Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
Junos Pulse Mobile Protection CenterMonitoring and Security Guide
Consumer OEM Edition
February 2011
Revision 1.0
Release
2.0
Copyright © 2011, Juniper Networks, Inc.
ii
.
Junos® Pulse Mobile Protection Center
Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, California 94089408-745-2000www.juniper.net
Copyright © Juniper Networks, Inc.February, 2011
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2010, Juniper Networks, Inc. All rights reserved.
Copyright © 2011, Juniper Networks, Inc.
Table of Contents
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
What’s In This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Junos Pulse Mobile Protection Center Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 2 Adding Devices to the Junos Pulse Mobile Security Gateway. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Configure the Mobile Protection Center for Consumers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Chapter 3 Installing Junos Pulse On Smartphones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Installation Overview - All Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Android Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
BlackBerry Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Windows Mobile Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Chapter 4 Using the Mobile Protection Center for Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Home Tab Commands and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Settings Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Handset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Reports Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Alerts Setup Tab Information and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Support/Help Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Chapter 5 Using Junos Pulse Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Android Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
BlackBerry Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Junos Pulse Mobile Protection Center iii
:
iv
Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Manual Virus Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
OnDemand Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
File Monitor Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Windows Mobile Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
Antivirus. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Antispam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Backup Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Anti-Theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Chapter 6 Junos Pulse FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Junos Pulse FAQs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47
Copyright © 2011, Juniper Networks, Inc.
About This Guide
This guide describes how to create security policies using the Junos® Pulse Mobile
Protection Center and how to install and use Junos Pulse software on supported
smartphones.
Audience
This guide is intended for users who wish to configure controls for smartphone users,
providing security features and access control features.
What’s In This Guide
This guide contains the following chapters:
Chapter 1, “Introduction” on page 1
Chapter 2, “Installing Junos Pulse On Smartphones” on page 3
Chapter 3, “Using the Mobile Protection Center for Controls” on page 13
Chapter 4, “Using Junos Pulse Security” on page 21
Typographical Conventions
Table 1 describes the text conventions used throughout this manual.
Contacting Technical Support
Technical product support is available through the Juniper Networks Technical
AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support
contract,or are covered under warranty, and need post-sales technical support, you
can access our tools and resources online or open a case with JTAC.
Table 1: Typographical Conventions
Convention Description Examples
Bold typeface Indicates buttons, field names, dialog names, and other user interface elements.
Use the Scheduling and Appointment tabs to schedule a meeting.
Plain sans serif typeface
Represents:
URLs, file names, and directories
Example:
URL:Download the JRE application from: http://java.sun.com/j2se/
Italics Identifies:
Terms defined in text
Variable elements
Book names
Examples:
Variable element:Use settings in the Users > Roles > Select Role page to configure roles.
Copyright © 2011, Juniper Networks, Inc. Audience v
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf .
Product warranties—For product warranty information, visit
http://www.juniper.net/support/warranty/ .
JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
vi Contacting Technical Support Copyright © 2011, Juniper Networks, Inc.
Chapter 1
Introduction
The Junos® Pulse Mobile Protection Center collects data from designated
smartphones and uploads that data to the Mobile Protection Center that is accessible
from the Internet with a username and password. Using the Mobile Protection Center,
you can manage registered smartphones and enable features such as remote wipe in
case the smartphone is lost or stolen. You can also configure email alerts for suspicious
messages received by or sent from the smartphone. In this case, messages containing
customized keywords, such as drugs, alcohol, or messages that originate from, or are
destined to specific addresses, are automatically emailed to you.
Junos Pulse Mobile Protection Center Features
The Junos Pulse Mobile Protection center provides both control and security for
registered smartphones.
Control features include:
Monitor activity on the smartphone.
View pictures taken by the smartphone camera and sent or received via text or email.
View the content of all text messages and email messages.
Automatically receive alerts when keywords are found in messages sent or received.
List all applications and software installed on the smartphone.
Display the location of the smartphone in an online map.
Sound an alarm on the smartphone.
Use GPS to help locate a lost or stolen smartphone. (GPS functionality on Verizon
BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive
GPS Longitude and Latitude coordinates of 0.0, this functionality may have been
blocked by the service provider or the smartphone may be out of range of a satellite.)
Security features include:
Antispam—This feature blocks unwanted text messages and voice calls. This is
beneficial for stopping spam, though also useful for blocking communication from
undesirable sources.
Antivirus—This feature provides real-time protection against malware threats by
automatically scanning smartphones to ensure files are not infected with malware.
The on-demand scanning ability lets you scan selected files and folders to ensure the
smartphone and memory card are clean and protected. The automatic update
capability ensures that the smartphone possesses the latest antivirus signatures.
Backup and restore—This feature lets you backup contact and calendar information.
Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Protection Center Features 1
Firewall—The firewall security features let you block or allow data traffic to and/or
from your smartphone using rule lists that control traffic based on port number and ip
addresses.
Anti−theft—This set of features includes remote commands you can send to the
smartphone if it is lost or stolen. Those commands include: lock handset, wipe
handset, locate handset, and backup handset.
Note that not all features are available on all platforms. See Table 2 on page 21 for
supported platforms and features.
2 Junos Pulse Mobile Protection Center Features Copyright © 2011, Juniper Networks, Inc.
Chapter 2
Adding Devices to the Junos Pulse Mobile Security Gateway
Before consumers can use Junos® Pulse, you must perform some preliminary tasks to
prepare the Junos Pulse Mobile Protection Center for consumer use.
Configure the Mobile Protection Center for Consumers
Complete the following tasks so that the consumer can access the Mobile Protection
Center and use the available features.
1. Login to the Junos Pulse Mobile Security Gateway by pointing your browser to the
following URL and entering the credentials provided to you.
https://mss.junospulse.juniper.net
2. Once you are logged in, select the Devices tab.
3. Click Add to open the Add Device dialog
4. Specify the following:
Phone Number—Enter the phone number of the device, including the country
code and area code. For example, 16035551212.
5. Click Save. The gateway uses SMS to send a Junos Pulse software download link
and a Consumer license key to the smartphone.
Informational Note: Service providers may create an API that overrides these
distribution instructions. If so, refer to information from the service provider.
When the smartphone user clicks on the provided URL specific to their smartphone
platform, they download Junos Pulse. They must provide their license key to register
the product and they must create a username and password during this registration for
logging into the Mobile Protection Center.
See the Junos Pulse Mobile Security Gateway Administration Guide for more information.
Copyright © 2011, Juniper Networks, Inc. Configure the Mobile Protection Center for Consumers 1
2 Configure the Mobile Protection Center for Consumers Copyright © 2011, Juniper Networks, Inc.
Chapter 3
Installing Junos Pulse On Smartphones
This chapter describes the smartphone installation and registration process for each
supported platform.
Installation Overview - All Platforms
For all supported smartphone platforms, as part of the installation and registration
process, you will do the following:
Download the Junos Pulse Security software to the smartphone.
Register the Junos Pulse application in order to use the web-based Mobile Protection
Center features for configuring and deploying parent control and security features.
Create a username and password on the smartphone as part of the Junos Pulse
installation process. You will use this username (the username is an email address)
and password to login to the Mobile Protection Center over the Internet. Since this
username and password effectively allow you to control and monitor the
smartphone, you should not provide this information to the smartphone user.
Additionally, email alerts are sent to the email address provided as the username.
Therefore, this email address should not belong to the smartphone user.
Android Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
Informational Note: Junos Pulse is supported on Google Android 1.6, 2.1 and 2.2. The
Pulse client is available from the Android application store.
1. Using the Android smartphone’s web browser, download the Junos Pulse software
directly to the device.
2. Once the application has been downloaded, select the application for installation.
3. After selecting the application to install, you are prompted to allow the application
to use network communication and phone call components. Select OK. See
Figure 1 on page 4.
Copyright © 2011, Juniper Networks, Inc. Installation Overview - All Platforms 3
Figure 1: Allow Pulse to use Network Communications
4. Select the Install button to continue. The installation process may take a couple of
minutes to complete
5. Once the installation completes, you begin the registration process. Select the Pulse application icon from the Application menu.
6. The End User License Agreement appears. You must Accept the license to begin
the registration.
7. In the Registration screen, enter a valid Email account. (This is your email
address.)
8. Create a Password. It must be at least five characters in length.
Email and Password are used to set up your Mobile Protection Center account.
This information should not belong to the smartphone user and you should not
provide this information to the smartphone user.
9. Enter the License Code provided to you.
10. If it is not already entered automatically, enter the Phone Number including the
country code. (Include a “1” if you are in the USA. For example: 16145555555. Add a
“+” and the country code if you are outside of the USA. For example,
+4455555555)
11. Select Register. See Figure 2 on page 5.
4 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing Junos Pulse On Smartphones
Figure 2: Register Pulse
12. Following a successful registration, the application main window appears and the
following features are viewable. See Figure 3 on page 5.
Antivirus provides scanning functions to protect the smartphone data from
malware.
Monitor and Control reflects the settings you’ve chosen (or their defaults) for
monitoring your mobile activities from the Mobile Protection Center. The default
settings may enable all monitoring features: text messages, calls, email, and
pictures.
Backup Data backs up contact and calendar appointment information to the
Mobile Protection Center from the Android smartphone.
Figure 3: Security Features
Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 5
See “Android Security Features” on page 21 for Android Junos Pulse feature and
configuration information.
BlackBerry Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
Informational Note: Junos Pulse is supported on BlackBerry version 4.2 and later. The
Pulse client is available from BlackBerry App World.
Informational Note: Make sure data services are enabled on the smartphone so that
it can receive settings and virus definition updates.
1. Using the BlackBerry smartphone’s web browser, download the Junos Pulse
software directly to the device.
2. Open the Junos Pulse application from the Application or Download directory.
3. You are prompted to accept a user agreement in order for installation to proceed.
Use the Menu button to access the menu that lets you agree. Once you select I agree, the installation proceeds. See Figure 4 on page 6.
Figure 4: BlackBerry Pulse License Agreement
4. Next, enter your registration information. First, enter the License Key provided to
you when you purchased the product. Click Next. See Figure 5 on page 6.
Figure 5: Enter Licence Key
5. If your phone number has not been prepopulated in the license window, enter the
Phone number, including the country code. (Include a “1” if you are in the USA. For
example: 16145555555. Add a “+” and the country code if you are outside of the
USA. For example, +4455555555). Click Next.
6 BlackBerry Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing Junos Pulse On Smartphones
Figure 6: Enter Phone Number
6. Next enter a User and Password. The User is a valid email address and the
password requires a minimum of five characters. For your password, we
recommend that it contain lower case letters and/or numbers and that you avoid
using symbols. These fields are used to set up your Mobile Protection Center
account. Click Next.
Figure 7: Enter User and Password
7. Click Finish in the next window to begin the registration process. See Figure 8 on
page 8. You should see the following progress information.
Registering Device...
Downloading Virus Signatures....
Update Completed Successfully
Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 7
Figure 8: Finish the Registration Process
8. Following a successful registration, you can run the application by selecting the
Pulse icon from the main Applications folder window.
When you open the application, the following features are viewable: See Figure 9
on page 8.
Antivirus provides scanning functions to protect the smartphone data from
malware.
Backup and Restore functions backup your calendar and contact information to
a central server.
Figure 9: Junos Pulse Features
See “BlackBerry Security Features” on page 31 for BlackBerry Junos Pulse feature and
configuration information.
Windows Mobile Installation and Registration Instructions
Use the following instructions to download, install, and register Junos Pulse software.
Informational Note: Junos Pulse is supported on WIndows Mobile 6.0, 6.1, and 6.5.
The Pulse client is available from the Windows Mobile App store.
1. Using the Windows Mobile smartphone’s web browser, download the Junos Pulse
software directly to the device.
Upon download of the application to the smartphone, the .CAB file will appear in
the smartphone’s Program Files folder.
8 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing Junos Pulse On Smartphones
2. To initiate the installation, locate the installation .CAB file using File Explorer, accessible from the Start menu.
3. Select the .CAB file and respond to the prompt to specify the desired location for
the application, either Store to device or Store to memory card.
After you install Junos Pulse, you are prompted to reboot the phone in order for the
firewall application to work. Once installed, the Junos Pulse icon appears on the Start menu and in the Programs list.
4. Next, you begin the registration process. Select the Junos Pulse application icon.
5. Next, you must accept the license agreement (see Figure 10 on page 9). Select Accept to move on to the Registration screen.
Figure 10: Junos Pulse LIcense Agreement
6. In the Registration screen, enter the following information (see Figure 11 on
page 10):
Enter your Email address.
Enter your Password and Confirm it. This password must be at least 6
characters in length.
Specify the License Code provided when you purchased the product.
Enter the Phone number, including the country code.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 9
Figure 11: Windows Mobile Registration
7. To complete the registration, select Register. The registration process may take a
few moments.
8. When the smartphone is registered, a window appears indicating that the device
has registered successfully. Click OK on that window to continue.
9. Following a successful registration, you can run the application by selecting the
Junos Pulse icon from the Programs list.
When you open the application, the following features are viewable (see Figure 12
on page 11):
Connection lets you add, edit, and remove network connections.
Intranet provides Web links configured by a network administrator.
Email launches your email application.
Security provides access to the following security features:
Antispam protects your smartphone from unsolicited calls and SMS spam.
Antivirus provides scanning functions to protect the smartphone data from
malware.
Firewall features let you block or allow data traffic to and/or from
smartphone using rule lists that control traffic based on port number, IP
address, and other options.
Monitor and Control reflects the settings you’ve chosen (or their defaults)
for monitoring your mobile activities from the Mobile Protection Center. The
default settings may enable all monitoring features: text messages, calls,
email, and pictures.
Backup Data backs up contact and calendar appointment information to
the Mobile Protection Center from the smartphone
10 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Installing Junos Pulse On Smartphones
Status lets you view, delete, and email Junos Pulse log files, which you might
need to do in a troubleshooting operation. The log files show all security
incidents, such as virus scan times and viruses discovered.
About provides version information for Junos Pulse software.
Figure 12: Junos Pulse Main Screen
See “Windows Mobile Security Features” on page 35 for Windows Mobile Junos Pulse
feature and configuration information.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 11
12 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.
Chapter 4
Using the Mobile Protection Center for Controls
This chapter describes how to access and use the Junos Pulse Mobile Protection Center
to configure monitoring and security features for registered smartphones.
Overview
Once the Junos Pulse application is installed on the smartphone and you have setup an
email address and password as part of the smartphone installation and registration
process, you can use that email address and password to login to the Mobile Protection
Center. You access the Mobile Protection Center by entering the URL you received from
your service provider.See Figure 13 on page 13.
Figure 13: Mobile Protection Center Login Window
Once you login, the Home tab is displayed. See Figure 14 on page 14. From the Home
tab, you can find tabs for each functional area of the Mobile Protection Center. Those
tabs are as follows:
Home—Provides links to logged messages and calls, found viruses, installed applications, and photos. It also provides recent GPS locations.
Copyright © 2011, Juniper Networks, Inc. Overview 13
Settings—Configure different user accounts and smartphones you wish to monitor
Reports—Look for certain senders or keywords in a range of messages, based on
dates
Alert Settings—Configure parameters for triggering alerts. (You can also find Alert
status and configure alerts by clicking the Alert button in the upper right hand corner
of the Mobile Protection Center window.)
Figure 14: Home Tab
Home Tab Commands and Events
From the Home tab, you can issue commands and access smartphone events as
follows:
Commands
Click any of the following buttons to send the command in question. When you click a
command button, a window appears asking you to verify the command you have
chosen before it is sent.
Lock Device—Locks the smartphone if the device is lost or stolen, or if you wish to
stop the use of the device for any other reason.
Unlock Device—Unlocks the smartphone.
Locate Device—Sends a command to determine the GPS location of the
smartphone, with the result displayed in a map on the Home tab page.
Backup and Restore—Creates a copy of the contact list, calendar and tasks. This is
useful if a smartphone is lost or stolen.
Wipe Device—Removes personal data from the smartphone such as contacts,
calendar events, notes, call history, message folders, and all data on the SD card.
14 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Protection Center for Controls
Scream Locate—Allows the smartphone user to audibly locate a misplaced device
within hearing distance, even if the speakers and ringer are muted.
Events
When there are events present for any of the listed categories, a view more button
becomes available. See Figure 14 on page 14. You can delete event category items
(messages, voice calls, etc.) from the Mobile Protection Center when you click view more. In the window that appears, select the check box next to the item you want to
remove and click the Delete button. You can also click the Select All button and then
the Delete button to delete all items within that event category.
Messages—View messages (voice, email, text) received on the smartphone.
Click view more (if present) to view all listed messages. See Figure 15 on page 15.
Voice calls—View voice calls received on the smartphone.
Click view more (if present) to view all listed calls.
Antivirus events—View new antivirus events that have occurred.
Click view more (if present) to view all detected viruses.
New applications—View new applications that have been installed on the
smartphone.
Click view more (if present) to open a new window that lists newly installed
applications. You can remotely uninstall an application by selecting the check box
beside the application and click the Uninstall specific application on the handset
button.
New photos—View new photos stored on the smartphone.
Click view more (if present) to open a new window that displays photos as 20
pictures per screen.
Figure 15: Detected Message Events View More Window
Settings Tab Information and Configuration
From the Settings tab, you can configure Account Management and Handset
Management. See Figure 16 on page 18. For example, you can change the email
address to where alerts are sent.
Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 15
Account Management
You can remove, edit or add a new email address to a smartphone account.
To add an email address and corresponding password,
1. Select the Settings tab.
2. From the Select phone to view pulldown in the top right corner, select the
smartphone you want to manage.
3. To add a new email address for handset account management, enter the email
address in the Username (email) edit field.
4. Enter the new password in the Password edit field.
5. Click the Add User button.
To remove an address, select it and click Remove Selected.
To edit an address, make your edits in the edit field and click Update Email. It is
important to note that changing this address also changes the login username for the
account.
Handset Management
With Handset Management, you can update specific smartphone monitoring functions,
change the GPS update period, control log file size limits, and determine data wipe
parameters. Note that updates are not received until the smartphone reports in at the
next scheduled time.
To update or change the available settings, do the following,
1. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the smartphone you want to manage.
In the Handset Management column on right side of the window, set the following:
2. Next to Email Monitoring, select the check box to enable this feature for the
selected smartphone.
3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable
messaging monitoring for the selected smartphone.
4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to
enable monitoring of messages containing pictures, video, sound or other
multimedia types for the selected smartphone.
5. Next to Voice Monitoring, select the check box to enable this feature for the
selected smartphone. Voice Monitoring provides a time-stamp for a conversation.
6. Next to Log Event Limit, select an available event limit from the pulldown list. We
recommend that you do not set this limit lower than 25.
7. Next to Log Size Limit, select an available size limit from the pulldown list. We
recommend that you do not set this limit to Off.
16 Settings Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Protection Center for Controls
The Log Event Limit and Log Size Limit work together in that whichever setting is
triggered first is the one that takes effect. The event limit causes the smartphone
to send the specified amount of events (email, voice, SMS, MMS) each as one
combined event when the event limit is achieved. This is preferable to sending
each individual event in real-time. If the smartphone sends or receives a large
number of messages, you should set this limit higher rather than lower. Otherwise,
the smartphone could be constantly sending events to the Mobile Protection
Center which could hinder smartphone performance. The Log Size Limit restricts
the amount monitored data this is sent from the smartphone. The limit that is
achieved first is the one that is used.
8. Next to Image Monitoring, select the check box to enable this feature for the
selected smartphone.
9. Next to Web Image Monitoring, select the check box to enable this feature for the
selected smartphone.
10. Next to GPS Update Period, select an available update time frame from the
pulldown list. With this setting, you can configure GPS updates to occur
automatically every fifteen minutes, 30 minutes, hourly, or daily.
11. Next to Lock on SIM Change, select the check box to enable this feature. With this
feature selected, if the SIM is removed, the smartphone switches on GPS Theft
Mode and Locks the smartphone. You can unlock the smartphone with a username
and password.
12. Next to Wipe on SIM Change, select the check box to enable this feature.This
check box is only available when the Lock on SIM Change check box is enabled.
With this feature selected, if the SIM is swapped for another, the smartphone does
all the Lock on SIM Change actions, plus it removes sensitive smartphone
information.
13. Click the Update button to apply your settings.
Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 17
Figure 16: Settings Tab
Reports Tab Information and Configuration
You can run customized reports against collected smartphone data by entering criteria
into the fields provided in this window.
To run a customized report, enter report criteria in one or more fields described here.
1. Select the Reports tab. See Figure 17 on page 19.
2. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the smartphone on which you want to run a
report.
3. If you want the report to include sender information, enter the Sender email
address or phone number in the corresponding field. Note that the address or
number you enter must match the sender address or number as it appears in the
Messages display.
4. If you want the report to include recipient information, enter the Recipient email
address or phone number in the corresponding field. Note that the address or
number you enter must match the recipient address or number as it appears in the
Messages display.
5. In the Start Date field, enter a start date parameter for the report you are creating.
Format the date as Year-Month-Day as in the following example: 2010-11-24.
6. In the End Date field, enter an end date parameter for the report you are creating.
Format the date as Year-Month-Day as in the following example: 2010-11-24.
7. From the Messages pulldown list, select the type of message for which you are
running this report. Your options are All, SMS, MMS, Email, Voice.
8. In the Keyword Search edit field, enter a keyword or phrase you want to search for
within messages. Messages containing this keyword are used to build your report.
9. Click the Search button to run the report.
18 Reports Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Using the Mobile Protection Center for Controls
History
On the right side of the Reports window, there is a History column. Here you can view
the last ten commands sent to the smartphone and their send dates.
Figure 17: Reports Tab
Alerts Setup Tab Information and Configuration
By using unique identifiers, such as keywords or addresses, messages that meet a
defined criteria are identified and viewed by clicking on the Alerts box in the top right
corner of the Mobile Protection Center. Alerts can also be configured to be sent via
email to you; for example, an SMS message that contains the keyword you designate
can be automatically emailed to you.
To configure an alert, do the following.
1. Select the Alert Setup tab. See Figure 18 on page 20.
2. If it isn’t already selected, from the Select phone to view pulldown in the top right
corner, select the phone number for the smartphone for which you want to
configure an alert.
3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this
word is found in a message sent or received by the smartphone. Click the Add
button. The keyword now appears in the Keyword list in the field below.
4. The Keywords field also has a check box that allows you to use suggested
keywords from the column on the right side of the window. These are keywords
that are often used as shorthand in messages. To use suggested keywords in place
of or in addition to keywords you enter, select the Use Suggested Keywords check
box. When this check box is selected, the Suggested Keywords that are enabled
are used as part of the alert.
Copyright © 2011, Juniper Networks, Inc. Alerts Setup Tab Information and Configuration 19
You can scroll through the Suggested Keywords list and enable check boxes
besides keywords you want to trigger an alert if found.
5. If you are selecting to Send the event as an Email Message by enabling the check
box in the Sender/Recipient Address field, enter the email address or phone
number to check for alerts. Use this feature to flag any communication with a
particular contact as an alert.
6. From the Select what to do with an event options, you can choose to,
Report the event as an Alert message
Send the event as an Email message
Select one or both check boxes.
7. Click the Update button to enable the alert.
Figure 18: Alert Setup Tab
Support/Help Tab Information and Configuration
If you have questions or need technical support, select the Support/Help tab. Enter the
required information in the available fields and click Submit.
20 Support/Help Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.
Chapter 5
Using Junos Pulse Security
This chapter describes the security features available on each supported smartphone.
Overview
Features such as antivirus, antispam, anti−theft, and backup and restore are available
on smartphones with various local controls. Each smartphone platform supports some
or all of the following features:
Table 2: Platforms and Supported Features
Android Security Features
The following sections describe the Junos Pulse features available for the Android
platform.
Status
Select the Junos Pulse icon in the Applications folder to access the available Pulse
features for your smartphone. Select Status to view and send log files. See Figure 19 on
page 22.
In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs
to delete scanning logs.
In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.
Smartphone Antivirus Antispam Firewall
Backup &
Restore Anti-Theft
Android Yes No No Yes Yes
BlackBerry Yes No No Yes Yes
Window Mobile Yes Yes Yes Yes Yes
Copyright © 2011, Juniper Networks, Inc. Overview 21
Figure 19: Android Junos Pulse Status Window, Show Logs, and Send Logs
Connect
Junos Pulse uses your smartphone’s 3G, 4G, or WiFi connectivity to establish an
authenticated connection to a protected network.You can add a connection for each
different network you connect to. See Figure 20 on page 23. To define a connection:
1. Select Connections.
2. Select Add Connection and specify the connection properties.
Connection name: A descriptive name.
URL: The Web address provided by an enterprise administrator.
Uses Certificate: Select this check box if your administrator has provided you
with a digital certificate, typically via an email attachment or SMS. If you do not
use a certificate, you must provide a username and password when you connect.
Certificate Path: This box is available if you selected the Uses Certificate check
box. Select Pick to browse to the certificate file.
Key Path: This box is available if you selected the Uses Certificate check box.
Enter the network key provided by your administrator.
3. Select Create Connection.
The status of your current connection appears at the bottom of the window in the
status bar.
22 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 20: Android Junos Pulse Add and Create Connections
Connections
Select the Junos Pulse icon in the Applications folder to access the available Pulse
features for your smartphone. Select Connections to view current connections and to
add new connections.
Email and Intranet
Once you establish a connection to a protected network, Email and Intranet features
become available. See Figure 21 on page 24. The Email and Intranet settings configured
by the administrator of the protected network to which you are connected are
accessible from the Intranet and Email buttons.
Copyright © 2011, Juniper Networks, Inc. Android Security Features 23
Figure 21: Android Junos Pulse Main Window
Security
Select the Junos Pulse icon in the Applications folder to access the available Pulse
features for your smartphone. Select Security to view and edit the following features.
See Figure 22 on page 25.
24 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 22: Android Junos Pulse Security Features
Security Settings
Click Security Settings to update all security settings for the smartphone and to
update virus definitions. See Figure 23 on page 26. The following security settings are
available.
Update security settings
Select a time frame for receiving security setting updates. In addition to virus
definitions, security settings include any changes you make to the smartphone from the
Mobile Protection Center. (Security settings do not include the commands you can
send from the Home tab. Those commands are sent immediately.) From the available
pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day,
Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.
Update Now
Click the Update Now button to immediately trigger a manual update of security
settings.
Automatically Scan Device
Select a time frame for automatic virus scans of the smartphone to occur. From the
available pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours,
Every 1 day, Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.
Copyright © 2011, Juniper Networks, Inc. Android Security Features 25
Figure 23: Android Junos Pulse Security Settings and Update Intervals
Antivirus
Select the Antivirus security feature to view antivirus controls and log file information.
When you open Antivirus, you see controls that let you perform a virus scan on the
memory card, on the entire device, on only files and folders, and to update virus
signatures.
Available Antivirus controls are as follows.
Scan Memory Card on Insert
This features is either Enabled or Disabled.
Virus Definitions updated on
This field lists the time and date of the last update. Click the Update Now button to
trigger a manual virus definition update.
Scan All Files and Folders for viruses
This field lists the time and date of the last scan. Click the Start Now button to trigger a
manual virus scan of the entire device. A scan of the entire device begins. It may take
several minutes to complete.
26 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 24: Android Junos Pulse Antivirus Settings
Select a Folder or a File to scan for viruses
Rather than scanning the entire smartphone, you can select specific files or folders to
scan. See Figure 25 on page 28.
To perform a manual antivirus scan of the specified files or folders, do the following.
1. From the Antivirus window, click the Select button beside Select a Folder or a File to scan for viruses. This takes you to a window where you can traverse directories
to locate the file or folder in question.
2. To select a directory or file in the current directory, select the directory or file name.
If the selected folder contains subfolders, its contents are displayed. You can
select subfolders by navigating down a folder path until the desired folder or file is
displayed. To move one directory up, click the Up button.
3. When you are finished selecting the path, click the Scan button to initiate the scan.
Copyright © 2011, Juniper Networks, Inc. Android Security Features 27
Figure 25: Android Junos Pulse Antivirus Scan Folder or File
Scan installed applications for spyware
Click the Start Now button to trigger an application scan for spyware. If spyware is
found, you are prompted to remove it.
View Scan Results
A scan log keeps track of all scans and scan results, including infected files that may
have been found. Click the Open button to view Spyware and Virus Reports. See
Figure 26 on page 29.
Informational Note: A virus scan scans all public data stored on the device for known
infections. A spyware scan scans all installed applications for known malware.
28 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 26: Android Junos Pulse View Scan Results
Monitor and Control
Select Monitor and Control to view settings for the smartphone in question that have
been enabled from the Mobile Protection Center. For example, you can see a list of
control, security, or anti−theft features with the word Enabled or Disabled beside them.
GPS update period and log limits are also viewable from this window. See Figure 27 on
page 29.
Figure 27: Android Junos Pulse Monitor and Control
Backup and Restore
You can back up contact and calendar appointment information to the Mobile
Protection Center from the Android smartphone.
To back up smartphone data, do the following.
1. Start the Junos Pulse application.
Copyright © 2011, Juniper Networks, Inc. Android Security Features 29
2. Select Security.
3. Select Backup Data. The backup begins. You are notified on the smartphone when
the backup is complete. See Figure 28 on page 30.
You can only initiate a restore from the Mobile Protection Center. When you initiate a
restore, an SMS command tells the smartphone to contact the server to retrieve the
backup. See “Commands” on page 14.
Figure 28: Android Junos Pulse Successful Backup Confirmation
Anti-Theft
Anti−theft protections are configured for the smartphone from the Mobile Protection
Center.
Anti−theft features include:
Lock Handset—Locks the smartphone until such time that the unlock command is
sent. If the smartphone is password protected, the smartphone will continue to be
locked even if the proper password is entered.
Unlock Handset—Unlocks the smartphone.
Wipe Handset—Deletes the email, scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the
contact, scheduling and task information and emails it to the email address provided
in the registration process.
GPS Location—If your smartphone is equipped with GPS, you can locate your
smartphone. Smartphone location is displayed in a map on the Home tab.
Alarm On and Off—Blares a maximum volume alarm sound to locate the
smartphone in a nearby location.
GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to
fine-tune GPS location if the smartphone is stolen.
SIM Change—Includes 2 settings:
30 Android Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &
Control logging, and Locks the smartphone. You can unlock the smartphone with
a username and password.
If the SIM is swapped for another, the smartphone does all the preceding
actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone
information automatically.
BlackBerry Security Features
The following sections describe the Junos Pulse features available for the BlackBerry
platform. When you click the main Junos Pulse icon in the Applications folder, you can
access the following security features:
Antivirus
Select the Antivirus security feature to view antivirus controls and log file information.
When you open Antivirus, you see the following information: See Figure 29 on page 31.
Monitor Status: This reads either Enabled or Disabled. The status is Enabled by
default.
Last Updated: View the date of the latest virus definition update.
Licence Expiration: View license expiration information.
By default, the antivirus feature is configured to scan files as it receives them, via any
file transfer mechanism (such as email, SMS/MMS, or Bluetooth). You can initiate a
manual scan, as well.
Figure 29: BlackBerry Junos Pulse Select Antivirus and View Information
Manual Virus Scan
When you click the Menu button on your BlackBerry from the Antivirus window, the
Scan Now option is available.
1. Select Scan Now to perform a full scan of the smartphone. Selecting Scan Now
takes you to the Scan Options window. See Figure 30 on page 32.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 31
Figure 30: BlackBerry Junos Pulse Scan Options
2. In Scan Options, the first three items are checked by default to perform a full
smartphone scan. Those are Scan applications, Scan internal files, Scan SD Card.
Select the Menu button and choose Start scan to scan those items.
3. Optionally, exclude the scanning of media files by selecting the Exclude media files check box
4. Optionally, perform a custom scan rather than scanning the entire smartphone by
selecting the Custom Scan check box. When you select Custom Scan, you can
choose files or folders to scan. See Figure 31 on page 32.
Figure 31: BlackBerry Junos Pulse Select Custom Scan
5. Under Custom Scan, highlight an available folder and click the Menu button on
your BlackBerry.
6. Choose Select Folder from the menu. See Figure 32 on page 33. To drill down
further keep repeating these steps until you have reached the file or folder you
want to scan.
32 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 32: BlackBerry Junos Pulse Select Custom Scan Folder/File
7. Click the Menu button and select Start scan to scan your selected items.
The scanning progress and the scan results when are displayed when the scan finishes.
Quarantined Files
During a scan, found infected files are automatically quarantined. Quarantining lets you
decide whether or not the infected file should be deleted. When you click the Menu
button on your BlackBerry from the Antivirus Monitor Status window, the Quarantine
list is available.
You can delete quarantined files by clicking the Menu button and selecting Delete.
OnDemand Scan
When you click the Menu button on your BlackBerry from the Antivirus Monitor Status
window, the OnDemand Scan Log option is available.The OnDemand ScanLog shows
the details of scans initiated by the you.
File Monitor Log
When you click the Menu button on your BlackBerry from the Antivirus Monitor Status
window, the File Monitor Log option is available. The FileMonitor log shows
timestamps associated with changes to the file monitor setting.
Backup and Restore
The Backup and Restore feature lets you backup the contacts and calendar events
stored on your smartphone.
To back up data:
1. From the Junos Pulse feature list, select Backup & Restore. The Backup & Restore
screen displays the date of the last backup and the last restore.
2. From the Backup & Restore window, click the Menu button.
3. Select Backup Data from the menu. See Figure 33 on page 34. Your information is
sent to the central server.
Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 33
Figure 33: BlackBerry Junos Pulse Backup Smartphone Data
4. When the backup is complete, click OK in the Backup Successful window that
appears.
You can only initiate a restore from the Mobile Protection Center. When you initiate a
restore, an SMS command tells the smartphone to contact the server to retrieve the
backup. See “Commands” on page 14.
Settings
From the main Junos Pulse feature list, you click the BlackBerry Menu button to access
security update settings and general information.
1. When you click the Menu button on your BlackBerry from the main Junos Pulse
features window, the Settings option is available.
2. Select Settings. The Pulse Settings window opens.
3. From the Settings window, the Auto-Update Frequency setting is available. By
default, this is set to 12 hours. You can change this from 1 hour to 1 month to Never
by selecting it and scrolling to update frequency you want.
Figure 34: BlackBerry Junos Pulse Update Settings and Frequency
4. From the Settings window, Connection type is available. If the smartphone is
managed by a corporate BlackBerry management server, your administrator
should let you know which method to use (BIZ or BEZ) for the device connection.
Otherwise, you can use the standard APN connection setting.
Anti-Theft
Anti−theft protections are configured for the smartphone from the Mobile Protection
Center.
Anti−theft features include:
34 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Lock Handset—Locks the smartphone until such time that the unlock command is
sent. If the smartphone is password protected, the smartphone will continue to be
locked even if the proper password is entered.
Unlock Handset—Unlocks the smartphone.
Wipe Handset—Deletes the email, scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the
contact, scheduling and task information and emails it to the email address provided
in the registration process.
GPS Location—If your smartphone is equipped with GPS, you can locate your
smartphone. Smartphone location is displayed in a map on the Home tab.
Alarm On and Off—Blares a maximum volume alarm sound to locate the
smartphone in a nearby location.
GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to
fine-tune GPS location if the smartphone is stolen.
SIM Change—Includes 2 settings:
If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &
Control logging, and Locks the smartphone. You can unlock the smartphone with
a username and password.
If the SIM is swapped for another, the smartphone does all the preceding
actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone
information automatically.
Windows Mobile Security Features
When you click the Junos Pulse icon in the Programs folder, you can access the
following features:
Status
Select Status to view and send log files. See Figure 35 on page 36.
In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs
to delete scanning logs.
In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.
Connections
Junos Pulse uses your smartphone’s 3G, 4G, or WiFi connectivity to establish an
authenticated connection to a protected network.You can add a connection for each
different network you connect to. See Figure 35 on page 36. To define a connection:
1. Select Connections.
2. Select Add Connection and specify the connection properties.
Connection name: A descriptive name.
URL: The Web address provided by your network administrator.
3. Select Save.
The status of your current connection appears at the bottom of the window in the
status bar.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 35
Connect
To connect to a connection that has already been configured, do the following:
1. Select Connect.
2. Enter your Username and Password.
3. Click Sign In.
After your username and password have been accepted, you can access Junos Pulse
features provided through your corporate connection.
Email and Intranet
Once you establish a connection to a protected network, Email and Intranet features
become available. The Email and Intranet settings configured by the administrator of
the protected network to which you are connected are accessible from the Intranet and
Email buttons. See Figure 35 on page 36.
Figure 35: Windows Mobile Junos Pulse Main Window
Security
Select the Junos Pulse icon in the Programs folder to access the available Pulse features for your smartphone. Select Security to view and edit the following features. See Figure 36 on page 37.
36 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 36: Windows Mobile Junos Pulse Security Features
Security Settings
Click Security Settings to update all security settings for the smartphone and to
update device location. Click Save if you make any changes to these settings. See
Figure 37 on page 38. The following security settings are available.
Update security settings and data
Select a time frame for receiving security setting updates. In addition to virus
definitions, security settings include any changes you make to the smartphone from the
Mobile Protection Center. (Security settings do not include the commands you can
send from the Home tab. Those commands are sent immediately.) From the available
pulldown, you can select: Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day,
Every 2 days, Every 1 week, Every 2 weeks, and Every 1 month.
Update
Click the Update button to immediately trigger a manual update of security settings.
Device Location
Select a time frame for automatic reporting of the smartphone location: Never, Every 1
hour, Every 4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1 week, Every 2
weeks, and Every 1 month.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 37
Figure 37: Windows Mobile Junos Pulse Security Settings
Antivirus
Select the Antivirus security feature to view antivirus controls and log file information.
When you open Antivirus, you see controls that let you perform a virus scan on the
memory card, on the entire device, on only files and folders, and to update virus
signatures.
Available Antivirus controls are as follows.
Antivirus Realtime Protection
Antivirus scanning is either Enabled or Disabled.
Scan Memory Card on Insert
This feature is either Enabled or Disabled.
Virus Definitions updated
This field lists the time and date of the last update. Click the Update Now button to
trigger a manual virus definition update.
Scan All Files and Folders for viruses
This field lists the time and date of the last scan. Click the Start Now button to trigger a
manual virus scan of the entire device. A complete scan may take several minutes to
complete.
Scan Custom Folder for viruses
Lets you scan a selected file, folder, or the installed SD card. Click Start Now to open
the component screen and choose a scan target.
Show Quarantine GUI
Select Show to view files that were quarantined by the antivirus scan.
38 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 38: Windows Mobile Junos Pulse Antivirus Settings
Antispam
The antispam service protects your smartphone from unsolicited calls and SMS spam.
The antispam menu provides options for creating, customizing, and deleting blacklists
that are used in spam filtering. To configure and run antispam features:
1. Select Antispam and configure the following (see Figure 39 on page 40):
Name: Enter the name of the of the person from whom you want calls or
messages blocked.
Number: Enter the number from which you want calls or messages blocked.
Block Calls from this number: Select this check box to block voice calls
originating from the number you entered.
Block SMS messages from this number: Select this check box to block SMS
messages originating from the number you entered.
2. Select Choose from Contacts if you want to use a number from your contact list.
3. Select Save.
Informational Note: Click Add from the Antispam window to add additional numbers
for blocking.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 39
Figure 39: Windows Mobile Junos Pulse Antispam Settings
Once you enter at least one number into the antispam feature, the Antispam window
changes to allow for adding additional numbers. You can also select to Enable Shortcode Blocking in the Antispam window after you have at least one entry. See
Figure 40 on page 41.
Shortcode blocking is not specific to any entries you add. It blocks all calls from short
codes. Short codes are special telephone numbers that are significantly shorter, five or
fewer digits. Short codes are often used for marketing or promotions and therefore you
may want to block them.
40 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 40: Windows Mobile Junos Pulse Antispam Shortcode Blocking
Informational Note: You must have at least one number configured for blocking in
order to see the features displayed in the Antispam window in Figure 40 on page 41.
Firewall
The firewall security features let you block or allow data traffic to and/or from the
device using rule lists that control traffic based on port number, IP address, and other
options.To configure firewall features, do the following:
1. Select Firewall and configure the following (see Figure 41 on page 42):
Security Level: Select a security level from the pulldown list. When you select a
level, firewall rules that correspond to that level are added to your active rule list.
You can set the security level as follows.
Low: to block specified items
High: to allow data traffic on only allowed ports and addresses
Off: for no firewall protection
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 41
Figure 41: Windows Mobile Junos Pulse Main Firewall Window
2. Click the New button to add a new rule to your active firewall rule list. See Figure 42
on page 43. You configure rules to add entries to be blocked or to be allowed.
3. To create a new firewall rule, configure the following:
Select the check box to Enable the rule. You can create a rule and leave it
disabled with the possibility of using it later.
Enter a Description of the rule
Select Block or Allow from the pulldown list.
Select Inbound Traffic or Outbound Traffic from the pulldown list.
You can create this rule to allow/block All IP addresses, Specific IP addresses or
a Range of IP addresses.
If you select specific IPs or a range of IPs enter that information in the IP address
fields provided. (Note that you can use a wildcard entry (*) to indicate blocking
of everything within octet in question.)
You can create this rule to allow/block port addresses. Select To a Range of Ports and enter that port information in the From and To fields provided or
select All Ports.
4. Click Save.
42 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 42: Windows Mobile Junos Pulse FIrewall Rule Window
When your rule is saved, it appears in the rule list. See Figure 43 on page 43.
Figure 43: Windows Mobile Junos Pulse FIrewall Rule List Window
Informational Note: Select a rule in the rule list and use the Edit and Delete buttons
to make changes to the existing rule and to delete rules from the rule list.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 43
Monitor and Control
Select Monitor and Control to view settings for the smartphone that have been
enabled from the Mobile Protection Center. For example, you can see a list of control,
security, or anti−theft features with the word Enabled or Disabled beside them. GPS
update period and log limits are also viewable from this window. See Figure 44 on
page 44.
Figure 44: Windows Mobile Junos Pulse Monitor and Control
Backup Data
You can back up contact and calendar appointment information to the Mobile
Protection Center from the Windows Mobile smartphone.
To back up smartphone data, do the following.
1. Select Backup Data.
2. In the Backup Data window, click Backup Contacts and Calendar. A prompt
appears asking you to confirm that you want to start a backup. Click Yes. The
backup begins. You are notified on the smartphone when the backup is complete.
See Figure 45 on page 45.
44 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Using Junos Pulse Security
Figure 45: Windows Mobile Junos Pulse Backup Data and Confirm
You can only initiate a restore from the Mobile Protection Center. When you initiate a
restore, an SMS command tells the smartphone to contact the server to retrieve the
backup. See “Commands” on page 14.
Anti-Theft
Anti−theft protections are configured for the smartphone from the Mobile Protection
Center.
Anti−theft features include:
Lock Handset—Locks the smartphone until such time that the unlock command is
sent. If the smartphone is password protected, the smartphone will continue to be
locked even if the proper password is entered.
Unlock Handset—Unlocks the smartphone.
Wipe Handset—Deletes the email, scheduling, contact and task information.
Send Backup—If this data is not stored on the server, this feature gathers the
contact, scheduling and task information and emails it to the email address provided
in the registration process.
GPS Location—If your BlackBerry is equipped with GPS, you can locate your
smartphone. Smartphone location is displayed in a map on the Home tab.
Alarm On and Off—Blares a maximum volume alarm sound to locate the
smartphone in a nearby location.
GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to
fine-tune GPS location if the smartphone is stolen.
SIM Change−—Includes 2 settings:
If the SIM is removed, the smartphone switches on GPS Theft Mode, Monitor &
Control logging, and Locks the smartphone. You can unlock the handset with a
username and password.
Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 45
If the SIM is swapped for another, the smartphone does all the preceding
actions, plus checks if the Wipe flag is set, and can wipe sensitive smartphone
information automatically.
46 Windows Mobile Security Features Copyright © 2011, Juniper Networks, Inc.
Chapter 6
Junos Pulse FAQ
This chapter provides answers to commonly asked questions.
Junos Pulse FAQs
I do not want the smartphone user to see the Junos Pulse application on his/her device. Can I hide it?
We are aware that on some devices icons can be hidden from view, but you cannot hide
the Pulse application. In addition control and monitoring, Junos Pulse provides security
features that require end user access for configuration.
What happens if the smartphone user modifies the Junos Pulse settings on the device?
Depending on the modification made, the modification may not display on the Mobile
Protection Center. For example, if the smartphone user uninstalls Junos Pulse from the
device, this event is not displayed in the Mobile Protection Center. You will simply
notice an absence of events.
Why would my GPS coordinates be inaccurate?
There could be several reasons for this inaccuracy. First, confirm that you have a GPS
enabled smartphone and that GPS is a part of your carrier's data plan. If you do not
have GPS functionality as a part of your network service, the GPS feature will not work.
Also, check the GPS feature on the smartphone to make sure there are no restrictions
and that all features are set to enabled. Calibrate your location with the device through
Google maps from a location with good carrier signal strength. The premier location for
testing is outdoors. GPS can also be gathered via satellite or network, with varying
degrees of accuracy.
What does it mean when the GPS coordinates are 0.0?
Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that
this feature is blocked by the carrier for use by 3rd party applications. (Note that we
cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1
devices.)
Copyright © 2011, Juniper Networks, Inc. Junos Pulse FAQs 47
How long does it take for the Mobile Protection Center to update with the smartphone user’s activities?
This is configurable from the Mobile Protection Center. See “Handset Management” on
page 16 for information and guidelines. (Note that if the smartphone user sends and
receives a high volume of texts, sending these texts to the Mobile Protection Center in
real-time is not advised.)
Can I use Junos Pulse to monitor or block URLs?
No, Junos Pulse does not provide that functionality at this time.
How many smartphones can I monitor using the Mobile Protection Center?
There is no limit to the number of smartphones you can monitor on an account. To add
a new smartphone to the account, you must first download the software to the
additional device. Once the smartphone registers withe Mobile Protection Center, you
can monitor it.
I want to monitor several smartphones, but each smartphone uses a different carrier.
The carrier does not matter. As long as the smartphone is running a supported
operating system: Android, BlackBerry, Symbian, and Windows Mobile, you can use
Junos Pulse.
48 Junos Pulse FAQs Copyright © 2011, Juniper Networks, Inc.
Index
AAccount management . . . . . . . . . . . . . . . . . . . . . . . . . . . .15Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19Android
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23license code, registration . . . . . . . . . . . . . . . . . . . . . . . . . .4monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .29security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .25, 37
Anti-Theft
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45
Antivirus
custom scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32file monitor log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33full scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32manual scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31ondemand scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33quarantined files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33settings for Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . .26settings for BlackBerry . . . . . . . . . . . . . . . . . . . . . . .31, 34settings for Windows Mobile . . . . . . . . . . . . . . . . . . . . . .38signature updates. . . . . . . . . . . . . . . . . . . . . . . . . . .26, 38
antivirus events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
B
Backup and Restore
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .29BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
Backup and restore, Mobile Protection Center . . . . . . . . . . . .14BlackBerry
antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31auto-update frequency . . . . . . . . . . . . . . . . . . . . . . . . . .34connection type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Blackberry
backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
C
Connection
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
E
email and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 7email monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
F
Features
by platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21features
control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Firewall
Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
G
GPS update period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
H
Handset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16History
commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
I
Image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17installation
Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
K
Keywords, messaging shorthand. . . . . . . . . . . . . . . . . . . . . 19
L
Lock handset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Lock on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Copyright © 2011, Juniper Networks, Inc. 49
50
Product Rev# Book Title
Log event limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Log size limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
M
MMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16Mobile Protection Center
account management . . . . . . . . . . . . . . . . . . . . . . . . . . 16alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19handset management . . . . . . . . . . . . . . . . . . . . . . . . . . 16overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Monitor and Control
Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
R
registration
Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
S
Scream Locate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15security features
Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Shortcode blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40SMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
U
Unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14username/password change . . . . . . . . . . . . . . . . . . . . . . . 16
V
view more
events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15Voice monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
W
Web image monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . 17Windows Mobile
.CAB file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9antispam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38backup data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14Wipe on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Copyright © 2011, Juniper Networks, Inc.