TREND MICRO. Mobile Security 7. Comprehensive security for enterprise handhelds

TREND MICRO™ Mobile Security7 Comprehensive security for enterprise handhelds Trend Micro Incorporated reserves the right to make changes to this d...
Author: Myrtle Garrett
0 downloads 2 Views 2MB Size
TREND MICRO™

Mobile Security7 Comprehensive security for enterprise handhelds

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file and the latest version of the User’s Guide, which are available from the Trend Micro Web site at: http://www.trendmicro.com/download/ Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2004–2011 Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored in a retrieval system, or transmitted without the express prior written consent of Trend Micro Incorporated. Release Date: September 2011 Document Part No.: TSEM74853/110520

The User’s Guide for Trend Micro Mobile Security for Enterprise version 7.1 introduces the main features of the software and installation instructions. Trend Micro recommends reading it before installing or using the software. Trend Micro is always seeking to improve its documentation. If you have questions, comments, or suggestions about this or any Trend Micro documents, please contact us at [email protected]. You can also evaluate this document at the following Web site: http://www.trendmicro.com/download/documentation/rating.asp

Contents

Contents Introducing Trend Micro™ Mobile Security

Contents

Chapter 1:

Protecting Mobile Devices .............................................................................1-2 Mobile Security Overview ..............................................................................1-2 Chapter 2:

Installing Trend Micro Mobile Security Before Installing ...............................................................................................2-2 Manual Installation Methods ....................................................................2-2 System Requirements ......................................................................................2-4 Host Computer ...........................................................................................2-5 Installing Mobile Security ...............................................................................2-5 Manual Registration ........................................................................................2-7 Uninstallation ...................................................................................................2-9

Chapter 3:

Getting Started with Trend Micro Mobile Security Product License ...............................................................................................3-2 Understanding the Mobile Security Interface .............................................3-3 Reviewing the Default Protection Policies ..................................................3-4 iii

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Updating Anti-Malware Components ..........................................................3-6 Contents

Scanning for Security Threats ........................................................................3-7 Chapter 4:

Updating App Scanner Components Connecting to the Master Server ...................................................................4-2 Types of Updates .............................................................................................4-2 Manual Updates ..........................................................................................4-3 Automatic Updates .....................................................................................4-4 Update History .................................................................................................4-5

Chapter 5:

Scanning for Security Threats Security Threats Scan Types ..........................................................................5-2 Manual Scan .................................................................................................5-3 Real-time Scan .............................................................................................5-3 Manual Scan Results ........................................................................................5-5 Viewing the Manual Scan Results ............................................................5-5 Handling Security Threats .........................................................................5-6 Scan History .....................................................................................................5-7

iv

Contents

Chapter 6:

Filtering Calls and SMS Messages Contents

Call Blocking ....................................................................................................6-2 Configuring Call Blocking .........................................................................6-2 Configuring Call Blocking Actions ..........................................................6-3 Configuring Annoying Call Protection ....................................................6-6 Text Blocking ...................................................................................................6-7 Configuring Text Blocking ........................................................................6-7 Configuring Text Blocking Actions .........................................................6-9 Configuring Annoying Message Protection ..........................................6-11 Call and Text Message Filtering Lists .........................................................6-12 Managing Filtering Lists ..........................................................................6-13 Chapter 7:

Using Web Security Using Web Security .........................................................................................7-2 Understanding Web Security ....................................................................7-2 Configuring Web Security .........................................................................7-3 Handling Web Sites Blocked by Web Security ......................................7-4 Using Approved Lists .....................................................................................7-4 Configuring Web Security Approved List ..............................................7-5 Web Security Blocked History .......................................................................7-6 Handling Blocked History .........................................................................7-6 v

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Chapter 8:

History

Contents

Viewing History ...............................................................................................8-2 Deleting History ..............................................................................................8-2 Chapter 9:

Troubleshooting, FAQs, and Technical Support Troubleshooting ..............................................................................................9-2 Frequently Asked Questions (FAQ) .............................................................9-4 Technical Support ...........................................................................................9-5 Contacting Technical Support ..................................................................9-5 Using the Knowledge Base .......................................................................9-6

Index

vi

Chapter 1 Introducing Trend Micro™ Mobile Security Read this chapter to understand how Mobile Security can protect your device. This chapter covers the following topics: •

Protecting Mobile Devices on page 1-2



Mobile Security Overview on page 1-2

1-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Introducing Trend Micro™ Mobile Security

1 Protecting Mobile Devices Trend Micro recommends the following safe practices when using your mobile device: •

Do not accept and install any content sent by strangers.



Ignore SMS messages that tell you that you have won something, especially if these messages instruct you to send money or disclose personal information.



Do not install or run applications received through unsolicited Bluetooth messages. When in a public area, avoid leaving your Bluetooth radio turned on.

Mobile Security Overview Trend Micro™ Mobile Security™ uses the latest security technologies to defend against threats to mobile devices. Integrated filters can also block unwanted telephone calls and text messages. Mobile Security also provides Web Security that can help protect you from online fraud like phishing and pharming by blocking access to risky sites on the Web. The logon password protection helps protect your mobile device from an unathorized access. Mobile Security offers the following features:

1-2



Scheduled or manual component updates from the Trend Micro Master Server to ensure up-to-date scan engine, pattern, security policies, and program versions



Logon authentication to prevent anyone from accessing your mobile device



Enables the adminisdtrator to control the camera and bluetooth on your mobile device.

Introducing Trend Micro™ Mobile Security

1

Award-winning anti-malware scanning technology for mobile malware



Web Security to ensure safe Internet browsing



SMS filtering to block unwanted text messages



Call filtering feature to block calls from unwanted and anonymous callers



Comprehensive logs tracking scan results, security threats found, text messages and calls filtered, and other events

1-3

Introducing Trend Micro™ Mobile Security



Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Introducing Trend Micro™ Mobile Security

1

1-4

Chapter 2 Installing Trend Micro Mobile Security Read this chapter to understand how to install Mobile Security manually on your mobile device. This chapter covers the following topics: •

Before Installing on page 2-2



System Requirements on page 2-4



Installing Mobile Security on page 2-5



Manual Registration on page 2-7



Uninstallation on page 2-9

2-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Installing Trend Micro Mobile Security

2 Before Installing You can skip the installation section if your network administrator has already installed and configured Mobile Security on your mobile device. Before you begin, obtain the following information from your network administrator: •

installation method



registration information (if manual registration is required)

Manual Installation Methods If you install Mobile Security manually, your network administrator will tell you the installation method to use. You can manually install Mobile Security on your mobile device using one of the following methods: •

Clicking the appropriate URL in an SMS message



Executing the setup file from the memory card

Depending on your installation method, make sure you have the required information provided by your network administrator.

2-2

Installing Trend Micro Mobile Security

TABLE 2-1.

2

Required information for manual installation

Installing Trend Micro Mobile Security

M ETHOD

R EQUIREMENTS

Installation Message

• Installation SMS messages in the inbox on your mobile device

Memory Card

• A memory card with the Mobile Security setup file

2-3

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

2 System Requirements Installing Trend Micro Mobile Security

Before installing and using Mobile Security, ensure that your mobile device meets the requirements. TABLE 2-2.

Operating system and mobile device memory requirements

O PERATING S YSTEM Android v2.1 or above

M EMORY

S TORAGE

9-MB

8-MB

You can install Mobile Security only on your mobile device’s internal storage space, not a memory card.

To determine the Android version running on your mobile device:

2-4

1.

On your mobile device, navigate to Settings > About phone > Software information.

2.

On the Software information screen, verify the Android version.

Installing Trend Micro Mobile Security

Host Computer

Installing Mobile Security This section explains how to install Mobile Security on your mobile device manually. After the installation is complete, Mobile Security is added to All apps. To manually install Mobile Security through the notification SMS message:

This method only works for telephones.

1.

Make sure your mobile device is connected to the Internet and can connect to the Master Server.

2.

Check the inbox on your mobile device. Your device should have received a text message from the Master Server.

3.

Open the SMS message, and use the URL to download the Mobile Security setup package. After downloading the file, your mobile device will show a pop-up confirmation message.

4.

Tap Install to start the installation. 2-5

2 Installing Trend Micro Mobile Security

Installing Mobile Security does not require a host computer, but you may need to connect the device to a computer to copy the installation file onto your mobile device.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

2 Installing Trend Micro Mobile Security

Do not delete the registration SMS message from your inbox. Mobile Security uses information in the SMS message for registering with the Master Server. If you have accidentally deleted this SMS message, contact your network administrator for assistance.

5.

After the installation process is completed, register your mobile device to the Master Server.

To install Mobile Security using a memory card: Check with your network administrator to find out how to get the Mobile Security setup file onto your memory card.

2-6

1.

Switch on your mobile device after inserting the memory card.

2.

Using a file explorer, navigate to the Mobile Security setup file location and then tap the file to start the installation process. After the installation is complete, Mobile Security is added to All apps.

3.

Manually register your mobile device with the Master Server (refer to Manual Registration on page 2-7 for more information).

Installing Trend Micro Mobile Security

2

To install Mobile Security by executing the setup file:

Connect your mobile device to your computer.

2.

Copy the setup file TmmsSuite.apk onto your mobile device. You can also use a memory card to transfer the file.

3.

On your device, navigate to the location of the setup file.

4.

Open the setup file to start installing Mobile Security. After the installation is complete, Mobile Security is added to All apps.

5.

Register your mobile device with the Master Server (refer to Manual Registration on page 2-7 for more information).

Manual Registration You need an Internet connection to register your mobile device.

Register your mobile device to the Master Server to obtain the licenses for Mobile Security on your mobile device. 2-7

Installing Trend Micro Mobile Security

1.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

2 Installing Trend Micro Mobile Security

If you did not register your mobile device, a message will ask you to register everytime you start Mobile Security. To register, tap Yes to make the Register screen appear, then provide the registration information (such as the host name or IP address, and the port number of the Master Server) given to you by your network administrator. If you do not wish to register your mobile device at the time of installation, you can still use Mobile Security on your mobile device with a thirty-day evaluation license. You will also not be able to receive the synchronization policies from the administrator. To register your mobile device:

1.

2.

2-8

Configure the fields in the Register screen: •

Device Name - Type a descriptive name for your mobile device. This name identifies your mobile device on the Master Server.



Server Name or IP address - Type the server name or IP address of the Master Server. This information is provided by your network administrator.



Port - Type the port number of the Master Server (such as port number 80). This information is provided by your network administrator.



Domain Username and Domain Password - Type your network domain name and password.

Tap Register. The registration process starts and may take some time depending on the speed of your network connection. The main Mobile Security screen will appear after a successful registration.

Installing Trend Micro Mobile Security

2

Uninstallation

Installing Trend Micro Mobile Security

You can uninstall Mobile Security on your mobile device from Applications. To uninstall Mobile Security on Android 2.1:

1.

On your mobile device, navigate to Settings > Applications > Manage applications.

2.

On the All tab, tap Mobile Security, and then tap Uninstall.

3.

Tap OK.

To uninstall Mobile Security on Android 2.2 or above:

1.

On your mobile device, navigate to Settings > Security > Device administrator and deactivate Mobile Security.

2.

Navigate to Settings > Applications > Manage applications.

3.

On the All tab, tap Mobile Security, and then tap Uninstall.

4.

Tap OK.

2-9

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Installing Trend Micro Mobile Security

2

2-10

Chapter 3 Getting Started with Trend Micro Mobile Security You can start using Mobile Security immediately after installation. Read this chapter to understand how to perform basic tasks and the default product policies. This chapter covers the following topics: •

Product License on page 3-2



Reviewing the Default Protection Policies on page 3-4



Scanning for Security Threats on page 3-7

3-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

3 Product License Getting Started with Trend Micro Mobile Security

You can use Mobile Security with an evaluation license for thirty days before registering it. If the evaluation license expires before you register Mobile Security, or if the registered version of Mobile Security expires, all of the features will be disabled.

3-2

Getting Started with Trend Micro Mobile Security

3

Understanding the Mobile Security Interface

Getting Started with Trend Micro Mobile Security

The main interface of Mobile Security displays all the features, where you can enable and disable any of them as per your requirements. You can also tap on any feature to see the detailed configuration and ammend it according to your needs.

Figure 3-1. Main screen

3-3

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

3 Reviewing the Default Protection Policies Getting Started with Trend Micro Mobile Security

After installing Mobile Security, you might want to review the default protection policies shown in Table 3-1 to decide if you want to modify them. The Master Server may control the Call and SMS message filtering features on your mobile device.

TABLE 3-1.

Default protection policies

F EATURE

3-4

D EFAULT P OLICY

R ESULTING A CTION

Real-time scan

Enabled

Scans applications being installed

Automatic updates

Enabled

Automatically checks for, downloads, and installs updates

Update frequency

30 days

Automatically checks for updates again 30 days after the last check

Getting Started with Trend Micro Mobile Security

TABLE 3-1.

3

Default protection policies

D EFAULT P OLICY

R ESULTING A CTION

Text message filtering

Enabled

All text messages are allowed to reach your inbox without filtering (feel free to adjust this setting)

Call filtering

Enabled

All telephone calls are allowed to reach your inbox without filtering (feel free to adjust this setting)

Getting Started with Trend Micro Mobile Security

F EATURE

3-5

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

3 Updating Anti-Malware Components Getting Started with Trend Micro Mobile Security

To ensure that you have the latest protection, update Mobile Security after installation. To update Mobile Security:

1.

Go to the installed applications, and tap Mobile Security icon to start Trend Micro Mobile Security.

2.

Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration.

3.

On the main screen, tap Automatic Updates > Update tab > Update Now to start the update. Tap Cancel if you need to stop the update before it has finished. For more information on getting updates, see Updating App Scanner Components on page 4-1.

3-6

Getting Started with Trend Micro Mobile Security

3

Scanning for Security Threats For more information, see Scanning for Security Threats on page 5-1. To scan your mobile device for security threats:

1.

Go to the installed applications, and tap the Mobile Security icon to start Trend Micro Mobile Security.

2.

On the main screen, tap Real-time Scan > Scan tab > Scan Now to start scanning. Tap Cancel if you need to stop the scan before it has finished.

3-7

Getting Started with Trend Micro Mobile Security

Trend Micro recommends scanning your mobile device right after installing Mobile Security. If the scan finds any security threats, Mobile Security will record it in Scan History.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Getting Started with Trend Micro Mobile Security

3

3-8

Chapter 4 Updating App Scanner Components To stay protected against the latest security threats, update Mobile Security regularly. This chapter covers the following topics: •

Connecting to the Master Server on page 4-2



Types of Updates on page 4-2



Manual Updates on page 4-3



Automatic Updates on page 4-4



Update History on page 4-5

4-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Updating App Scanner Components

4 Connecting to the Master Server To update Mobile Security, your mobile device must connect to the Master Server. You may need to type the IP address and port number of the Master Server in the Register screen (see Manual Registration on page 2-7).

Types of Updates You can configure Mobile Security to download updates automatically, or get the updates manually. There are two types of updates. TABLE 4-1.

Update types

TYPE

4-2

D ESCRIPTION

Manual Update

Try to download a new update whenever you want

Automatic Update

Starts according to a schedule if the network connection is available on your mobile device

Updating App Scanner Components

4

Manual Updates

Updating App Scanner Components

You can start a manual update at any time. To perform a manual update:

1.

Ensure that your mobile device is connected to the Internet.

2.

Start Mobile Security from the installed applications.

3.

Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration.

4.

On the main screen, tap Automatic Updates > Update tab > Update Now to start the update, as shown in Figure 4-1. Tap Cancel if you need to stop the update before it has finished. Trend Micro strongly recommends performing a manual scan immediately after every update. For more information on performing a manual scan, see Manual Scan on page 5-3.

Figure 4-1. Update screen

4-3

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Automatic Updates Automatic updates run according to the schedule that you have selected.

Updating App Scanner Components

4

To enable automatic updates:

1.

Start Mobile Security from the installed applications.

2.

Ensure that the network connection is available, and your mobile device is registered. See Troubleshooting on page 9-2 on how to check the registration.

3.

On the main screen, tap Automatic Updates > Update tab.

4.

Select Automatic Updates.

5.

Tap Scheduled Updates, and then choose the update interval from the pop-up options list, as shown in Figure 4-2. This update will run only if your mobile device is connected to the Internet. To disable automatic updates, clear Automatic Updates on the main screen or on the Update screen shown in Figure 4-1. Figure 4-2. Update interval options

4-4

Updating App Scanner Components

4

Update History

Updating App Scanner Components

Mobile Security maintains records of all the updates that it has received. To view the Update History:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Automatic Updates > History tab > Update History, and then tap the record that you want to view. The record screen will look like Figure 4-3.

To delete all of the update records:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Automatic Updates > History tab > Update History.

3.

Press the Menu button, and then tap Delete all.

Figure 4-3. Update History screen

4-5

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Updating App Scanner Components

4

4-6

Chapter 5 Scanning for Security Threats Read this chapter to understand the anti-malware features of Mobile Security. This chapter covers the following topics: •

Security Threats Scan Types on page 5-2



Manual Scan on page 5-3



Real-time Scan on page 5-3



Manual Scan Results on page 5-5



Scan History on page 5-7

5-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

5 Security Threats Scan Types Scanning for Security Threats

Mobile Security offers the following Security Threat scan types: TABLE 5-1.

Security Threat scan types

S CAN TYPE

5-2

D ESCRIPTION

Manual scan

Checks for security threats on demand

Real-time scan

Automatically checks for threats in each application that you install

Scanning for Security Threats

5

Manual Scan

Scanning for Security Threats

Manual scans check all of the applications and files on your mobile device for security threats. The Scan Results screen lists any infected or suspicious files and applications. You can then remove them from your mobile device. For more information, see Handling Security Threats on page 5-6. To scan your mobile device for malware:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Real-time Scan > Scan tab > Scan Now to start scanning. Tap Cancel if you need to stop the scan before it has finished.

Real-time Scan When enabled, the real-time scan checks for security threats in every new application that you install.

Enabling Real-Time Scanning You should always keep the real-time scan enabled to protect your mobile device.

Figure 5-1. Scan screen

5-3

5

To enable real-time scanning:

1.

Start Mobile Security from the installed applications.

Scanning for Security Threats

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

2.

On the main screen, select Real-time Scan. To disable real-time scanning, clear the Real-time Scan setting on the main screen or on the Scan screen shown in Figure 5-1.

5-4

Scanning for Security Threats

5

Manual Scan Results

Scanning for Security Threats

Use the scan results to decide what actions to take in response to security threats found.

Viewing the Manual Scan Results After a manual scan, Mobile Security displays a list of infected or suspicious files and applications, as shown in Figure 5-2.

Figure 5-2. Scan Result screen

5-5

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Handling Security Threats If you close the results screen without deleting any suspicious files or applications, they will stay on your mobile device and may damage other files or cause performance problems.

Scanning for Security Threats

5

To remove infected or suspicious applications:

On the Scan Results screen that opens when the scan has finished, do one of the following: •



To remove applications from mobile device’s internal memory: a.

Navigate to Settings > Applications > Manage applications.

b.

On the All tab, tap the application name, and then tap Uninstall.

c.

Tap OK.

To remove applications from the memory card: a.

Select applications to remove. To select everything on the list, press the Menu button, and then tap Select All.

b.

5-6

Press the Menu button, and then tap Delete to remove what you selected.

Scanning for Security Threats

5

Scan History

Scanning for Security Threats

Mobile Security maintains record of all the scans performed on you mobile device, which you can use to track scan activities and view task results. To view Scan History:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Real-time Scan > History tab > Scan History, and then tap the record that you want to view. The record screen will look like Figure 5-3.

To delete all of the scan reocrds:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Real-time Scan > History tab > Scan History.

3.

Press the Menu button, and then tap Delete all.

Figure 5-3. Scan History screen

5-7

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Scanning for Security Threats

5

5-8

Chapter 6 Filtering Calls and SMS Messages Read this chapter to understand how to configure the call and message blocking features if your mobile device includes a telephone. This chapter covers the following topics: •

Call Blocking on page 6-2



Text Blocking on page 6-7



Call and Text Message Filtering Lists on page 6-12

6-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Filtering Calls and SMS Messages

6 Call Blocking Trend Micro Mobile Security helps you filter unwanted calls with the following filtering lists: •

Blocked list - When enabled, Mobile Security will block calls from numbers on this list and allow all others.



Approved list - When enabled, Mobile Security only allows calls from numbers on this list, and blocks all others.

For more information on filtering lists, see Call and Text Message Filtering Lists on page 6-12. You can also make Mobile Security block unwanted calls and reply with an SMS text message automatically.

Configuring Call Blocking To configure call blocking:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking > Calls tab.

3.

Select Call Blocking.

4.

Tap Filtering Method, and then select one of the following options:

5.



Use Blocked List



Use Approved List

Tap Action, and then select one of the following options: •

6-2

Reject call

Filtering Calls and SMS Messages



Silence device



Reject call + send reply

6

6.

Press the Back button to save your settings and return to the Calls tab.

7.

Select Block Annoying Calls to filter calls from an unknown numbers if the caller disconnects within three seconds. Refer to Configuring Annoying Call Protection on page 6-6 for more details.

To disable call blocking:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, clear Call Blocking.

Configuring Call Blocking Actions Mobile Security lets you choose from the following call blocking actions: •

Reject call uses the Call Blocking list to block incoming calls.



Silence device prevents your mobile device from making noise.

6-3

Filtering Calls and SMS Messages

If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically. Refer to Configuring Call Blocking Actions on page 6-3 for more details.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

6 Filtering Calls and SMS Messages



Reject call + send reply blocks incoming calls according to the filtering list you selected, and automatically sends a predefined text message to the caller. The standard text messaging data rates defined in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions.

To configure call blocking actions:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking > Calls tab.

3.

Tap Action, and then select one of the following options: •

Reject call



Silence device



Reject call + send reply If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically.

4.

6-4

Press the Back button to save your settings and return to the Calls tab.

Filtering Calls and SMS Messages

6

To change the automatic reply text message:

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking > Calls tab.

3.

Tap Action, and then select Reject call + send reply.

4.

Tap Automatic reply, and then choose what Mobile Security should send in response automatically.

5.

Press the Back button twice to save your settings and return to the Calls tab.

To add, edit, or delete an automatic reply text message:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking > Calls tab.

3.

Tap Action, and then select Reject call + send reply.

4.

Tap Automatic reply.

5.

You can now either add, edit, or delete a message: •

To add a new message, press the Menu button, and then tap Add. After typing the message, tap OK.



To edit an existing message, tap and hold that message, and then tap Edit on the list that appears. After editing the message, tap OK.



To delete an existing message, tap and hold that message, and then tap Delete on the list that appears. When asked to confirm your decision, tap OK.

6-5

Filtering Calls and SMS Messages

1.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Configuring Annoying Call Protection Enabling Block Annoying Calls records a call as "blocked" if it came from an unknown number and the caller disconnected within three seconds.

Filtering Calls and SMS Messages

6

Mobile Security identifies any phone number not in your address book or on the Blocked List or Approved list as an unknown number. The icon indicates Annoying Call records in the Blocked Call History. You can add Annoying Call records to your Blocked List. Refer to Call and Text Message Filtering Lists on page 6-12 for detailed instructions.

To enable or disable Annoying Call Protection:

6-6

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking > Calls tab.

3.

Select Block Annoying Calls to enable Annoying Call Protection. Clear Block Annoying Calls to stop using this feature.

Filtering Calls and SMS Messages

6

Text Blocking •

Blocked list - When enabled, Mobile Security will block text messages from senders on this list and allow all others.



Approved list - When enabled, Mobile Security only allows text messages from senders on this list, and blocks all others.

For more information on filtering lists, see Call and Text Message Filtering Lists on page 6-12. You can choose to block unwanted text messages or configure Mobile Security to reply with an text message automatically. Mobile Security will block unwanted messages from reaching your inbox but keeps the complete message in Blocked Text History.

Configuring Text Blocking To configure Text Blocking:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab.

3.

Select Text Blocking. 6-7

Filtering Calls and SMS Messages

Trend Micro Mobile Security helps you filter unwanted text messages with the following filtering lists:

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

6 Filtering Calls and SMS Messages

4.

5.

Tap Filtering Method, and then select one of the following options: •

Use Blocked List



Use Approved List

Tap Action, and then select one of the following options: • •

Block message Block message + reply If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically. Refer to Configuring Text Blocking Actions on page 6-9 for more details.

6.

Press the Back button to save your settings and return to the Texts tab.

7.

Select Block Annoying Texts if you want to block messages received from unknown numbers, based on your defined keywords. See Configuring Annoying Message Protection on page 6-11 for more details.

8.

Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons.

To disable text blocking:

6-8

1.

Start Mobile Security from the installed applications.

2.

On the main screen, clear Text Blocking.

Filtering Calls and SMS Messages

6

Configuring Text Blocking Actions •

Block message stops text messages according to the filtering list you selected.



Block message + reply stops text messages according to the filtering list you selected, and automatically transmits a predefined text message to the sender.

Filtering Calls and SMS Messages

Mobile Security provides the following text blocking actions:

The standard text messaging data rates defined in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions.

To configure text blocking actions:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab.

3.

Tap Action, and then select one of the following options: •

Block message



Block message + reply If you select the last option, tap Automatic reply, and then choose a message that Mobile Security should automatically transmit back to the sender.

4.

Press the Back button to save your settings and return to the Texts tab. 6-9

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

6

To add, edit, or delete an automatic reply text message:

Filtering Calls and SMS Messages

1.

6-10

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab.

3.

Tap Action, and then select Block message + reply.

4.

Tap Automatic reply.

5.

You can now either add, edit, or delete a message: •

To add a new message, press the Menu button, and then tap Add. After typing the message, tap OK.



To edit an existing message, tap and hold that message, and then tap Edit on the list that appears. After editing the message, tap OK.



To delete an existing message, tap and hold that message, and then tap Delete on the list that appears. When asked to confirm your decision, tap OK.

Filtering Calls and SMS Messages

Configuring Annoying Message Protection

Mobile Security identifies any phone number not in your address book or on the Blocked List or Approved list as an unknown number. The icon indicates Annoying Text records in the Blocked Text History. You can add Annoying Text records to your Blocked List. Refer to Call and Text Message Filtering Lists on page 6-12 for detailed instructions.

To enable or disable annoying message protection:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab.

3.

Select Block Annoying Texts.

4.

Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons.

5.

Tap Save.

To disable annoying message protection:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab. 6-11

6 Filtering Calls and SMS Messages

Enabling Block Annoying Texts blocks text messages from unknown numbers based on keywords that you have selected.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Filtering Calls and SMS Messages

6

3.

Clear Block Annoying Texts.

To add keywords for message filtering:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Text Blocking > Texts tab.

3.

Select Block Annoying Texts if you have not done that already.

4.

Tap Filter Keywords, and then type new filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Separate the keywords with semi-colons.

5.

Tap Save.

Call and Text Message Filtering Lists Trend Micro Mobile Security includes the following two types of filtering lists:

6-12



The Blocked List stores phone numbers that Mobile Security will block. If you enable this list, Mobile Security only stops incoming calls or text messages from phone numbers on this list. Nobody else will be blocked.



The Approved List stores phone numbers that Mobile Security will never block. If you enable this list, Mobile Security only allows incoming calls and text messages from phone numbers on this list. Everyone else will be blocked.

Filtering Calls and SMS Messages

6

Uninstalling Mobile Security will permanently remove your Blocked and Approved lists.

To import contacts into your filtering list:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Call Blocking or Text Blocking > Lists tab > Blocked List or Approved List.

3.

Press the Menu button, tap Add, and then select one of the following options:

4.



Use device contact list



Use call history



Use text history



Use annoying call/text list

You can now import contacts to your filtering list: •

To import multiple contacts, select the individual contacts, press the Menu button, and then tap Import.



To import all the contacts, press the Menu button, and then tap Import all. 6-13

Filtering Calls and SMS Messages

Managing Filtering Lists

6

To add, edit, or delete contacts in your filtering lists:

1.

Start Mobile Security from the installed applications.

Filtering Calls and SMS Messages

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

2.

On the main screen, tap Call Blocking or Text Blocking > Lists tab > Blocked List or Approved List.

3.

Select either the Blocked List or the Approved List.

4.

You can now either add, edit, or delete list items: •

To make an addition, press the Menu button, then tap Add > Add phone number, and type the name and phone number. When finished, tap Save.



To edit a contact, tap and hold that contact, then tap Edit Contact on the list that appears, and make your changes. When finished, tap Save.



To delete a contact, tap and hold that contact, then tap Delete Contact on the list that appears. When asked to confirm your decision, tap OK.



To delete multiple contacts: i.

Press the Menu button, and then tap Delete.

ii. Select the contact(s) you want to delete. iii. Press the Menu button, and then tap Delete. When asked to confirm your decision, tap OK. •

6-14

To delete all contacts, tap Menu, and then tap Delete all. When asked to confirm your decision, tap OK.

Chapter 7 Using Web Security Trend Micro Mobile Security can filter unsafe sites when you browse the Web. This chapter covers the following topics: •

Using Web Security on page 7-2



Using Approved Lists on page 7-4



Web Security Blocked History on page 7-6

7-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Using Web Security

7 Using Web Security Web Security can help protect you from online fraud like phishing and pharming by blocking access to risky sites on the Web.

Understanding Web Security Mobile Security provides the following levels of Web Security protection: •

Low blocks only sites that have been confirmed as fraudulent or dangerous.



Normal provides appropriate protection for everyday use without aggressively blocking minor risks (Trend Micro recommends this setting).



High provides the most protection by blocking site that show any signs of fraud or malicious software.

After enabling Web Security, attempts to open blocked sites are recorded in the Blocked History. For more details, refer to Web Security Blocked History on page 7-6.

7-2

Using Web Security

7

Configuring Web Security

Using Web Security

Web Security provides protection against online security threats by blocking access to unsafe Web sites. To enable or adjust Web Security:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Web Security > Protection tab.

3.

Select Web Security, and then select either Low, Normal, or High to enable or adjust Web Security, as shown in Figure 7-1. •

Clear Web Security to stop using this feature.

To disable Web Security:

1.

Start Mobile Security from the installed applications.

2.

On the main screen or on the screen shown in Figure 7-1, clear Web Security.

Figure 7-1. Web Reputation Screen

7-3

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Handling Web Sites Blocked by Web Security Mobile Security displays a warning whenever it detects a suspicious site, as shown in Figure 7-2. The screen will show the following information:

Using Web Security

7



Address - the address of the blocked site



Type - the classification of the blocked site



Rating - rates the site as Safe, Suspicious, Dangerous, or Unknown When you try to visit a blocked site, the Web Security blocking screen will appear, showing the address of the blocked site, as well as its type and risk level. The attempt is recorded in the Blocked History. If you think a page has been misclassified, please contact Trend Micro.

Using Approved Lists Approved List under Web Security enables you to access only sites that appear on this lists and blocks all the others. 7-4

Figure 7-2. Web Reputation block screen

Using Web Security

Configuring Web Security Approved List To add sites to or delete sites from the Approved List:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Web Security > Approved List tab.

3.

You can now either add or delete sites: •

To add a site, press the Menu button, tap Add, fill in the Name and Website fields, and then tap Save.



To delete a site, tap and hold the one you want to remove, and then tap Delete. To delete everything on the list, press the Menu button, and then tap Delete All.

7-5

7 Using Web Security

Enabling and then adding trusted sites to the Approved List will block access to any site not on the list.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Using Web Security

7 Web Security Blocked History Mobile Security adds a record to the Blocked History under Web Security upon detecting a suspicious or risk website.

Handling Blocked History To view or delete records in the Blocked History:

7-6

1.

Start Mobile Security from the installed applications.

2.

On the main screen, tap Web Security > Blocked History tab.

3.

You can now either view or delete log records: •

Tap a record in the logs that you want to see.



To delete the records, press the Menu button, and then tap Delete all.

Chapter 8 History Read this chapter to understand how to use the records that keep track of the events that occur while Trend Micro Mobile Security is running. The chapter covers the following topics: •

Viewing History on page 8-2



Deleting History on page 8-2

8-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

8 Viewing History History

To view history:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, press Menu, and then tap History to view a list like the example shown in Figure 8-1.

Deleting History To delete history:

1.

Start Mobile Security from the installed applications.

2.

On the main screen, press Menu, and then tap History.

3.

Press the Menu button, and then tap Delete all on the pop-up menu.

Figure 8-1. History screen

8-2

Chapter 9 Troubleshooting, FAQs, and Technical Support Read this chapter for a list of common problems and workarounds and instructions for contacting technical support. This chapter covers the following topics: •

Troubleshooting on page 9-2



Frequently Asked Questions (FAQ) on page 9-4



Technical Support on page 9-5

9-1

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

9 Troubleshooting Troubleshooting, FAQs, and Technical Support

This section explains what you can do if issues arise when installing, configuring, or using Mobile Security. I SSUE

9-2

R ECOMMENDED A CTION

The mobile device runs out of power during the installation of Mobile Security.

Recharge the mobile device and then restart the installation process.

Mobile Security performs actions slowly.

Check the storage space available and try removing unnecessary files and applications.

I cannot receive text messages after installing Mobile Security.

If you have enabled the Approved List but added nothing to that list, then Mobile Security will move all incoming messages to the Blocked Message Logs. Check those logs and consider adjusting your Message Filtering configuration.

After successfully installing Mobile Security, it did not detect a security risk.

Ask your network administrator if your Mobile Security license has expired.

Troubleshooting, FAQs, and Technical Support

I SSUE

Troubleshooting, FAQs, and Technical Support

Mobile Security cannot receive updates.

9

R ECOMMENDED A CTION Verify the following:

• Check if Mobile Security was registered successfully.

• Make sure that your mobile device can connect with the Internet or Intranet.

• Contact your network administrator to see if your server has been configured properly for access. I do not know if Mobile Security has been registered.

Check the Mobile Security registration screen. If the Device Name, Host Name or IP Address, and Port Security fields contain information, then you have registered Mobile Security.

9-3

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

9 Frequently Asked Questions (FAQ) Troubleshooting, FAQs, and Technical Support

Can I install Mobile Security on a storage card?

No, you can only install Mobile Security on your mobile device’s internal memory. Certain features seem to be missing in this version. Where did they go?

Your administrator might have disabled the availability of certain features. Contact your administrator before contacting support. Can I download the updates to a storage card even though Mobile Security is installed directly on the device?

No, you must download and install updates in the same place where you installed Mobile Security. How often should I update Mobile Security?

Trend Micro recommends updating Mobile Security weekly. Your network administrator may have already set up scheduled updates on your mobile device. Can I receive or make a call while Mobile Security is performing a scan?

Yes. Mobile Security can scan in the background while you do other things with your mobile device. You can view the logs to see details on scans and any detected malware and security risks.

9-4

Troubleshooting, FAQs, and Technical Support

How does Mobile Security match callers and message senders with the filtering lists?

Technical Support Trend Micro has sales and corporate offices located in many cities around the globe. For global contact information, visit the Trend Micro Web site at: http://www.trendmicro.com/en/about/contact/overview.htm The information on this Web site is subject to change without notice

Contacting Technical Support You can contact Trend Micro by fax, phone, and email, or visit us at: http://www.trendmicro.com 9-5

9 Troubleshooting, FAQs, and Technical Support

Mobile Security can match partial numbers or names with items on the filtering lists. If the caller or sender's number has more than seven digits, for example, Mobile Security will check the last seven of them against the lists. If the caller or sender's number contains less than seven digits, the entire number is compared to the lists.

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide

Troubleshooting, FAQs, and Technical Support

9

Speeding Up Support Calls When you contact Trend Micro Technical Support, to speed up your problem resolution, ensure that you have the following details available: •

Network type



Amount of memory and free space on your mobile device



Exact text of any error messages



Steps to reproduce the problem

Using the Knowledge Base The Trend Micro Knowledge Base is a 24x7 online resource that contains thousands of do-it-yourself technical support procedures for Trend Micro products. Use Knowledge Base, for example, if you are getting an error message and want to find out what to do. New solutions are added daily. Also available in Knowledge Base are product FAQs, important tips, preventive anti-malware advice, and regional contact information for support and sales. All Trend Micro customers, including users of evaluation versions, can access Knowledge Base at: http://esupport.trendmicro.com/ If you cannot find an answer to a particular question, Knowledge Base includes an additional service that allows you to submit your questions by email.

9-6

Index

Index automatic updates 4-2, 4-4

B

I Installation 2-5 installation 2-2, 2-5 installation methods 2-2, 2-5 Internet 4-2

before you install 2-2 Bluetooth 1-2

K

D

M

default policies 3-4

manual installation 2-2, 2-5 manual scan 5-2 manual updates 4-2–4-3 Mobile Security features 1-2

E event logs types 8-2 viewing 8-2

F

Knowledge Base 9-6

P

FAQ 9-4

parental controls 7-1 product registration 2-7

G

R

getting started 3-1

H Handling Security Threats 5-6 History deleting 8-2 History records 8-1

Index

A

host computer requirements 2-5

real-time scan 5-2 registering Mobile Security manually 2-7 registration 2-7 removing the product 2-9

S safe practices 1-2

I–1

Index

Trend Micro Mobile Security for Enterprise v7.1 for Android User’s Guide scan results 5-5–5-6 delete 5-6 scan types 5-2 scanning 3-7, 5-1 SMS 1-2 system requirements 2-4

U

T

W

technical support 9-5 troubleshooting 9-2

I–2

uninstallation 2-9 uninstalling Mobile Security 2-9 update options 4-4 updating 3-2, 4-1 user interface 3-2 web filtering 7-1 web security 7-1