22
March 2012 R1 Release 3.2 Copyright © 2012, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard User Guide

Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Junos Pulse Mobile Security Dashboard

User Guide

March 2012

R1

Release

3.2

Copyright © 2012, Juniper Networks, Inc.

Page 2: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

ii

.

Junos® Pulse Mobile Security Dashboard

Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, California 94089408-745-2000www.juniper.net

Copyright © Juniper Networks, Inc.March 2012

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2011, Juniper Networks, Inc. All rights reserved.

Copyright © 2012, Juniper Networks, Inc.

Page 3: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Table of Contents

Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

What’s In This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Junos Pulse Mobile Security Dashboard Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2 Using the Mobile Security Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Home Tab Commands and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Commands for iOS Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Events for iOS Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6

Settings Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Handset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Reports Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Alerts Setup Tab Information and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Support/Help Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Chapter 3 Junos Pulse FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Junos Pulse FAQs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Junos Pulse Mobile Security Dashboard iii

Page 4: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

:

iv

Copyright © 2012, Juniper Networks, Inc.
Page 5: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

About This Guide

This guide describes how to use the Junos® Pulse Mobile Security Dashboard to

manage registered mobile devices and to enable features such as remote wipe and

remote lock in case a device is lost or stolen.

Informational Note: For information on installing and configuring Junos Pulse on

individual mobile devices, refer to the Junos Pulse documentation for that device type.

Audience

This guide is intended for users who wish to configure controls for device users,

providing security features and access control features.

What’s In This Guide

This guide contains the following chapters:

Chapter 1, “Introduction” on page 1

Chapter 2, “Using the Mobile Security Dashboard” on page 3

Chapter 3, “Junos Pulse FAQ” on page 13

Typographical Conventions

Table 1 describes the text conventions used throughout this manual.

Contacting Technical Support

Technical product support is available through the Juniper Networks Technical

AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support

contract,or are covered under warranty, and need post-sales technical support, you can

access our tools and resources online or open a case with JTAC.

Table 1: Typographical Conventions

Convention Description Examples

Bold typeface Indicates buttons, field names, dialog names, and other user interface elements.

Use the Scheduling and Appointment tabs to schedule a meeting.

Plain sans serif typeface

Represents:

URLs, file names, and directories

Example:

URL:Download the JRE application from: http://java.sun.com/j2se/

Italics Identifies:

Terms defined in text

Variable elements

Book names

Examples:

Variable element:Use settings in the Users > Roles > Select Role page to configure roles.

Copyright © 2012, Juniper Networks, Inc. Audience v

Page 6: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

JTAC policies—For a complete understanding of our JTAC procedures and policies,

review the JTAC User Guide located at

http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.

Product warranties—For product warranty information, visit

http://www.juniper.net/support/warranty/.

JTAC hours of operation—The JTAC centers have resources available 24 hours a day, 7

days a week, 365 days a year.

vi Contacting Technical Support Copyright © 2012, Juniper Networks, Inc.

Page 7: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Chapter 1

Introduction

The Junos® Pulse Mobile Security Dashboard collects data from designated mobile

devices and uploads that data to the dashboard that is accessible from the Internet

with a username and password. Using the Junos Pulse Mobile Security Dashboard, you

can manage registered mobile devices and enable features such as remote wipe in case

a device is lost or stolen. You can also configure email alerts for suspicious messages

received by or sent from the device. In this case, messages containing customized

keywords, such as drugs, alcohol, or messages that originate from, or are destined to

specific addresses, are automatically emailed to you.

Junos Pulse Mobile Security Dashboard Features

The Junos Pulse Mobile Security Dashboard provides both control and security for

registered mobile devices.

Control features include:

Monitor activity on the device.

View pictures taken by the device camera and sent or received via text or email.

View the content of all text messages and email messages.

Automatically receive alerts when keywords are found in messages sent or received.

List all applications and software installed on the device.

Display the location of the device in an online map.

Sound an alarm on the device.

Use GPS to help locate a lost or stolen device. (GPS functionality on Verizon

BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive

GPS Longitude and Latitude coordinates of 0.0, this functionality may have been

blocked by the service provider or the device may be out of range of a satellite.)

Security features include:

Antivirus—This feature provides real-time protection against malware threats by

automatically scanning devices to ensure files are not infected with malware. The

on-demand scanning ability lets you scan selected files and folders to ensure the

device and memory card are clean and protected. The automatic update capability

ensures that the device possesses the latest antivirus signatures.

Backup and restore—This feature lets you backup contact and calendar information.

Firewall—The firewall security features let you block or allow data traffic to and/or

from your device using rule lists that control traffic based on port number and ip

addresses.

Copyright © 2012, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard Features 1

Page 8: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Anti−theft—This set of features includes remote commands you can send to the

device if it is lost or stolen. Those commands include: lock device, wipe device, locate

device, and backup device.

2 Junos Pulse Mobile Security Dashboard Features Copyright © 2012, Juniper Networks, Inc.

Page 9: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Chapter 2

Using the Mobile Security Dashboard

This chapter describes how to access and use the Junos Pulse Mobile Security

Dashboard to configure monitoring and security features for registered devices.

Overview

Once the Junos Pulse application is installed on the device and you have setup an email

address and password as part of the device installation and registration process, you

can use that email address and password to login to the dashboard. You access the

dashboard by entering the URL you received from your service provider.See Figure 1 on

page 3.

Figure 1: Mobile Security Dashboard Login Window

Once you login, the Home tab is displayed. See Figure 2 on page 4. Next to the Home

tab, you can find tabs for each functional area of the dashboard. Those tabs are as

follows:

Home—Provides links to logged messages and calls, found viruses, installed applications, and photos. It also provides recent GPS locations.

Settings—Configure different user accounts and devices you wish to monitor

Copyright © 2012, Juniper Networks, Inc. Overview 3

Page 10: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Reports—Look for certain senders or keywords in a range of messages, based on

dates

Alert Settings—Configure parameters for triggering alerts. (You can also find Alert

status and configure alerts by clicking the Alert button in the upper right hand corner

of the dashboard window.)

Informational Note: Note that Alert Settings are not available for iOS devices

Figure 2: Home Tab

Home Tab Commands and Events

From the Home tab, you can issue commands and access device events as follows:

Commands

Click any of the following buttons to send the command in question. When you click a

command button, a window appears asking you to verify the command you have

chosen before it is sent.

Informational Note: A different set of commands are available for iOS devices. See

“Commands for iOS Devices” on page 5.

Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of the

device for any other reason.

Unlock Device—Unlocks the device.

Locate Device—Sends a command to determine the GPS location of the device, with

the result displayed in a map on the Home tab page.

Backup and Restore—Creates a copy of the contact and calendar information. This is

useful if a device is lost or stolen.

4 Home Tab Commands and Events Copyright © 2012, Juniper Networks, Inc.

Page 11: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Using the Mobile Security Dashboard

Wipe Device—Removes personal data from the device such as contacts, calendar

events, notes, call history, message folders, and all data on the SD card.

Scream Locate—Allows the device user to audibly locate a misplaced device within

hearing distance, even if the speakers and ringer are muted.

Commands for iOS Devices

For iOS devices, the commands available from the Home tab are as follows (see

Figure 3 on page 5):

Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of the

device for any other reason.

Unlock Device—Unlocks the device.

Retrieve App List—Updates the list of installed applications on the device.

Wipe Device—Sets device back to factory settings.

Informational Note: There are no commands available for iOS devices that do not

have an associated APNS certificate. When no APNS certificate is present, GPS location

is only available feature.

Informational Note: GPS is not supported on the iPod Touch and on iOS devices that

do not have cell service.

Figure 3: Home Tab for iOS Devices

Events

When there are events present for any of the listed categories, a view more button

becomes available. See Figure 2 on page 4. You can delete event category items

(messages, voice calls, etc.) from the dashboard when you click view more. In the

window that appears, select the check box next to the item you want to remove and

click the Delete button. You can also click the Select All button and then the Delete

button to delete all items within that event category.

Copyright © 2012, Juniper Networks, Inc. Home Tab Commands and Events 5

Page 12: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Informational Note: Different events are available for iOS devices. See “Events for iOS

Devices” on page 6.

Messages—View messages (voice, email, text) received on the device.

Click view more (if present) to view all listed messages. See Figure 4 on page 6.

Voice calls—View voice calls received on the device.

Click view more (if present) to view all listed calls.

Anti-Virus events—View new antivirus events that have occurred.

Click view more (if present) to view all detected viruses.

New applications—View new applications that have been installed on the device.

Click view more (if present) to open a new window that lists newly installed

applications. You can remotely uninstall an application by selecting the check box

beside the application and click the Uninstall specific application on the handset

button.

New photos—View new photos stored on the device.

Click view more (if present) to open a new window that displays photos as 20

pictures per screen.

Figure 4: Detected Message Events View More Window

Events for iOS Devices

New applications is the only event available for iOS at this time. Click view more (if

present) to open a new window that lists newly installed applications (see Figure 5 on

page 7).

6 Home Tab Commands and Events Copyright © 2012, Juniper Networks, Inc.

Page 13: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Using the Mobile Security Dashboard

Figure 5: Detected Application Installation Events View More Window

Settings Tab Information and Configuration

From the Settings tab, you can configure Account Management and Handset

Management. See Figure 6 on page 9. For example, you can change the email address

to where alerts are sent.

Account Management

You can remove, edit or add a new email address to a device account.

To add an email address and corresponding password,

1. Select the Settings tab.

2. From the Select phone to view pulldown in the top right corner, select the device

you want to manage.

3. To add a new email address for handset account management, enter the email

address in the Username (email) edit field.

4. Enter the new password in the Password edit field.

5. Click the Add User button.

To remove an address, select it and click Remove Selected.

To edit an address, make your edits in the edit field and click Update Email. It is

important to note that changing this address also changes the login username for the

account.

Handset Management

With Handset Management, you can update specific device monitoring functions,

change the GPS update period, control log file size limits, and determine data wipe

parameters. Note that updates are not received until the device reports in at the next

scheduled time.

Copyright © 2012, Juniper Networks, Inc. Settings Tab Information and Configuration 7

Page 14: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Informational Note: Handset Management is not available for iOS devices. From the

Settings tab, you can view Handset Information for the selected iOS device such as

phone number, device type, device name and UDID. See Figure 7 on page 9.

To update or change the available settings, do the following,

1. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device you want to manage.

In the Handset Management column on right side of the window, set the following:

2. Next to Email Monitoring, select the check box to enable this feature for the

selected device.

3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable

messaging monitoring for the selected device.

4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to

enable monitoring of messages containing pictures, video, sound or other

multimedia types for the selected device.

5. Next to Voice Monitoring, select the check box to enable this feature for the

selected device. Voice Monitoring provides a time-stamp for a conversation.

6. Next to Log Event Limit, select an available event limit from the pulldown list. We

recommend that you do not set this limit lower than 25.

7. Next to Log Size Limit, select an available size limit from the pulldown list. We

recommend that you do not set this limit to Off.

The Log Event Limit and Log Size Limit work together in that whichever setting is

triggered first is the one that takes effect. The event limit causes the device to send

the specified amount of events (email, voice, SMS, MMS) each as one combined

event when the event limit is achieved. This is preferable to sending each individual

event in real-time. If the device sends or receives a large number of messages, you

should set this limit higher rather than lower. Otherwise, the device could be

constantly sending events to the dashboard which could hinder device

performance. The Log Size Limit restricts the amount monitored data this is sent

from the device. The limit that is achieved first is the one that is used.

8. Next to Image Monitoring, select the check box to enable this feature for the

selected device.

9. Next to Web Image Monitoring, select the check box to enable this feature for the

selected device.

10. Next to GPS Update Period, select an available update time frame from the

pulldown list. With this setting, you can configure GPS updates to occur

automatically every fifteen minutes, 30 minutes, hourly, or daily.

11. Next to Lock on SIM Change, select the check box to enable this feature. With this

feature selected, if the SIM is removed, the device switches on GPS Theft Mode and

Locks the device. You can unlock the device with a username and password.

12. Next to Wipe on SIM Change, select the check box to enable this feature.This check

box is only available when the Lock on SIM Change check box is enabled. With this

feature selected, if the SIM is swapped for another, the device does all the Lock on

SIM Change actions, plus it removes sensitive device information.

13. Click the Update button to apply your settings.

8 Settings Tab Information and Configuration Copyright © 2012, Juniper Networks, Inc.

Page 15: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Using the Mobile Security Dashboard

Figure 6: Settings Tab

Figure 7: Settings Tab for iOS Devices

Reports Tab Information and Configuration

You can run customized reports against collected device data by entering criteria into

the fields provided in this window.

To run a customized report, enter report criteria in one or more fields described here.

1. Select the Reports tab. See Figure 8 on page 10.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device on which you want to run a report.

Copyright © 2012, Juniper Networks, Inc. Reports Tab Information and Configuration 9

Page 16: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

3. If you want the report to include sender information, enter the Sender email

address or phone number in the corresponding field. Note that the address or

number you enter must match the sender address or number as it appears in the

Messages display.

4. If you want the report to include recipient information, enter the Recipient email

address or phone number in the corresponding field. Note that the address or

number you enter must match the recipient address or number as it appears in the

Messages display.

5. In the Start Date field, enter a start date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

6. In the End Date field, enter an end date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

7. From the Messages pulldown list, select the type of message for which you are

running this report. Your options are All, SMS, MMS, Email, Voice.

8. In the Keyword Search edit field, enter a keyword or phrase you want to search for

within messages. Messages containing this keyword are used to build your report.

9. Click the Search button to run the report.

History

On the right side of the Reports window, there is a History column. Here you can view

the last ten commands sent to the device and their send dates.

Figure 8: Reports Tab

Alerts Setup Tab Information and Configuration

By using unique identifiers, such as keywords or addresses, messages that meet a

defined criteria are identified and viewed by clicking on the Alerts box in the top right

corner of the dashboard. Alerts can also be configured to be sent via email to you; for

example, an SMS message that contains the keyword you designate can be

automatically emailed to you.

10 Alerts Setup Tab Information and Configuration Copyright © 2012, Juniper Networks, Inc.

Page 17: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Using the Mobile Security Dashboard

To configure an alert, do the following.

1. Select the Alert Setup tab. See Figure 9 on page 12.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device for which you want to configure an

alert.

3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this

word is found in a message sent or received by the device. Click the Add button. The

keyword now appears in the Keyword list in the field below.

4. The Keywords field also has a check box that allows you to use suggested

keywords from the column on the right side of the window. These are keywords that

are often used as shorthand in messages. To use suggested keywords in place of or

in addition to keywords you enter, select the Use Suggested Keywords check box.

When this check box is selected, the Suggested Keywords that are enabled are

used as part of the alert.

You can scroll through the Suggested Keywords list and enable check boxes

besides keywords you want to trigger an alert if found.

5. If you are selecting to Send the event as an Email Message by enabling the check

box in the Sender/Recipient Address field, enter the email address or phone

number to check for alerts. Use this feature to flag any communication with a

particular contact as an alert.

6. From the Select what to do with an event options, you can choose to,

Report the event as an Alert message

Send the event as an Email message

Select one or both check boxes.

7. Click the Update button to enable the alert.

Copyright © 2012, Juniper Networks, Inc. Alerts Setup Tab Information and Configuration 11

Page 18: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Figure 9: Alert Setup Tab

Support/Help Tab Information and Configuration

If you have questions or need technical support, select the Support/Help tab. Enter the

required information in the available fields and click Submit.

Figure 10: Support/Help Tab

12 Support/Help Tab Information and Configuration Copyright © 2012, Juniper Networks, Inc.

Page 19: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Chapter 3

Junos Pulse FAQ

This chapter provides answers to commonly asked questions.

Junos Pulse FAQs

I do not want the device user to see the Junos Pulse application on his/her device. Can I hide it?

We are aware that on some devices icons can be hidden from view, but you cannot hide

the Junos Pulse application. In addition control and monitoring, Junos Pulse provides

security features that require end user access for configuration.

What happens if the device user modifies the Junos Pulse settings on the device?

Depending on the modification made, the modification may not display on the Mobile

Security Dashboard. For example, if the device user uninstalls Junos Pulse from the

device, this event is not displayed in the Mobile Security Dashboard. You will simply

notice an absence of events.

Why would my GPS coordinates be inaccurate?

There could be several reasons for this inaccuracy. First, confirm that you have a GPS

enabled device and that GPS is a part of your carrier's data plan. If you do not have GPS

functionality as a part of your network service, the GPS feature will not work. Also, check

the GPS feature on the device to make sure there are no restrictions and that all

features are set to enabled. Calibrate your location with the device through Google

maps from a location with good carrier signal strength. The premier location for testing

is outdoors. GPS can also be gathered via satellite or network, with varying degrees of

accuracy.

What does it mean when the GPS coordinates are 0.0?

Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that

this feature is blocked by the carrier for use by 3rd party applications. (Note that we

cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1

devices.)

Copyright © 2012, Juniper Networks, Inc. Junos Pulse FAQs 13

Page 20: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

How long does it take for the Mobile Security Dashboard to update with the device user’s activities?

This is configurable from the dashboard. See “Handset Management” on page 7 for

information and guidelines. (Note that if the device user sends and receives a high

volume of texts, sending these texts to the dashboard in real-time is not advised.)

Can I use Junos Pulse to monitor or block URLs?

No, Junos Pulse does not provide that functionality at this time.

How many devices can I monitor using the Mobile Security Dashboard?

There is no limit to the number of devices you can monitor on an account. To add a new

device to the account, you must first download the software to the additional device.

Once the device registers with the dashboard, you can monitor it.

I want to monitor several devices, but each device uses a different carrier.

The carrier does not matter. As long as the device is running a supported operating

system, you can use Junos Pulse.

14 Junos Pulse FAQs Copyright © 2012, Juniper Networks, Inc.

Page 21: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

Index

A

Account management . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10antivirus events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6APNS certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

B

backup and restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

C

commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4commands, iOS devices . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

E

email monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

F

features

control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

G

GPS

support information for iOS . . . . . . . . . . . . . . . . . . . . . . . .5update period. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

H

Handset management . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7History

commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10

I

Image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

K

Keywords, messaging shorthand . . . . . . . . . . . . . . . . . . . . .11

L

locate device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4lock device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4, 5Lock on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Log event limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8Log size limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8

M

MMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8Mobile Security Dashboard

account management . . . . . . . . . . . . . . . . . . . . . . . . . . . 7alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10handset management . . . . . . . . . . . . . . . . . . . . . . . . . . . 7overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

R

Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9retrieve app list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

S

scream locate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7SMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

U

unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4, 5username/password change . . . . . . . . . . . . . . . . . . . . . . . . 7

V

view more

events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Voice monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

W

Web image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5Wipe on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Copyright © 2012, Juniper Networks, Inc. 15

Page 22: Junos Pulse Mobile Security Dashboard · BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive GPS Longitude and Latitude coordinates of 0.0, this functionality

16

Copyright © 2012, Juniper Networks, Inc.