86
December 2011 R2 Release 3.0 Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard Administration Guide

Junos Pulse Mobile Security Dashboard

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Junos Pulse Mobile Security Dashboard

Junos Pulse Mobile Security Dashboard

Administration Guide

December 2011

R2

Release

3.0

Copyright © 2011, Juniper Networks, Inc.

Page 2: Junos Pulse Mobile Security Dashboard

ii

.

Junos® Pulse Mobile Security Dashboard

Juniper Networks, Inc.1194 North Mathilda AvenueSunnyvale, California 94089408-745-2000www.juniper.net

Copyright © Juniper Networks, Inc.December, 2011

Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2011, Juniper Networks, Inc. All rights reserved.

Copyright © 2011, Juniper Networks, Inc.

Page 3: Junos Pulse Mobile Security Dashboard

Table of Contents

Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

What’s In This Guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v

Chapter 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Junos Pulse Mobile Security Dashboard Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 2 Adding Devices to the Junos Pulse Mobile Security Dashboard (for Service Providers) . . . . . . . . . . 1

Configure the Junos Pulse Mobile Security Dashboard for Consumers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Chapter 3 Installing and Registering Junos Pulse On Mobile Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Installation Overview - All Platforms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Android Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Automatic URL Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4

Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

BlackBerry Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Automatic Registration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9

Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Available Junos Pulse Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

iOS Installation and Registration Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Windows Mobile Installation and Registration Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Chapter 4 Using the Mobile Security Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Home Tab Commands and Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Commands. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22

Commands for iOS Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

Events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23

Events for iOS Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

Settings Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Account Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Handset Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Reports Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Alerts Setup Tab Information and Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Support/Help Tab Information and Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

Chapter 5 Using Junos Pulse on Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Android Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32

Adding a Secure Connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33

Junos Pulse Mobile Protection Center iii

Page 4: Junos Pulse Mobile Security Dashboard

:

iv

Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Viewing Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Viewing Connection Status Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Using Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Registering Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Automatic URL Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37

Manual Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

AntiVirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Malware, Prohibited Application, and Suspicious Application Detection . . . . . . . . . . . . . . . . . . . . 42

Scan Results Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Scan Results Tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

Back Up Data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47

Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Anti−Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Uninstalling or Clearing Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

BlackBerry Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Manual Virus Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Quarantined Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

OnDemand Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

File Monitor Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Backup and Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Anti-Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

iOS Security Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Connecting with Junos Pulse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

Adding a Secure Connection Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57

Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Viewing Connection Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Windows Mobile Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Connecting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Email and Intranet. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Using Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

Antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Antispam. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Monitor and Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Backup Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

Anti-Theft Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Chapter 6 Junos Pulse FAQ . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

Junos Pulse FAQs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73

Copyright © 2011, Juniper Networks, Inc.

Page 5: Junos Pulse Mobile Security Dashboard

About This Guide

This guide describes how to create security policies using the Junos® Pulse Mobile

Security Dashboard and how to install and use Junos Pulse software on supported

devices.

Audience

This guide is intended for users who wish to configure controls for device users,

providing security features and access control features.

What’s In This Guide

This guide contains the following chapters:

Chapter 1, “Introduction” on page 1

Chapter 2, “Installing and Registering Junos Pulse On Mobile Devices” on page 3

Chapter 3, “Using the Mobile Security Dashboard” on page 21

Chapter 4, “Using Junos Pulse on Mobile Devices” on page 31

Typographical Conventions

Table 1 describes the text conventions used throughout this manual.

Contacting Technical Support

Technical product support is available through the Juniper Networks Technical

AssistanceCenter (JTAC). If you are a customer with an active J-Care or JNASC support

contract,or are covered under warranty, and need post-sales technical support, you

can access our tools and resources online or open a case with JTAC.

Table 1: Typographical Conventions

Convention Description Examples

Bold typeface Indicates buttons, field names, dialog names, and other user interface elements.

Use the Scheduling and Appointment tabs to schedule a meeting.

Plain sans serif typeface

Represents:

URLs, file names, and directories

Example:

URL:Download the JRE application from: http://java.sun.com/j2se/

Italics Identifies:

Terms defined in text

Variable elements

Book names

Examples:

Variable element:Use settings in the Users > Roles > Select Role page to configure roles.

Copyright © 2011, Juniper Networks, Inc. Audience v

Page 6: Junos Pulse Mobile Security Dashboard

JTAC policies—For a complete understanding of our JTAC procedures and policies,

review the JTAC User Guide located at

http://www.juniper.net/us/en/local/pdf/resource-guides/7100059-en.pdf.

Product warranties—For product warranty information, visit

http://www.juniper.net/support/warranty/.

JTAC hours of operation—The JTAC centers have resources available 24 hours a day,

7 days a week, 365 days a year.

vi Contacting Technical Support Copyright © 2011, Juniper Networks, Inc.

Page 7: Junos Pulse Mobile Security Dashboard

Chapter 1

Introduction

The Junos® Pulse Mobile Security Dashboard collects data from designated mobile

devices and uploads that data to the dashboard that is accessible from the Internet

with a username and password. Using the Junos Pulse Mobile Security Dashboard, you

can manage registered mobile devices and enable features such as remote wipe in

case a device is lost or stolen. You can also configure email alerts for suspicious

messages received by or sent from the device. In this case, messages containing

customized keywords, such as drugs, alcohol, or messages that originate from, or are

destined to specific addresses, are automatically emailed to you.

Junos Pulse Mobile Security Dashboard Features

The Junos Pulse Mobile Security Dashboard provides both control and security for

registered mobile devices.

Control features include:

Monitor activity on the device.

View pictures taken by the device camera and sent or received via text or email.

View the content of all text messages and email messages.

Automatically receive alerts when keywords are found in messages sent or received.

List all applications and software installed on the device.

Display the location of the device in an online map.

Sound an alarm on the device.

Use GPS to help locate a lost or stolen device. (GPS functionality on Verizon

BlackBerry Curve and the Storm 1 smartphones may not be available. If you receive

GPS Longitude and Latitude coordinates of 0.0, this functionality may have been

blocked by the service provider or the device may be out of range of a satellite.)

Security features include:

Antivirus—This feature provides real-time protection against malware threats by

automatically scanning devices to ensure files are not infected with malware. The

on-demand scanning ability lets you scan selected files and folders to ensure the

device and memory card are clean and protected. The automatic update capability

ensures that the device possesses the latest antivirus signatures.

Backup and restore—This feature lets you backup contact and calendar information.

Firewall—The firewall security features let you block or allow data traffic to and/or

from your device using rule lists that control traffic based on port number and ip

addresses.

Copyright © 2011, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard Features 1

Page 8: Junos Pulse Mobile Security Dashboard

Anti−theft—This set of features includes remote commands you can send to the

device if it is lost or stolen. Those commands include: lock device, wipe device, locate

device, and backup device.

2 Junos Pulse Mobile Security Dashboard Features Copyright © 2011, Juniper Networks, Inc.

Page 9: Junos Pulse Mobile Security Dashboard

Chapter 2

Adding Devices to the Junos Pulse Mobile Security Dashboard (for Service Providers)

Before consumers can use Junos® Pulse, you must perform some preliminary tasks to

prepare the Junos Pulse Mobile Security Dashboard for consumer use.

Configure the Junos Pulse Mobile Security Dashboard for Consumers

Complete the following tasks so that the consumer can access the dashboard and use

the available features.

1. Login to the Junos Pulse Mobile Security Dashboard by pointing your browser to

the following URL and entering the credentials provided to you.

https://mss.junospulse.juniper.net

2. Once you are logged in, select the Devices tab.

3. Click Add to open the Add Device dialog

4. Specify the following:

Phone Number—Enter the phone number of the device, including the country

code and area code. For example, 16035551212.

5. Click Save. The gateway uses SMS to send a Junos Pulse software download link

and a Consumer license key to the device.

Informational Note: Service providers may create an API that overrides these

distribution instructions. If so, refer to information from the service provider.

When the user clicks on the provided URL specific to their device platform, they

download Junos Pulse. They must provide their license key to register the product and

they must create a username and password during this registration for logging into the

Mobile Security Dashboard.

See the Junos Pulse Mobile Security Gateway Administration Guide for more information.

Copyright © 2011, Juniper Networks, Inc. Configure the Junos Pulse Mobile Security Dashboard for Consumers 1

Page 10: Junos Pulse Mobile Security Dashboard

2 Configure the Junos Pulse Mobile Security Dashboard for Consumers Copyright © 2011, Juniper Networks, Inc.

Page 11: Junos Pulse Mobile Security Dashboard

Chapter 3

Installing and Registering Junos Pulse On Mobile Devices

This chapter describes the Junos Pulse installation and registration process for each

supported platform.

Installation Overview - All Platforms

For all supported mobile platforms, as part of the installation and registration process,

you will do the following:

Download the Junos Pulse Security software to the mobile device.

Register the Junos Pulse application in order to use the web-based Mobile Security

Dashboard features for configuring and deploying monitor, control and security

features.

Create a username and password on the device as part of the Junos Pulse

installation process. You will use this username (the username is an email address)

and password to login to the Mobile Security Dashboard over the Internet. Since this

username and password effectively allow you to control and monitor the device, you

should not provide this information to the device user. Additionally, email alerts are

sent to the email address provided as the username. Therefore, this email address

should not belong to the device user.

Android Installation and Registration Instructions

Use the following instructions to download and install Junos Pulse software on Google

Android devices.

Informational Note: The Junos Pulse client is available from the Android Market

application store.

1. From your Android device, download the Junos Pulse software directly to the

device. Once downloaded, Junos Pulse installs automatically.

2. During installation, you are prompted to allow the application to use network

communication and phone call components. Select OK. See Figure 1 on page 4.

Copyright © 2011, Juniper Networks, Inc. Installation Overview - All Platforms 3

Page 12: Junos Pulse Mobile Security Dashboard

Figure 1: Allow Pulse to use Network Communications

Once the application has been downloaded and installed, the Junos Pulse icon appears

in the applications menu. See Figure 2 on page 4.

Figure 2: Junos Pulse in the Applications Menu

The first time you start Junos Pulse, the End User License Agreement appears. You must Accept the license to begin using Junos Pulse.

Registering Security

Your administrator can configure security registration for your device as automatic URL

registration or as a manual registration process.

Automatic URL Registration

Automatic URL registration requires you to select a URL provided by your administrator.

Once you click the URL, you are prompted to verify that the URL comes from a trusted

source. When you click Yes from this prompt, the automated security registration

process takes place.

To register security features automatically, do the following:

1. Start Junos Pulse.

4 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 13: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

2. Select the registration URL provided to you by your administrator via email, text

message, or Web site.

3. Because the automatic registration changes the security settings on your device,

you should verify the validity of the URL. If you are certain the URL is trusted, select

Yes when prompted (see Figure 3 on page 5).

Once you select Yes, your device is automatically registered for security features.

Figure 3: Automatic URL Registration Prompt

Manual Registration

In some cases, manual registration may also require you to select a URL provided by

your administrator. Once you select the URL, you are prompted to verify that the URL

has comes from a trusted source (see Figure 4 on page 6). When you click Yes in the

registration prompt, the manual registration screen appears.

The registration screen requires that you to enter information such as a license code

provided to you by the administrator.

Informational Note: If you are using a WIFI-only device (i.e. such as a tablet with no

cellular service), the phone number field does not appear in the registration window.

See Figure 5 on page 7.

To manually register security, do the following:

1. Start Junos Pulse.

1. Select the URL provided by your administrator via email, text message, or Web site.

2. Verify the URL is trusted and click Yes when prompted. The registration screen

appears (see Figure 4 on page 6).

Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 5

Page 14: Junos Pulse Mobile Security Dashboard

3. Optionally, enter an Email address and Password. (Email and password

information is not used at this time.)

4. Specify the License Code provided by your administrator.

5. Your device’s phone number appears in the Phone Number box. If the number

does not appear, enter it manually including Country Code and Area Code without

the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or

special characters. Valid phone numbers are between 11 and 15 digits (including

country code)

6. Select Register.

Figure 4: Manual URL Registration Prompt and Registration Screen

6 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 15: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

Figure 5: WIFI only Device Manual Registration Example

Copyright © 2011, Juniper Networks, Inc. Android Installation and Registration Instructions 7

Page 16: Junos Pulse Mobile Security Dashboard

Once you’ve successfully registered security features, the available features appear

(see Figure 6 on page 8) and are now accessible from the Security button (see Figure 7

on page 9). Those features are as follows:

AntiVirus (and Malware Detection): Control antivirus activities and detect installed

malware.

Monitor and Control: View monitoring settings.

Backup Data: Back up contacts and calendar information.

Security Settings: Set scan intervals.

Your administrator can enable or disable security features.

Figure 6: Available Features

8 Android Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 17: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

Figure 7: Security Features

See “Android Security Features” on page 31 for Android Junos Pulse feature and

configuration information.

BlackBerry Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

Informational Note: Make sure data services are enabled on the device so that it can

receive settings and virus definition updates.

1. Using the BlackBerry device’s web browser, download the Junos Pulse software

directly to the device.

2. Open the Junos Pulse application from the Application or Download directory.

3. You are prompted to accept a user agreement in order for installation to proceed.

Use the Menu button to access the menu that lets you agree. Once you select I agree, the installation and registration proceeds. See Figure 8 on page 10.

Registering Security

Once you agree to EULA, you must register for security features. Your administrator

configures what type of registration your device requires: automatic registration or

manual registration.

Automatic Registration

If you are registering automatically for security features, once you accept the EULA, the

registration process starts immediately with no user prompts. See Figure 8 on page 10.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 9

Page 18: Junos Pulse Mobile Security Dashboard

Figure 8: Auto Registration

Manual Registration

If you are registering manually for security features, once you accept the EULA, you are

prompted to do the following:

1. Enter an Email address and Password. (User and password information is not

used at this time.) See Figure 9 on page 11.

2. Re-enter your password in the Confirm Password field.

3. Enter the License Code provided by your administrator.

4. Enter your Phone Number and click Finish. In some cases, this field is

prepopulated. If the number does not appear, enter it manually including Country

Code and Area Code without the international dialing prefixes: '00' or '+'. Do not

use spaces, parentheses, or special characters.

10 BlackBerry Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 19: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

Figure 9: Manual Registration

Once the application is installed and registered, the Junos Pulse icon appears in the

Applications folder.

Available Junos Pulse Features

Your administrator decides which Junos Pulse features are available to you.

Junos Pulse can include the following features (see Figure 6 on page 8):

AntiVirus (and Malware Detection): Controls antivirus activities and detects

installed malware.

Monitor and Control: View monitoring settings.

Backup and Restore Data: Backup contacts and calendar information.

Figure 10: Junos Pulse Features

Copyright © 2011, Juniper Networks, Inc. BlackBerry Installation and Registration Instructions 11

Page 20: Junos Pulse Mobile Security Dashboard

See “BlackBerry Security Features” on page 51 for BlackBerry Junos Pulse feature and

configuration information.

iOS Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

Junos Pulse VPN features and Junos Pulse security features are available through the

Junos Pulse app, which is available from the Apple App Store. The security features are

available only after you register your iOS device.

1. Downloading and installing Junos Pulse is the same as installing any iOS app. You

can download Junos Pulse and import it into iTunes in order to install it on your iOS

device. Once you install Junos Pulse, do the following to automatically register

Junos Pulse and begin using VPN and security features.

2. After the application has been downloaded and installed, browse to the

registration URL provided by your administrator in an email or in a text message.

3. Clicking the registration URL brings up the Junos Pulse EULA agreement. Tap

Accept to continue. See Figure 11 on page 12.

Figure 11: Accept EULA

4. Next, you are prompted to Enable Junos Pulse. Tap the Enable button to continue.

See Figure 12 on page 13.

12 iOS Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 21: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

Figure 12: Enable Junos Pulse

5. You are next prompted to register for security features. Tap Yes to register your iOS

device for Junos Pulse security features. See Figure 13 on page 13.

Informational Note: If you have previously registered Junos Pulse using this device,

you must delete the old security profile before you can register for a new security

profile.

Figure 13: Register Security

6. Once Junos Pulse is enabled, you are prompted to install the Junos Pulse security

profile. Tap the Install button. See Figure 14 on page 14.

Copyright © 2011, Juniper Networks, Inc. iOS Installation and Registration Instructions 13

Page 22: Junos Pulse Mobile Security Dashboard

Figure 14: Install Profile

7. A screen appears informing you that installing this profile allows your administrator

to remotely control and access certain aspects of your device. This is necessary to

provide security features such as remote lock and remote wipe. Tap the Install button to continue. See Figure 15 on page 14.

Figure 15: Install Profile Warning

14 iOS Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 23: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

8. A screen displays informing you that the security profile has installed successfully.

See Figure 16 on page 15. Security features are now in place for your iOS device.

Figure 16: Profile Installed Successfully

9. When you relaunch Junos Pulse, if your administrator has configured GPS location

tracking services for your device, you are prompted to permit GPS location tracking

using your current location. Click OK to allow this service. Click Don’t Allow to

decline. See Figure 17 on page 15.

Figure 17: Allow GPS Tracking

Copyright © 2011, Juniper Networks, Inc. iOS Installation and Registration Instructions 15

Page 24: Junos Pulse Mobile Security Dashboard

Informational Note: If your iOS device does not have Location Services turned on, the

following prompt appears (see Figure 18 on page 16):

Figure 18: Turn On Location Services

Informational Note: Tap the Settings button (see Figure 18 on page 16) to go to the

Location Services screen where you can turn the service on. You must then relaunch

Junos Pulse to enable the GPS tracking report.

Caution: Once you select Don’t Allow or OK for GPS location services, your selection is

remembered if you uninstall and reinstall Junos Pulse. You are not prompted again and

your previous selection is used. If you want to reset this feature to change your

selection, on your iOS device, navigate to Settings > General > Reset Location

Warnings. This resets all of the location warnings for all your applications.

Windows Mobile Installation and Registration Instructions

Use the following instructions to download, install, and register Junos Pulse software.

1. Using the Windows Mobile device’s web browser, download the Junos Pulse

software directly to the device.

Upon download of the application to the device, the .CAB file will appear in the

device’s Program Files folder.

2. To initiate the installation, locate the installation .CAB file using File Explorer, accessible from the Start menu.

3. Select the .CAB file and respond to the prompt to specify the desired location for

the application, either Store to device or Store to memory card.

After you install Junos Pulse, you are prompted to reboot the phone in order for the

firewall application to work. Once installed, the Junos Pulse icon appears on the Start menu and in the Programs list.

4. Next, you begin the registration process. Select the Junos Pulse application icon.

16 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 25: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

5. Next, you must accept the license agreement (see Figure 19 on page 17). Select Accept to move on to the Registration screen.

Figure 19: Junos Pulse LIcense Agreement

6. In the Registration screen, enter the following information (see Figure 20 on

page 18):

Enter your Email address.

Enter your Password and Confirm it. This password must be at least 6

characters in length.

Specify the License Code provided when you purchased the product.

Enter the Phone number, including the country code.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 17

Page 26: Junos Pulse Mobile Security Dashboard

Figure 20: Windows Mobile Registration

7. To complete the registration, select Register. The registration process may take a

few moments.

8. When the device is registered, a window appears indicating that the device has

registered successfully. Click OK on that window to continue.

9. Following a successful registration, you can run the application by selecting the

Junos Pulse icon from the Programs list.

When you open the application, the following features are viewable (see Figure 21

on page 19):

Connection lets you add, edit, and remove network connections.

Intranet provides Web links configured by a network administrator.

Email launches your email application.

Security provides access to the following security features:

Antispam protects your device from unsolicited calls and SMS spam.

Antivirus provides scanning functions to protect the device data from

malware.

Firewall features let you block or allow data traffic to and/or from the device

using rule lists that control traffic based on port number, IP address, and

other options.

Monitor and Control reflects the settings you’ve chosen (or their defaults)

for monitoring your mobile activities from the dashboard. The default

settings may enable all monitoring features: text messages, calls, email, and

pictures.

Backup Data backs up contact and calendar appointment information to

the dashboard from the device.

18 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 27: Junos Pulse Mobile Security Dashboard

Installing and Registering Junos Pulse On Mobile Devices

Status lets you view, delete, and email Junos Pulse log files, which you might

need to do in a troubleshooting operation. The log files show all security

incidents, such as virus scan times and viruses discovered.

About provides version information for Junos Pulse software.

Figure 21: Junos Pulse Main Screen

See “Windows Mobile Security Features” on page 51 for Windows Mobile Junos Pulse

feature and configuration information.

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Installation and Registration Instructions 19

Page 28: Junos Pulse Mobile Security Dashboard

20 Windows Mobile Installation and Registration Instructions Copyright © 2011, Juniper Networks, Inc.

Page 29: Junos Pulse Mobile Security Dashboard

Chapter 4

Using the Mobile Security Dashboard

This chapter describes how to access and use the Junos Pulse Mobile Security

Dashboard to configure monitoring and security features for registered devices.

Overview

Once the Junos Pulse application is installed on the device and you have setup an email

address and password as part of the device installation and registration process, you

can use that email address and password to login to the dashboard. You access the

dashboard by entering the URL you received from your service provider.See Figure 22 on

page 21.

Figure 22: Mobile Security Dashboard Login Window

Once you login, the Home tab is displayed. See Figure 23 on page 22. Next to the Home

tab, you can find tabs for each functional area of the dashboard. Those tabs are as

follows:

Home—Provides links to logged messages and calls, found viruses, installed applications, and photos. It also provides recent GPS locations.

Settings—Configure different user accounts and devices you wish to monitor

Copyright © 2011, Juniper Networks, Inc. Overview 21

Page 30: Junos Pulse Mobile Security Dashboard

Reports—Look for certain senders or keywords in a range of messages, based on

dates

Alert Settings—Configure parameters for triggering alerts. (You can also find Alert

status and configure alerts by clicking the Alert button in the upper right hand corner

of the dashboard window.)

Informational Note: Note that Alert Settings are not available for iOS devices

Figure 23: Home Tab

Home Tab Commands and Events

From the Home tab, you can issue commands and access device events as follows:

Commands

Click any of the following buttons to send the command in question. When you click a

command button, a window appears asking you to verify the command you have

chosen before it is sent.

Informational Note: A different set of commands are available for iOS devices. See

“Commands for iOS Devices” on page 23.

Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of

the device for any other reason.

Unlock Device—Unlocks the device.

Locate Device—Sends a command to determine the GPS location of the device, with

the result displayed in a map on the Home tab page.

Backup and Restore—Creates a copy of the contact and calendar information. This

is useful if a device is lost or stolen.

22 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.

Page 31: Junos Pulse Mobile Security Dashboard

Using the Mobile Security Dashboard

Wipe Device—Removes personal data from the device such as contacts, calendar

events, notes, call history, message folders, and all data on the SD card.

Scream Locate—Allows the device user to audibly locate a misplaced device within

hearing distance, even if the speakers and ringer are muted.

Commands for iOS Devices

For iOS devices, the commands available from the Home tab are as follows (see

Figure 24 on page 23):

Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of

the device for any other reason.

Unlock Device—Unlocks the device.

Retrieve App List—Updates the list of installed applications on the device.

Wipe Device—Sets device back to factory settings.

Informational Note: There are no commands available for iOS devices that do not

have an associated APNS certificate. When no APNS certificate is present, GPS

location is only available feature.

Informational Note: GPS is not supported on the iPod Touch and on iOS devices that

do not have cell service.

Figure 24: Home Tab for iOS Devices

Events

When there are events present for any of the listed categories, a view more button

becomes available. See Figure 23 on page 22. You can delete event category items

(messages, voice calls, etc.) from the dashboard when you click view more. In the

window that appears, select the check box next to the item you want to remove and

click the Delete button. You can also click the Select All button and then the Delete

button to delete all items within that event category.

Copyright © 2011, Juniper Networks, Inc. Home Tab Commands and Events 23

Page 32: Junos Pulse Mobile Security Dashboard

Informational Note: Different events are available for iOS devices. See “Events for

iOS Devices” on page 24.

Messages—View messages (voice, email, text) received on the device.

Click view more (if present) to view all listed messages. See Figure 25 on page 24.

Voice calls—View voice calls received on the device.

Click view more (if present) to view all listed calls.

Anti-Virus events—View new antivirus events that have occurred.

Click view more (if present) to view all detected viruses.

New applications—View new applications that have been installed on the device.

Click view more (if present) to open a new window that lists newly installed

applications. You can remotely uninstall an application by selecting the check box

beside the application and click the Uninstall specific application on the handset

button.

New photos—View new photos stored on the device.

Click view more (if present) to open a new window that displays photos as 20

pictures per screen.

Figure 25: Detected Message Events View More Window

Events for iOS Devices

New applications is the only event available for iOS at this time. Click view more (if

present) to open a new window that lists newly installed applications (see Figure 26 on

page 25).

24 Home Tab Commands and Events Copyright © 2011, Juniper Networks, Inc.

Page 33: Junos Pulse Mobile Security Dashboard

Using the Mobile Security Dashboard

Figure 26: Detected Application Installation Events View More Window

Settings Tab Information and Configuration

From the Settings tab, you can configure Account Management and Handset

Management. See Figure 27 on page 27. For example, you can change the email

address to where alerts are sent.

Account Management

You can remove, edit or add a new email address to a device account.

To add an email address and corresponding password,

1. Select the Settings tab.

2. From the Select phone to view pulldown in the top right corner, select the device

you want to manage.

3. To add a new email address for handset account management, enter the email

address in the Username (email) edit field.

4. Enter the new password in the Password edit field.

5. Click the Add User button.

To remove an address, select it and click Remove Selected.

To edit an address, make your edits in the edit field and click Update Email. It is

important to note that changing this address also changes the login username for the

account.

Handset Management

With Handset Management, you can update specific device monitoring functions,

change the GPS update period, control log file size limits, and determine data wipe

parameters. Note that updates are not received until the device reports in at the next

scheduled time.

Copyright © 2011, Juniper Networks, Inc. Settings Tab Information and Configuration 25

Page 34: Junos Pulse Mobile Security Dashboard

Informational Note: Handset Management is not available for iOS devices. From the

Settings tab, you can view Handset Information for the selected iOS device such as

phone number, device type, device name and UDID. See Figure 28 on page 27.

To update or change the available settings, do the following,

1. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device you want to manage.

In the Handset Management column on right side of the window, set the following:

2. Next to Email Monitoring, select the check box to enable this feature for the

selected device.

3. Next to SMS Monitoring (Short Messaging Service), select the check box to enable

messaging monitoring for the selected device.

4. Next to MMS Monitoring (Multimedia Messaging Service), select the check box to

enable monitoring of messages containing pictures, video, sound or other

multimedia types for the selected device.

5. Next to Voice Monitoring, select the check box to enable this feature for the

selected device. Voice Monitoring provides a time-stamp for a conversation.

6. Next to Log Event Limit, select an available event limit from the pulldown list. We

recommend that you do not set this limit lower than 25.

7. Next to Log Size Limit, select an available size limit from the pulldown list. We

recommend that you do not set this limit to Off.

The Log Event Limit and Log Size Limit work together in that whichever setting is

triggered first is the one that takes effect. The event limit causes the device to send

the specified amount of events (email, voice, SMS, MMS) each as one combined

event when the event limit is achieved. This is preferable to sending each individual

event in real-time. If the device sends or receives a large number of messages, you

should set this limit higher rather than lower. Otherwise, the device could be

constantly sending events to the dashboard which could hinder device

performance. The Log Size Limit restricts the amount monitored data this is sent

from the device. The limit that is achieved first is the one that is used.

8. Next to Image Monitoring, select the check box to enable this feature for the

selected device.

9. Next to Web Image Monitoring, select the check box to enable this feature for the

selected device.

10. Next to GPS Update Period, select an available update time frame from the

pulldown list. With this setting, you can configure GPS updates to occur

automatically every fifteen minutes, 30 minutes, hourly, or daily.

11. Next to Lock on SIM Change, select the check box to enable this feature. With this

feature selected, if the SIM is removed, the device switches on GPS Theft Mode

and Locks the device. You can unlock the device with a username and password.

12. Next to Wipe on SIM Change, select the check box to enable this feature.This

check box is only available when the Lock on SIM Change check box is enabled.

With this feature selected, if the SIM is swapped for another, the device does all the

Lock on SIM Change actions, plus it removes sensitive device information.

13. Click the Update button to apply your settings.

26 Settings Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 35: Junos Pulse Mobile Security Dashboard

Using the Mobile Security Dashboard

Figure 27: Settings Tab

Figure 28: Settings Tab for iOS Devices

Reports Tab Information and Configuration

You can run customized reports against collected device data by entering criteria into

the fields provided in this window.

To run a customized report, enter report criteria in one or more fields described here.

1. Select the Reports tab. See Figure 29 on page 28.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device on which you want to run a report.

Copyright © 2011, Juniper Networks, Inc. Reports Tab Information and Configuration 27

Page 36: Junos Pulse Mobile Security Dashboard

3. If you want the report to include sender information, enter the Sender email

address or phone number in the corresponding field. Note that the address or

number you enter must match the sender address or number as it appears in the

Messages display.

4. If you want the report to include recipient information, enter the Recipient email

address or phone number in the corresponding field. Note that the address or

number you enter must match the recipient address or number as it appears in the

Messages display.

5. In the Start Date field, enter a start date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

6. In the End Date field, enter an end date parameter for the report you are creating.

Format the date as Year-Month-Day as in the following example: 2010-11-24.

7. From the Messages pulldown list, select the type of message for which you are

running this report. Your options are All, SMS, MMS, Email, Voice.

8. In the Keyword Search edit field, enter a keyword or phrase you want to search for

within messages. Messages containing this keyword are used to build your report.

9. Click the Search button to run the report.

History

On the right side of the Reports window, there is a History column. Here you can view

the last ten commands sent to the device and their send dates.

Figure 29: Reports Tab

Alerts Setup Tab Information and Configuration

By using unique identifiers, such as keywords or addresses, messages that meet a

defined criteria are identified and viewed by clicking on the Alerts box in the top right

corner of the dashboard. Alerts can also be configured to be sent via email to you; for

example, an SMS message that contains the keyword you designate can be

automatically emailed to you.

28 Alerts Setup Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 37: Junos Pulse Mobile Security Dashboard

Using the Mobile Security Dashboard

To configure an alert, do the following.

1. Select the Alert Setup tab. See Figure 30 on page 30.

2. If it isn’t already selected, from the Select phone to view pulldown in the top right

corner, select the phone number for the device for which you want to configure an

alert.

3. In the Add Keyword edit field, enter a keyword you want to trigger an alert if this

word is found in a message sent or received by the device. Click the Add button.

The keyword now appears in the Keyword list in the field below.

4. The Keywords field also has a check box that allows you to use suggested

keywords from the column on the right side of the window. These are keywords

that are often used as shorthand in messages. To use suggested keywords in place

of or in addition to keywords you enter, select the Use Suggested Keywords check

box. When this check box is selected, the Suggested Keywords that are enabled

are used as part of the alert.

You can scroll through the Suggested Keywords list and enable check boxes

besides keywords you want to trigger an alert if found.

5. If you are selecting to Send the event as an Email Message by enabling the check

box in the Sender/Recipient Address field, enter the email address or phone

number to check for alerts. Use this feature to flag any communication with a

particular contact as an alert.

6. From the Select what to do with an event options, you can choose to,

Report the event as an Alert message

Send the event as an Email message

Select one or both check boxes.

7. Click the Update button to enable the alert.

Copyright © 2011, Juniper Networks, Inc. Alerts Setup Tab Information and Configuration 29

Page 38: Junos Pulse Mobile Security Dashboard

Figure 30: Alert Setup Tab

Support/Help Tab Information and Configuration

If you have questions or need technical support, select the Support/Help tab. Enter the

required information in the available fields and click Submit.

Figure 31: Support/Help Tab

30 Support/Help Tab Information and Configuration Copyright © 2011, Juniper Networks, Inc.

Page 39: Junos Pulse Mobile Security Dashboard

Chapter 5

Using Junos Pulse on Mobile Devices

This chapter describes the security and connection features available on each

supported device.

Android Security Features

Your administrator decides which Junos Pulse features are available to you. You may

see more features once you establish a connection to your network. (See “Adding a

Secure Connection” on page 33 for instructions.)

Junos Pulse can include the following features (see Figure 32 on page 32):

Connections: Lets you add, edit, and remove corporate network connections.

Intranet: Provides Web links configured by your administrator.

Email: Launches your email application.

Security: Provides access to security features.

Status: Lets you view, delete, and email log files, which you might need to do in a

troubleshooting operation. The log files show all security incidents, such as virus scan

times and viruses discovered. If you have an established VPN connection, you can

also view the status of that connection from this screen.

About: Provides software version information.

Copyright © 2011, Juniper Networks, Inc. Android Security Features 31

Page 40: Junos Pulse Mobile Security Dashboard

Figure 32: Available Features

Status

Select the Junos Pulse icon in the Applications folder to access the available Pulse

features for your device. Select Status to view and send log files. See Figure 33 on

page 33.

In the Status window, you can view, delete, and email log files, which you might need

to do in a troubleshooting operation. The log files show all security incidents, such as

virus scan times and viruses discovered. If you have an established VPN connection,

you can also view the status of that connection from this screen.

In the Status window, click Send Logs to send logs by email or SMS.

32 Android Security Features Copyright © 2011, Juniper Networks, Inc.

Page 41: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 33: Android Junos Pulse Status Window, Show Logs, and Send Logs

Adding a Secure Connection

Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an

authenticated connection to a protected network. You can add a connection for each

different network to which you connect. This is a secure VPN connection to your

corporate network.

To define a connection, do the following:

1. Start Junos Pulse.

2. Select Connections (see Figure 32 on page 32).

3. Select Add Connection (see Figure 34 on page 34).

Copyright © 2011, Juniper Networks, Inc. Adding a Secure Connection 33

Page 42: Junos Pulse Mobile Security Dashboard

Figure 34: Add a Connection

4. Enter the connection properties as follows (see Figure 35 on page 35):

Connection name: A descriptive name.

URL: The Web address provided by your administrator.

Uses Certificate: Select this check box if your administrator has provided you

with a digital certificate. If you do not use a certificate, you may have to provide a

username and password when you connect.

Certificate Path: This box is available if you selected the Uses Certificate check

box. Select Pick to browse to the certificate file.

Key Path: This box is available if you selected the Uses Certificate check box.

Select Pick to browse to the network key provided by your administrator.

5. Select Create Connection. Your connection is now created and saved.

34 Adding a Secure Connection Copyright © 2011, Juniper Networks, Inc.

Page 43: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 35: Create a Connection

Connecting

Once you have configured your connection, select the Connect button (see Figure 32

on page 32).

If the Select Connection field does not default to the correct connection, you can

select it from the pulldown menu. You may have to enter additional information

required by your network when you are establishing a connection.

Viewing Connection Status

The status of your current connection also appears at the bottom of the Junos Pulse

window in the form of an icon. The appearance of the icon indicates whether the

connection is active or inactive.

The active connection icon also appears in the status bar at the top of your device

screen. When you close Junos Pulse, that icon remains visible as long as your VPN

connection is active.

Viewing Connection Status Screen

When you have an established, full VPN connection (not all devices support full VPN

capability), selecting the Status button in the main screen (see Figure 32 on page 32)

displays VPN information similar to that shown in Figure 36 on page 36.

Active Connection No Session

Copyright © 2011, Juniper Networks, Inc. Connecting 35

Page 44: Junos Pulse Mobile Security Dashboard

Figure 36: VPN Connection Status Screen

From the Notification bar, the following notification also appears when you have an

active VPN connection. See Figure 37 on page 37.

36 Connecting Copyright © 2011, Juniper Networks, Inc.

Page 45: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 37: VPN Notification

Using Security Features

The Junos Pulse Mobile Security Suite provides access to features that protect your

device from malware and viruses and it allows you to backup your device’s calendar

and contact information to a central server. Junos Pulse Mobile Security is an optional

feature that is enabled by your administrator. When it is enabled for your device, you

must register your device with the Mobile Security Gateway before you can access the

security feature set.

Registering Security

Your administrator can configure security registration for your device as automatic URL

registration or as a manual registration process.

Automatic URL Registration

Automatic URL registration requires you to select a URL provided by your administrator.

Once you click the URL, you are prompted to verify that the URL comes from a trusted

source. When you click Yes from this prompt, the automated security registration

process takes place.

To register security features automatically, do the following:

1. Start Junos Pulse.

2. Select the registration URL provided to you by your administrator via email, text

message, or Web site.

3. Because the automatic registration changes the security settings on your device,

you should verify the validity of the URL. If you are certain the URL is trusted, select

Yes when prompted (see Figure 38 on page 38).

Copyright © 2011, Juniper Networks, Inc. Using Security Features 37

Page 46: Junos Pulse Mobile Security Dashboard

Once you select Yes, your device is automatically registered for security features.

Figure 38: Automatic URL Registration Prompt

Manual Registration

In some cases, manual registration may also require you to select a URL provided by

your administrator. Once you select the URL, you are prompted to verify that the URL

has comes from a trusted source (see Figure 39 on page 39). When you click Yes in the

registration prompt, the manual registration screen appears.

The registration screen requires that you to enter information such as a license code

provided to you by the administrator.

Informational Note: If you are using a WIFI-only device and do not have access to a

cellular network, some fields such as phone number, will not appear.

To manually register security, do the following:

1. Start Junos Pulse.

1. Select the URL provided by your administrator via email, text message, or Web site.

2. Verify the URL is trusted and click Yes when prompted. The registration screen

appears (see Figure 39 on page 39).

3. Optionally, enter an Email address and Password. (Email and password

information is not used at this time.)

4. Specify the License Code provided by your administrator.

38 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 47: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

5. Your device’s phone number appears in the Phone Number box. If the number

does not appear, enter it manually including Country Code and Area Code without

the international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or

special characters. Valid phone numbers are between 11 and 15 digits (including

country code)

6. Select Register.

Figure 39: Manual URL Registration Prompt and Registration Screen

Copyright © 2011, Juniper Networks, Inc. Using Security Features 39

Page 48: Junos Pulse Mobile Security Dashboard

Once you’ve successfully registered security features, the available features appear

and are now accessible from the Security button (see Figure 40 on page 40). Those

features are as follows:

AntiVirus (and Malware Detection): Control antivirus activities and detect installed

malware.

Monitor and Control: View monitoring settings.

Backup Data: Back up contacts and calendar information.

Security Settings: Set scan intervals.

Informational Note: Your administrator can enable or disable security features.

Figure 40: Available Features and Security Features

About: Provides software version information.

AntiVirus

The AntiVirus feature protects your device by scanning all files and scanning secure

digital (SD) cards to prevent device infections from malware that may have been

stored on the card. To configure and run antivirus features:

1. Start Junos Pulse.

2. Select Security.

3. Select AntiVirus and configure the following (see Figure 41 on page 42):

Scan Memory Card on Insert: Scans the memory card for malware and viruses.

Select the available button to Enable this feature.

Scan application on install: Scans the files downloaded at /sdcard/download

for malware. Select the available button to Enable this feature.

40 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 49: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Virus Definitions updated on: Definitions are loaded when you register, and they

are updated on a schedule set by the administrator. Select Update Now to

update definitions manually.

Last scanned for viruses: This field may display one of the following results:

− Never: This is the scan status when a complete scan was never initiated.

− Blank: This is the scan status when a complete scan was initiated and it was

cancelled or it is in progress.

− Timestamp: The timestamp of the last scan appears here when a scan has

been completed successfully.

Scan all Files and Folders for viruses: Select Start Now to start a complete scan

of device data.

Select a File or Folder to scan for viruses: You can scan a selected file, folder, or

the installed SD card. Click Select to open the component section screen, and

choose a scan target.

Scan installed applications for malware: Select Start Now to scan applications

for malware.

View Scan Results: Select Open to view the results of the most recent virus and

malware scans. This button takes you to the Scan Results screen described in

“Scan Results Screen” on page 42.

View Allowed Suspicious App: Select Open to view the list of applications

labeled suspicious that you have allowed. From this screen, you can change your

mind and choose to not allow the listed applications. For more information, see

page 46.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 41

Page 50: Junos Pulse Mobile Security Dashboard

Figure 41: AntiVirus Configuration

Malware, Prohibited Application, and Suspicious Application Detection

Junos Pulse detects application malware by using blacklists containing known

malware and by using heuristics to detect possible suspicious applications. Virus and

malware device scans take place at regular intervals determined by your administrator.

Scans also detect applications that are not in compliant with corporate policies. These

are applications that have been prohibited by your network administrator.

Scan Results Screen

If your administrator has enabled Antivirus for your device, the Scan Results screen lists

the viruses, malware, suspicious applications and prohibited applications found on your

device. If your device does not have Antivirus enabled, you only see the prohibited

applications found on your device.

Each available tab displays the files or applications that fall into the corresponding

detection category. You can access the Scan Results screen in one of the following

ways:

From the AntiVirus screen (see Figure 41 on page 42): Click the View Scan Results

Open button.

From the notification icon: The notification icon is present at the top

of the Junos Pulse screen when any viruses or malware are visible in

the Scan Results screen. Select the notification when it is present to

open the Scan Results screen.

From a device scan: When a scan finishes, if any viruses or malware are found, the

Scan Results screen displays at the end of the scan.

42 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 51: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Scan Results Tabs

A scan may detect and label an application as any of the following in the Scan Results

screen:

Prohibited: This tab (see Figure 42 on page 43) lists the applications installed on

your device that have been prohibited by your administrator. To remove a prohibited

application, select the radio button beside the application name and click the

Uninstall button. If you do not uninstall applications that are prohibited, the

notification icon continues to appear at the top of the Junos Pulse screen.

Informational Note: On some devices, Junos Pulse can automatically uninstall

applications that are prohibited.

Figure 42: Scan Results Prohibited Tab

Copyright © 2011, Juniper Networks, Inc. Using Security Features 43

Page 52: Junos Pulse Mobile Security Dashboard

Malware: This tab (see Figure 43 on page 44) lists the applications installed on your

device that are known to be malware. To remove malware, select the radio button

beside the application name and click the Uninstall button. If you do not uninstall

applications that are found to be malware, the notification icon continues to appear

at the top of the Junos Pulse screen.

Informational Note: On some devices, Junos Pulse can automatically uninstall

applications that are found to be malware.

Figure 43: Scan Results Malware Tab

44 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 53: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Suspicious: This tab (see Figure 44 on page 45) lists the applications installed on

your device that appear to be suspicious. The suspicious label is applied to an

application when a set of heuristics determine that the application may be malware.

For suspicious applications, you are given the option of allowing the application or

uninstalling it. To allow a suspicious application, select the radio button beside the

application name and click the Allow button. You must also click Yes to confirm the

Allow action. To uninstall a suspicious application, select the radio button beside the

application and click the Uninstall button. If you do not uninstall or allow

applications that are found to be suspicious, the notification icon continues to

appear at the top of the Junos Pulse screen.

Figure 44: Scan Results Suspicious Tab and Allow Prompt

Copyright © 2011, Juniper Networks, Inc. Using Security Features 45

Page 54: Junos Pulse Mobile Security Dashboard

Allowed Suspicious applications: When you allow a suspicious application, you are

provided with a separate screen from which to manage suspicious applications in

case you change your mind and want to uninstall an allowed application at a later

time (see Figure 45 on page 46). By selecting the check box beside the application

name and clicking the Do not allow button, you can move the allowed application

back to the Suspicious tab. The allowed applications screen is accessible from the

AntiVirus screen View Allowed Suspicious App Open button. (see Figure 41 on

page 42).

Figure 45: Allowed Suspicious Applications Screen

46 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 55: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Viruses: This tab (see Figure 46 on page 47) lists the viruses found during the last

scan. It is recommended that you delete viruses when they appear here.To delete the

virus from your device, select the check box beside the virus name and click the

Delete button. To delete multiple viruses at one time, select the Check All button

and then the Delete button.

Figure 46: Scan Results Viruses Tab

Monitor and Control

The Monitor and Control screen lets you view your current Junos Pulse settings as well

as events and log files. To use Monitor and Control:

1. Start Junos Pulse.

2. Select Security.

3. Select Monitor and Control (see Figure 40 on page 40).

The Monitor and Control screen shows the settings that are currently in effect along

with the log file size limit and the event count limit. If the data volume exceeds the

specified limits, the data in question is uploaded to the server.

Back Up Data

Junos Pulse Mobile Security backs up contact and calendar appointment information

to a central location.

To restore data, you must contact your administrator. The administrator initiates a

restore in the form of an SMS command that tells your device to contact the server to

retrieve your backup.

To back up device data:

Copyright © 2011, Juniper Networks, Inc. Using Security Features 47

Page 56: Junos Pulse Mobile Security Dashboard

1. Start Junos Pulse.

2. Select Security.

3. Select Backup Data (see Figure 40 on page 40). The backup begins (see Figure 47

on page 48).

To restore device data, contact your administrator.

Figure 47: Backing Up Data

Security Settings

Security settings are configured by your administrator, and changes are downloaded to

your device. You may change security setting updates and scanning intervals by doing

the following:

1. Start Junos Pulse.

2. Select Security.

3. Select Security Settings (see Figure 40 on page 40).

4. Optionally set the following (see Figure 48 on page 49):

Update security settings: You can specify how often your device contacts the

Junos Pulse server for updated settings. To perform an immediate update, select

Update Now.

Automatically scan device: This setting is configured by the administrator and

you cannot change it.

48 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 57: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 48: Security Settings

Anti-Theft Features

There are a number of measures that can be taken to protect your device if it is lost or

stolen. To activate anti-theft features, contact your administrator. Those features

include:

Lock Handset, Unlock Handset, Wipe Handset— These features perform differently

on different Android OS versions as follows:

On Android OS 2.2 and higher

Lock and Unlock Handset —If the Device Administrator function is activated, the

only way to unlock the device is to send an unlock command from the server. If

the Device Administrator function is not activated, the device can be unlocked

when an unlock command is sent from the server or by entering the password

configured during manual registration.

− Emergency Call Button—When the device is locked, an Emergency Call

button is available from the unlock screen. You can make an emergency call,

to 911 for example, when you select this button and enter an emergency

number.

SIM Change or Removal—If the Device Administrator function is activated and

Wipe is enabled, a wipe command sets the device back to factory settings. No

lock is performed. If the Device Administrator function is not activated and the

SIM card is removed or changed, the device switches on GPS Theft Mode,

Monitor & Control logging, and the device is locked.

Wipe Handset—If the Device Administrator function is activated, a wipe

command sent from the server sets the device back to factory settings. If the

Device Administrator function is not activated, no wipe function will take place.

On Android OS 2.1

Copyright © 2011, Juniper Networks, Inc. Using Security Features 49

Page 58: Junos Pulse Mobile Security Dashboard

Lock and Unlock Handset —Locks the device until such time that an unlock

command is sent from the server or by entering the password configured during

manual registration.

− Emergency Call Button—When the device is locked, an Emergency Call

button is available from the unlock screen. You can make an emergency call,

to 911 for example, when you select this button and enter an emergency

number.

SIM Change or Removal—If the SIM is removed, the device switches on GPS

Theft Mode, Monitor & Control logging, and the device is locked. If the SIM is

swapped for another, the device does all the preceding actions, plus checks if

Wipe is enabled, and can wipe sensitive device information (such as email

contacts) automatically.

Wipe Handset—Deletes the email, scheduling, contact and task information.

Send Backup—If this data is not stored on the server, this feature gathers the backup

information from the device and emails it to the email address provided in the

registration process.

GPS Location—If your device is equipped with GPS, your administrator can locate

your device. Device location is displayed on the Junos Pulse server.

Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a

nearby location.

GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5

minute period to fine-tune GPS location if the device is stolen.

SIM Change—Includes 2 settings:

If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control

logging, and locks the device.

If the SIM is swapped for another, the device does all the preceding actions, plus

checks if the Wipe flag is set, and can wipe sensitive device information

automatically.

Uninstalling or Clearing Data

When you register your device for security features, you are registering with the Junos

Pulse Mobile Security Gateway. In some cases, you may need to register your device

with a different Junos Pulse Mobile Security Gateway after the initial registration or you

may need to clear your devices’ Junos Pulse settings for another reason. You can

accomplish this by uninstalling Junos Pulse or by manually clearing all settings as

follows.

1. From the main menu, select Settings > Applications > Manage Applications >

Junos Pulse.

2. To uninstall Junos Pulse, select the Uninstall button (see Figure 49 on page 51).

or

3. To clear all Junos Pulse data, select the Clear data button.

Your administrator provides instructions reregistering Junos Pulse.

50 Uninstalling or Clearing Data Copyright © 2011, Juniper Networks, Inc.

Page 59: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 49: Junos Pulse Application Info Screen

BlackBerry Security Features

The following sections describe the Junos Pulse features available for the BlackBerry

platform. When you click the main Junos Pulse icon in the Applications folder, you can

access the following security features:

Antivirus

Select the Antivirus security feature to view antivirus controls and log file information.

When you open Antivirus, you see the following information: See Figure 50 on page 52.

Monitor Status: This reads either Enabled or Disabled. The status is Enabled by

default.

Last Updated: View the date of the latest virus definition update.

Licence Expiration: View license expiration information.

By default, the antivirus feature is configured to scan files as it receives them, via any

file transfer mechanism (such as email, SMS/MMS, or Bluetooth). You can initiate a

manual scan, as well.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 51

Page 60: Junos Pulse Mobile Security Dashboard

Figure 50: BlackBerry Junos Pulse Select Antivirus and View Information

Manual Virus Scan

When you click the Menu button on your BlackBerry from the Antivirus window, the

Scan Now option is available.

1. Select Scan Now to perform a full scan of the device. Selecting Scan Now takes

you to the Scan Options window. See Figure 51 on page 52.

Figure 51: BlackBerry Junos Pulse Scan Options

2. In Scan Options, the first three items are checked by default to perform a full

device scan. Those are Scan applications, Scan internal files, Scan SD Card.

Select the Menu button and choose Start scan to scan those items.

3. Optionally, exclude the scanning of media files by selecting the Exclude media files check box

4. Optionally, perform a custom scan rather than scanning the entire device by

selecting the Custom Scan check box. When you select Custom Scan, you can

choose files or folders to scan. See Figure 52 on page 53.

52 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.

Page 61: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 52: BlackBerry Junos Pulse Select Custom Scan

5. Under Custom Scan, highlight an available folder and click the Menu button on

your BlackBerry.

6. Choose Select Folder from the menu. See Figure 53 on page 53. To drill down

further keep repeating these steps until you have reached the file or folder you

want to scan.

Figure 53: BlackBerry Junos Pulse Select Custom Scan Folder/File

7. Click the Menu button and select Start scan to scan your selected items.

The scanning progress and the scan results when are displayed when the scan finishes.

Quarantined Files

During a scan, found infected files are automatically quarantined. Quarantining lets you

decide whether or not the infected file should be deleted. When you click the Menu

button on your BlackBerry from the Antivirus Monitor Status window, the Quarantine

list is available.

You can delete quarantined files by clicking the Menu button and selecting Delete.

OnDemand Scan

When you click the Menu button on your BlackBerry from the Antivirus Monitor Status

window, the OnDemand Scan Log option is available.The OnDemand ScanLog shows

the details of scans initiated by the you.

File Monitor Log

When you click the Menu button on your BlackBerry from the Antivirus Monitor Status

window, the File Monitor Log option is available. The FileMonitor log shows

timestamps associated with changes to the file monitor setting.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 53

Page 62: Junos Pulse Mobile Security Dashboard

Monitor and Control

The Monitor and Control screen lets you view your current Junos Pulse settings as well

as events and log files. To use Monitor and Control:

1. Start Junos Pulse.

2. Select Monitor and Control (see Figure 50 on page 52).

The Monitor and Control screen shows the settings that are currently in effect along

with the log file size limit and the event count limit. If the data volume exceeds the

specified limits, the data in question is uploaded to the server.

Backup and Restore

The Backup and Restore feature lets you backup the contacts and calendar events

stored on your device.

To back up data:

1. From the Junos Pulse feature list, select Backup & Restore. The Backup & Restore

screen displays the date of the last backup and the last restore.

2. From the Backup & Restore window, click the Menu button.

3. Select Backup Data from the menu. See Figure 54 on page 54. Your information is

sent to the central server.

Figure 54: BlackBerry Junos Pulse Backup Device Data

4. When the backup is complete, click OK in the Backup Successful window that

appears.

You can only initiate a restore from the dashboard. When you initiate a restore, an SMS

command tells the device to contact the server to retrieve the backup. See

“Commands” on page 22.

Settings

From the main Junos Pulse feature list, you click the BlackBerry Menu button to access

security update settings and general information.

1. When you click the Menu button on your BlackBerry from the main Junos Pulse

features window, the Settings option is available.

2. Select Settings. The Pulse Settings window opens.

3. From the Settings window, the Auto-Update Frequency setting is available. By

default, this is set to 12 hours. You can change this from 1 hour to 1 month to Never

by selecting it and scrolling to update frequency you want.

54 BlackBerry Security Features Copyright © 2011, Juniper Networks, Inc.

Page 63: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 55: BlackBerry Junos Pulse Update Settings and Frequency

4. From the Settings window, Connection type is available. If the device is managed

by a corporate BlackBerry management server, your administrator should let you

know which method to use (BIZ or BEZ) for the device connection. Otherwise, you

can use the standard APN connection setting.

Anti-Theft Features

Anti−theft protections are configured for the device from the dashboard.

Anti−theft features include:

Lock and Unlock Handset —If the device is locked, it can be unlocked when an

unlock command is sent from the server or by entering the password configured

during manual registration.

Emergency Call Button—When the device is locked, an Emergency Call button is

available from the unlock screen. You can make an emergency call, to 911 for

example, when you select this button and enter an emergency number.

Wipe Handset—A wipe command sent from the server deletes contacts, events,

tasks, and emails. Text messages are not deleted. If the device email account is set

to sync with server(the default), the deletion synchronization may delete emails from

server, as well.

Send Backup—If this data is not stored on the server, this feature gathers the backup

information from the device and emails it to the email address provided in the

registration process.

GPS Location—If your device is equipped with GPS, your administrator can locate

your device. Device location is displayed on the Junos Pulse server.

Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a

nearby location.

GPS Theft On and Off—Sends GPS updates to the Junos Pulse server on a 2 to 5

minute period to fine-tune GPS location if the device is stolen.

SIM Change—Includes 2 settings:

If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control

logging, and locks the device.

If the SIM is swapped for another, the device does all the preceding actions, plus

checks if the Wipe flag is set, and can wipe sensitive device information

automatically.

Copyright © 2011, Juniper Networks, Inc. BlackBerry Security Features 55

Page 64: Junos Pulse Mobile Security Dashboard

iOS Security Features

Junos Pulse lets you access protected network resources from your Apple iOS™ device

through a secure VPN connection. The security component, Junos Pulse Mobile

Security Suite, includes the following tools to reduce the risks of a lost or stolen device:

Lock Device—Locks the device if it is lost or stolen, or if you wish to stop the use of

the device for any other reason.

Unlock Device—Unlocks the device.

Retrieve App List—Updates the list of installed applications on the device.

Wipe Device—Sets device back to factory settings.

Connecting with Junos Pulse

In addition to the security features already described, you can use Junos Pulse to

establish a secure VPN connection to your corporate network using your device’s 3G,

4G, Edge or WiFi connectivity. Once a VPN connection is established, Junos Pulse can

include the following features (see Figure 32 on page 32):

Intranet: Launches connections to internal site configured by your administrator.

Email: Launches your email application.

Status: Lets you view, delete, and email log files, which you might need to do in a

troubleshooting operation. The log files show all security incidents, such as virus scan

times and viruses discovered. If you have an established VPN connection, you can

also view the status of that connection from this screen.

About: Provides software version information.

Informational Note: Screens for different iOS devices may vary.

56 iOS Security Features Copyright © 2011, Juniper Networks, Inc.

Page 65: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 56: Available Features as they appear for iPhone

Figure 57: Available Features as they appear for iPad

Adding a Secure Connection Profile

You can add a VPN connection for each different network to which you connect. To

define a connection profile, do the following:

1. Start Junos Pulse.

Copyright © 2011, Juniper Networks, Inc. Connecting with Junos Pulse 57

Page 66: Junos Pulse Mobile Security Dashboard

2. Tap Configuration.

3. If you have already set up one connection profile and you are adding an additional

profile, tap Edit.

4. Tap Add New Connection. The Add window opens. See Figure 58 on page 58.

Informational Note: Screens for different iOS devices may vary.

Figure 58: Add Connection iPhone

Figure 59: Add Configuration iPad

5. Specify the connection profile properties.

Name: The name or description for this connection profile.

58 Connecting with Junos Pulse Copyright © 2011, Juniper Networks, Inc.

Page 67: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

URL: The Web address provided by your network administrator.

Certificate: If your network administrator has provided you with a digital

certificate (typically via an e-mail attachment or SMS), tap Certificate. When the

Identities window opens, select the certificate you want to use with this profile.

If you do not use a certificate, you must provide a username and password when

you use this connection profile.

6. Tap Configuration to return to the main Junos Pulse window.

Connecting

Once you have configured your connection, do the following to connect.

1. Start Junos Pulse.

2. Tap Connect.

3. When the Connect window opens, enter your login Username and Password. See

Figure 60 on page 59.

4. Tap Sign In.

Figure 60: Connect

Viewing Connection Status

The status of your current connection also appears at the bottom of the Junos Pulse

window in the form of an icon. The appearance of the icon indicates whether the

connection is active or inactive. See also Figure 32 on page 32.

Windows Mobile Security Features

When you click the Junos Pulse icon in the Programs folder, you can access the

following features:

Active Connection No Session

Copyright © 2011, Juniper Networks, Inc. Windows Mobile Security Features 59

Page 68: Junos Pulse Mobile Security Dashboard

Status

Select Status to view and send log files. See Figure 61 on page 61.

In the Status window, click Show Logs to view Antivirus Scan logs. Click Clear Logs

to delete scanning logs.

In the Status window, click Send Logs to send Antivirus Scan logs by email or SMS.

Connecting

Junos Pulse uses your device’s 3G, 4G, Edge, or WiFi connectivity to establish an

authenticated connection to a protected network.You can add a connection for each

different network you connect to. See Figure 61 on page 61. To define a connection:

1. Select Connections.

2. Select Add Connection and specify the connection properties.

Connection name: A descriptive name.

URL: The Web address provided by your network administrator.

3. Select Save.

The status of your current connection appears at the bottom of the window in the

status bar.

Connect

To connect to a connection that has already been configured, do the following:

1. Select Connect.

2. Enter your Username and Password.

3. Click Sign In.

After your username and password have been accepted, you can access Junos Pulse

features provided through your corporate connection.

Email and Intranet

Once you establish a connection to a protected network, Email and Intranet features

become available. The Email and Intranet settings configured by the administrator of

the protected network to which you are connected are accessible from the Intranet and

Email buttons. See Figure 61 on page 61.

60 Connecting Copyright © 2011, Juniper Networks, Inc.

Page 69: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 61: Windows Mobile Junos Pulse Main Window

Using Security Features

Select the Junos Pulse icon in the Programs folder to access the available Pulse features for your device. Select Security to view and edit the following features. See Figure 62 on page 62.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 61

Page 70: Junos Pulse Mobile Security Dashboard

Figure 62: Windows Mobile Junos Pulse Security Features

Security Settings

Click Security Settings to update all security settings for the device and to update

device location. Click Save if you make any changes to these settings. See Figure 63 on

page 63. The following security settings are available.

Update security settings and data: Select a time frame for receiving security setting

updates. In addition to virus definitions, security settings include any changes you

make to the device from the dashboard. (Security settings do not include the

commands you can send from the Home tab. Those commands are sent

immediately.) From the available pulldown, you can select: Never, Every 1 hour, Every

4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1 week, Every 2 weeks, and

Every 1 month.

Update: Click the Update button to immediately trigger a manual update of security

settings.

Device Location: Select a time frame for automatic reporting of the device location:

Never, Every 1 hour, Every 4 hours, Every 12 hours, Every 1 day, Every 2 days, Every 1

week, Every 2 weeks, and Every 1 month.

62 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 71: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 63: Windows Mobile Junos Pulse Security Settings

Antivirus

Select the Antivirus security feature to view antivirus controls and log file information.

When you open Antivirus, you see controls that let you perform a virus scan on the

memory card, on the entire device, on only files and folders, and to update virus

signatures. Available Antivirus controls are as follows.

Antivirus Scanning: Antivirus scanning is either Enabled or Disabled.

Scan Memory Card on Insert: This feature is either Enabled or Disabled.

Virus Definitions updated: This field lists the time and date of the last update. Click

the Update Now button to trigger a manual virus definition update.

Scan All Files and Folders for viruses: This field lists the time and date of the last

scan. Click the Start Now button to trigger a manual virus scan of the entire device. A

complete scan may take several minutes to complete.

Scan Custom Folder for viruses: Lets you scan a selected file, folder, or the installed

SD card. Click Start Now to open the component screen and choose a scan target.

Show Quarantine GUI: Select Show to view files that were quarantined by the

antivirus scan.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 63

Page 72: Junos Pulse Mobile Security Dashboard

Figure 64: Windows Mobile Junos Pulse Antivirus Settings

Antispam

The antispam service protects your device from unsolicited calls and SMS spam. The

antispam menu provides options for creating, customizing, and deleting blacklists that

are used in spam filtering. To configure and run antispam features:

1. Select Antispam and configure the following (see Figure 65 on page 65):

Name: Enter the name of the of the person from whom you want calls or

messages blocked.

Number: Enter the number from which you want calls or messages blocked.

Block Calls from this number: Select this check box to block voice calls

originating from the number you entered.

Block SMS messages from this number: Select this check box to block SMS

messages originating from the number you entered.

2. Select Choose from Contacts if you want to use a number from your contact list.

3. Select Save.

Informational Note: Click Add from the Antispam window to add additional numbers

for blocking.

64 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 73: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 65: Windows Mobile Junos Pulse Antispam Settings

Once you enter at least one number into the antispam feature, the Antispam window

changes to allow for adding additional numbers. You can also select to Enable Shortcode Blocking in the Antispam window after you have at least one entry. See

Figure 66 on page 66.

Shortcode blocking is not specific to any entries you add. It blocks all calls from short

codes. Short codes are special telephone numbers that are significantly shorter, five or

fewer digits. Short codes are often used for marketing or promotions and therefore you

may want to block them.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 65

Page 74: Junos Pulse Mobile Security Dashboard

Figure 66: Windows Mobile Junos Pulse Antispam Shortcode Blocking

Informational Note: You must have at least one number configured for blocking in

order to see the features displayed in the Antispam window in Figure 66 on page 66.

Firewall

The firewall security features let you block or allow data traffic to and/or from the

device using rule lists that control traffic based on port number, IP address, and other

options.To configure firewall features, do the following:

1. Select Firewall and configure the following (see Figure 67 on page 67):

Security Level: Select a security level from the pulldown list. When you select a

level, firewall rules that correspond to that level are added to your active rule list.

You can set the security level as follows.

Low: to block specified items

High: to allow data traffic on only allowed ports and addresses

Off: for no firewall protection

66 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 75: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Figure 67: Windows Mobile Junos Pulse Main Firewall Window

2. Click the New button to add a new rule to your active firewall rule list. See

Figure 68 on page 68. You configure rules to add entries to be blocked or to be

allowed.

3. To create a new firewall rule, configure the following:

Select the check box to Enable the rule. You can create a rule and leave it

disabled with the possibility of using it later.

Enter a Description of the rule

Select Block or Allow from the pulldown list.

Select Inbound Traffic or Outbound Traffic from the pulldown list.

You can create this rule to allow/block All IP addresses, Specific IP addresses or

a Range of IP addresses.

If you select specific IPs or a range of IPs enter that information in the IP address

fields provided. (Note that you can use a wildcard entry (*) to indicate blocking

of everything within octet in question.)

You can create this rule to allow/block port addresses. Select To a Range of Ports and enter that port information in the From and To fields provided or

select All Ports.

4. Click Save.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 67

Page 76: Junos Pulse Mobile Security Dashboard

Figure 68: Windows Mobile Junos Pulse FIrewall Rule Window

When your rule is saved, it appears in the rule list. See Figure 69 on page 68.

Figure 69: Windows Mobile Junos Pulse FIrewall Rule List Window

Informational Note: Select a rule in the rule list and use the Edit and Delete buttons

to make changes to the existing rule and to delete rules from the rule list.

68 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 77: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

Monitor and Control

Select Monitor and Control to view settings for the device that have been enabled

from the dashboard. For example, you can see a list of control, security, or anti−theft

features with the word Enabled or Disabled beside them. GPS update period and log

limits are also viewable from this window. See Figure 70 on page 69.

Figure 70: Windows Mobile Junos Pulse Monitor and Control

Backup Data

You can back up contact and calendar appointment information to the dashboard

from the Windows Mobile device.

To back up device data, do the following.

1. Select Backup Data.

2. In the Backup Data window, click Backup Contacts and Calendar. A prompt

appears asking you to confirm that you want to start a backup. Click Yes. The

backup begins. You are notified on the device when the backup is complete. See

Figure 71 on page 70.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 69

Page 78: Junos Pulse Mobile Security Dashboard

Figure 71: Windows Mobile Junos Pulse Backup Data and Confirm

You can only initiate a restore from the device. When you initiate a restore, an SMS

command tells the device to contact the server to retrieve the backup. See

“Commands” on page 14.

Anti-Theft Features

Anti−theft protections are configured for the device from the device.

Anti−theft features include:

Lock Handset—Locks the device until such time that the unlock command is sent. If

the device is password protected, the device will continue to be locked even if the

proper password is entered.

Unlock Handset—Unlocks the device.

Wipe Handset—Deletes the email, scheduling, contact and task information.

Send Backup—If this data is not stored on the server, this feature gathers the backup

information and emails it to the email address provided in the registration process.

GPS Location—If your BlackBerry is equipped with GPS, you can locate your device.

Device location is displayed in a map on the Home tab.

Alarm On and Off—Blares a maximum volume alarm sound to locate the device in a

nearby location.

GPS Theft On and Off—Sends GPS updates to server on a 2 to 5 minute period to

fine-tune GPS location if the device is stolen.

SIM Change−—Includes 2 settings:

If the SIM is removed, the device switches on GPS Theft Mode, Monitor & Control

logging, and Locks the device. You can unlock the handset with a username and

password.

70 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 79: Junos Pulse Mobile Security Dashboard

Using Junos Pulse on Mobile Devices

If the SIM is swapped for another, the device does all the preceding actions, plus

checks if the Wipe flag is set, and can wipe sensitive device information

automatically.

Copyright © 2011, Juniper Networks, Inc. Using Security Features 71

Page 80: Junos Pulse Mobile Security Dashboard

72 Using Security Features Copyright © 2011, Juniper Networks, Inc.

Page 81: Junos Pulse Mobile Security Dashboard

Chapter 6

Junos Pulse FAQ

This chapter provides answers to commonly asked questions.

Junos Pulse FAQs

I do not want the device user to see the Junos Pulse application on his/her device. Can I hide it?

We are aware that on some devices icons can be hidden from view, but you cannot hide

the Junos Pulse application. In addition control and monitoring, Junos Pulse provides

security features that require end user access for configuration.

What happens if the device user modifies the Junos Pulse settings on the device?

Depending on the modification made, the modification may not display on the Mobile

Security Dashboard. For example, if the device user uninstalls Junos Pulse from the

device, this event is not displayed in the Mobile Security Dashboard. You will simply

notice an absence of events.

Why would my GPS coordinates be inaccurate?

There could be several reasons for this inaccuracy. First, confirm that you have a GPS

enabled device and that GPS is a part of your carrier's data plan. If you do not have GPS

functionality as a part of your network service, the GPS feature will not work. Also,

check the GPS feature on the device to make sure there are no restrictions and that all

features are set to enabled. Calibrate your location with the device through Google

maps from a location with good carrier signal strength. The premier location for testing

is outdoors. GPS can also be gathered via satellite or network, with varying degrees of

accuracy.

What does it mean when the GPS coordinates are 0.0?

Usually 0.0 identifies that GPS on the device needs to be activated by the carrier or that

this feature is blocked by the carrier for use by 3rd party applications. (Note that we

cannot guarantee GPS functionality on Verizon BlackBerry Curve and the Storm 1

devices.)

Copyright © 2011, Juniper Networks, Inc. Junos Pulse FAQs 73

Page 82: Junos Pulse Mobile Security Dashboard

How long does it take for the Mobile Security Dashboard to update with the device user’s activities?

This is configurable from the dashboard. See “Handset Management” on page 25 for

information and guidelines. (Note that if the device user sends and receives a high

volume of texts, sending these texts to the dashboard in real-time is not advised.)

Can I use Junos Pulse to monitor or block URLs?

No, Junos Pulse does not provide that functionality at this time.

How many devices can I monitor using the Mobile Security Dashboard?

There is no limit to the number of devices you can monitor on an account. To add a new

device to the account, you must first download the software to the additional device.

Once the device registers with the dashboard, you can monitor it.

I want to monitor several devices, but each device uses a different carrier.

The carrier does not matter. As long as the device is running a supported operating

system, you can use Junos Pulse.

74 Junos Pulse FAQs Copyright © 2011, Juniper Networks, Inc.

Page 83: Junos Pulse Mobile Security Dashboard

Index

A

Account management . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28allowed suspicious applications

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41Android screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46

Android

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40automatic registration. . . . . . . . . . . . . . . . . . . . . . . . . . .37connecting securely . . . . . . . . . . . . . . . . . . . . . . . . . . . .35install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38manual registration. . . . . . . . . . . . . . . . . . . . . . . . . . . . .38monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .47security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31security settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62

Anti-Theft

Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .70anti-theft features . . . . . . . . . . . . . . . . . . . . . . . . . . . .49, 55

alarm on and off . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55emergency call button, Android . . . . . . . . . . . . . . . . . . . .49emergency call button, BlackBerry . . . . . . . . . . . . . . . . . .55GPS location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55GPS theft . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55lock and unlock, BlackBerry . . . . . . . . . . . . . . . . . . . . . . .55lock handset, Android . . . . . . . . . . . . . . . . . . . . . . . . . . .49send backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50, 55sim change . . . . . . . . . . . . . . . . . . . . . . . . . . . .49, 50, 55unlock handset, Android . . . . . . . . . . . . . . . . . . . . . . . . .49wipe handset, Android . . . . . . . . . . . . . . . . . . . . . . . . . .49

Antivirus

settings for Windows Mobile . . . . . . . . . . . . . . . . . . . . . .63signature updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .40custom scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . .52definitions update, Android . . . . . . . . . . . . . . . . . . . . . . .41file monitor log, BlackBerry . . . . . . . . . . . . . . . . . . . . . . .53full scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . .52last scanned for viruses . . . . . . . . . . . . . . . . . . . . . . . . . .41manual scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . .52ondemand scan, BlackBerry . . . . . . . . . . . . . . . . . . . . . .53

quarantined files, BlackBerry. . . . . . . . . . . . . . . . . . . . . . 53scan file or folder, Android . . . . . . . . . . . . . . . . . . . . . . . 41settings for BlackBerry . . . . . . . . . . . . . . . . . . . . . . . 52, 54view allowed suspicious app, Android . . . . . . . . . . . . . . . 41view scan results, Android . . . . . . . . . . . . . . . . . . . . . . . 41

antivirus events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24APNS certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23automatic URL registration. . . . . . . . . . . . . . . . . . . . . . . . . . 4

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

B

back up data

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47BlackBerry. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Backup and Restore

Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22BlackBerry

antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51auto-update frequency . . . . . . . . . . . . . . . . . . . . . . . . . 54backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54connection type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51update settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

C

clear data

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22commands, iOS devices . . . . . . . . . . . . . . . . . . . . . . . . . . . 23connecting

add a connection, Android . . . . . . . . . . . . . . . . . . . . . . . 33Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33, 35certificate, Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34certificate, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56, 59key, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34name, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58status icon, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35status screen, full VPN, Android . . . . . . . . . . . . . . . . . . . 35

Copyright © 2011, Juniper Networks, Inc. 75

Page 84: Junos Pulse Mobile Security Dashboard

76

status, iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58URL, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Connection

Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

E

ed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43email monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26emergency call button, Android . . . . . . . . . . . . . . . . . . . . . 49emergency call button, BlackBerry . . . . . . . . . . . . . . . . . . . 55EULA

Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9iOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

F

features

control overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1security overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

Firewall

Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

G

GPS

location tracking for iOS. . . . . . . . . . . . . . . . . . . . . . . . . 15support information for iOS . . . . . . . . . . . . . . . . . . . . . . 23update period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

H

Handset management. . . . . . . . . . . . . . . . . . . . . . . . . . . . 25History

commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

I

Image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26installation

Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9iOS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3Windows Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

iOS

automatic URL registration . . . . . . . . . . . . . . . . . . . . . . 12connect securely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56enable Junos Pulse . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12GPS location tracking . . . . . . . . . . . . . . . . . . . . . . . . . . 15security features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56security profile install . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

K

Keywords, messaging shorthand . . . . . . . . . . . . . . . . . . . . 29

L

license code. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

locate device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22lock device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22, 23, 56Lock on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Log event limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Log size limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

M

malware applications

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44malware detection

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42manual registration

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5, 38MMS monitoring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26Mobile Security Dashboard

account management . . . . . . . . . . . . . . . . . . . . . . . . . .25alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28handset management . . . . . . . . . . . . . . . . . . . . . . . . . .25overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .21reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27

Monitor and Control

Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .69

N

notifications icon

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .42

P

prohibited applications

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43

R

registration

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10Windows Mobile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16

registration URL

iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27restore data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48retrieve app list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23, 56

S

scan results

malware, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44prohibited applications, Android . . . . . . . . . . . . . . . . . . .43suspicious, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

Copyright © 2011, Juniper Networks, Inc.

Page 85: Junos Pulse Mobile Security Dashboard

viruses, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47scan results screen

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41, 42scream locate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23secure connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35security features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4, 31, 37antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11automatic URL registration . . . . . . . . . . . . . . . . . . . . . . . .4automatic URL registration, Android. . . . . . . . . . . . . . . . .37backup and restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9, 11, 51iOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56license code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6license code, Android . . . . . . . . . . . . . . . . . . . . . . . . . . .38lock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56manual registration, Android . . . . . . . . . . . . . . . . . . . .5, 38monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . .11register for, Android. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4register for, BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . .9register, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37retrieve app list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56

security settings

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25Shortcode blocking. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65SMS monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26status

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32suspicious applications

allowed, Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .46Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .45

U

uninstall

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .50unlock device . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22, 23, 56username/password change . . . . . . . . . . . . . . . . . . . . . . . .25

V

view more

events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23viruses

Android . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47BlackBerry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51

Voice monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26

W

Web image monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . .26WIFI only devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5

Windows Mobile

.CAB file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16antispam . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64antivirus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63backup data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16intranet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60monitor and control . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

wipe device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23, 56Wipe on SIM change . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Copyright © 2011, Juniper Networks, Inc. 77

Page 86: Junos Pulse Mobile Security Dashboard

78

Copyright © 2011, Juniper Networks, Inc.