Trend Micro� Mobile Security� for Enterprise Help
Contents
Introduction
Protecting Your Mobile Device
Product License
Enrolling Mobile Device to Server
Proxy Settings
Mobile Security Interface
Reviewing the Default Protection Policies
Enterprise Applications
Malware Scan
Mobile Security Components Update
Privacy Scan
Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
Handling Privacy Risks
Web Security
Web Security - Filtering Lists
Web Security - Blocked Websites
Call Blocking
Call Blocking - Actions
Annoying Call Protection
Text Blocking
Text Blocking - Actions
Annoying Text Protection
Call and Text Filtering Lists
History
Uninstalling Mobile Security
Troubleshooting
Frequently Asked Questions (FAQ)
Technical Support
About Trend Micro
Copyright � 2010-2013 Trend Micro Incorporated. All rights reserved.
Introduction
Trend Micro Mobile Security defends against the latest threats to mobile devices and helps protect your privacy.
Mobile Security offers the following features:
- Scheduled or manual component updates from the Trend Micro server to ensure up-to-date scan engine, pattern, security policies, and program versions.
- Password protection to prevent anyone from accessing your mobile device.
- Enables the administrator to control the camera and bluetooth on your mobile device.
- Award-winning anti-malware scanning technology for mobile security threats. It connects to Trend Micro through the Internet to scan your apps for new threats as they arise.
- Website filters to ensure safe Internet browsing.
- Text filtering feature to block unwanted text messages.
- Call filtering feature to block telephone calls from unwanted and anonymous callers.
- Comprehensive logs tracking scan results, security threats found, text messages and calls filtered, and other events.
 |
Trend Micro recommends removing other apps that provide similar features before using Mobile Security. |
Back to Top
About Trend Micro
Protecting Your Mobile Device
Trend Micro recommends the following safe practices when using your mobile device:
- Do not accept and install any content sent by strangers.
- Ignore text messages that tell you that you have won something, especially if these messages instruct you to send money or disclose personal information.
- Do not install or run applications received through unsolicited Bluetooth messages. When in a public area, avoid leaving your Bluetooth radio turned on.
Back to Top
Product License
You can use Mobile Security with an evaluation license for thirty days before registering it. If the evaluation license expires before you register Mobile Security, or if the registered version of Mobile Security expires, all of the features will be disabled.
Enrolling Mobile Device to Server
Back to Top
Enrolling Mobile Device to Server
 |
You need an Internet connection to enroll your mobile device to the Mobile Security server. |
You can enroll your mobile device using one of the following methods:
- Enroll using QR-code.
- Enroll using server address.
- Enroll without using server address.
To manually enroll your mobile device using QR-code:
- Tap Enroll Using QR code.
- Open the invitation email on a computer or another mobile device and scan the QR code received in the invitation email using the mobile device camera.
- If required, type the username and password in the fields provided, and tap OK.
Your mobile device will be enrolled with the Mobile Security server.
To manually enroll your mobile device using server address:
- Tap Enroll Manually.
- Tap the Local Server tab, type the server address and port number in the relevant fields and then tap Next.
- Type the Enrollment Key or the username and password in the relevant fields and tap Next.
Your mobile device will be enrolled with the Mobile Security server.
To manually enroll your mobile device without using server address:
- Tap Enroll Manually.
- Tap the Cloud Server tab, type the Enrollment Key you have received in the invitation email, and then tap Next.
Your mobile device will be enrolled with the Mobile Security server.
Product License
Proxy Settings
Back to Top
Proxy Settings
You can use proxy for accessing Mobile Security server on your mobile device.
To configure proxy for Mobile Security:
- On the main screen, tap the menu button on the top-right of your screen (three vertical dots), and then tap Proxy.
- Type the proxy host name or IP address, port, username and password in their relevant fields.
 |
You may not need the username and password for the proxy settings, depending on the requirement set by your network administrator. |
- Tap Save.
Product License
Enrolling Mobile Device to Server
Back to Top
Mobile Security Interface
The main interface of Mobile Security displays the following tabs:
- Status tab displays one of the following health statuses of your mobile device:
- Healthy—shows that the device is enrolled to the Mobile Security server and the components and policies on the mobile device are up-todate.
- Non-Compliant—shows that the device is enrolled to the Mobile Security server, but does not comply with the company policies.
- Out of Sync—shows that the device is enrolled to the Mobile Security server, but either the components or the polices are out-of-date.
- Inactive—shows that the device is not yet enrolled to the Mobile Security server.
- Apps tab displays the downloaded apps on your mobile device and the App Store from where you can download the apps recommended by your administrator.
- Security tab provides Malware Scan and Privacy Scan options for your mobile device.
- Policy tab displays the current policies set by your administrator.
The main interface also has the Menu button (three vertical dots) at the top right of the screen. The items on the menu are as follows:
- History—displays the events that occur while Mobile Security is running.
- Proxy—enables you to configure proxy settings for accessing the Mobile Security server on your mobile device.
- About—displays the Mobile Security server IP address, port number and the version number of the client app.
- Help—displays the help screen.
- Uninstall—lets you remove Mobile Security from your mobile device.
Reviewing the Default Protection Policies
Malware Scan
Mobile Security Components Update
Privacy Scan
Web Security
Call Blocking
Text Blocking
History
Back to Top
Reviewing the Default Protection Policies
After installing Mobile Security, you might want to review the default protection policies shown in the following table to decide if you want to modify them.
To see the default protection policies, tap the Policy tab on the main interface.
Feature |
Default Policy |
Resulting Action |
Real-time Malware Scan |
Enabled |
Checks for security threats in installed apps |
Real-time Privacy Scan |
Enabled |
Checks for the apps that potentially steal your private information |
Web Security |
Enabled |
Blocks unsafe Internet browsing |
Call Blocking |
Enabled |
All telephone calls are allowed to reach your inbox without filtering (feel free to adjust this setting) |
Text Blocking |
Enabled |
All text messages are allowed to reach your inbox without filtering (feel free to adjust this setting) |
Password Security |
Enabled |
Sets the screen lock for device |
Feature Lock |
Enabled |
Lets the administrator control device features |
Application Control |
Disabled |
Lets the administrator control applications installed on the device |
 |
The Mobile Security server may control the call and text blocking features on your mobile device. |
Malware Scan
Mobile Security Components Update
Privacy Scan
Web Security
Call Blocking
Text Blocking
Back to Top
Enterprise Applications
The Apps tab displays the list of enterprise applications for your mobile device. These applications are divided into two categories:
- Downloaded Apps displays the applications that are downloaded and installed on your mobile device.
- App Store provides a list of enterprise applications that your network administrator has suggested for you.
To install the enterprise applications:
- On the main screen, tap Apps tab > App Store.
- Tap Install for the application that you want to install.
 |
You can also search for any app by typing its name in the search field in the app store. |
Default Protection Policies
Back to Top
Malware Scan
Mobile Security can check for malicious apps on your mobile device in two ways:
- When enabled, the Real-time Scan checks for security threats in every new app that you install.
- Running a Scan On Demand checks for security threats in all files and apps currently on your mobile device.
If you enable Scan from Cloud, Mobile Security will connect to Trend Micro through the Internet to scan your apps for new threats as they arise.
If the malware scan finds any security threats, Mobile Security will record it in Malware Scan History.
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To run a Scan On Demand:
- On the main screen, tap Security tab > Malware Scan > Scan Now to start scanning. Tap Cancel to stop the current scan.
To enable Real-time Scan:
- On the main screen, tap Security tab > Malware Scan.
- Tap the menu icon (three vertical dots) at the top and then select Real-time Scan.
To enable SD Card Scan:
- On the main screen, tap Security tab > Malware Scan.
- Tap the menu icon (three vertical dots) at the top and then select SD Card Scan.
- Tap File type, and then select one of the following:
- Scan all files
- Scan only APK files
To disable SD Card Scan:
- On the main screen, tap Security tab > Malware Scan.
- Tap the menu icon (three vertical dots) at the top and then clear SD Card Scan checkbox.
To enable or disable Scan from Cloud:
- On the main screen, tap Security tab > Malware Scan.
- Tap the menu icon (three vertical dots) at the top and then select Scan from Cloud to enable this feature. Clear this setting if you want to stop using this feature.
Mobile Security Components Update
History
Default Protection Policies
Back to Top
Mobile Security Components Update
To stay protected against the latest security threats, please update the Mobile Security components after installation and keep updating them from time to time.
You can update Mobile Security components in two ways:
- When enabled, Automatic Update attempts to download a new update according to a schedule if the network connection is available on your mobile device.
- Update On Demand attempts to download a new update whenever you want.
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To update Mobile Security components on demand:
- Ensure that the network connection is available, and your mobile device is enrolled to the Mobile Security server.
- On the main screen, tap the update icon at the bottom of the screen to start the update. Tap Cancel if you need to stop the update before it has finished.
 |
If Mobile Security does not run the automatic scan after the update, Trend Micro strongly recommends performing a manual scan immediately after every update. |
To enable automatic updates:
- Ensure that the network connection is available, and your mobile device is enrolled to the Mobile Security server.
- On the main screen, tap Security tab > Malware Scan.
- Tap the Menu icon (three vertical dots) at the top and then select Automatic Updates.
- Select Auto Update Using Wi-Fi Only if you do not want to use mobile network for auto updates.
- Tap Scheduled Update, and then select how often Mobile Security should check for updates, based on the last time you checked for one.
 |
This update will run only if your mobile device is connected to the Internet. |
To enable automatic scan after successful updates:
- On the main screen, tap Security tab > Malware Scan.
- Tap the Menu icon (three vertical dots) at the top and then select Automatic Scan.
Malware Scan
History
Default Protection Policies
Back to Top
Privacy Scan
The Privacy Scan checks apps to determine if they might secretly attempt to steal private information. It connects to Trend Micro through the Internet to get the very latest information about new apps identified as privacy risks.
Whenever you download another app, the Privacy Scan assigns it a risk rating according to what kind of and how much information it can collect, then warns you about ones that might pose a privacy risk. If you add apps to the Trusted Apps list, then future scans will ignore them.
Mobile Security can check for privacy risks on your mobile device in two ways:
- When enabled, the Real-time Scan checks for privacy risks in every new app that you install.
- Running a Scan On Demand checks for privacy risks in all apps currently on your mobile device.
If the privacy scan finds any security threats, Mobile Security will record it in Privacy Scan History.
 |
Your mobile device must connect to the Internet to run a privacy scan. |
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To run a Scan On Demand:
- On the main screen, tap Security tab > Privacy Scan > Scan Now to start scanning. Tap Cancel to stop the current scan.
To enable or disable Real-time Scan:
- On the main screen, tap Security tab > Privacy Scan.
- Tap the menu icon (three vertical dots) at the top and then tap Settings.
- Select Privacy Real-Time Scan to enable this feature. Clear this setting if you want to stop using this feature.
To enable or disable SD Card Scan:
- On the main screen, tap Security tab > Privacy Scan.
- Tap the menu icon (three vertical dots) at the top and then tap Settings.
- Select SD Card Scan to enable this feature. Clear this setting if you want to stop using this feature.
When enabled, Mobile Security will scan all files on the memory card in your device during data theft scans.
Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
Handling Privacy Risks
History
Default Protection Policies
Back to Top
Privacy Scan - Trusted Apps List
You can add apps to the Trusted Apps list that Mobile Security will ignore while scanning apps for privacy risks.
 |
Mobile Security will NOT scan any apps on the Trusted Apps list, so take care when using this feature. |
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To add apps to the Trusted Apps List:
- On the main screen, tap Security tab > Privacy Scan.
- Tap the menu icon (three vertical dots) at the top and then tap Trusted Apps.
- Tap the menu icon (three vertical dots) at the top and then tap Add, and then tap one of the following options:
- Privacy scan history
- Installed apps list
- Select the apps that you want to add, and then tap the + sign at the top.
To remove apps from the Trusted Apps List:
- On the main screen, tap Security tab > Privacy Scan.
- Tap the menu icon (three vertical dots) at the top and then tap Trusted Apps.
- Tap the menu icon (three vertical dots) at the top and then tap Remove.
- Select the apps that you want to remove, and then tap the delete icon (trash can) at the top.
Privacy Scan
Understanding Privacy Scan Results
Handling Privacy Risks
History
Default Protection Policies
Back to Top
Understanding Privacy Scan Results
After a privacy scan, you can see what personal information an app may try to collect from your mobile device. Keep in mind that apps may secretly gather information for a legitimate purpose.
For example, a backup app might make copies of your photos on the Internet, and that behavior could trigger an alert. However, most risky apps try to gather information that they should not access. A weather app has no good reason to make copies of your photos, for instance.
Trend Micro Mobile Security can help you see if an app has legitimately collected information, and then you can decide if you want to keep the app. Mobile Security assigns a severity rating to each app:
- High risk apps can collect messages, photos, contacts, your phone number, audio recordings, and other personal information. Apps that collect lots of basic information about your device and your specific identity also qualify as high risk apps.
- Medium risk apps can collect information about your location, your mobile device, or your specific identity.
- Low risk apps can collect a little bit of device information, files that you have created, and what you have downloaded from the Internet.
Privacy Scan
Privacy Scan - Trusted Apps List
Handling Privacy Risks
History
Default Protection Policies
Back to Top
Handling Privacy Risks
If you close the results screen without deleting any suspicious files or applications, they will stay on your mobile device and may damage other files or cause performance problems.
To remove infected or suspicious applications or files:
- On the Scan Results screen that opens when the scan has finished, do one of the following:
- To remove applications from mobile device’s internal memory:
- Navigate to Settings > Applications > Manage applications.
- On the All tab, tap the application name, and then tap Uninstall.
- Tap OK.
- To remove files from the memory card:
- Select files to remove.
 |
To select everything on the list, tap the menu button, and then tap Select All. |
- Tap the Menu button, and then tap Delete to remove what you selected.
Privacy Scan
Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
History
Default Protection Policies
Back to Top
Web Security
Mobile Security can block unsafe websites based on the level of protection that you choose:
- Low blocks only websites that have been confirmed as fraudulent or dangerous.
- Normal provides appropriate protection for everyday use without aggressively
blocking minor risks, so Trend Micro recommends this setting.
- High provides the most protection by blocking websites that show any signs of fraud or hosting malicious software.
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To enable or adjust Web Security:
- On the main screen, tap Policy tab >Web Security.
- Select Safe Surfing if you have not done that already.
- Select a Protection Level:
To disable Web Security:
- On the main screen, tap Policy tab >Web Security.
- Clear Safe Surfing checkbox.
Web Security - Filtering Lists
Web Security - Blocked Websites
History
Default Protection Policies
Back to Top
Web Security - Filtering Lists
Trend Micro Mobile Security helps you filter unwanted websites with the following lists:
- The Blocked List stores the addresses of websites that you want to block in addition to those already blocked by the level of protection that you chose.
- The Approved List stores addresses of websites that will not be blocked, even if the level of protection that you chose would normally block them.
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To add a website to the filtering list:
- On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
- Tap the menu icon (three vertical dots) at the top and then tap Add.
- Type the name and address of the website and then tap Save.
To edit a website on the filtering list:
- On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
- Tap and hold the name of the website that you want to edit, and then tap Edit on the menu that appears.
- Edit the name and address of the website and then tap Save.
To delete websites from the filtering list:
- On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
- You can either select and delete a single website, or delete all of the websites:
- To select and delete a single website, tap and hold a website that you want to delete, and then tap Delete.
- To delete all of the websites, tap the menu icon (three vertical dots) at the top, tap Remove all, and then tap OK.
Web Security
Web Security - Blocked Websites
History
Default Protection Policies
Back to Top
Web Security - Blocked Websites
Mobile Security displays a warning whenever it detects a suspicious site. The screen will show the following
information:
- Address: the address of the blocked site
- Type: the classification of the blocked site
- Rating: rates the site as Safe, Suspicious, Dangerous, or Unknown
 |
When you try to visit a blocked site, the Web Security blocking screen will appear, showing the address of the blocked site, as well as its type and risk level. The attempt is recorded in the Blocked History.
If you think a page has been misclassified, please contact Trend Micro by clicking the Notify Trend Micro link on the blocking page. |
Web Security
Web Security - Filtering Lists
History
Default Protection Policies
Back to Top
Call Blocking
Mobile Security helps you filter unwanted calls with the following lists:
- Use the Blocked List to filter out calls from numbers on this list and allow all others.
- Use the Approved List to allow calls only from numbers on this list and block all others.
 |
You may not be able to change Mobile Security settings if they are controlled by the server. |
To configure Call Blocking:
- On the main screen, tap Policy tab > Call Blocking.
- Select Call Blocking.
- Tap Filtering Method, and then select one of the following options:
- Stop only blocked callers
- Allow only approved callers
- Allow approved and anonymous callers
- Tap Action, and then select one of the following options:
- Reject call
- Silence device
- Reject call + send reply
If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically.
Refer to Actions for more details.
- Select Block Annoying Calls to filter calls from an unknown numbers if the caller disconnects within three seconds. Refer to Annoying Call Protection for more details.
- Tap Blocked List or Approved List, then tap the menu icon (three vertical dots) at the top and then tap Add to add contacts or phone numbers to the list. Refer to Call and Text Filtering Lists for more details.
To disable Call Blocking:
- On the main screen, tap Policy tab > Call Blocking.
- Clear Call Blocking checkbox.
Call Blocking - Actions
Annoying Call Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Call Blocking - Actions
You can choose what Mobile Security will do in response to a blocked call:
- Reject call blocks incoming calls based on the filtering list you selected.
- Silence device prevents your mobile device from making noise.
- Reject call + send reply blocks incoming calls based on the filtering list you selected, and
automatically sends a predefined text message to the caller.
 |
If Mobile Security rejects a call, the caller will not reach your voice mail. |
 |
The standard text messaging data rates in your mobile service contract will apply for
any text messages sent. Contact your service provider if you have questions. |
To change the Action:
- On the main screen, tap Policy tab > Call Blocking.
- Select Call Blocking if you have not done that already.
- Tap Action, and then select one of the following options:
- Reject call
- Silence device
- Reject call + send reply
If you select the last option, tap Automatic reply, and then choose what Mobile Security should send in response automatically.
To add a new reply message:
- On the main screen, tap Policy tab > Call Blocking.
- Select Call Blocking if you have not done that already.
- Tap Action, and then select Reject call + send reply.
- Tap Automatic reply.
- Tap the add icon (plus sign) at the top.
- Type the message, and then tap Save.
To edit a reply message:
- On the main screen, tap Policy tab > Call Blocking.
- Select Call Blocking if you have not done that already.
- Tap Action, and then select Reject call + send reply.
- Tap Automatic reply.
- Tap and hold the message that you want to edit, and then tap Edit.
- Edit the message, and then tap Save.
To delete a reply message:
- On the main screen, tap Policy tab > Call Blocking.
- Select Call Blocking if you have not done that already.
- Tap Action, and then select Reject call + send reply.
- Tap Automatic reply.
- Tap and hold the message that you want to delete, and then tap Delete.
- Tap OK to confirm your decision.
Call Blocking
Annoying Call Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Annoying Call Protection
Enabling Block Annoying Calls records a call as "blocked" if it came from an unknown number and the caller disconnected within three seconds.
 |
Mobile Security identifies any phone number as unknown if it does not appear in your address book, on the Blocked List, or on the Approved List. |
 |
The icon indicates Annoying Call records in the Blocked Call History. You
can add Annoying Call records to your Blocked List. Refer to Filtering Lists for more detailed instructions. |
To enable or disable Annoying Call Protection:
- On the main screen, tap Policy tab > Call Blocking.
- Select Block Annoying Calls to enable Annoying Call Protection. Clear Block Annoying Calls to stop using this feature.
Call Blocking
Call Blocking - Actions
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Text Blocking
Trend Micro Mobile Security helps you filter unwanted text messages with the following lists:
- Use the Blocked list to filter out text messages from numbers on this list and allow all others.
- Use the Approved list to allow text messages only from numbers on this list and block all others.
To configure Text Blocking:
- On the main screen, tap Policy tab > Text Blocking.
- Select Text Blocking.
- Tap Filtering Method, and then select one of the following options:
- Stop only blocked senders
- Allow only approved senders
- Tap Action, and then select one of the following options:
- Block message
- Block and delete message
- Block message and reply
If you select the last option, tap Automatic Reply, and then choose what Mobile Security should send in response automatically.
Refer to Actions for more details.
- Select Block Annoying Texts if you want to block messages received from unknown numbers, based on your defined keywords. You can define keywords by following these steps:
- Tap Filter Keywords, and then write your filtering keywords in the text field so that Mobile Security can recognize messages that annoy you. Please separate the keywords with semi-colons.
- Tap Save when finished.
Refer to Annoying Text Protection for more details.
- Tap Blocked List or Approved List, and then tap Add to add contacts or phone numbers to the list.
To disable Text Blocking:
- On the main screen, tap Policy tab > Text Blocking.
- Clear Text Blocking checkbox.
Text Blocking - Actions
Annoying Text Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Text Blocking - Actions
You can choose what Mobile Security will do in response to a blocked text message:
- Block message stops messages from reaching your inbox according to the filtering list that you selected, and saves the message in your history.
- Block and delete message stops and deletes the message according to the filtering list that you selected.
- Block message and reply stops messages according to the filtering list that you selected, saves it in your history, and automatically responds to the sender with a predefined text message.
 |
The standard text messaging data rates in your mobile service contract will apply for
any text messages sent. Contact your service provider if you have questions. |
To change the Action:
- On the main screen, tap Policy tab > Text Blocking.
- Select Text Blocking if you have not done that already.
- Tap Action, and then select one of the following options:
- Block message
- Block and delete message
- Block message and reply
If you selected this setting, tap Automatic reply, and then choose what Mobile Security should send in response automatically.
To add new reply message:
- On the main screen, tap Policy tab > Text Blocking.
- Select Text Blocking if you have not done that already.
- Tap Action, and then select Block message and reply.
- Tap Automatic Reply.
- Press the Menu button, and then tap Add.
- Type the message, and then tap Save.
To edit a reply message:
- On the main screen, tap Policy tab > Text Blocking.
- Select Text Blocking if you have not done that already.
- Tap Action, and then select Block message and reply.
- Tap Automatic Reply.
- Tap and hold the message you want to edit, and then tap Edit.
- Edit the message, and then tap Save.
To delete a reply message:
- On the main screen, tap Policy tab > Text Blocking.
- Select Text Blocking if you have not done that already.
- Tap Action, and then select Block message and reply.
- Tap Automatic reply.
- Tap and hold the message you want to delete, and then tap Delete.
- Tap OK to confirm your decision.
Text Blocking
Annoying Text Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Annoying Text Protection
Enabling Block Annoying Texts blocks text messages from unknown numbers based on keywords that you have selected.
 |
Mobile Security identifies any phone number as unknown if it does not appear in your address book, on the Blocked List, or on the Approved List. |
 |
The icon indicates Annoying Text records in the Blocked Text History. You can add Annoying Text records to your Blocked List. Refer to Filtering Lists for detailed instructions. |
To enable Annoying Text Protection:
- On the main screen, tap Policy tab > Text Blocking.
- Select Block Annoying Texts.
- Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Please separate the keywords with semi-colons.
- Tap Save.
To add keywords for message filtering:
- On the main screen, tap Policy tab > Text Blocking.
- Select Block Annoying Texts if you have not done that already.
- Tap Filter Keywords, and then type
new filtering keywords in the text field so that Mobile Security can
identify messages that annoy you. Please separate the keywords with
semi-colons.
- Tap Save.
To disable Annoying Text Protection:
- On the main screen, tap Policy tab > Text Blocking.
- Clear Block Annoying Texts checkbox.
Text Blocking
Text Blocking - Actions
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top
Call and Text Filtering Lists
Trend Micro Mobile Security includes the following two types of filtering lists:
- The Blocked List stores phone numbers that
Mobile Security will block. If enabled, Mobile Security only stops
incoming calls or text messages from phone numbers on this list. Nobody
else will be blocked.
- The Approved List stores phone numbers that Mobile Security will never block. If enabled,
Mobile Security only allows incoming calls and text messages from phone
numbers on this list. Everyone else will be blocked.
 |
Uninstalling Mobile Security will permanently remove your Blocked List and Approved List. |
To import contacts into your filtering list:
- On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
- Tap the menu icon (three vertical dots) at the top, tap Add, and then tap one of the following options:
- Add from system contacts
- Add from call history
- Add from message records
- Add from Annoying records
- You can now select and add contacts or add all of the contacts in the list:
- To add only the selected contacts, select contacts that you want to import, tap the menu icon (three vertical dots) at the top, and then tap Import.
- To add all of the contacts, tap the menu icon (three vertical dots) at the top, and then tap Import all.
To add a phone number to your filtering list:
- On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
- Tap the menu icon (three vertical dots) at the top, tap Add, and then tap Add phone number.
- Type the name and phone number of the contact.
- Tap Save.
To edit a contact in your filtering list:
- On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
- Tap and hold the contact that you want to edit, then tap Edit Contact on the list that appears and make changes.
- Tap Save when finished.
To delete contacts from your filtering list:
- On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
- You can either delete one contact, several contacts, or all of your contacts:
- To delete one contact:
- Tap and hold that contact, then tap Delete Contact on the list that appears.
- Tap OK to confirm your decision.
- To delete more than one contact:
- Tap the menu icon (three vertical dots) at the top, and then tap Remove.
- Select the contacts that you want to delete.
- Tap the menu icon (three vertical dots) at the top, and then tap Remove.
- Tap OK to confirm your decision.
- To delete all of your contacts:
- Tap the menu icon (three vertical dots) at the top, and then tap Remove all.
- Tap OK to confirm your decision.
Call Blocking
Text Blocking
History
Default Protection Policies
Back to Top
History
Mobile Security maintains records of the following events that occur while it is running:
- Malware Scan History automatically keeps records of previous malware scans.
- Privacy Scan History automatically keeps records of previous privacy risk scans.
- Web Blocking History adds a record upon detecting a suspicious or risky website.
- Call Blocking History updates with a new record every time it blocks a call.
- Text Blocking History updates with a new record every time it blocks a text message.
- Update History maintains records of updates performed.
To view history records:
- On the main screen, tap the menu icon (three vertical dots) at the top and then tap History.
- Tap the type of record, and then tap the record you want to view.
To delete history records:
- On the main screen, tap the menu icon (three vertical dots) at the top and then tap History.
- Tap the menu icon (three vertical dots) at the top, and then tap Remove all.
Back to Top
Uninstalling Mobile Security
To uninstall Mobile Security:
- On the Mobile Security main screen, press the Menu button, and then tap Uninstall.
- If required, type your security password, and then tap OK.
 |
If you do not have the security password, please contact your network administrator for it. |
- On the confirmation screen, tap OK.
Troubleshooting
Frequently Asked Questions (FAQ)
Technical Support
Back to Top
Troubleshooting
This section explains what you can do if issues arise when installing, configuring, or using Mobile Security.
- The mobile device runs out of power during the installation of Mobile Security.
Recharge the mobile device and then restart the installation process.
- Mobile Security performs actions slowly.
Check the storage space available and try removing unnecessary files and applications.
- I cannot receive text messages after installing Mobile Security.
If you have enabled the Approved List but added nothing to that list, then Mobile Security will move all incoming messages to the Blocked Message Logs. Check those logs and consider adjusting your Message Filtering configuration.
- After successfully installing Mobile Security, it did not detect a security risk.
Ask your network administrator if your Mobile Security license has expired.
- Mobile Security cannot receive updates.
Verify the following:
- Check if Mobile Security was registered successfully.
- Make sure that your mobile device can connect with the Internet or Intranet.
- Contact your network administrator to see if your server has been configured properly for access.
Frequently Asked Questions (FAQ)
Technical Support
Back to Top
Frequently Asked Questions (FAQ)
- Can I install Mobile Security on a storage card?
No, you can only install Mobile Security on your mobile device’s internal memory.
- Certain features seem to be disabled in this version. Why?
Your administrator might have disabled the availability of certain features. Contact your administrator before contacting support.
- Can I download the updates to a storage card even though Mobile Security is installed directly on the device?
No, you must download and install updates in the same place where you installed Mobile Security.
- How often should I update Mobile Security?
Trend Micro recommends updating Mobile Security weekly. Your network administrator may have already set up scheduled updates on your mobile device.
- Can I receive or make a call while Mobile Security is performing a scan?
Yes. Mobile Security can scan in the background while you do other things with your mobile device. You can view the logs to see details on scans and any detected malware and security risks.
- How does Mobile Security match callers and message senders with the filtering lists?
Mobile Security can match partial numbers or names with items on the filtering lists. If the caller or sender's number has more than seven digits, for example, Mobile Security will check the last seven of them against the lists. If the caller or sender's number contains less than seven digits, the entire number is compared to the lists.
Troubleshooting
Technical Support
Back to Top
Technical Support
Trend Micro has sales and corporate offices located in many cities around the globe. For global contact information, visit the Trend Micro Web site at:
http://www.trendmicro.com/en/about/contact/overview.htm
 |
The information on this Web site is subject to change without notice. |
Contacting Technical Support
You can contact Trend Micro by fax, phone, and email, or visit us at:
http://www.trendmicro.com
Speeding Up Support Calls
When you contact Trend Micro Technical Support, to speed up your problem resolution, ensure that you have the following details available:
- Network type
- Amount of memory and free space on your mobile device
- Exact text of any error messages
- Steps to reproduce the problem
Troubleshooting
Frequently Asked Questions (FAQ)
Back to Top
About Trend Micro
Trend Micro, Inc. provides protection against viruses, spyware and spam, as well as content-filtering security software and services. Trend Micro helps customers worldwide sop malicious code from harming their computers and mobile devices.
Back to Top