Trend Micro� Mobile Security� for Enterprise Help

Contents

Introduction
Protecting Your Mobile Device
Product License
Enrolling Mobile Device to Server
Proxy Settings
Mobile Security Interface
Reviewing the Default Protection Policies
Enterprise Applications
Malware Scan
Mobile Security Components Update
Privacy Scan
Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
Handling Privacy Risks
Web Security
Web Security - Filtering Lists
Web Security - Blocked Websites
Call Blocking
Call Blocking - Actions
Annoying Call Protection
Text Blocking
Text Blocking - Actions
Annoying Text Protection
Call and Text Filtering Lists
History
Uninstalling Mobile Security
Troubleshooting
Frequently Asked Questions (FAQ)
Technical Support
About Trend Micro

Copyright � 2010-2013 Trend Micro Incorporated. All rights reserved.


Introduction

Trend Micro Mobile Security defends against the latest threats to mobile devices and helps protect your privacy.

Mobile Security offers the following features:

Note

Trend Micro recommends removing other apps that provide similar features before using Mobile Security.

Back to Top
About Trend Micro


Protecting Your Mobile Device

Trend Micro recommends the following safe practices when using your mobile device:

Back to Top


Product License

You can use Mobile Security with an evaluation license for thirty days before registering it. If the evaluation license expires before you register Mobile Security, or if the registered version of Mobile Security expires, all of the features will be disabled.

Enrolling Mobile Device to Server
Back to Top


Enrolling Mobile Device to Server

Note

You need an Internet connection to enroll your mobile device to the Mobile Security server.

You can enroll your mobile device using one of the following methods:

To manually enroll your mobile device using QR-code:

  1. Tap Enroll Using QR code.
  2. Open the invitation email on a computer or another mobile device and scan the QR code received in the invitation email using the mobile device camera.
  3. If required, type the username and password in the fields provided, and tap OK.
    Your mobile device will be enrolled with the Mobile Security server.

To manually enroll your mobile device using server address:

  1. Tap Enroll Manually.
  2. Tap the Local Server tab, type the server address and port number in the relevant fields and then tap Next.
  3. Type the Enrollment Key or the username and password in the relevant fields and tap Next.
    Your mobile device will be enrolled with the Mobile Security server.

To manually enroll your mobile device without using server address:

  1. Tap Enroll Manually.
  2. Tap the Cloud Server tab, type the Enrollment Key you have received in the invitation email, and then tap Next.
    Your mobile device will be enrolled with the Mobile Security server.

Product License
Proxy Settings
Back to Top


Proxy Settings

You can use proxy for accessing Mobile Security server on your mobile device.

To configure proxy for Mobile Security:

  1. On the main screen, tap the menu button on the top-right of your screen (three vertical dots), and then tap Proxy.
  2. Type the proxy host name or IP address, port, username and password in their relevant fields.
  3. Note

    You may not need the username and password for the proxy settings, depending on the requirement set by your network administrator.

  4. Tap Save.

Product License
Enrolling Mobile Device to Server
Back to Top


Mobile Security Interface

The main interface of Mobile Security displays the following tabs:

The main interface also has the Menu button (three vertical dots) at the top right of the screen. The items on the menu are as follows:

Reviewing the Default Protection Policies
Malware Scan
Mobile Security Components Update
Privacy Scan
Web Security
Call Blocking
Text Blocking
History
Back to Top


Reviewing the Default Protection Policies

After installing Mobile Security, you might want to review the default protection policies shown in the following table to decide if you want to modify them.

To see the default protection policies, tap the Policy tab on the main interface.

Feature
Default Policy
Resulting Action
Real-time Malware Scan
Enabled
Checks for security threats in installed apps
Real-time Privacy Scan
Enabled
Checks for the apps that potentially steal your private information
Web Security
Enabled
Blocks unsafe Internet browsing
Call Blocking
Enabled
All telephone calls are allowed to reach your inbox without filtering (feel free to adjust this setting)
Text Blocking
Enabled
All text messages are allowed to reach your inbox without filtering (feel free to adjust this setting)
Password Security
Enabled
Sets the screen lock for device
Feature Lock
Enabled
Lets the administrator control device features
Application Control
Disabled
Lets the administrator control applications installed on the device

Note

The Mobile Security server may control the call and text blocking features on your mobile device.

Malware Scan
Mobile Security Components Update
Privacy Scan
Web Security
Call Blocking
Text Blocking
Back to Top


Enterprise Applications

The Apps tab displays the list of enterprise applications for your mobile device. These applications are divided into two categories:

To install the enterprise applications:

  1. On the main screen, tap Apps tab > App Store.
  2. Tap Install for the application that you want to install.
Note

You can also search for any app by typing its name in the search field in the app store.

Default Protection Policies
Back to Top


Malware Scan

Mobile Security can check for malicious apps on your mobile device in two ways:

If you enable Scan from Cloud, Mobile Security will connect to Trend Micro through the Internet to scan your apps for new threats as they arise.

If the malware scan finds any security threats, Mobile Security will record it in Malware Scan History.

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To run a Scan On Demand:

To enable Real-time Scan:

  1. On the main screen, tap Security tab > Malware Scan.
  2. Tap the menu icon (three vertical dots) at the top and then select Real-time Scan.

To enable SD Card Scan:

  1. On the main screen, tap Security tab > Malware Scan.
  2. Tap the menu icon (three vertical dots) at the top and then select SD Card Scan.
  3. Tap File type, and then select one of the following:

To disable SD Card Scan:

  1. On the main screen, tap Security tab > Malware Scan.
  2. Tap the menu icon (three vertical dots) at the top and then clear SD Card Scan checkbox.

To enable or disable Scan from Cloud:

  1. On the main screen, tap Security tab > Malware Scan.
  2. Tap the menu icon (three vertical dots) at the top and then select Scan from Cloud to enable this feature. Clear this setting if you want to stop using this feature.

Mobile Security Components Update
History
Default Protection Policies
Back to Top


Mobile Security Components Update

To stay protected against the latest security threats, please update the Mobile Security components after installation and keep updating them from time to time.

You can update Mobile Security components in two ways:

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To update Mobile Security components on demand:

  1. Ensure that the network connection is available, and your mobile device is enrolled to the Mobile Security server.
  2. On the main screen, tap the update icon at the bottom of the screen to start the update. Tap Cancel if you need to stop the update before it has finished.
Note

If Mobile Security does not run the automatic scan after the update, Trend Micro strongly recommends performing a manual scan immediately after every update.

To enable automatic updates:

  1. Ensure that the network connection is available, and your mobile device is enrolled to the Mobile Security server.
  2. On the main screen, tap Security tab > Malware Scan.
  3. Tap the Menu icon (three vertical dots) at the top and then select Automatic Updates.
  4. Select Auto Update Using Wi-Fi Only if you do not want to use mobile network for auto updates.
  5. Tap Scheduled Update, and then select how often Mobile Security should check for updates, based on the last time you checked for one.
Note

This update will run only if your mobile device is connected to the Internet.

To enable automatic scan after successful updates:

  1. On the main screen, tap Security tab > Malware Scan.
  2. Tap the Menu icon (three vertical dots) at the top and then select Automatic Scan.

Malware Scan
History
Default Protection Policies
Back to Top


Privacy Scan

The Privacy Scan checks apps to determine if they might secretly attempt to steal private information. It connects to Trend Micro through the Internet to get the very latest information about new apps identified as privacy risks.

Whenever you download another app, the Privacy Scan assigns it a risk rating according to what kind of and how much information it can collect, then warns you about ones that might pose a privacy risk. If you add apps to the Trusted Apps list, then future scans will ignore them.

Mobile Security can check for privacy risks on your mobile device in two ways:

If the privacy scan finds any security threats, Mobile Security will record it in Privacy Scan History.

Note

Your mobile device must connect to the Internet to run a privacy scan.

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To run a Scan On Demand:

To enable or disable Real-time Scan:

  1. On the main screen, tap Security tab > Privacy Scan.
  2. Tap the menu icon (three vertical dots) at the top and then tap Settings.
  3. Select Privacy Real-Time Scan to enable this feature. Clear this setting if you want to stop using this feature.

To enable or disable SD Card Scan:

  1. On the main screen, tap Security tab > Privacy Scan.
  2. Tap the menu icon (three vertical dots) at the top and then tap Settings.
  3. Select SD Card Scan to enable this feature. Clear this setting if you want to stop using this feature.
    When enabled, Mobile Security will scan all files on the memory card in your device during data theft scans.

Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
Handling Privacy Risks
History
Default Protection Policies
Back to Top


Privacy Scan - Trusted Apps List

You can add apps to the Trusted Apps list that Mobile Security will ignore while scanning apps for privacy risks.

Note

Mobile Security will NOT scan any apps on the Trusted Apps list, so take care when using this feature.

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To add apps to the Trusted Apps List:

  1. On the main screen, tap Security tab > Privacy Scan.
  2. Tap the menu icon (three vertical dots) at the top and then tap Trusted Apps.
  3. Tap the menu icon (three vertical dots) at the top and then tap Add, and then tap one of the following options:
  4. Select the apps that you want to add, and then tap the + sign at the top.

To remove apps from the Trusted Apps List:

  1. On the main screen, tap Security tab > Privacy Scan.
  2. Tap the menu icon (three vertical dots) at the top and then tap Trusted Apps.
  3. Tap the menu icon (three vertical dots) at the top and then tap Remove.
  4. Select the apps that you want to remove, and then tap the delete icon (trash can) at the top.

Privacy Scan
Understanding Privacy Scan Results
Handling Privacy Risks
History
Default Protection Policies
Back to Top


Understanding Privacy Scan Results

After a privacy scan, you can see what personal information an app may try to collect from your mobile device. Keep in mind that apps may secretly gather information for a legitimate purpose.

For example, a backup app might make copies of your photos on the Internet, and that behavior could trigger an alert. However, most risky apps try to gather information that they should not access. A weather app has no good reason to make copies of your photos, for instance.

Trend Micro Mobile Security can help you see if an app has legitimately collected information, and then you can decide if you want to keep the app. Mobile Security assigns a severity rating to each app:

Privacy Scan
Privacy Scan - Trusted Apps List
Handling Privacy Risks
History
Default Protection Policies
Back to Top


Handling Privacy Risks

If you close the results screen without deleting any suspicious files or applications, they will stay on your mobile device and may damage other files or cause performance problems.

To remove infected or suspicious applications or files:

Privacy Scan
Privacy Scan - Trusted Apps List
Understanding Privacy Scan Results
History
Default Protection Policies
Back to Top


Web Security

Mobile Security can block unsafe websites based on the level of protection that you choose:

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To enable or adjust Web Security:

  1. On the main screen, tap Policy tab >Web Security.
  2. Select Safe Surfing if you have not done that already.
  3. Select a Protection Level:

To disable Web Security:

  1. On the main screen, tap Policy tab >Web Security.
  2. Clear Safe Surfing checkbox.

Web Security - Filtering Lists
Web Security - Blocked Websites
History
Default Protection Policies
Back to Top


Web Security - Filtering Lists

Trend Micro Mobile Security helps you filter unwanted websites with the following lists:

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To add a website to the filtering list:

  1. On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
  2. Tap the menu icon (three vertical dots) at the top and then tap Add.
  3. Type the name and address of the website and then tap Save.

To edit a website on the filtering list:

  1. On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
  2. Tap and hold the name of the website that you want to edit, and then tap Edit on the menu that appears.
  3. Edit the name and address of the website and then tap Save.

To delete websites from the filtering list:

  1. On the main screen, tap Policy tab > Web Security > Approved List or Blocked List.
  2. You can either select and delete a single website, or delete all of the websites:

Web Security
Web Security - Blocked Websites
History
Default Protection Policies
Back to Top


Web Security - Blocked Websites

Mobile Security displays a warning whenever it detects a suspicious site. The screen will show the following
information:

Note

When you try to visit a blocked site, the Web Security blocking screen will appear, showing the address of the blocked site, as well as its type and risk level. The attempt is recorded in the Blocked History.

If you think a page has been misclassified, please contact Trend Micro by clicking the Notify Trend Micro link on the blocking page.

Web Security
Web Security - Filtering Lists
History
Default Protection Policies
Back to Top


Call Blocking

Mobile Security helps you filter unwanted calls with the following lists:

Note

You may not be able to change Mobile Security settings if they are controlled by the server.

To configure Call Blocking:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Call Blocking.
  3. Tap Filtering Method, and then select one of the following options:
  4. Tap Action, and then select one of the following options: Refer to Actions for more details.
  5. Select Block Annoying Calls to filter calls from an unknown numbers if the caller disconnects within three seconds. Refer to Annoying Call Protection for more details.
  6. Tap Blocked List or Approved List, then tap the menu icon (three vertical dots) at the top and then tap Add to add contacts or phone numbers to the list. Refer to Call and Text Filtering Lists for more details.

To disable Call Blocking:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Clear Call Blocking checkbox.

Call Blocking - Actions
Annoying Call Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Call Blocking - Actions

You can choose what Mobile Security will do in response to a blocked call:

Note

If Mobile Security rejects a call, the caller will not reach your voice mail.

Note

The standard text messaging data rates in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions.

To change the Action:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Call Blocking if you have not done that already.
  3. Tap Action, and then select one of the following options:

To add a new reply message:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Call Blocking if you have not done that already.
  3. Tap Action, and then select Reject call + send reply.
  4. Tap Automatic reply.
  5. Tap the add icon (plus sign) at the top.
  6. Type the message, and then tap Save.

To edit a reply message:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Call Blocking if you have not done that already.
  3. Tap Action, and then select Reject call + send reply.
  4. Tap Automatic reply.
  5. Tap and hold the message that you want to edit, and then tap Edit.
  6. Edit the message, and then tap Save.

To delete a reply message:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Call Blocking if you have not done that already.
  3. Tap Action, and then select Reject call + send reply.
  4. Tap Automatic reply.
  5. Tap and hold the message that you want to delete, and then tap Delete.
  6. Tap OK to confirm your decision.

Call Blocking
Annoying Call Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Annoying Call Protection

Enabling Block Annoying Calls records a call as "blocked" if it came from an unknown number and the caller disconnected within three seconds.

Note

Mobile Security identifies any phone number as unknown if it does not appear in your address book, on the Blocked List, or on the Approved List.

Note

The Annoying Call Icon icon indicates Annoying Call records in the Blocked Call History. You can add Annoying Call records to your Blocked List. Refer to Filtering Lists for more detailed instructions.

To enable or disable Annoying Call Protection:

  1. On the main screen, tap Policy tab > Call Blocking.
  2. Select Block Annoying Calls to enable Annoying Call Protection. Clear Block Annoying Calls to stop using this feature.

Call Blocking
Call Blocking - Actions
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Text Blocking

Trend Micro Mobile Security helps you filter unwanted text messages with the following lists:

To configure Text Blocking:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Text Blocking.
  3. Tap Filtering Method, and then select one of the following options:
  4. Tap Action, and then select one of the following options: Refer to Actions for more details.
  5. Select Block Annoying Texts if you want to block messages received from unknown numbers, based on your defined keywords. You can define keywords by following these steps:
    1. Tap Filter Keywords, and then write your filtering keywords in the text field so that Mobile Security can recognize messages that annoy you. Please separate the keywords with semi-colons.
    2. Tap Save when finished.
  6. Refer to Annoying Text Protection for more details.
  7. Tap Blocked List or Approved List, and then tap Add to add contacts or phone numbers to the list.

To disable Text Blocking:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Clear Text Blocking checkbox.

Text Blocking - Actions
Annoying Text Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Text Blocking - Actions

You can choose what Mobile Security will do in response to a blocked text message:

Note

The standard text messaging data rates in your mobile service contract will apply for any text messages sent. Contact your service provider if you have questions.

To change the Action:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Text Blocking if you have not done that already.
  3. Tap Action, and then select one of the following options:

To add new reply message:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Text Blocking if you have not done that already.
  3. Tap Action, and then select Block message and reply.
  4. Tap Automatic Reply.
  5. Press the Menu button, and then tap Add.
  6. Type the message, and then tap Save.

To edit a reply message:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Text Blocking if you have not done that already.
  3. Tap Action, and then select Block message and reply.
  4. Tap Automatic Reply.
  5. Tap and hold the message you want to edit, and then tap Edit.
  6. Edit the message, and then tap Save.

To delete a reply message:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Text Blocking if you have not done that already.
  3. Tap Action, and then select Block message and reply.
  4. Tap Automatic reply.
  5. Tap and hold the message you want to delete, and then tap Delete.
  6. Tap OK to confirm your decision.

Text Blocking
Annoying Text Protection
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Annoying Text Protection

Enabling Block Annoying Texts blocks text messages from unknown numbers based on keywords that you have selected.

Note

Mobile Security identifies any phone number as unknown if it does not appear in your address book, on the Blocked List, or on the Approved List.

Note

The Annoying Message Icon icon indicates Annoying Text records in the Blocked Text History. You can add Annoying Text records to your Blocked List. Refer to Filtering Lists for detailed instructions.

To enable Annoying Text Protection:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Block Annoying Texts.
  3. Tap Filter Keywords, and then type your filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Please separate the keywords with semi-colons.
  4. Tap Save.

To add keywords for message filtering:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Select Block Annoying Texts if you have not done that already.
  3. Tap Filter Keywords, and then type new filtering keywords in the text field so that Mobile Security can identify messages that annoy you. Please separate the keywords with semi-colons.
  4. Tap Save.

To disable Annoying Text Protection:

  1. On the main screen, tap Policy tab > Text Blocking.
  2. Clear Block Annoying Texts checkbox.

Text Blocking
Text Blocking - Actions
Call and Text Filtering Lists
History
Default Protection Policies
Back to Top


Call and Text Filtering Lists

Trend Micro Mobile Security includes the following two types of filtering lists:

Note

Uninstalling Mobile Security will permanently remove your Blocked List and Approved List.

To import contacts into your filtering list:

  1. On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
  2. Tap the menu icon (three vertical dots) at the top, tap Add, and then tap one of the following options:
  3. You can now select and add contacts or add all of the contacts in the list:

To add a phone number to your filtering list:

  1. On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
  2. Tap the menu icon (three vertical dots) at the top, tap Add, and then tap Add phone number.
  3. Type the name and phone number of the contact.
  4. Tap Save.

To edit a contact in your filtering list:

  1. On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
  2. Tap and hold the contact that you want to edit, then tap Edit Contact on the list that appears and make changes.
  3. Tap Save when finished.

To delete contacts from your filtering list:

  1. On the main screen, tap Policy tab > Call Blocking or Text Blocking > Blocked List or Approved List.
  2. You can either delete one contact, several contacts, or all of your contacts:

Call Blocking
Text Blocking
History
Default Protection Policies
Back to Top


History

Mobile Security maintains records of the following events that occur while it is running:

To view history records:

  1. On the main screen, tap the menu icon (three vertical dots) at the top and then tap History.
  2. Tap the type of record, and then tap the record you want to view.

To delete history records:

  1. On the main screen, tap the menu icon (three vertical dots) at the top and then tap History.
  2. Tap the menu icon (three vertical dots) at the top, and then tap Remove all.

Back to Top


Uninstalling Mobile Security

To uninstall Mobile Security:

  1. On the Mobile Security main screen, press the Menu button, and then tap Uninstall.
  2. If required, type your security password, and then tap OK.
  3. Note

    If you do not have the security password, please contact your network administrator for it.

  4. On the confirmation screen, tap OK.

Troubleshooting
Frequently Asked Questions (FAQ)
Technical Support
Back to Top


Troubleshooting

This section explains what you can do if issues arise when installing, configuring, or using Mobile Security.

Frequently Asked Questions (FAQ)
Technical Support
Back to Top


Frequently Asked Questions (FAQ)

Troubleshooting
Technical Support
Back to Top


Technical Support

Trend Micro has sales and corporate offices located in many cities around the globe. For global contact information, visit the Trend Micro Web site at:

http://www.trendmicro.com/en/about/contact/overview.htm

Note

The information on this Web site is subject to change without notice.

Contacting Technical Support

You can contact Trend Micro by fax, phone, and email, or visit us at:

http://www.trendmicro.com

Speeding Up Support Calls

When you contact Trend Micro Technical Support, to speed up your problem resolution, ensure that you have the following details available:

Troubleshooting
Frequently Asked Questions (FAQ)
Back to Top


About Trend Micro

Trend Micro, Inc. provides protection against viruses, spyware and spam, as well as content-filtering security software and services. Trend Micro helps customers worldwide sop malicious code from harming their computers and mobile devices.

Back to Top