Preview only show first 10 pages with watermark. For full document please download

Trustport Mobile Security

   EMBED


Share

Transcript

TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 C opyright © 2014, TrustPort, a.s., All rights reserved. Content CONTENT ............................................................................................................... 2 1 ABOUT .............................................................................................................. 4 1.1 PRODUCT OVERVIEW AND KEY FEATURES..................................................................... 4 1.2 MINIMUM SYSTEM REQUIREMENTS ........................................................................... 4 1.3 SUPPORTED LANGUAGES ....................................................................................... 4 2 INSTALLATION AND UNINSTALLATION OF TRUSTPO RT MOBILE SEC URITY .......... 5 2.1 HOW TO INSTALL THE APK FILES MANUALLY ON YOUR ANDROID DEVICE.................................. 5 2.2 INSTALLATION FROM GOOGLE PLAY STORE .................................................................. 8 2.3 UNINSTALLATION OF T RUSTPORT MOBILE SECURITY ....................................................... 8 3 USER INTERF ACE AND B ASIC SETTINGS ............................................................. 9 3.1 RUNNING INTERFACE .......................................................................................... 9 3.2 SETUP WIZARD................................................................................................. 9 3.3 REGISTRATION AND LICENSING ..............................................................................11 3.4 PREMIUM VERSION ............................................................................................12 3.5 PASSWORD PROTECTION OF MOBILE SECURITY ............................................................13 4 TRUSTPORT WEB CONTRO L .............................................................................. 14 4.1 ACCESSING WEB CONTROL ACCOUNT .......................................................................14 4.2 DASHBOARD ...................................................................................................14 4.3 REMOTE COMMAND ...........................................................................................15 5 ANTIVIRUS...................................................................................................... 17 5.1 RESIDENT SHIELD .............................................................................................17 5.2 ON–DEMAND SCANNING ......................................................................................17 5.3 UPDATING OF VIRUS DATABASE ..............................................................................18 6 WEB SHIELD .................................................................................................... 19 6.1 USING THE SAFE BROWSER ..................................................................................19 2 7 APPLIC ATION MANAGER .................................................................................. 19 7.1 USING THE APPLICATION MANAGER .........................................................................19 8 DATA BAC KUP ................................................................................................. 21 8.1 USING DATA BACKUP .........................................................................................21 9 PHONE CALL AND SMS F ILTER .......................................................................... 23 9.1 USING PHONE CALL AND SMS F ILTER ......................................................................23 10 TESTING OF TRUSTPORT MOBILE SECURITY .................................................. 24 11 ANTI- THEF T F UNC TIONS............................................................................... 25 11.1 GEOLOCATION .................................................................................................25 11.1.1 Prepare the Mobile Phone for Geolocation ...................................................25 11.1.2 Allow Location service and GPS satellites ....................................................25 11.1.3 Sending remote command for Geolocation ..................................................26 11.2 REMOTE LOCK OF THE PHONE ................................................................................28 11.2.1 Sending remote lock command .................................................................28 11.2.2 Sending remote lock and scream command .................................................30 11.2.3 Change of Lock screen message ................................................................30 11.3 REMOTE WIPE OF THE PHONE................................................................................31 11.3.1 Sending remote wipe command ................................................................31 12 APPLIC ATION BLOC KING AND PARENTAL CONTROL ...................................... 32 12.1 ENABLING APPLICATION BLOCKING AND PARENTAL CONTROL .............................................32 13 ALERT ON SIM CHANGE ................................................................................ 37 13.1 ENABLING ALERT ON SIM CHANGE ..........................................................................37 14 GEOFENC ING ................................................................................................ 38 14.1 ENABLING GEOF ENCING ......................................................................................38 15 TECHNIC AL SUPPORT ................................................................................... 41 3 1 About 1.1 Product overview and key features TrustPort Mobile Security offers you not only the function of scanning your phone on demand, but it also offers a resident shield – on access scanning, as main protection against malware. The application enables you to surf the web safely, because it scans the URL addresses that you visit, and it blocks websites which contain malicious codes. If you happen to lose your mobile, TrustPort application will find it for you, because you will receive an SMS with the specific coordinates of the location of where your mobile phone is currently located. In the same way you can even remotely delete all your data on the lost device and restore your phone to “factory default” settings. Your contacts are always secure, because a backup function is offered. You can also easily create your own blacklist and whitelist for the blocking of outgoing and incoming calls and SMS’s. The application enables you to define so -called forbidden dialing codes. This function is especially connected with premium rate SMS’s or with expensive phone lines. • Antivirus and Anti-Malware protection based on TrustPort’s engine • Resident shield – on-access scanning • Application manager • Contacts backup on memory card • Geolocation – a useful tool for the loss of a mobile phone • Steal Protection – a useful tool for remote wiping of your data • Blocking of outgoing and incoming calls and SMS’s (blacklist/ whitelist) • Safe web surfing – blocking of infected and phishing we bpages • Blocking of defined dialing codes (premium rate SMS’s or expensive phone lines) 1.2 Minimum System Requirements The TrustPort Antivirus requires at least the following software configuration:  Android 2.2 version or higher.  At least 20 megabytes (MB) of free space.  At least 128 megabytes (MB) of RAM 1.3 Supported languages  English  Russian 4 2 Installation and uninstallation of TrustPort Mobile Security 2.1 How to install the APK files manually on your android device You can install Mobile security from APK (Android application package) file downloaded from TrustPort site http://www.trustport.com/download/file/TrustPort_Mob ile_Security.apk or from installation media or web sites of TrustPort partners. (C D may contain Older Versions of Software - latest version is always available at TrustPort website). Things you’ll need: • USB cable for your Android device (or a connection between your computer system and the Android device, which can be connected either through Bluetooth or Wi-Fi) • The application APK you need to install • A file manager app installed on your Android device (Total C ommander, Astro File Manager, File Expert etc.) Steps: • Install the required USB/Bluetooth or Wi-Fi drivers you need to connec t your Android device to the computer. You probably have it already installed if you ever connect your PC with your phone. If not for most devices the driver will be installed automatically after you connect your device into your PC . In task bar of PC you will see similar information like in picture. • Download the APK of the app you need to install on your Android device and transfer the APK file to your Android device. You can just copy the file mobilesecurity.apk from your C D or the downloaded one to your SD card. You can use any file manager you have or use Windows explorer. Your storage will be probably already shown in “My C omputer”. C opy the file like you copy music, pictures etc. It does not matter what is location of the installation file at your SD card. (You can also use section http://www.trustport.com/en/download and download the APK of TrustPort Mobile Security file directly to your SD card using your Android device). 5 • On your Android device, go to Settings>Applications>C heck the box Unknown sources. Location can be different on each device for example Settings>Security. If this option will not be checked on, your device asks for permission during the ins tallation anyway. There will be displayed warning about vulnerability of the device – just choose OK. It is recommended to switch this option off after successful installation. • Disconnect your device from the computer system • Use the file manager to explore the APK file on your device • Tap on the APK to open it and choose “Install” the APK – for “C omplete action using” choose “Package installer” (Just once). If you did not check the box “Unknown sources” in one of the previous step choose “Setting” and allow it – in this case you need to start installation from this point again. 6 7 • Follow the installation wizard and finish installation of the application. 2.2 Installation from Google Play store You can find Mobile Security application also at Google Play store https://play.google.com/store just use search tab and find TrustPort or use directly this link: https://play.google.com/store/apps/details?id=com.trustport.mobilesecurity The version from Google play store may not be compatible with the activation codes! 2.3 Uninstallation of TrustPort Mobile Security You can uninstall TrustPort Mobile Security from application manager (Settings of phone - Apps) like any other application just find Mobile Security and in App info choose option „Uninstall“. Remember that in settings of mobile security you can disable this action so there ca n be needed to allow uninstallation in settings – Protect from uninstallation option. 8 3 User Interface and basic settings 3.1 Running Interface It can be launched easily by taping on the shortcut at home screen or from the list of application. Just find the green Mobile Security icon. 3.2 Setup Wizard In case you start Mobile Security for the first time the Setup Wizard is automatically started. You can also skip the wizard and run it anytime later under application settings option Settings > Wizard. Remember that all settings can be change anytime later under application settings option Settings. At first page choose your registration method – probably you have activation code so fill it and choose next. As second option you can use already created Web C ontrol account if you have one. Or you can run Mobile Security in trial version. At next page choose your password – this password can be used for protection of application itself, and also for remote commands like geo-location, remote wipe and lock of mobile phone (later you can change password if you want - see 3.5 Setting of Password for Mobile Security). If you choose “Protect from uninstallation” option for Mobile Security application it need special permission “Device administrator” in this case choose activate at ask page. At next page you can enable Web C ontrol function it allows you to control your mobile device directly from anywhere – using your own account at our website. Please fill your email correctly – the password must have at least 6 characters and from security reason should be different than the one used for remote commands. The filling of your phone number of your device is necessary if you want to use remote commands from the web account – remember to save phone number in internacional 9 format of phone number (with international prefix like 420 for C zech Republic, 91 for India, 44 for Great Britain…. For details see chapter 3.6 Mobile Security Web C ontrol At last page you can choose which features should be enabled in your mobile phone – some of them need special permission “Device administrator” in this case choose activate at ask page. 10 3.3 Registration and Licensing You can register the product (if you did not do that in wizard during isntallation) under Application settings > Product license. (If there is missing Product license tab you have probably installed the version from Google Play store, so please install the one described described in part 2.1 Step by step guide on how to install the APK files manually on your Android device). Please fill in your activation code in app Settings>Product license in format TP-NZYX-MTGT-MZTJ-TTJHXXXXXXXX and your email address. Store this information for case of lost your activation code. All other items like C ompany and State are optional. After it use green “C heck” mark at top-right corner of the screen. It will be followed by note about successful registration. After it you have available all premium functions see 3.4 Pemium functions. Note that during registration process your device must be connected to the Internet. You can anytime later check the validity of your license at main page of Mobile Security. 11 3.4 Premium version After first installation of TrustPort Mobile Security all users have activated Premium versions. After demo-period expiration there is need to use Activation code to activate Premium version (or buy product using Google play – only for versions installed from Google play store!). In other case premium functions are disabled. Premium functions are for example:  Scan applications  Scan external storages  Scan whole cell phone (Scan applications + Scan external storages) At main screen of the application you can check if your version is Premium one – and in case of demo period using how many days of premium functionality left. In case of expired version/license there will appear note about it. 12 3.5 Password protection of Mobile Security You can set the program password under application settings option Settings > Set a new password. This password will be required to access the program menu if you check option “Protect whole application”. Password is also used for authorization for Geo -location and all anti-theft functions like Remote Wipe. (Password can be changed any time later using option “C hange or delete password”). 13 4 TrustPort Web Control By using Web C ontrol account you can have your mobile under control from any other PC or mobile device. See overview of your mobile phones and even send remote command for example if you need to locate your device. 4.1 Accessing Web Control account If you create account for Web control in chapter 3.2 Setup Wizard you can log with your email and password at https://mobile.trustport.com/login.php 4.2 Dashboard Here you can see overview of your mobile devices with most important informations. At left side there is your profile setting: Email notification: enable sending email notification for registration confirmation and remote commands. At your email will be sent a copy with results of remote commands e.g. location of your mobile or confirmation that your phone has been locked. Registering new devices: under web control account you can have multiple devices as is show at next picture. By disabling this option all new registration will be disabled. Change password: possibility to change password to your Web C ontrol account. At dashboard you can also switch between your devices – this is important especially when you are sending remote command. The inactive device is grayed out. 14 4.3 Remote Command At remote command tab you can locate, lock or wipe your device in similar way like in chapter 10 AntiTheft Functions. Just mark the remote command and use Send command to device option. In case of wipe command there is need to choose between wiping of device only (partial) or wiping of device together with SD card (C omplete). Remember that remote command must be allowed in settings of you device - in Mobile Security software – in another cases some options will be grayed out in web control. For example at next picture you can see that only sending of location command is allowed. Remember that mobile phone send answer/confirmation SMS to portal (e.g. phone location) and these SMS are charged by your provider as international! 15 At left you can find results of previous Remote commands attempts. E.g. map with location of your lost phone or just information that your device has been wiped. In case of Geolocation is important method the Network method means that location is approximate - find using e.g. mobile network. The GPS method is more accurate. 16 5 Antivirus TrustPort Mobile Security is able to scan on demand each installed application or each downloaded file. If you download or update an application, TrustPort Mobile Security scans this application automatically, and if necessary, you are easily able to uninstall such suspicious application. TrustPort Mobile Security offers not only the function of scanning your phone memory on demand, but it also offers a resident shield – on access scanning, as main protection against malware. 5.1 Resident Shield The Resident shield steadily checks installation of any new applications or application update. If it finds the infection offer you uninstallation of this application directly from the report. Just tap on the infection in list. 5.2 On–demand scanning In case of need you can scan your Android device and find all threads. You can:  Scan applications  Scan external storages  Scan whole cell phone (Scan applications + Scan external storages) The most important is scan of applications because installed infected application can make you harm. In case that some infection is found during scanning you can remove/uninstall the infected application or delete files just by taping on particular infection in the list. The time of scanning can be different according your device type, number of installed application and number of files at yo ur SD card. Additional setting of scanner be find under option Scan > Settings tab. 17 5.3 Updating of virus database The TrustPort Mobile Security automatically check for new virus definitions udaptes every day – you can change this period under option Scan > Settings > Update period. You can also anytime check if new virus definitions are available under option Scan > Update virus database. Under Setting tab you can also disable/enable automatic updates and use C onnection type restriction for example for blocking updates in case you are connect via mobile data and allow it only if you are connected via Wi-Fi. 18 6 Web Shield The TrustPort Mobile Security application enables you to browse the internet safely on your phone, because it effectively scans all URL addresses which you visit and it prevents you from accessing websites with malicious codes and phishing websites. 6.1 Using the Safe Browser You can run Safe browser directly from main menu of TrustPort Mobile Security. Once you try to access some suspicious page TrustPort block it and only blocking page info is displayed. 7 Application Manager Thanks to this function, it is possible to end or uninstall a currently running process or application. Application manager also shows the list of all installed applications, or those which are currently running. It will warn you about any dangerous applications, which can possibly jeopardize your smart phone, and enables you to uninstall them. It is also possible to display a full list of all authorizations which will be required by the specific application, meaning you will have a co herent summary of all activities. 7.1 Using the Application Manager This feature can help you to find potentially dangerous application. You can access it from main interface under Application. It allows you to:  C heck downloaded application  C heck permissions of applications  C heck running applications  C heck running services  C heck running tasks 19 These features are for more experienced users. As example in case you install some game or screenshot’s application there should not be requirement of permissions like REA D YOUR C ONTAC TS or DIREC TLY C ALL PHONE NUMBERS. In case that some application required similar permissions it does not necessarily mean that application is malicious. 20 8 Data Backup Your contacts will be safe with this feature, because it offers the option of storing all your contacts on a memory card, in an encrypted database. 8.1 Using Data Backup This feature can help you to backup contacts. You can access it from main interface under Backup contacts. You can anytime create encrypted contacts backup by using the + mark at right-top corner. If you wish to restore backup just tap at specific backup and fill the password requested. For complete action choose People (just once). 21 The backup files location can be change from the main settings of TrustPort application (application settings > Settings > Backup location). From this location you can download the files also to PC and use them later for example for your new device. (Just browse the files on your SD cards with the help of file browser). 22 9 Phone Call and SMS Filter Users can create their own blacklist and whitelist for blocking of outg oing and incoming calls and SMSs according to their own requirements. This feature enables the user to define so -called forbidden dialing codes. This function is especially useful for premium rate SMSs or for expensive phone lines. 9.1 Using Phone Call and SMS Filter For both Incoming and Outgoing calls and SMS can be defined black list and whitelist of phone numbers. So you can block incoming and outgoing SMS according to user's setings :  Allow all  Disable all - disable all incoming/outgoing calls and SMS  Rules - checks incoming and outgoing calls and SMS according to user's settings. Blacklist is a list of disabled phone numbers. Whitelist is a list of allowed phone numbers. Unknown phone numbers are numbers not listed in the phone's directory.  Allow all except Blacklist - allow all calls and SMS except phone numbers listed in the Blacklist  Block all except Whitelist - block all calls and SMS except those listed in the Whitelist  Block Unknown numbers You can anytime add contact to black/white list by using the + mark at right-top corner. Records can be added from your contacts or manually. Remember to hold internacional format of phone number (with international prefix like 001 USA, 00420 C zech Republic, 0091 for India, 0044 Great Britain… 23 10 Testing of TrustPort Mobile Security If you want to test that antivirus shield works fine at your device go to Google play and find application Mobile Security Virus Test from TrustPort company (file is harmful; it is just for testing purposes so there’s no need to be worry) direct link is: https://play.google.com/store/apps/details?id=com.trustport.mobilesecurity_eicar_test_file&hl=enu Once you install it, the resident shield will notice you that the file is infected and offer you uninstallation. Just tap it in List of infection and uninstall it. 24 11 Anti-Theft Functions These functions help you in case your phone is lost or theft, when you need to be sure that no one get access to your data. Note: SMSs are normally charged by your provider according your local tariff. One SMS is necessary to be sent from different device and one SMS is sent back to this device from the “lost/stolen” phone with GPS coordinate or confirmation of lock/wipe of the device. 11.1 Geolocation This feature guards your phone at all times. If you lose your phone, it will find it thanks to the Geolocation function. All you have to do is simply send an SMS to your lost phone number, and you will receive back an SMS with the exact GPS coordinates, where your device is located. 11.1.1 Prepare the Mobile Phone for Geolocation At your mobile phone in settings of Mobile security you need to set up password under application settings > Settings > Set a new password. See 3.5 Setting of Password for Mobile Security and then enable Geo-location in the same tab (application settings > Settings > Geolocation). The password is used for authorization. Without knowledge of the password no -one can’t find out your location. 11.1.2 Allow Location service and GPS satellites At your mobile phone setting in location settings allow using GPS satellites and/or Google location service (optional). In case that GPS signal is not available Mobile security try to send at least approximate location of the phone using information from e.g. GMS network more details are in chapter 10.1.3 Sending remote command for Geolocation. 25 11.1.3 Sending remote command for Geolocation There are two possibilities how to send Geolocation command. If you have another mobile phone with TrustPort Mobile Security in main menu go to Remote control. Fill the recipient phone number and password (phone number and password of phone you want to locate). As a command to be sent choose Gather location. As a format of response you can choose from three formats: Text, URL and JSON, described below. For example we choose Text format. And press the green checkmark at right-top corner. The SMS answer you receive is the location of lost mobile in GPS coordinates. As the picture bellow shows NOW is the location latitude 49.22 and longitude 16.58. 26 As the second option you can send plain SMS from any phone in format TRUSTEE R TEXT LOC ATION “password”.For example TRUSTEE R TEXT LOC ATION pass123 Both methods are equivalent - they have the same effect. URL format of response: in this case you receive back link in SMS with position of your device in Google maps. JSON format of response: in this case you receive back SMS with GPS coordinate in JSON format for example: "TRUSTEE A JSON LOC {s:"gps",p:"l",lat:49.265934,long:16.979298}" Examples of request send as plain SMS to stolen/lost phone: TRUSTEE R TEXT LOC ATION password TRUSTEE R URL LOC ATION password TRUSTEE R JSON LOC ATION password Examples of answers from stolen/lost pho ne: Text: Answer with current gps coordinates: TRUSTEE A TEXT LOC ATION GPS NOW 48.265934 17.979298 Answer that last gps position is (for example GPS signal is not available right now but previous position is known). TRUSTEE A TEXT LOC ATION GPS LAST-KNOWN 48.265934 17.979298 27 Answer that current network is (in case that GPS is not available or enabled but you have enabled network location in your device TrustPort send location obtained from GMS network). TRUSTEE A TEXT LOC ATION NETWORK NOW 48.265934 17.979298 Answer that current network is (similar like previous case but the actual data are not available). TRUSTEE A TEXT LOC ATION NETWORK LAST-KNOWN 48.265934 17.979298 Answer that location is unknown (can happened for example if you are at place without GPS signal). TRUSTEE A TEXT LOC ATION UNKNOWN URL: TRUSTEE A URL LOC ATION GPS LAST-KNOWN http://maps.google.com/maps?q=49.265934+17.979298 JSON: TRUSTEE A JSON LOC ATION {s:"gps",p:"l",lat:49.265934,long:16.979298} 11.2 Remote Lock of the Phone You can remotely lock display of your phone against unauthorized access. So no one can open it without knowledge of password. In settings of Mobile security you need to set up password under application settings > Settings > Set a new password see 3.5 Setting of Password for Mobile Security The password is used for authorization of remote commands. Without knowledge of the password noone can’t lock your mobile device. 11.2.1 Sending remote lock command There are two possibilities how to send lock command. If you have another mobile phone with TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and password (phone number and password of device you want to lock). As command to send choose Lock phone. And press the green checkmark in right-top corner. As the second options you can send plain SMS from any phone in format TRUSTEE R LOC K password (Example: TRUSTEE R LOC K pass123). Both methods are equivalent - they have the same effect. 28 Once the mobile phone obtain this command it locks it’s display operations immediatelly. Until you put correct password the phone is locked and you have no access to its functions. To the sender phone is send confirmation SMS in format TRUSTEE A TEXT LOC KOK. 29 11.2.2 Sending remote lock and scream command Instead of lock command (see chapter 11.2.1 Sending remote lock command) you can send “Lock and scream” command. In addition to lock of the phone there is laud sound – good way how to find your lost phone at noisy places. The plain SMS has format TRUSTEE R SC REAM password 11.2.3 Change of Lock screen message You can modify lock screen of your phone with the message. So if finder wants to contact you and return back your phone he gets the right information. 30 11.3 Remote Wipe of the Phone You can remotely wipe your phone as prevention against abusing of the data stored at your device or C D card. No one can use it without knowledge of password. At your mobile phone in settings of Mobile security you need to set the password under application settings > Settings > Set a new password see 3.5 Setting of Password for Mobile Security After it enable remote wipe at the same tab (application settings > Settings > Remote Wipe). (Activate the device administrator). The password is used for authorization of this command. Without knowledge of the password no one can wipe your mobile device. REMEMBER THAT YOU LOST ALL YOUR DATA! 11.3.1 Sending remote wipe command There are two ways how to send the wipe command. If you have another mobile device with installed TrustPort Mobile Security in main menu go to Remote control. Fill in the recipient phone number and password (phone number and password of phone you want to wipe). To send the command choose option Wipe phone (or Wipe phone and SD card if you want to wipe also SD). The second way how to send this command is plain taxt SMS sent from any phone in format TRUSTEE R WIPE password (example TRUSTEE R WIPE pass123). (In case you want to wipe also SD card the command is TRUSTEE R SDWIPE password). To the sender’s phone is send confirmation SMS in format TRUSTEE A TEX T WIPE OK. 31 12 Application blocking and Parental control Features enabling parents or teachers to limit child access to the applications running on mobile device and to limit web page access to selected categories with the help of TP Safe Browser. There exist only two possible accounts – Administrator for parents enabling to set up system and User for child. 12.1 Enabling Application blocking and Parental control 1. To enable Parental control functionality it is necessary to set up Administrator and User ac counts first. In TP Mobile Security main menu open Account settings. 2. Specify admin password (implicitly this is the same as you have specified in Remote control wizard in chapter 3.2 Setup Wizard) and User password. 32 3. Administrator can setup enabling/blocking applications for User by specifying Rules and selecting individual already installed applications. 33 4. Administrator can enable to User to use Safe browsing, e.g. TrustPort web browse r that protect user against malware on web pages and web page filtering preventing user to access unwanted web content like pornography. C ombination of Safe browsing and blocking all other installed web browsers enable to protect child from dangerous web page content. Enable safe browsing and select of blocked categories can be setup in the Accounts setting menu. 5. Administrator can setup time frame when the User’s account is enabled, e.g. when the User can login into his profile. The rest of the time User cannot login and use the mobile device. Enable scheduling and set the period in which the user profile will be enabled can be setup in the Accounts setting menu. 34 6. When Administrator leaves the settings and both Administrator and User passwor d are set up, the login window appears. Then any of these 2 users can login, in User case with restrictions applied. 7. In the notification bar (swing gesture from top device bar opens it) appears information on which profile you are logged in, if you tap that notification the login windows appears and you can re -login. 35 8. When User try to access blocked application a dialog inform him about it and offer possibility to log in as Administrator to enable it. Similarry when the user try to access blocked web page using our safe browser the information dialog inform him about it. 36 13 Alert on SIM change Features enabling warning SMS message and lock of phone once anyone try to change SIM card in your mobile device. 13.1 Enabling Alert on SIM change To enable Alert on SIM change feature go to settings and check “Alert on SIM change”. For correct function there is need to set also “SIM change upervisor’s phone number” e.g. number of your second phone or phone number of your relative. Once anyone change the SIM in your lost/stolen phone you get SMS directly from new SIM card so you receive it from phone number of finder of the phone. The phone is also automatically locked once anyone change the SIM like is described in chapter 11.2 Remote Lock of the Phone. 37 14 GeoFencing Features enabling parents to check area where the child is located. Once the mobile device cross the border of the area then Mobile Security send SMS to parent. 14.1 Enabling GeoFencing To enable GeoFencing feature it is necessary to set up Administrator and User accounts first. See point 1 and 2 in chapter 12.1 Enabling Application blocking and Parental control and after it just check “Turn on/off parental lock”. After it follow these instructions to set up geofencing: 1) Enable geofencing feature and specify the geofencing area. Once you tap the map you can specify the area using radius. After it you can see radius marked in map. 2) Go back and set geofencing period – remember that location cannot be obtained continuously from power saving reason. Recommended value is 5 minutes. The value depends on your battery life and the total time you want to use the GeoFencing feature. 3) Specify the Location providers – the GPS method is more precise but consume more battery (there is need to have allowed Allow Location service and GPS satellites see chapter 11.1.2 Allow Location service and GPS satellite. The network method is less precise but consumes less battery. 4) Set the notification number – once mobile device cross the area the notification SMS is send to this phone. For example phone of the parents. You can see example of SMS bellow i t include the link to Google maps with current phone location. 5) Log out from your admin account and log in as user see chapter 12.1 Enabling Application blocking and Parental control – from that moment the mobile device is tracked for location. 38 39 40 15 Technical support Thank you for using the TrustPort Mobile Security. If you wish to meet other products of our company, you can find all the necessary information on our web pages. If you have any comments or questions about the TrustPort products, please visit our website www.trustport.com. If you didn’t find answers there, use any of the contacts below. Troubleshooting: If you come across an error in the TrustPort Mobile Security, you can announce it to some of the contacts below. Please, prepare the following information in advance:  the exact description of error,  the program version including the compile number (you will find this information in the About dialog window),  version of Android and type of your Android device . Contact: Address: TrustPort, a.s. Purkynova 2845/101 612 00 Brno C zech Republic Web: www.trustport.com E-mail: [email protected] 41