Trend Micro™ Mobile Security Help

Contents
Introduction
Main Tasks
Scan Results
Scan Settings
Update Settings
Firewall Settings
SMS Anti-Spam Settings
WAP Push Protection Settings
Quarantine List
Logs
About
Registration

Copyright © 2004-2011 Trend Micro Incorporated. All rights reserved.


Introduction

Trend Micro Mobile Security offers comprehensive protection for your mobile device. With Mobile Security, you can password protect your mobile device, encrypt data stored on your mobile device or an inserted memory card. Mobile Security allows you to scan your mobile device for mobile threats, filter SMS and WAP Push messages, and filter inbound and outbound network traffic. Your mobile device can also update components and synchronize security policies from the Mobile Security Management server after registering with the server.

Help Contents

Main Tasks

You can run the following tasks from the main screen:

To enable or disable real-time scan:

To change the firewall protection level:

To update components and synchronize security policies:

To scan for viruses and other malware, select Menu > Scan Now.

Scan Settings
Firewall Settings
Help Contents

Scan Results

After a manual scan or a card scan, you can either delete or quarantine suspicious and unscannable files. If you leave the scan results screen without specifying delete or quarantine, the files will remain in their original state.

Note: Unscannable files are inaccessible archive files. These files may be compressed within too many layers of compression, password-protected, or too large to be extracted on the mobile device. You can configure the product to scan archives in up to three compression layers.

To delete a suspicious or unscannable file:

To quarantine a suspicious or unscannable file:

Tip: Select Delete All or Quarantine All on the scan results menu to delete or quarantine all suspicious and unscannable files.

Quarantine List
Scan Settings
Help Contents

Scan Settings

To configure anti-malware scan policies:

To scan files every time they are accessed:

To specify the action to take on suspicious files:

Note: The selected action applies only to infected/suspicious files detected by real-time scan.

To scan memory cards after they are inserted:

To specify the file types to scan:

To specify the number of layers to scan within compressed .CAB and .ZIP files:

Note: The option to set compression layers to scan is available only if you select All files or Executable and CAB/ZIP files under File types to scan.

Quarantine List
Help Contents

Update Settings

To configure update policies:

To be alerted before Trend Micro Mobile Security opens a GPRS connection or other wireless connections:

To check for updates at fixed intervals:

To set the interval between updates:

Mobile Security will attempt to check for updates at the specified interval from the last update attempt when the Internet is accessible. As a failsafe, Mobile Security will run another update at intervals that are not affected by other update attempts. This forced update will open your default Internet connection when necessary.

To set the wait period before the product forces updates:

Note: Forced updates can involve opening your default GPRS connection or other wireless connections. To be alerted before Mobile Security opens a wireless connection, select Wireless connection alert.

Help Contents

Firewall Settings

General Settings
Rule List
Rule Details
Help Contents


General Firewall Settings

To configure firewall policies:

To filter network traffic:

To block denial of service (DoS) attacks:

Note: The intrusion detection system (IDS) will block only SYN packet flood attacks.

To set the firewall protection level:

To customize your firewall protection:

Note: Firewall rules take precedence over the predefined protection levels.

Firewall Settings
Help Contents

Firewall Rule List

To maintain your firewall rules:

To add a new rule:

Note: Firewall rules may overlap when they cover the same ports or the same IP addresses. When they do, rules at the top of the list take precedence over rules that are closer to the bottom.

To move rules up or down the list:

To edit or view a rule:

You also have the following menu options:

Firewall Settings
Help Contents

Firewall Rule Details

To add, edit, or view a firewall rule:

Each firewall rule has the following settings that you may configure:

Firewall Settings
Help Contents

SMS Anti-Spam Settings

To configure SMS Anti-Spam settings:

To filter SMS messages:

To disable SMS filtering:

To block SMS messages without sender numbers:

Note: Trend Micro Mobile Security will move all blocked SMS messages to a Spam folder in your inbox. SMS Anti-Spam settings will be locked if the Mobile Security Anti-Spam setting is enabled with server-side control of SMS Anti-Spam.

Depending on the SMS anti-spam option you have selected, you will need to maintain either an approved list or a blocked list.

To add a sender to the Anti-Spam filtering list, you can do either of the following:

To manually enter sender details:

To import senders:

To delete a sender from the list for Pocket PC:

To delete a sender from the list for SmartPhone:

To delete all senders from the list for Pocket PC:

To delete all senders from the list for SmartPhone:

To edit sender details:

Help Contents

WAP Push Protection Settings

WAP Push messages typically display an alert that gives you the option to connect directly to a WAP site and download content. You may receive inaccurate or uninformative WAP Push messages designed to trick you into accepting unwanted content. With WAP Push protection, you can avoid downloading and installing unwanted content on your mobile device.

To configure WAP Push Protection settings:

To allow WAP Push messages from trusted senders only:

Warning: With WAP Push Protection enabled, Trend Micro Mobile Security will prompt you whenever you receive messages from senders that are not in your trusted list. The messages that you choose to block will not be stored on your mobile device.
Note: WAP Push Protection settings will be locked if the Mobile Security WAP Push Protection setting is enabled with server-side control of WAP Push Protection.

To add a sender to the trusted senders list:

Tip: To add unknown senders to your trusted list, select Add to trusted list whenever Mobile Security prompts you to allow or block WAP Push messages.

To delete a sender from the list:

To delete all senders from the list:

To edit sender details:

Help Contents

Quarantine List

To access files that have been quarantined:

To restore a quarantined file:

Warning: Do not to open suspicious files after restoring them.

To delete a quarantined file:

To view details on a quarantined file:

Scan Results
Scan Settings
Help Contents

Logs
Scan Log
Task Log
Firewall Log
Spam Log
WAP Push Log
Help Contents


Scan Log

To view the list of log entries on malware detections:

To view the details of a Scan log entry:

To delete the entries in the Scan log:

Note: Trend Micro Mobile Security allocates 32-KB of memory space for each log type. When this limit is reached, it automatically deletes the oldest entries to accommodate new entries.

Logs
Help Contents

Task Log

To view the list of log entries on product tasks, including manual scans, card scans, and updates:

To view the details of a log entry:

To delete the entries in the task log:

Note: Trend Micro Mobile Security allocates 32-KB of memory space for each log type. When this limit is reached, it automatically deletes the oldest entries to accommodate new entries.

Logs
Help Contents

Firewall Log

Trend Micro Mobile Security generates an entry in the firewall log when one of the following occurs:

To view the list of firewall log entries:

To view the details of a log entry:

To delete the entries in the firewall log:

Note: Trend Micro Mobile Security allocates 32-KB of memory space for each log type. When this limit is reached, it automatically deletes the oldest entries to accommodate new entries.

Logs
Help Contents

Spam Log

To view the list of log entries on blocked SMS messages:

To view the details of a log entry:

To delete the entries in the spam log:

Note: Trend Micro Mobile Security allocates 32-KB of memory space for each log type. When this limit is reached, it automatically deletes the oldest entries to accommodate new entries.

Logs
Help Contents

WAP Push Log

To view the list of log entries on blocked WAP Push messages:

To view the details of a log entry:

To delete the entries in the WAP Push log:

Note: Trend Micro Mobile Security allocates 32-KB of memory space for each log type. When this limit is reached, it automatically deletes the oldest entries to accommodate new entries.

Logs
Help Contents

About

To view the product license information:

You can see the expiry dates for the Standard License and Advanced License. The Standard License activates the anti-malware and firewall features in Mobile Device Agent while the Advanced License activates the encryption module for logon authentication and data encryption.

Help Contents

Registration

You need to register Mobile Device Agent to the Mobile Security Management server to use it beyond the trial date.

To register and activate the product:

For more product information, visit the Trend Micro Web site at http://us.trendmicro.com/us/products/enterprise/mobile-security/index.html.

Help Contents