

Informational Note: When you manually initiate a full device scan, a Battery usage

warning may appear. It is to inform you that scans can use large amounts of battery life.

Therefore, you may want to have your device charging during the scan.

White list Tab

When you allow a detected suspicious application, it appears in your White list tab.

From the White list tab, you can manage suspicious applications in case you change

your mind and want to uninstall an allowed application at a later time. By selecting

the orange button beside the application name and taping the available Uninstall button, you can uninstall the white−listed application. You can also tap the View Detail button to view more information about the application and then Uninstall the

application from the detail window.

Backup

Junos Pulse Mobile Security backs up contact and calendar appointment information to

a central location. To restore data, you must contact your administrator or access the

dashboard. A restore occurs in the form of an SMS command that tells your device to

contact the server to retrieve your backup.

To back up device data:

1. Start Junos Pulse.

2. Select the Security tab.

3. Select Backup. The time of the last backup is displayed on the Backup button.

4. From the Backup window, the number of Contacts and Calendar events previously

backed up is displayed. To initiate a backup, tap the Backup button at the top of the

window. The backup immediately begins.

6 Using Security Features Copyright © 2012, Juniper Networks, Inc.

Page 11: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Remote Monitoring

The Remote Monitoring window lets you view the device event types and activities that

are being monitored. To view the Remote Monitoring window, do the following:

1. Start Junos Pulse.

2. Select the Security tab.

3. Select Remote Monitoring.

The Remote Monitoring window may display one or more of the following monitored

activities:

Monitoring

SMS: Inbound and outbound SMS messages are logged, including the sender, receiver

and contents of each message.

MMS: Logging MMS messages is not supported at this time.

Voice: Call history events are logged, such as initiated outgoing calls and received

incoming calls (call duration is not recorded, but the remote phone number is noted.)

Log images/pictures: If enabled from the server, the images downloaded or captured

on the device are turned into thumbnail images and uploaded to the server. This

occurs immediately and is not dependent on log limits.

Logs:

Event limit: When the total number of events (SMS, email, voice) crosses this

threshold, the full suite of logs is uploaded to the server.

File size limit: When the total combined file size of all logs (SMS, email, voice) crosses

this threshold, the full suite of logs is uploaded to the server. Note that SMS messages

are generally several hundred bytes in size. Emails are usually 2KB or larger (no

attachments included). And voice messages are typically 200 hundred bytes.

Control:

Periodic GPS updates: This update period is configured on the server. This setting

periodically queries the device position and uploads that information to the server for

tracking purposes.

Block calls: When enabled, blocks all outbound calls.

Copyright © 2012, Juniper Networks, Inc. Using Security Features 7

Page 12: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Web Security

If Web Security is enabled on your device, URLs that you are attempting to access may

be blocked or monitored. If a URL is blocked by the security policy on the device, the

web browser displays a page informing you that the web site you are attempting to view

is blocked.

When Web Security is active on your device, a notification at the bottom of the Junos

Pulse screen informs you of this.

Settings

From the Settings window, you can configure security settings such as scanning options

and virus signature update intervals. You can also view support information and log

files.

From within the Junos Pulse application, you can access the Settings window through

the Settings button. Locate the Settings button by doing the following:

Select the three vertical dots on the right side of the Action bar (for Android 4.0 and

later) to access the menu. Select Settings from the menu.

Select the Menu button (Android 3.0 and earlier) to access the menu. Select Settings

from the menu.

From the Settings window, you can access the following:

Security Settings

Security settings are configured by your administrator or service provider, and changes

are downloaded to your device. You may change security settings by selecting the

orange arrow beside the Security Settings to access the following:

Scan applications on install: When enabled, a scan is initiated on an application

when it is installed. A malware scan also takes place on files downloaded to

/sdcard/download. When disabled, a scan only occurs at the scheduled interval or

when manually initiated. Select the check box to enable this feature.

Scan SD Card on Insert: Scans the SD card for malware and viruses. Select the check

box to enable this feature.

Action bar button Menu button

8 Settings Copyright © 2012, Juniper Networks, Inc.

Page 13: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Scan inside archives: Scans the contents of compressed files such as .zip and .apk

files.

Optimize media scanning: Allows for faster scanning of photos, media, and music

files by not re−scanning large files that have already been scanned (unless those files

have changed).

Full device scan: Displays the time interval in which a full device scan occurs. A full

device scan scans all files, the SD card, and non−system applications. Select the arrow

beside the time interval to change the scan interval.

Profile update: Virus definitions are loaded when you register, and they are updated

on a preset schedule. Select the arrow beside the time interval to change the update

interval.

Support Info

You can view device and Junos Pulse application information as well as view and send

logs by selecting the orange arrow beside Support Info in the Settings window. This

takes you the Support Info window where you can do the following:

Tap the View Logs button to see the log file data. From this data window, you can

select which log type to view from the pulldown list and you can clear the log file by

tapping the Clear Logs button.

Tap the Send Logs button to select an application from which to send the log file.

Informational Note: You can only send log files using an email application. No other

methods are supported at this time.

Update

You can update the virus list and the Junos Pulse application (if updates exist for both)

by selecting the orange arrow beside Update in the Settings window. This takes you to

the Update window. From here you can check for updates for the following:

Virus List: If there is an update available, tap the Update button to update your virus

list. If there is no Update button, your list is likely up to date. An available Check

button allows you to check for updates.

Application: If there is an update available for Junos Pulse, tap the Update button to

update your software. If there is no Update button, your software is likely up to date.

An available Check button allows you to check for updates.

Anti-Theft Features

There are a number of measures that can be taken to protect your device if it is lost or

stolen. If your Junos Pulse deployment makes these features visible to you, an Anti Theft button appears on your Junos Pulse home screen. When you tap this button, the

anti−theft features that are activated on your device are listed.

You can tap the Manage Anti-Theft Features button from the Anti Theft window to go

to your service provider’s web site to purchase or view more anti−theft features.

Anti−theft features include:

Copyright © 2012, Juniper Networks, Inc. Anti−Theft Features 9

Page 14: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Lock Handset and Unlock Handset —Locks the device until an unlock command is

sent from the server or by entering a device password that matches the device

password policy. When a lock command is sent from the server to the device, a new

password can be generated, as well. This password may be sent via email to you and

you can modify it. When the lock command is triggered with this newly generated

password, the following occurs on various devices:

If the Device Administrator is enabled and the device already has a password

configured:

− When a lock command is sent with a new password, the device is locked

with the existing password. The new password from the server is not used.

− When a lock command is sent with an empty password, the device is locked

with the existing password. The password from the server is not used.

If the Device Administrator is enabled and the device does not have a password

configured:

− When a lock command is sent with a new password, the device is locked

with this new password.

− When a lock command is sent with an empty password, the device is NOT

locked.

If the Device Administrator is disabled and the device is automatically registered:

− When a lock command is sent with a new password, the device is locked

with this new password. (Irrespective of password configured on the device.)

− When a lock command is sent with an empty password, the device is NOT

locked.

If the Device Administrator is disabled and the device is registered manually:

− When a lock command is sent with a new password, the device is locked

with this new password. (Irrespective of password configured on the device.)

− When a lock command is sent with an empty password, the device is NOT

locked.

Emergency Call Button—When the device is locked, an Emergency Call button is

available from the unlock window. You can make an emergency call, to 911 for

example, when you select this button and enter an emergency number.

SIM Change—(On Android OS 2.2 and later) If the Device Administrator function is

activated and Wipe is enabled, a wipe command sets the device back to factory

settings. No lock is performed. If the Device Administrator function is not activated

and the SIM card is changed, the device switches on GPS Theft Mode and the device

is locked.

SIM Change— (On Android OS 2.1) The device switches on GPS Theft Mode and the

device is locked. If Wipe is enabled, sensitive device information is wiped

automatically.

Wipe Handset— (On Android OS 2.2 and later) If the Device Administrator function is

activated, a wipe command sent from the server sets the device back to factory

settings. If the Device Administrator function is not activated, a wipe command

deletes scheduling, contact and task information, SMS messages, and the memory

card.

10 Anti−Theft Features Copyright © 2012, Juniper Networks, Inc.

Page 15: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Wipe Handset—(On Android OS 2.1) Deletes scheduling, contact and task

information.

Send Backup—If this data is not stored on the server, this feature gathers the backup

information from the device and emails it to the email address provided in the

registration process.

GPS Location—If your device is equipped with GPS, your administrator can locate

your device. Device location is displayed on the Junos Pulse server.

Alarm On and Off (Scream locate)—Blares a maximum volume alarm sound to

locate the device in a nearby location.

GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5

minute period to fine-tune GPS location if the device is stolen.

Password Policies and Storage Encryption

Junos Pulse can enforce password and storage encryption policies on your device. This

means that you are required to use a device password and set up device data

encryption that meets the criteria of the Junos Pulse security policy.

A password policy can include but is not limited to requirements such as the number of

required characters, the frequency in which you must change your password, the

number of failed password entry attempts that can occur before the device is wiped,

and the amount of time your device can remain idle before an auto−lock occurs. Also,

your password can be remotely reset and sent to you via email. For example, if your

device is remotely locked, an unlock command may reset your password with the new

password being sent to you in an email.

If you have not set a device password or if your password does not meet the password

policy requirements, you are prompted to reset your password so that it meets those

requirements.

As part of your device security policy, you may be required to encrypt your application

data. If this is the case, a prompt will inform you of this requirement. You are continually

prompted until you set the data encryption feature on your device. If you fail to meet the

security policy requirements within a given period of time, it is possible for your device to

be remotely locked or wiped.

Scream Dismiss

From the dashboard, a scream command can be sent to your device which allows you

to audibly locate the device if it’s within hearing distance, even if the speakers and ringer

are muted. Once you locate the device, you can turn off the scream from the

Notification bar. Select the Scream activated notification to dismiss the scream.

Custom Button

If your Junos Pulse deployment makes this feature visible to you, an additional button

customized by your service provider, appears on your home screen. When you tap this

button, a customized URL takes you to a web page that is set up by your service

provider. This page may offer the purchase of additional features or it may provide

additional information. This will vary by service provider.

Copyright © 2012, Juniper Networks, Inc. Anti−Theft Features 11

Page 16: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Uninstalling or Clearing Data

You may need to re−register your device after the initial registration or you may need to

clear your devices’ Junos Pulse settings for another reason. You can accomplish this by

uninstalling Junos Pulse or by manually clearing all settings as follows.

1. From the main menu, select Settings > Applications > Manage Applications >

Junos Pulse.

2. To uninstall Junos Pulse, select the Uninstall button.

or

3. To clear all Junos Pulse data, select the Clear data button.

If the Device Administrator function is activated, you can uninstall Junos Pulse by doing

the following:

1. From the main menu, select Settings> Location & Security (or just Security on

some devices).

2. Select Device Administrator and uncheck the Junos Pulse check box. Now you can

begin the regular uninstall process.

Adding a Secure Connection

Informational Note: This service is only offered if you are accessing your corporate network resources securely.

Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an

authenticated connection to a protected network. You can add a connection for each

different network to which you connect. This is a secure VPN connection to your

corporate network or a core access SSL channel to web bookmarks configured by your

administrator.

To define a connection, do the following:

1. Start Junos Pulse.

2. From the VPN tab, select Connections.

3. Select Add Connection.

4. Enter the connection properties as follows:

Connection name: A descriptive name.

URL: The Web address provided by your administrator.

(Note that Connection name and URL are the only required fields when creating a

connection profile. All other fields are optional.)

Username: Enter your username.

Realm: If your administrator has provided this information, enter the realm value.

Role: If your administrator has provided this information, enter the role value.

Uses Certificate: Select this check box if your administrator has provided you

with a digital certificate. If you do not use a certificate, you may have to provide a

username and password when you connect.

12 Uninstalling or Clearing Data Copyright © 2012, Juniper Networks, Inc.

Page 17: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

Certificate Path: This box is available if you selected the Uses Certificate check

box. Select Pick to browse to the certificate file. (Note that this field is required if

you have selected Uses Certificate.)

Key Path: This box is available if you selected the Uses Certificate check box.

Select Pick to browse to the network key provided by your administrator. (Note

that this field is required if you have selected Uses Certificate.)

5. Select Create Connection. Your connection is now created and saved.

Connecting

Once you have configured your connection, select the Connect button.

If the Select Connection field does not default to the correct connection, you can select

it from the pulldown menu. You may have to enter additional information required by

your network when you are establishing a connection.

Viewing Connection Status Icon

The status of your current connection also appears at the bottom of the Junos Pulse

window in the form of an icon. The appearance of the icon indicates whether the

connection is active, inactive, or limited by policy non−compliance (see Limited Access

on page 14).

The active connection icon also appears in the status bar at the top of your device

window. When you close Junos Pulse, that icon remains visible as long as your VPN

connection is active.

Viewing Connection Status Window

When you have an established, full VPN connection (not all devices support full VPN

capability), selecting the Status button in the main window displays the following VPN

information:

VPN Status: Connected or Disconnected

Server: Server URL

Duration

Bytes Sent

Bytes Received

Address

From the Notification bar, the following notification also appears when you have an

active VPN connection.

Informational Note: If you only have access to web bookmarks (Core Access rather

than VPN access) the VPN status is “Disconnected” but the Junos Pulse connection

icon will appear at the bottom of the Junos Pulse window.

Active Connection No Session Limited Access

Copyright © 2012, Juniper Networks, Inc. Connecting 13

Page 18: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Limited Access

To ensure the integrity of mobile devices that are accessing network resources, an

administrator can enforce a security policy with which mobile devices must comply in

order to connect to the network. If a device is found to be non−compliant when

attempting a secure network connection, only limited network access may be granted.

When your device is non−compliant, you are prompted with this information and you

may be presented with a Continue button which you can tap to obtain limited network

access.

Reasons for non−compliance may include the following:

Your device has been rooted.

Your device is running an operating system that is not allowed by the security policy.

Your device is not actively registered with the appropriate Mobile Security Gateway

(MSG) and/or Junos Pulse Mobile Security Suite is not active on your device.

You must remedy the non−compliance issue on your device before you can establish a

full network connection.

User Interface Modes

Your administrator or service provider can deploy Junos Pulse to your device with varying

features sets available to you through the Junos Pulse UI. You can have a full UI with all

possible Junos Pulse features visible to you or you can have a minimal or security UI that

includes a subset of Junos Pulse features that are visible to you. The possible UI modes

that your administrator can deploy to your device are as follows:

Full UI: The full UI includes all available Junos Pulse features as described in this

manual.

Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a

Home screen that provides an About menu. For supported devices only, detected

viruses, malware, and prohibited applications are deleted automatically. For malware

and prohibited applications, a notification is displayed when an application removal

occurs. When you tap on the notification, a screen appears which provides

information on the application that was removed. You can tap the Clear button

remove the notification.

Security UI: The security UI includes only the Junos Pulse security features and does

not provide the ability to make VPN connections.

Known Issues and Limitations

Android has limitations in its support for certificates. If you experience the "No cert"

error, or if Junos Pulse closes unexpectedly when you try to connect, contact your

administrator.

At this time, you can only send log files using email. No other methods are supported.

Although Photo and Video Share appears as an option when you select Send Logs, it

is not a valid method for sending logs. You should not select that option when sending

log files.

14 User Interface Modes Copyright © 2012, Juniper Networks, Inc.

Page 19: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Installing and Using Junos Pulse for Google Android

When the device is locked by either the Handset Lock command or the Lock on SIM

Change command, you may still be able to access the device’s Home window and the

Notifications window.

If a device does not have cell service, it cannot receive commands. For example, if a

device is connected only through WiFi, commands such as Lock and Wipe are not

received by the device.

If the Device Administrator is not activated, automatic removal of malware and

prohibited applications, as well as the automatic application removal feature, are

only available on certain Samsung devices. Please refer to the Junos Pulse Supported

Platforms Guide for details.

If your device registers with the MSG using automatic registration, and Lock on SIM

change is enabled, and you change the SIM, the only way to unlock the device is to put

the original SIM back in or to send an unlock command to the device from the

dashboard.

Copyright © 2012, Juniper Networks, Inc. Known Issues and Limitations 15

Page 20: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

16 Known Issues and Limitations Copyright © 2012, Juniper Networks, Inc.

Page 21: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

Index

Index

A

anti-theft features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9alarm on and off, scream locate. . . . . . . . . . . . . . . . . . . .11emergency call button . . . . . . . . . . . . . . . . . . . . . . . . . .10GPS location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11GPS theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11lock handset, new passcode set . . . . . . . . . . . . . . . . . . .10send backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10unlock handset, new passcode set . . . . . . . . . . . . . . . . . .10

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4automatic application removal . . . . . . . . . . . . . . . . . . . . . . .4automatic URL registration . . . . . . . . . . . . . . . . . . . . . . . . . .2available features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

B

back up data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

C

clear data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12connecting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12, 13

add a connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13realm. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12status icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13status screen, full VPN . . . . . . . . . . . . . . . . . . . . . . . . . .13URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12username. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

custom button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

D

dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3Detections tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4device administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3download application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

E

email address validation . . . . . . . . . . . . . . . . . . . . . . . . . . . .3emergency call button . . . . . . . . . . . . . . . . . . . . . . . . . . . .10EULA. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

I

installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

L

license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3limited access, non-compliance . . . . . . . . . . . . . . . . . . . . . 14

M

malware applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2Mobile Security Dashboard. . . . . . . . . . . . . . . . . . . . . . . . . . 3

O

optimize media scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

P

password policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11profile update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9prohibited applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

R

remote monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

S

scan button. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6scan inside archives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9scan results

malware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5prohibited . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4prohibited applications. . . . . . . . . . . . . . . . . . . . . . . . . . . 4suspicious . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

scream dismiss . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11secure connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

antivirus, malware detection. . . . . . . . . . . . . . . . . . . . . . . 4automatic URL registration. . . . . . . . . . . . . . . . . . . . . . . . 2manual registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2register for. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8send logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8storage encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11support info . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9suspicious applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

T

threats detected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

U

uninstall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Copyright © 2012, Juniper Networks, Inc. Index 1

Page 22: Junos Pulse for Google Android - Juniper Networks · Installing and Using Junos Pulse for Google Android Critical Malware: This is an application installed on your device that is

2 Inde

update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9user interface modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

V

validate email address. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3view logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9viruses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

W

web security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8WIFI only devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

x Copyright © 2012, Juniper Networks, Inc.