Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers
regarding this software product.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal
reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by
applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written
permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and
personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version
of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document
for which the rights are held by third parties, or for any potential or actual losses associated with the use of these
materials.
In this document, registered trademarks and service trademarks are used which are the property of the corresponding
rights holders.
ABOUT THIS HELP ....................................................................................................................................................... 6
ADDITIONAL DATA SOURCES .................................................................................................................................... 7
Information sources for further research ................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 8
Contacting the Documentation Development Group ................................................................................................ 8
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 9
What's new in Kaspersky Endpoint Security 8 for Smartphone .............................................................................. 10
Hardware and software requirements ..................................................................................................................... 10
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................. 11
Automatic installation of the application .................................................................................................................. 11
About installing the application through the computer ............................................................................................ 11
Installing the application through the computer ...................................................................................................... 12
About installing the application after receiving a message by email ....................................................................... 14
Installing the application after receiving a message by email ................................................................................. 14
UNINSTALLING THE APPLICATION .......................................................................................................................... 15
Manual deletion of the application .......................................................................................................................... 16
Automatic deletion of the application ...................................................................................................................... 17
MANAGING THE LICENSE ......................................................................................................................................... 18
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 18
Installing a license .................................................................................................................................................. 19
Viewing license information .................................................................................................................................... 19
SYNCHRONIZATION WITH THE REMOTE ADMINISTRATION SYSTEM ................................................................. 20
Starting the application ........................................................................................................................................... 21
Entering the secret code ......................................................................................................................................... 22
Updating the application's databases ..................................................................................................................... 23
Scanning the device for viruses .............................................................................................................................. 23
Viewing information about the application .............................................................................................................. 24
Protection status window ........................................................................................................................................ 25
Application menu .................................................................................................................................................... 27
FILE SYSTEM PROTECTION ..................................................................................................................................... 28
About Protection ..................................................................................................................................................... 28
Selecting the action to be performed on malicious objects ..................................................................................... 30
SCANNING THE DEVICE ............................................................................................................................................ 32
About on-demand scans ......................................................................................................................................... 32
Starting a scan manually ........................................................................................................................................ 33
U S E R GU I D E
4
Starting a scheduled scan ...................................................................................................................................... 35
Selection of object type to be scanned ................................................................................................................... 36
About Quarantine ................................................................................................................................................... 39
Restoring objects from Quarantine ......................................................................................................................... 41
Deleting objects from Quarantine ........................................................................................................................... 41
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 42
About Anti-Spam .................................................................................................................................................... 42
Changing the Anti-Spam mode ............................................................................................................................... 44
Creating a Black List ............................................................................................................................................... 44
Adding entries to the Black List ......................................................................................................................... 45
Editing entries in the Black List ......................................................................................................................... 47
Deleting entries from the Black List ................................................................................................................... 47
Creating a White List .............................................................................................................................................. 48
Adding entries to the White List ........................................................................................................................ 48
Editing entries in the White List ......................................................................................................................... 50
Deleting entries from the White List .................................................................................................................. 51
Response to SMS messages and calls from numbers not in Contacts .................................................................. 51
Responding to SMS messages from non-numeric numbers................................................................................... 53
Selecting a response to incoming SMS .................................................................................................................. 54
Selecting a response to incoming calls ................................ ................................................................................... 55
DATA PROTECTION IN THE EVENT OF LOSS OR THEFT OF THE DEVICE .......................................................... 56
About Anti-Theft ...................................................................................................................................................... 57
Blocking the device ................................................................................................................................................. 58
Deleting personal data ................................ ................................ ............................................................................ 60
Creating a list of folders to delete ........................................................................................................................... 63
Monitoring the replacement of a SIM card on the device ................................ ........................................................ 64
Determining the device's geographical coordinates................................................................................................ 65
Remote start of the Anti-Theft functions ................................................................................................................. 68
Creating a list of private numbers ........................................................................................................................... 74
Adding a number to the list of private numbers ................................................................................................. 75
Editing a number in the list of private numbers ................................................................................................. 76
Deleting a number from the list of private numbers ........................................................................................... 76
Selecting data to hide: Privacy Protection .............................................................................................................. 77
About Firewall ......................................................................................................................................................... 79
Selecting the Firewall mode .................................................................................................................................... 80
Notifications about blocked connections ................................................................................................................. 81
ENCRYPTING PERSONAL DATA ............................................................................................................................... 82
About Encryption .................................................................................................................................................... 82
Data encryption ...................................................................................................................................................... 82
Data decryption ...................................................................................................................................................... 84
Blocking access to encrypted data ......................................................................................................................... 86
UPDATING THE APPLICATION'S DATABASES ........................................................................................................ 87
About updating the application's databases ........................................................................................................... 88
Viewing database information ................................................................................................................................. 89
Updating while roaming .......................................................................................................................................... 91
About logs ............................................................................................................................................................... 92
Viewing Log records ............................................................................................................................................... 93
Deleting Log records .............................................................................................................................................. 94
INFORMATION ABOUT THIRD-PARTY CODE ........................................................................................................ 101
INDEX ........................................................................................................................................................................ 102
6
ABOUT THIS HELP
This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The
document is designed for a wide audience.
Objectives of the document:
help the user independently set up the application on on a mobile device, activate it and optimize the application
for their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving
technical support.
7
ADDITIONAL DATA SOURCES
IN THIS SECTION
Information sources for further research ........................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 8
Contacting the Documentation Development Group ......................................................................................................... 8
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers
from them, using various sources of information. You can choose the most suitable source according to how important or
urgent your request is.
INFORMATION SOURCES FOR FURTHER RESEARCH
You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application's Knowledge Base page at the Technical Support Service website;
the installed Help system;
the installed application documentation.
Page on Kaspersky Lab website
www.kaspersky.com/endpoint-security-smartphone
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and
options.
The application's page at the Technical Support Service website (Knowledge Base).
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and
cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics,
such as "Work with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions
about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also
contain news from the Technical Support Service.
The installed Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can
view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
U S E R GU I D E
8
The installed Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF
format). This document describes how to install and uninstall the application, manage its settings, start working with
the application, configure the settings of its components. The document describes the application interface and the
capabilities offered for typical application tasks.
DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE
WEB FORUM
If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in
our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine
for specific enquiries.
CONTACTING THE DOCUMENTATION DEVELOPMENT
GROUP
If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment,
please contact our User documentation development group. To contact the Documentation Development Group send an
email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8
for Smartphone".
9
KASPERSKY ENDPOINT SECURITY 8 FOR
SMARTPHONE
Kaspersky Endpoint Security 8 for Smartphone protects mobile devices working on the Microsoft® Windows® Mobile
platform. The application can protect information on the device from infection by known threats, prevent unwanted SMS
messages and calls, control the network connection on the device, encrypt information, hide it for confidential contacts
and also protect information if the device is lost or stolen. Every type of threat is processed in separate components of
the program. This allows to fine-tune the application settings depending on user needs. The administrator installs the
application and configures settings using the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Virus folder. It protects the file system of the mobile device from viruses and other malicious applications.
Anti-Virus can detect and neutralize malicious objects on your device and update the application's anti-virus
databases.
Anti-Spam. Scans all incoming SMS messages and calls for spam. The component allows the flexible blocking
of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored
there, and pinpoint its geographic location (if your mobile device has a GPS receiver) using SMS commands
from another device. Furthermore, Anti-Theft allows you to lock your device if the SIM card is replaced or if the
device is activated without a SIM card.
Privacy Protection. It hides information related to confidential numbers from the contact list. For these
numbers, Privacy Protection hides entries in Contacts, SMS messages in the call log and new SMS messages
received and incoming calls.
Firewall folder. Checks the network connections on your mobile device. Firewall sets the connections which will
be permitted or prohibited.
Encryption folder. This protects information in encrypted mode. The component encrypts any amount of non-
system folders which are in the device memory or on storage cards. Access to files from encrypted folders is
only possible after entering the secret application code.
Furthermore, the application contains a series of service functions which allow maintaining the application in up-to-date
condition, expanding the application's options of use and supporting the user in his operations:
Protection status. The status of the program's components is displayed on screen. Based on the information
presented, you can evaluate the current information protection status on your device.
Update the application's anti-virus databases. The function allows you to keep Kaspersky Endpoint Security 8
for Smartphone databases up to date.
Events log. The application for each component has its own Events log with information on the operation of the
component (e.g. scan report, update of anti-virus databases, information about blocked files). Reports on the
operation of components are given in the remote administration system and remain in it.
Kaspersky Endpoint Security 8 for Smartphone does not back up and then restore data.
U S E R GU I D E
10
IN THIS SECTION
What's new in Kaspersky Endpoint Security 8 for Smartphone ....................................................................................... 10
Hardware and software requirements ............................................................................................................................. 10
WHAT'S NEW IN KASPERSKY ENDPOINT SECURITY 8 FOR
SMARTPHONE
Let's take a closer look at the innovations in Kaspersky Endpoint Security 8 for Smartphone.
New protection:
Access to the application is protected by a secret code.
The list of executable files scanned by Protection and Scan in the event of the type of executable files being
limited is expanded. The application's executable files of the following formats are scanned: EXE, DLL, MDL,
APP, RDL, PRT, PXT, LDD, PDD, CLASS. The list of scanned archives is also expanded. The application
unpacks and scans the archives of the following formats: ZIP, JAR, JAD, RAR and CAB.
Privacy Protection can hide the following information for confidential contacts: entries in Contacts, SMS
correspondence and new incoming SMS messages and incoming calls. Confidential information is accessible
for viewing for hiding is disabled.
Encryption allows encrypting folders saved in the device's memory or on a memory card. The component
protects confidential data in encrypted mode and allows access to encrypted information only when the
application secret code is entered.
A new function GPS Find is enabled in the updated Anti-Theft: if the device is lost or stolen, its geographical
coordinates can be picked up on a telephone number or indicated email address. Also, in Anti-Theft, an updated
function Data Wipe can remotely delete not just the user's personal information kept in the memory of the
telephone or on the storage card, but also files from the list of folders to be deleted.
To economize on traffic, an option has been added to automatically disable application database updates when
the mobile device is in a roaming zone.
A new service function has been added, called Display prompts: Kaspersky Endpoint Security 8 for Smartphone
shows a short description of a component before configuration of its settings.
HARDWARE AND SOFTWARE REQUIREMENTS
Kaspersky Endpoint Security 8 for Smartphone is designed for installation on mobile devices running one of the following
operating systems:
Microsoft Windows Mobile 5.0;
Microsoft Windows Mobile 6.0, 6.1, 6.5.
For some remote administration systems, devices with Microsoft Windows Mobile 5.0 are not supported. Check with the
administrator which operating systems are supported.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11
INSTALLING KASPERSKY ENDPOINT
SECURITY 8 FOR SMARTPHONE
The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration. According to the
user's means of administration, installation can be automatic or require further input from the user.
If the user's further input is needed to install the application, the installation will proceed in one of the following ways:
The Kaspersky Endpoint Security 8 for Smartphone application installation utility of the same name is installed
on your computer. With its help, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile
device.
A message from the administrator with the distribution package or an indication to download it comes to your
email address. You install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using
information from the message.
This section gives the preparatory actions for installing Kaspersky Endpoint Security 8 for Smartphone, it describes the
different ways of installing applications on the mobile device and what the user has to do for each of them.
AUTOMATIC INSTALLATION OF THE APPLICATION
The Administrator installs the application on the device using remote administration.
As a result, the Kaspersky Endpoint Security 8 for Smartphone distribution package is sent to your device and the
application is automatically installed.
Installation is by one of the following means:
The application automatically installs on the device without the user's intervention. The application's installation
status is not given.
The application shows the installation status. At the end of installation, an installation successful message will
appear on the screen of the device.
The automatic installation process depends on the remote administration with which the administrator performs remote
installation of the application.
Contact the administrator if any errors occur during the installation process.
ABOUT INSTALLING THE APPLICATION THROUGH THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can
install Kaspersky Endpoint Security 8 for Smartphone on the mobile devices connected to this computer. The Kaspersky
Endpoint Security 8 for Smartphone supply utility contains the application distribution package and provides it to the
mobile device. After it is installed on the workstation, the utility automatically launches and monitors the connection of
mobile devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the
device satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application
on it.
Installation is only possible if Microsoft ActiveSync® is installed on the computer.
U S E R GU I D E
12
INSTALLING THE APPLICATION THROUGH THE COMPUTER
If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile
devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for
Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices
to the computer.
To install the application on a mobile device:
1. Connect the mobile device to the computer using Microsoft ActiveSync.
If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1: Kaspersky Endpoint Security 8 for Smartphone installation application
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
13
2. Press the Continue button.
The KES 8 window opens with a list of connected devices found.
If more than one device which satisfies the system requirements is connected to the computer, they are shown
in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be
installed. Do this by checking the boxes next to the names of the devices.
Figure 2: Selection of devices for installation of Kaspersky Endpoint Security 8 for Smartphone
4. Press Install button.
The utility puts the distribution package on the selected devices. The KES 8 window on the computer shows the
status of the transfer of the distribution package.
After the distribution package is transferred onto the chosen devices, application installation starts automatically.
If during the application installation process errors occurred, contact the administrator. To block the installation of
Kaspersky Endpoint Security 8 for Smartphone with the following devices connected to the computer,
check in the KES 8 window the box Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone
Installation Wizard.
U S E R GU I D E
14
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A MESSAGE BY EMAIL
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application's connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.
INSTALLING THE APPLICATION AFTER RECEIVING A
MESSAGE BY EMAIL
To install Kaspersky Endpoint Security 8 for Smartphone:
1. On the mobile device or the workstation, open the message from the administrator which contains the
application installation settings.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
If you download the distribution package to a mobile device, it will be saved by default into My documents.
3. Perform one of the following actions:
if you downloaded the distribution package to the mobile device, open it;
if you downloaded the distribution package to the workstation connect the device to it with Microsoft
ActiveSync, copy the distribution package to the device and open it.
Installation starts automatically and the application will be installed on the device.
4. Run the application (see "Starting the application" on page 21). Select Start Applications KES 8 and
launch the application using the stylus or the central button on your joystick.
5. Set the application secret code (see "Entering the secret code" on page. 22). To do this you have to fill in the
Enter new code and Confirm code fields and press OK.
This will open Synchronization settings window.
U N I N S T A L L I N G T H E A P P L I C A T I O N
15
6. Show the values for the settings to connect to the remote administration system if they were given when you
received the message from the administrator. Enter the values for the following settings:
Server;
Port;
Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will
not be present.
7. In the Your email address field, enter your business email address and press OK.
Enter the email address correctly since it is used to register the device on the remote administration system.
Contact the administrator if any errors occur during the installation process.
UNINSTALLING THE APPLICATION
The application can be deleted from the device in one of the following ways:
manually by the user (see section "Manual deletion of the application" on page. 15);
remotely by the administrator with the remote administration system.
The following actions are performed automatically when deleting:
Hiding of information is automatically disabled.
Data on the device is decrypted if it was encrypted by Kaspersky Endpoint Security 8 for Smartphone.
On automatic deletion (see Section "Automatic deletion of the application" on page 17), if the secret code was set for the
application, the user may have to take additional action in the following cases.
If the application did not start and the secret code was not set, then automatic deletion will occur without input from the
user.
U S E R GU I D E
16
MANUAL DELETION OF THE APPLICATION
To manually delete the application:
1. Close Kaspersky Endpoint Security 8 for Smartphone. To do this, press Menu Exit.
2. Uninstall Kaspersky Endpoint Security 8 for Smartphone. To do this, perform the following actions:
a. Press Start Settings.
b. Select Remove Programs on the System tab (see Figure below).
Figure 3: The System tab
c. Select KES 8 from the list of installed applications and press Delete.
d. Confirm deletion of the application by clicking Yes in the window that opens.
e. Enter the secret code and press OK.
f. Specify whether it is necessary to keep the application settings and objects in Quarantine:
to save the application settings and the quarantined objects, press Save;
in order to delete the application in full, press Delete.
The deletion of the application begins.
If hiding confidential information is enabled on your device and / or just one folder is encrypted by Kaspersky
Endpoint Security 8 for Smartphone, the application invites you to disable hiding confidential data and / or
decrypt all folders.
3. Restart the device in order to complete the uninstalling of the application.
M A N A G I N G A P P L I C A T I O N S E T T I N G S
17
AUTOMATIC DELETION OF THE APPLICATION
If the administrator deletes the application through remote administration and you have given the secret application code,
the Kaspersky Endpoint Security 8 for Smartphone screen automatically opens, where you will be asked to take the
necessary actions to delete the application.
To delete the application,
enter the secret code and click OK on the Kaspersky Endpoint Security 8 for Smartphone screen.
A window opens with confirmation of the application being deleted. Confirm the uninstalling of the application by
pressing the Yes button.
If hiding confidential information is enabled on your device and / or just one folder is encrypted by Kaspersky
Endpoint Security 8 for Smartphone, the application invites you to disable hiding confidential data and / or decrypt all
folders.
The application is deleted from the device and no notification of the deletion of the application is shown.
If you refuse to delete the application, deletion is canceled. In this case, a second attempt at deletion will be made on the
next synchronization with the remote administration system. You will then be asked to delete the application again.
MANAGING APPLICATION SETTINGS
All the operation settings for Kaspersky Endpoint Security 8 for Smartphone, including the license, are configured by the
administrator through the remote administration system. The administrator can then allow or block the user changing the
values of these settings.
You can change the operating settings of the application on your mobile device if the administrator has not blocked the
changing of these parameters.
The administrator can block changing all or some components. If the component settings screen has a lock icon and a
warning message, the settings of the component cannot be accessed to be changed on the mobile device.
If the administrator changed the application settings, they will be transferred to the device through the remote
administration system. In this case the values of the application settings which the administrator has blocked will change.
Settings which the administrator has not blocked remain unchanged with the values that were configured earlier.
If the application settings were not received on the device or if you want to configure the values set by the administrator,
use synchronization of the device with the remote administration system (see Section "Start synchronization manually"
on page 20).
Only use the synchronization function under the administrator's guidance.
U S E R GU I D E
18
MANAGING THE LICENSE
IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 18
Installing a license ........................................................................................................................................................... 19
Viewing license information ............................................................................................................................................. 19
This section gives information about the application license, how to activate it and view information about it.
ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR
SMARTPHONE LICENSES
A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it
as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
License term – a period during which the additional services are offered:
technical support;
update the application's anti-virus databases.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license's period of validity, all application functions are accessible. Upon expiration of its validity period,
Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens, only the
following actions are available:
disabling the Encryption and Privacy Protection components;
users can decrypt folders previously selected by them for encryption;
disabling hiding of personal data;
viewing the application's help system;
synchronization with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
M A N A G I N G T H E L I C E N S E
19
On termination of its commercial license's validity, Kaspersky Endpoint Security 8 for Smartphone limits the
application's functionality. You can continue to use the Anti-Spam and Firewall components, perform an antivirus scan and use the protection components, but only using the anti-virus databases last updated on the date
of terminating the license's term of validity. For other application components, only the following actions are
available:
decryption of folders selected by the user for encryption;
disabling hiding of personal data;
viewing the application's help system;
INSTALLING A LICENSE
The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is
installed. During this time, the administrator installs the license through the remote administration system and the
application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are
accessible in this mode:
disabling all components;
encryption of one or several folders;
disabling hiding of personal data;
viewing application's help system.
If the license was not installed within three days, install it using synchronization of the device with the remote
administration system (see "Start synchronization manually" on page 20).
synchronization with the remote administration system.
VIEWING LICENSE INFORMATION
You can view the following license information: license number, type, activation date, expiration date, number of days to
expiration and device serial number.
To view the license information:
1. Select MenuAdditional.
This will open the Additional window.
2. Select About license.
U S E R GU I D E
20
SYNCHRONIZATION WITH THE REMOTE
ADMINISTRATION SYSTEM
During synchronization, the application settings configured by the administrator are transferred to the device. Operational
reports on the application components are transferred from the device to the remote administration system.
The device is automatically synchronized with the remote administration system.
If synchronization does not perform automatically, you can start it manually.
Manual synchronization is required in the following situations:
if the license was not installed within three days of the application being installed;
if the application settings given by the administrator were not received by the device.
According to the remote administration system chosen by the administrator to manage the application, the user may be
asked to enter connection settings to the remote administration system. In this case, the values set by the user manually
are accessible for changes from the application (see "Changing the synchronization settings" on page 20).
Change the settings for connection to the remote administration system only under the administrator's guidance.
START SYNCHRONIZATION MANUALLY
To manually synchronize the device with the remote administration system:
1. Select MenuAdditional.
This will open the Additional window.
2. Select Start synchronization.
If the user was not asked to enter the settings for connection to the remote administration system when
installing the application, a window appears with confirmation of the Internet connection setting. Allow
connection by pressing Yes. Internet connection with the remote administration system will be set.
If the user was asked to enter settings for connection to the remote administration system when installing the
application, the Synchronization screen opens. Select Start synchronization. Allow connection to the Internet
by pressing Yes. Internet connection with the remote administration system will be set.
G E T T I N G S T A R T E D
21
IN THIS SECTION
Starting the application .................................................................................................................................................... 21
Entering the secret code ................................................................................................................................................. 22
Updating the application's databases .............................................................................................................................. 22
Scanning the device for viruses ...................................................................................................................................... 23
Viewing information about the application ....................................................................................................................... 23
CHANGING THE SYNCHRONIZATION SETTINGS
Change the settings for connection to the remote administration system only under the administrator's guidance.
To change settings for connection to the remote administration:
1. Select MenuAdditional.
This will open the Additional window.
2. Select Synchronization.
This will open the Synchronization window.
3. Select Server settings.
4. Change the following settings:
Server;
Port.
5. Press OK.
GETTING STARTED
This section contains information about how to start working with Kaspersky Endpoint Security 8 for Smartphone: set the
application secret code, start the application, update anti-virus databases and scan the device for viruses.
STARTING THE APPLICATION
To start Kaspersky Endpoint Security 8 for Smartphone:
1. Select Start Applications.
2. Select KES 8 and start the application, using your stylus or the central button of your joystick.
3. Start entering the secret code of the application (see section "Entering the secret code" on page 22).
U S E R GU I D E
22
ENTERING THE SECRET CODE
After starting the application you will be asked to enter the application secret code. The secret code prevents
unauthorized access to the application settings. You can later change the secret code installed.
The secret code is requested in the following instances:
for access to the application;
for access to encrypted folders;
when sending an SMS command from another mobile device to start the following functions remotely: Block,
Data Wipe, SIM Watch, GPS Find, Privacy Protection;
when uninstalling the application.
Keep the secret code in mind. If you forget it, it will be impossible to manage the functions of Kaspersky Mobile
Security 8 or to obtain access to encrypted files and uninstall the application.
The secret code is comprised of numerals. It must contain at least four characters.
To enter the secret code:
1. After start for the first time, in the Enter new code field the figures which will be your code.
2. Re-enter the same code in the Confirm code field.
The code entered is automatically verified.
3. If the scan shows that the code is not reliable, a warning message appears and the application prompts for
confirmation. To use the code, press OK. In order to create a new code, press No.
4. On completion, press OK.
G E T T I N G S T A R T E D
23
UPDATING THE APPLICATION'S DATABASES
Kaspersky Endpoint Security 8 for Smartphone scans for threats based on the application's anti-virus databases, which
contain descriptions of all the malicious programs known to date and methods for neutralizing them and descriptions of
other unwanted objects. When installing the application, the anti-virus databases in the Kaspersky Endpoint Security 8
for Smartphone distribution package may be out of date.
We recommend you to update the application's anti-virus databases immediately after the application installation.
To update the application's anti-virus databases, you must have an Internet connection configured on your mobile
device.
To start the anti-virus database update process:
1. Select MenuAnti-Virus.
This will open the Anti-Virus window.
2. Select the Update item.
This will open the Update window.
3. Select the Update item.
The application starts the database updating process from the server indicated by the administrator. Information on the
update process is displayed on the screen.
SCANNING THE DEVICE FOR VIRUSES
After installing the application, it is recommended to immediately run a scan of your mobile device for malware objects.
You can start the scan with the current settings or set them in advance (see "Scan settings" on page 31).
To run a full scan of the device:
1. Select MenuAnti-Virus.
This will open the Anti-Virus window.
2. Select the Scan item.
This will open the Scan window.
3. Select Full scan.
U S E R GU I D E
24
VIEWING INFORMATION ABOUT THE APPLICATION
You can view general information about Kaspersky Endpoint Security 8 for Smartphone and its version.
To view information about the application:
1. Select MenuAdditional.
This will open the Additional window.
2. Select the About tab (see Figure below).
Figure 4: Information about the application
A P P L I C A T I O N I N T E R F A C E
25
IN THIS SECTION
Protection status window................................................................................................................................................. 25
Application menu ............................................................................................................................................................. 27
APPLICATION INTERFACE
The Kaspersky Endpoint Security 8 for Smartphone interface is simple and convenient. This section provides information
on its main elements.
PROTECTION STATUS WINDOW
The status of the application's main components is displayed in the current status window.
There are three possible statuses for every component, each is displayed with a color similar to the code of traffic lights.
The green light means that the protection of your device is provided at the necessary level. Yellow and red indicate
various types of threats. Threats do not only include outdated anti-virus application databases, but also, for instance,
disabled protection components or minimum application operation settings.
The status window is immediately accessible after starting the application and contains the following information:
Protection is the protection status in real-time mode (see "File system protection" section on page 28).
The green status icon displays that the Protection is active and ensured at the required level, and the
application's anti-virus databases are up to date.
The yellow icon indicates that the databases have not been updated for several days.
The red icon indicates problems that might lead to loss of data or infection of the device: for example, protection
is disabled or the application has not updated for more than two weeks.
Firewall is the level of protection of the device from unwanted network activity (see "Filtering network activity.
Firewall" section on page 78).
The green status icon shows that the component is active. Firewall mode is selected.
The red icon indicates that the firewall is disabled.
Anti-Theft – status of data protection in case the device is lost or stolen (see "Data protection in the event of
loss or theft of the device" section on page 55).
The green status icon means that the Anti-Theft function is active; its name is displayed under the component's
status.
The red colored icon shows that all Anti-Theft functions are disabled.
Privacy Protection is the status of hiding confidential information (see "Hiding confidential information" on
page 69).
The green status icon indicates that hiding confidential information is enabled. Confidential information is
hidden.
The yellow icon warns that hiding confidential information is disabled. Confidential information can be viewed.
U S E R GU I D E
26
License is the license's validity period (see the section "Managing the license" on page 17).
The green status icon means that the license's validity period ends within more than 14 days.
The yellow status icon means that the license's validity period ends within less than 14 days.
The red icon indicates that the license has expired or that it is not installed.
Figure 5: The application component status window
You can also go to the status window by selecting MenuProtection status.
A P P L I C A T I O N I N T E R F A C E
27
APPLICATION MENU
The application components are logically grouped and accessible in the application menu. Every menu item allows going
to the parameters of the selected component and protection tasks (see Figure below).
Figure 6: Application menu
The Kaspersky Endpoint Security 8 for Smartphone menu contains the following:
Anti-Virus: protection of the file system from viruses, on-demand scan and updating the application's anti-virus
databases.
Anti-Theft – protection of information on the device in the event of theft or loss.
Privacy Protection – hiding confidential information on the device.
Encryption – encryption of data on the device.
Anti-Spam: filtering of unwanted incoming calls and SMS.
Firewall – control of network activity.
Additional – general settings, start of synchronization of the device with the remote administration system,
information about application and license.
Protection status – information about the main application components.
Exit – exit from application settings configuration.
U S E R GU I D E
28
In order to open the application menu,
IN THIS SECTION
About Protection .............................................................................................................................................................. 28
Selecting the action to be performed on malicious objects.............................................................................................. 30
select Меnu.
To navigate through the application menu, use the device's joystick or stylus.
To return to the application:
select Menu Protection status.
To exit the application:
select Menu Exit.
FILE SYSTEM PROTECTION
This section provides information on the Protection component which enables avoidance of infections of your device's file
system. The section also describes how to activate/stop the Protection and adjust its operation settings.
ABOUT PROTECTION
Protection starts when operation system starts up and is always found in the device's memory. Protection is used to
monitor changes in file system the background mode and scans files for the malicious objects. Files are scanned
according to the following algorithm:
1. Protection scans every file when the user accesses it.
2. Protection analyses the file for the presence of malicious objects. Malicious objects are detected by comparison
with the application's anti-virus databases. Anti-virus databases contain descriptions of all currently known
malicious objects, and methods for neutralizing them.
3. According to the analysis results, the following types of Protection are possible:
If malicious code was detected in the file, the Protection blocks access to the file and performs the action
specified in the settings;
If no malicious code is discovered in the file, it will be immediately restored.
Information on results from the operation of Protection is saved in the application's log (see "Application logs" on page
92).
F I L E S Y S T E M P R O T E C T I O N
29
ACTIVATE/DEACTIVATE PROTECTION
When activating the Protection, all actions in the system are under permanent control.
To ensure the protection from malicious objects, the resources of the device are used. In order to reduce the load on the
device when executing several tasks, you can temporarily stop Protection.
The Kaspersky Lab specialists strongly recommend that you do not disable Protection, since this could lead to the
infection of your computer and data loss.
The current Protection status is displayed on the Anti-Virus tab next to the Protection menu item.
You can enable/disable the Protection as follows:
from the component settings menu;
from the Anti-Virus menu.
To modify the values of the settings, use the device's joystick or stylus.
To enable Protection:
1. Select MenuAnti-Virus.
This will open the Anti-Virus window.
2. Select the Protection item.
This will open the Settings window.
3. Check the Enable Protection box (see Figure below).
Figure 7: Enabling Protection
4. Press OK to save the changes.
U S E R GU I D E
30
To disable Protection:
1. Select MenuAnti-Virus.
This will open the Anti-Virus window.
2. Select the Protection item.
This will open the Settings window.
3. Uncheck the Enable Protection box.
4. Press OK to save the changes.
To quickly enable/disable the Protection:
1. Select MenuAnti-Virus.
2. This will open the Anti-Virus window.
3. Press the Enable / Disable. The name of the menu item will change to the opposite depending on the current
Protection status.
SELECTING THE ACTION TO BE PERFORMED ON
MALICIOUS OBJECTS
You can choose the activity which Kaspersky Endpoint Security 8 for Smartphone fulfills on the detected malicious
object.
To modify the values of the settings, use the device's joystick or stylus.
In order to change the values settings of the Protection, ensure that it is activated.
Loading...
+ 75 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.