trustport mobile security · 2015. 5. 26. · 5 antivirus..... 17 5.1 resident shield ... trustport...
TRANSCRIPT
TrustPort Mobile Security
User Guide
Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC,
Samsung, Sony etc.
Revision date: 2014/10/06
Copyright © 2014, TrustPort, a.s., All rights reserved.
2
Content
CONTENT ............................................................................................................... 2
1 ABOUT .............................................................................................................. 4
1.1 PRODUCT OVERVIEW AND KEY FEATURES ..................................................................... 4
1.2 MINIMUM SYSTEM REQUIREMENTS ........................................................................... 4
1.3 SUPPORTED LANGUAGES ....................................................................................... 4
2 INSTALLATION AND UNINSTALLATION OF TRUSTPORT MOBILE SECURITY .......... 5
2.1 HOW TO INSTALL THE APK FILES MANUALLY ON YOUR ANDROID DEVICE .................................. 5
2.2 INSTALLATION FROM GOOGLE PLAY STORE .................................................................. 8
2.3 UNINSTALLATION OF TRUSTPORT MOBILE SECURITY ....................................................... 8
3 USER INTERFACE AND BASIC SETTINGS ............................................................. 9
3.1 RUNNING INTERFACE .......................................................................................... 9
3.2 SETUP WIZARD ................................................................................................. 9
3.3 REGISTRATION AND LICENSING ..............................................................................11
3.4 PREMIUM VERSION ............................................................................................12
3.5 PASSWORD PROTECTION OF MOBILE SECURITY ............................................................13
4 TRUSTPORT WEB CONTROL .............................................................................. 14
4.1 ACCESSING WEB CONTROL ACCOUNT .......................................................................14
4.2 DASHBOARD ...................................................................................................14
4.3 REMOTE COMMAND ...........................................................................................15
5 ANTIVIRUS...................................................................................................... 17
5.1 RESIDENT SHIELD.............................................................................................17
5.2 ON–DEMAND SCANNING ......................................................................................17
5.3 UPDATING OF VIRUS DATABASE ..............................................................................18
6 WEB SHIELD.................................................................................................... 19
6.1 USING THE SAFE BROWSER ..................................................................................19
3
7 APPLICATION MANAGER .................................................................................. 19
7.1 USING THE APPLICATION MANAGER .........................................................................19
8 DATA BACKUP ................................................................................................. 21
8.1 USING DATA BACKUP .........................................................................................21
9 PHONE CALL AND SMS FILTER .......................................................................... 23
9.1 USING PHONE CALL AND SMS FILTER ......................................................................23
10 TESTING OF TRUSTPORT MOBILE SECURITY .................................................. 24
11 ANTI-THEFT FUNCTIONS............................................................................... 25
11.1 GEOLOCATION .................................................................................................25
11.1.1 Prepare the Mobile Phone for Geolocation ...................................................25
11.1.2 Allow Location service and GPS satellites ....................................................25
11.1.3 Sending remote command for Geolocation ..................................................26
11.2 REMOTE LOCK OF THE PHONE ................................................................................28
11.2.1 Sending remote lock command .................................................................28
11.2.2 Sending remote lock and scream command .................................................30
11.2.3 Change of Lock screen message ................................................................30
11.3 REMOTE WIPE OF THE PHONE ................................................................................31
11.3.1 Sending remote wipe command ................................................................31
12 APPLICATION BLOCKING AND PARENTAL CONTROL ...................................... 32
12.1 ENABLING APPLICATION BLOCKING AND PARENTAL CONTROL .............................................32
13 ALERT ON SIM CHANGE ................................................................................ 37
13.1 ENABLING ALERT ON SIM CHANGE ..........................................................................37
14 GEOFENCING ................................................................................................ 38
14.1 ENABLING GEOFENCING ......................................................................................38
15 TECHNICAL SUPPORT ................................................................................... 41
4
1 About
1.1 Product overview and key features
TrustPort Mobile Security offers you not only the function of scanning your phone on demand, but it also
offers a resident shield – on access scanning, as main protection against malware. The application enables
you to surf the web safely, because it scans the URL addresses that you visit, and it blocks websites which
contain malicious codes. If you happen to lose your mobile, TrustPort application will find it for you, because
you will receive an SMS with the specific coordinates of the location of where your mobile phone is currently located. In the same way you can even remotely delete all your data on the lost device and restore your
phone to “factory default” settings. Your contacts are always secure, because a backup function is offered.
You can also easily create your own blacklist and whitelist for the blocking of outgoing and incoming calls and
SMS’s. The application enables you to define so-called forbidden dialing codes. This function is especially connected with premium rate SMS’s or with expensive phone lines.
• Antivirus and Anti-Malware protection based on TrustPort’s engine
• Resident shield – on-access scanning
• Application manager
• Contacts backup on memory card
• Geolocation – a useful tool for the loss of a mobile phone
• Steal Protection – a useful tool for remote wiping of your data
• Blocking of outgoing and incoming calls and SMS’s (blacklist/ whitelist)
• Safe web surfing – blocking of infected and phishing webpages
• Blocking of defined dialing codes (premium rate SMS’s or expensive phone lines)
1.2 Minimum System Requirements
The TrustPort Antivirus requires at least the following software configuration:
Android 2.2 version or higher.
At least 20 megabytes (MB) of free space.
At least 128 megabytes (MB) of RAM
1.3 Supported languages
English
Russian
5
2 Installation and uninstallation of TrustPort Mobile Security
2.1 How to install the APK files manually on your android device
You can install Mobile security from APK (Android application package) file downloaded from TrustPort site
http://www.trustport.com/download/file/TrustPort_Mobile_Security.apk or from installation media or web
sites of TrustPort partners. (CD may contain Older Versions of Software - latest version is always available at TrustPort website).
Things you’ll need:
• USB cable for your Android device (or a connection between your computer system and the Android device,
which can be connected either through Bluetooth or Wi-Fi)
• The application APK you need to install
• A file manager app installed on your Android device (Total Commander, Astro File Manager, File Expert etc.)
Steps:
• Install the required USB/Bluetooth or Wi-Fi drivers you need to connect your Android device to the
computer. You probably have it already installed if you ever connect your PC with your phone. If not for most
devices the driver will be installed automatically after you connect your device into your PC. In task bar of PC
you will see similar information like in picture.
• Download the APK of the app you need to install on your Android device and transfer the APK file to your
Android device. You can just copy the file mobilesecurity.apk from your CD or the downloaded one to your SD
card. You can use any file manager you have or use Windows explorer. Your storage will be probably already
shown in “My Computer”. Copy the file like you copy music, pictures etc. It does not matter what is location
of the installation file at your SD card. (You can also use section http://www.trustport.com/en/download and
download the APK of TrustPort Mobile Security file directly to your SD card using your Android device).
6
• On your Android device, go to Settings>Applications>Check the box Unknown sources. Location can be
different on each device for example Settings>Security. If this option will not be checked on, your device
asks for permission during the installation anyway. There will be displayed warning about vulnerability of the
device – just choose OK. It is recommended to switch this option off after successful installation.
• Disconnect your device from the computer system
• Use the file manager to explore the APK file on your device
• Tap on the APK to open it and choose “Install” the APK – for “Complete action using” choose “Package
installer” (Just once). If you did not check the box “Unknown sources” in one of the previous step choose
“Setting” and allow it – in this case you need to start installation from this point again.
7
8
• Follow the installation wizard and finish installation of the application.
2.2 Installation from Google Play store
You can find Mobile Security application also at Google Play store https://play.google.com/store just use
search tab and find TrustPort or use directly this link:
https://play.google.com/store/apps/details?id=com.trustport.mobilesecurity
The version from Google play store may not be compatible with the activation codes!
2.3 Uninstallation of TrustPort Mobile Security
You can uninstall TrustPort Mobile Security from application manager (Settings of phone - Apps) like any
other application just find Mobile Security and in App info choose option „Uninstall“. Remember that in
settings of mobile security you can disable this action so there can be needed to allow uninstallation in settings – Protect from uninstallation option.
9
3 User Interface and basic settings
3.1 Running Interface
It can be launched easily by taping on the shortcut at home screen or from the list of application. Just find
the green Mobile Security icon.
3.2 Setup Wizard
In case you start Mobile Security for the first time the Setup Wizard is automatically started. You can
also skip the wizard and run it anytime later under application settings option Settings > Wizard.
Remember that all settings can be change anytime later under application settings option Settings.
At first page choose your registration method – probably you have activation code so fill it and choose
next. As second option you can use already created Web Control account if you have one. Or you can
run Mobile Security in trial version.
At next page choose your password – this password can be used for protection of application itself,
and also for remote commands like geo-location, remote wipe and lock of mobile phone (later you can change password if you want - see 3.5 Setting of Password for Mobile Security). If you choose “Protect
from uninstallation” option for Mobile Security application it need special permission “Device
administrator” in this case choose activate at ask page.
At next page you can enable Web Control function it allows you to control your mobile device directly
from anywhere – using your own account at our website. Please fill your email correctly – the
password must have at least 6 characters and from security reason should be different than the one
used for remote commands. The filling of your phone number of your device is necessary if you want to use remote commands from the web account – remember to save phone number in internacional
10
format of phone number (with international prefix like 420 for Czech Republic, 91 for India, 44 for Great Britain…. For details see chapter 3.6 Mobile Security Web Control
At last page you can choose which features should be enabled in your mobile phone – some of them need special permission “Device administrator” in this case choose activate at ask page.
11
3.3 Registration and Licensing
You can register the product (if you did not do that in wizard during isntallation) under Application
settings > Product license. (If there is missing Product license tab you have probably installed the
version from Google Play store, so please install the one described described in part 2.1 Step by step guide on how to install the APK files manually on your Android device).
Please fill in your activation code in app Settings>Product license in format TP-NZYX-MTGT-MZTJ-TTJH-XXXXXXXX and your email address. Store this information for case of lost your activation code. All
other items like Company and State are optional. After it use green “Check” mark at top-right corner of
the screen. It will be followed by note about successful registration. After it you have available all
premium functions see 3.4 Pemium functions. Note that during registration process your device must be
connected to the Internet.
You can anytime later check the validity of your license at main page of Mobile Security.
12
3.4 Premium version
After first installation of TrustPort Mobile Security all users have activated Premium versions. After demo-period expiration there is need to use Activation code to activate Premium version (or buy
product using Google play – only for versions installed from Google play store!). In other case
premium functions are disabled. Premium functions are for example:
Scan applications
Scan external storages
Scan whole cell phone (Scan applications + Scan external storages)
At main screen of the application you can check if your version is Premium one – and in case of demo period using how many days of premium functionality left. In case of expired version/license there will
appear note about it.
13
3.5 Password protection of Mobile Security
You can set the program password under application settings option Settings > Set a new password.
This password will be required to access the program menu if you check option “Protect whole
application”. Password is also used for authorization for Geo-location and all anti-theft functions like
Remote Wipe. (Password can be changed any time later using option “Change or delete password”).
14
4 TrustPort Web Control By using Web Control account you can have your mobile under control from any other PC or mobile device. See overview of your mobile phones and even send remote command for example if you need to
locate your device.
4.1 Accessing Web Control account
If you create account for Web control in chapter 3.2 Setup Wizard you can log with your email and password at https://mobile.trustport.com/login.php
4.2 Dashboard
Here you can see overview of your mobile devices with most important informations. At left side there is
your profile setting:
Email notification: enable sending email notification for registration confirmation and remote
commands. At your email will be sent a copy with results of remote commands e.g. location of your
mobile or confirmation that your phone has been locked.
Registering new devices: under web control account you can have multiple devices as is show at next
picture. By disabling this option all new registration will be disabled.
Change password: possibility to change password to your Web Control account.
At dashboard you can also switch between your devices – this is important especially when you are
sending remote command. The inactive device is grayed out.
15
4.3 Remote Command
At remote command tab you can locate, lock or wipe your device in similar way like in chapter 10 Anti-
Theft Functions. Just mark the remote command and use Send command to device option.
In case of wipe command there is need to choose between wiping of device only (partial) or wiping of
device together with SD card (Complete).
Remember that remote command must be allowed in settings of you device - in Mobile Security software – in another cases some options will be grayed out in web control. For example at
next picture you can see that only sending of location command is allowed.
Remember that mobile phone send answer/confirmation SMS to portal (e.g. phone location)
and these SMS are charged by your provider as international!
16
At left you can find results of previous Remote commands attempts. E.g. map with location of your lost
phone or just information that your device has been wiped. In case of Geolocation is important method -
the Network method means that location is approximate - find using e.g. mobile network. The GPS
method is more accurate.
17
5 Antivirus TrustPort Mobile Security is able to scan on demand each installed application or each downloaded file. If you
download or update an application, TrustPort Mobile Security scans this application automatically, and if
necessary, you are easily able to uninstall such suspicious application. TrustPort Mobile Security offers not only the function of scanning your phone memory on demand, but it also offers a resident shield – on access
scanning, as main protection against malware.
5.1 Resident Shield
The Resident shield steadily checks installation of any new applications or application update. If it
finds the infection offer you uninstallation of this application directly from the report.
Just tap on the infection in list.
5.2 On–demand scanning
In case of need you can scan your Android device and find all threads. You can:
Scan applications
Scan external storages
Scan whole cell phone (Scan applications + Scan external storages)
The most important is scan of applications because installed infected application can make you harm.
In case that some infection is found during scanning you can remove/uninstall the infected application
or delete files just by taping on particular infection in the list. The time of scanning can be different
according your device type, number of installed application and number of files at your SD card.
Additional setting of scanner be find under option Scan > Settings tab.
18
5.3 Updating of virus database
The TrustPort Mobile Security automatically check for new virus definitions udaptes every day – you can change this period under option Scan > Settings > Update period. You can also anytime check if new
virus definitions are available under option Scan > Update virus database.
Under Setting tab you can also disable/enable automatic updates and use Connection type restriction for example for blocking updates in case you are connect via mobile data and allow it only if you are
connected via Wi-Fi.
19
6 Web Shield The TrustPort Mobile Security application enables you to browse the internet safely on your phone, because it effectively scans all URL addresses which you visit and it prevents you from accessing
websites with malicious codes and phishing websites.
6.1 Using the Safe Browser
You can run Safe browser directly from main menu of TrustPort Mobile Security. Once you try to access
some suspicious page TrustPort block it and only blocking page info is displayed.
7 Application Manager Thanks to this function, it is possible to end or uninstall a currently running process or application. Application manager also shows the list of all installed applications, or those which are currently
running. It will warn you about any dangerous applications, which can possibly jeopardize your smart
phone, and enables you to uninstall them. It is also possible to display a full list of all authorizations which will be required by the specific application, meaning you will have a coherent summary of all
activities.
7.1 Using the Application Manager
This feature can help you to find potentially dangerous application. You can access it from main
interface under Application. It allows you to:
Check downloaded application
Check permissions of applications
Check running applications
Check running services
Check running tasks
20
These features are for more experienced users. As example in case you install some game or screenshot’s application there should not be requirement of permissions like READ YOUR CONTACTS or
DIRECTLY CALL PHONE NUMBERS. In case that some application required similar permissions it does not
necessarily mean that application is malicious.
21
8 Data Backup Your contacts will be safe with this feature, because it offers the option of storing all your contacts on a memory card, in an encrypted database.
8.1 Using Data Backup
This feature can help you to backup contacts. You can access it from main interface under Backup contacts. You can anytime create encrypted contacts backup by using the + mark at right-top corner.
If you wish to restore backup just tap at specific backup and fill the password requested.
For complete action choose People (just once).
22
The backup files location can be change from the main settings of TrustPort application (application
settings > Settings > Backup location). From this location you can download the files also to PC and use them later for example for your new device. (Just browse the files on your SD cards with the help of
file browser).
23
9 Phone Call and SMS Filter Users can create their own blacklist and whitelist for blocking of outgoing and incoming calls and SMSs
according to their own requirements. This feature enables the user to define so-called forbidden dialing
codes. This function is especially useful for premium rate SMSs or for expensive phone lines.
9.1 Using Phone Call and SMS Filter
For both Incoming and Outgoing calls and SMS can be defined black list and whitelist of phone numbers. So you can block incoming and outgoing SMS according to user's setings:
Allow all
Disable all - disable all incoming/outgoing calls and SMS
Rules - checks incoming and outgoing calls and SMS according to user's settings. Blacklist is a list of
disabled phone numbers. Whitelist is a list of allowed phone numbers. Unknown phone numbers are
numbers not listed in the phone's directory.
Allow all except Blacklist - allow all calls and SMS except phone numbers listed in the Blacklist
Block all except Whitelist - block all calls and SMS except those listed in the Whitelist
Block Unknown numbers
You can anytime add contact to black/white list by using the + mark at right-top corner. Records can be
added from your contacts or manually. Remember to hold internacional format of phone number (with international prefix like 001 USA, 00420 Czech Republic, 0091 for India, 0044 Great Britain…
24
10 Testing of TrustPort Mobile Security If you want to test that antivirus shield works fine at your device go to Google play and find application Mobile Security Virus Test from TrustPort company (file is harmful; it is just for testing purposes so
there’s no need to be worry) direct link is:
https://play.google.com/store/apps/details?id=com.trustport.mobilesecurity_eicar_test_file&hl=enu
Once you install it, the resident shield will notice you that the file is infected and offer you uninstallation.
Just tap it in List of infection and uninstall it.
25
11 Anti-Theft Functions These functions help you in case your phone is lost or theft, when you need to be sure that no one get access to your data.
Note: SMSs are normally charged by your provider according your local tariff. One SMS is necessary to
be sent from different device and one SMS is sent back to this device from the “lost/stolen” phone with GPS coordinate or confirmation of lock/wipe of the device.
11.1 Geolocation
This feature guards your phone at all times. If you lose your phone, it will find it thanks to the Geo-
location function. All you have to do is simply send an SMS to your lost phone number, and you will
receive back an SMS with the exact GPS coordinates, where your device is located.
11.1.1 Prepare the Mobile Phone for Geolocation
At your mobile phone in settings of Mobile security you need to set up password under application
settings > Settings > Set a new password. See 3.5 Setting of Password for Mobile Security and then enable Geo-location in the same tab (application settings > Settings > Geolocation).
The password is used for authorization. Without knowledge of the password no-one can’t find out your location.
11.1.2 Allow Location service and GPS satellites
At your mobile phone setting in location settings allow using GPS satellites and/or Google location service (optional). In case that GPS signal is not available Mobile security try to send at least
approximate location of the phone using information from e.g. GMS network more details are in chapter
10.1.3 Sending remote command for Geolocation.
26
11.1.3 Sending remote command for Geolocation
There are two possibilities how to send Geolocation command. If you have another mobile phone with
TrustPort Mobile Security in main menu go to Remote control. Fill the recipient phone number and
password (phone number and password of phone you want to locate). As a command to be sent choose Gather location. As a format of response you can choose from three formats: Text, URL and JSON,
described below. For example we choose Text format. And press the green checkmark at right-top
corner. The SMS answer you receive is the location of lost mobile in GPS coordinates. As the picture
bellow shows NOW is the location latitude 49.22 and longitude 16.58.
27
As the second option you can send plain SMS from any phone in format TRUSTEE R TEXT LOCATION
“password”.For example TRUSTEE R TEXT LOCATION pass123 Both methods are equivalent - they have the same effect.
URL format of response: in this case you receive back link in SMS with position of your device in Google
maps.
JSON format of response: in this case you receive back SMS with GPS coordinate in JSON format for
example: "TRUSTEE A JSON LOC {s:"gps",p:"l",lat:49.265934,long:16.979298}"
Examples of request send as plain SMS to stolen/lost phone:
TRUSTEE R TEXT LOCATION password
TRUSTEE R URL LOCATION password
TRUSTEE R JSON LOCATION password
Examples of answers from stolen/lost phone:
Text:
Answer with current gps coordinates:
TRUSTEE A TEXT LOCATION GPS NOW 48.265934 17.979298
Answer that last gps position is <value> (for example GPS signal is not available right now but
previous position is known).
TRUSTEE A TEXT LOCATION GPS LAST-KNOWN 48.265934 17.979298
28
Answer that current network is <value> (in case that GPS is not available or enabled but you have enabled network location in your device TrustPort send location obtained from GMS network).
TRUSTEE A TEXT LOCATION NETWORK NOW 48.265934 17.979298
Answer that current network is <value> (similar like previous case but the actual data are not
available).
TRUSTEE A TEXT LOCATION NETWORK LAST-KNOWN 48.265934 17.979298
Answer that location is unknown (can happened for example if you are at place without GPS signal).
TRUSTEE A TEXT LOCATION UNKNOWN
URL:
TRUSTEE A URL LOCATION GPS LAST-KNOWN
http://maps.google.com/maps?q=49.265934+17.979298
JSON:
TRUSTEE A JSON LOCATION {s:"gps",p:"l",lat:49.265934,long:16.979298}
11.2 Remote Lock of the Phone
You can remotely lock display of your phone against unauthorized access. So no one can open it
without knowledge of password.
In settings of Mobile security you need to set up password under application settings > Settings > Set
a new password see 3.5 Setting of Password for Mobile Security
The password is used for authorization of remote commands. Without knowledge of the password no-
one can’t lock your mobile device.
11.2.1 Sending remote lock command
There are two possibilities how to send lock command. If you have another mobile phone with TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and password
(phone number and password of device you want to lock). As command to send choose Lock phone. And
press the green checkmark in right-top corner.
As the second options you can send plain SMS from any phone in format TRUSTEE R LOCK password
(Example: TRUSTEE R LOCK pass123).
Both methods are equivalent - they have the same effect.
29
Once the mobile phone obtain this command it locks it’s display operations immediatelly. Until you put
correct password the phone is locked and you have no access to its functions. To the sender phone is send confirmation SMS in format TRUSTEE A TEXT LOCKOK.
30
11.2.2 Sending remote lock and scream command
Instead of lock command (see chapter 11.2.1 Sending remote lock command) you can send “Lock and scream” command. In addition to lock of the phone there is laud sound – good way how to find your lost
phone at noisy places. The plain SMS has format TRUSTEE R SCREAM password
11.2.3 Change of Lock screen message
You can modify lock screen of your phone with the message. So if finder wants to contact you and
return back your phone he gets the right information.
31
11.3 Remote Wipe of the Phone
You can remotely wipe your phone as prevention against abusing of the data stored at your device or
CD card. No one can use it without knowledge of password.
At your mobile phone in settings of Mobile security you need to set the password under application
settings > Settings > Set a new password see 3.5 Setting of Password for Mobile Security
After it enable remote wipe at the same tab (application settings > Settings > Remote Wipe).
(Activate the device administrator).
The password is used for authorization of this command. Without knowledge of the password no one can
wipe your mobile device.
REMEMBER THAT YOU LOST ALL YOUR DATA!
11.3.1 Sending remote wipe command
There are two ways how to send the wipe command. If you have another mobile device with installed
TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and
password (phone number and password of phone you want to wipe). To send the command choose
option Wipe phone (or Wipe phone and SD card if you want to wipe also SD).
The second way how to send this command is plain taxt SMS sent from any phone in format TRUSTEE R
WIPE password (example TRUSTEE R WIPE pass123).
(In case you want to wipe also SD card the command is TRUSTEE R SDWIPE password).
To the sender’s phone is send confirmation SMS in format TRUSTEE A TEXT WIPE OK.
32
12 Application blocking and Parental control Features enabling parents or teachers to limit child access to the applications running on mobile device
and to limit web page access to selected categories with the help of TP Safe Browser. There exist only
two possible accounts – Administrator for parents enabling to set up system and User for child.
12.1 Enabling Application blocking and Parental control
1. To enable Parental control functionality it is necessary to set up Administrator and User ac counts first. In TP Mobile Security main menu open Account settings.
2. Specify admin password (implicitly this is the same as you have specified in Remote control wizard in
chapter 3.2 Setup Wizard) and User password.
33
3. Administrator can setup enabling/blocking applications for User by specifying Rules and selecting
individual already installed applications.
34
4. Administrator can enable to User to use Safe browsing, e.g. TrustPort web browse r that protect user against malware on web pages and web page filtering preventing user to access unwanted web content like
pornography. Combination of Safe browsing and blocking all other installed web browsers enable to protect
child from dangerous web page content.
Enable safe browsing and select of blocked categories can be setup in the Accounts setting menu.
5. Administrator can setup time frame when the User’s account is enabled, e.g. when the User can login into his profile. The rest of the time User cannot login and use the mobile device. Enable
scheduling and set the period in which the user profile will be enabled can be setup in the Accounts
setting menu.
35
6. When Administrator leaves the settings and both Administrator and User password are set up, the login window appears. Then any of these 2 users can login, in User case with restrictions applied.
7. In the notification bar (swing gesture from top device bar opens it) appears information on which
profile you are logged in, if you tap that notification the login windows appears and you can re-login.
36
8. When User try to access blocked application a dialog inform him about it and offer possibility to log in as Administrator to enable it. Similarry when the user try to access blocked web page using our
safe browser the information dialog inform him about it.
37
13 Alert on SIM change Features enabling warning SMS message and lock of phone once anyone try to change SIM card in your mobile device.
13.1 Enabling Alert on SIM change
To enable Alert on SIM change feature go to settings and check “Alert on SIM change”. For correct function there is need to set also “SIM change upervisor’s phone number” e.g. number of your second
phone or phone number of your relative. Once anyone change the SIM in your lost/stolen phone you get
SMS directly from new SIM card so you receive it from phone number of finder of the phone.
The phone is also automatically locked once anyone change the SIM like is described in chapter 11.2
Remote Lock of the Phone.
38
14 GeoFencing Features enabling parents to check area where the child is located. Once the mobile device cross the
border of the area then Mobile Security send SMS to parent.
14.1 Enabling GeoFencing
To enable GeoFencing feature it is necessary to set up Administrator and User accounts first. See point
1 and 2 in chapter 12.1 Enabling Application blocking and Parental control and after it just check “Turn
on/off parental lock”. After it follow these instructions to set up geofencing:
1) Enable geofencing feature and specify the geofencing area. Once you tap the map you can specify the
area using radius. After it you can see radius marked in map.
2) Go back and set geofencing period – remember that location cannot be obtained continuously from power saving reason. Recommended value is 5 minutes. The value depends on your battery life and the total
time you want to use the GeoFencing feature.
3) Specify the Location providers – the GPS method is more precise but consume more battery (there is need to have allowed Allow Location service and GPS satellites see chapter 11.1.2 Allow Location service and
GPS satellite. The network method is less precise but consumes less battery.
4) Set the notification number – once mobile device cross the area the notification SMS is send to this phone. For example phone of the parents. You can see example of SMS bellow i t include the link to Google
maps with current phone location.
5) Log out from your admin account and log in as user see chapter 12.1 Enabling Application blocking
and Parental control – from that moment the mobile device is tracked for location.
39
40
41
15 Technical support Thank you for using the TrustPort Mobile Security. If you wish to meet other products of our company, you can find all the necessary information on our web pages. If you have any comments or questions
about the TrustPort products, please visit our website www.trustport.com. If you didn’t find answers
there, use any of the contacts below.
Troubleshooting:
If you come across an error in the TrustPort Mobile Security, you can announce it to some of the
contacts below. Please, prepare the following information in advance:
the exact description of error,
the program version including the compile number (you will find this information in the About
dialog window),
version of Android and type of your Android device.
Contact:
Address: TrustPort, a.s.
Purkynova 2845/101
612 00 Brno
Czech Republic
Web: www.trustport.com
E-mail: [email protected]