KASPERSKY Endpoint Security User Manual

Kaspersky Endpoint Security 8 for Smartphone
for Microsoft
®
Windows® Mobile
User Guide
PROGRAM VERSION: 8.0
2
Dear User!
Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document for which the rights are held by third parties, or for any potential or actual losses associated with the use of these materials.
In this document, registered trademarks and service trademarks are used which are the property of the corresponding rights holders.
Revision date: 10.20.2010
© 1997-2010 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3
TABLE OF CONTENTS
ABOUT THIS HELP ....................................................................................................................................................... 6
ADDITIONAL DATA SOURCES .................................................................................................................................... 7
Information sources for further research ................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 8
Contacting the Documentation Development Group ................................................................................................ 8
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 9
What's new in Kaspersky Endpoint Security 8 for Smartphone .............................................................................. 10
Hardware and software requirements ..................................................................................................................... 10
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................. 11
Automatic installation of the application .................................................................................................................. 11
About installing the application through the computer ............................................................................................ 11
Installing the application through the computer ...................................................................................................... 12
About installing the application after receiving a message by email ....................................................................... 14
Installing the application after receiving a message by email ................................................................................. 14
UNINSTALLING THE APPLICATION .......................................................................................................................... 15
Manual deletion of the application .......................................................................................................................... 16
Automatic deletion of the application ...................................................................................................................... 17
MANAGING APPLICATION SETTINGS ...................................................................................................................... 17
MANAGING THE LICENSE ......................................................................................................................................... 18
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 18
Installing a license .................................................................................................................................................. 19
Viewing license information .................................................................................................................................... 19
SYNCHRONIZATION WITH THE REMOTE ADMINISTRATION SYSTEM ................................................................. 20
Start synchronization manually ............................................................................................................................... 20
Changing the synchronization settings ................................................................................................................... 21
GETTING STARTED.................................................................................................................................................... 21
Starting the application ........................................................................................................................................... 21
Entering the secret code ......................................................................................................................................... 22
Updating the application's databases ..................................................................................................................... 23
Scanning the device for viruses .............................................................................................................................. 23
Viewing information about the application .............................................................................................................. 24
APPLICATION INTERFACE ........................................................................................................................................ 25
Protection status window ........................................................................................................................................ 25
Application menu .................................................................................................................................................... 27
FILE SYSTEM PROTECTION ..................................................................................................................................... 28
About Protection ..................................................................................................................................................... 28
Activate/Deactivate Protection ................................................................................................................................ 29
Selecting the action to be performed on malicious objects ..................................................................................... 30
SCANNING THE DEVICE ............................................................................................................................................ 32
About on-demand scans ......................................................................................................................................... 32
Starting a scan manually ........................................................................................................................................ 33
U S E R GU I D E
4
Starting a scheduled scan ...................................................................................................................................... 35
Selection of object type to be scanned ................................................................................................................... 36
Configuring archive scans ...................................................................................................................................... 37
Selecting the action to be performed on detected objects ...................................................................................... 37
QUARANTINING MALWARE OBJECTS ..................................................................................................................... 39
About Quarantine ................................................................................................................................................... 39
Viewing quarantined objects ................................................................................................................................... 40
Restoring objects from Quarantine ......................................................................................................................... 41
Deleting objects from Quarantine ........................................................................................................................... 41
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 42
About Anti-Spam .................................................................................................................................................... 42
Anti-Spam modes ................................................................................................................................................... 43
Changing the Anti-Spam mode ............................................................................................................................... 44
Creating a Black List ............................................................................................................................................... 44
Adding entries to the Black List ......................................................................................................................... 45
Editing entries in the Black List ......................................................................................................................... 47
Deleting entries from the Black List ................................................................................................................... 47
Creating a White List .............................................................................................................................................. 48
Adding entries to the White List ........................................................................................................................ 48
Editing entries in the White List ......................................................................................................................... 50
Deleting entries from the White List .................................................................................................................. 51
Response to SMS messages and calls from numbers not in Contacts .................................................................. 51
Responding to SMS messages from non-numeric numbers................................................................................... 53
Selecting a response to incoming SMS .................................................................................................................. 54
Selecting a response to incoming calls ................................ ................................................................................... 55
DATA PROTECTION IN THE EVENT OF LOSS OR THEFT OF THE DEVICE .......................................................... 56
About Anti-Theft ...................................................................................................................................................... 57
Blocking the device ................................................................................................................................................. 58
Deleting personal data ................................ ................................ ............................................................................ 60
Creating a list of folders to delete ........................................................................................................................... 63
Monitoring the replacement of a SIM card on the device ................................ ........................................................ 64
Determining the device's geographical coordinates................................................................................................ 65
Remote start of the Anti-Theft functions ................................................................................................................. 68
PRIVACY PROTECTION ............................................................................................................................................. 69
Privacy Protection ................................................................................................................................................... 69
Privacy Protection modes ....................................................................................................................................... 69
Enabling/disabling Privacy Protection ................................................................................................ ..................... 70
Enabling Privacy Protection automatically .............................................................................................................. 71
Enabling Privacy Protection remotely ..................................................................................................................... 72
Creating a list of private numbers ........................................................................................................................... 74
Adding a number to the list of private numbers ................................................................................................. 75
Editing a number in the list of private numbers ................................................................................................. 76
Deleting a number from the list of private numbers ........................................................................................... 76
Selecting data to hide: Privacy Protection .............................................................................................................. 77
FILTERING NETWORK ACTIVITY. FIREWALL .......................................................................................................... 79
About Firewall ......................................................................................................................................................... 79
Firewall modes ....................................................................................................................................................... 79
T A B L E O F C O N T E N T S
5
Selecting the Firewall mode .................................................................................................................................... 80
Notifications about blocked connections ................................................................................................................. 81
ENCRYPTING PERSONAL DATA ............................................................................................................................... 82
About Encryption .................................................................................................................................................... 82
Data encryption ...................................................................................................................................................... 82
Data decryption ...................................................................................................................................................... 84
Blocking access to encrypted data ......................................................................................................................... 86
UPDATING THE APPLICATION'S DATABASES ........................................................................................................ 87
About updating the application's databases ........................................................................................................... 88
Viewing database information ................................................................................................................................. 89
Updating Manually .................................................................................................................................................. 90
Starting scheduled updates .................................................................................................................................... 90
Updating while roaming .......................................................................................................................................... 91
APPLICATION LOGS................................................................................................................................................... 92
About logs ............................................................................................................................................................... 92
Viewing Log records ............................................................................................................................................... 93
Deleting Log records .............................................................................................................................................. 94
CONFIGURING ADDITIONAL SETTINGS .................................................................................................................. 94
Changing the secret code ................................................................ ....................................................................... 94
Displaying prompts ................................................................................................................................................. 95
Configuring sound notifications ............................................................................................................................... 96
GLOSSARY ................................................................................................................................................................. 97
KASPERSKY LAB ...................................................................................................................................................... 100
INFORMATION ABOUT THIRD-PARTY CODE ........................................................................................................ 101
INDEX ........................................................................................................................................................................ 102
6

ABOUT THIS HELP

This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The document is designed for a wide audience.
Objectives of the document:
help the user independently set up the application on on a mobile device, activate it and optimize the application
for their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving
technical support.
7

ADDITIONAL DATA SOURCES

IN THIS SECTION
Information sources for further research ........................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 8
Contacting the Documentation Development Group ......................................................................................................... 8
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers from them, using various sources of information. You can choose the most suitable source according to how important or urgent your request is.

INFORMATION SOURCES FOR FURTHER RESEARCH

You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application's Knowledge Base page at the Technical Support Service website;
the installed Help system;
the installed application documentation.
Page on Kaspersky Lab website
www.kaspersky.com/endpoint-security-smartphone
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and options.
The application's page at the Technical Support Service website (Knowledge Base).
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics, such as "Work with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also contain news from the Technical Support Service.
The installed Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
U S E R GU I D E
8
The installed Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF format). This document describes how to install and uninstall the application, manage its settings, start working with the application, configure the settings of its components. The document describes the application interface and the capabilities offered for typical application tasks.

DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE WEB FORUM

If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine for specific enquiries.

CONTACTING THE DOCUMENTATION DEVELOPMENT GROUP

If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment, please contact our User documentation development group. To contact the Documentation Development Group send an email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8 for Smartphone".
9

KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

Kaspersky Endpoint Security 8 for Smartphone protects mobile devices working on the Microsoft® Windows® Mobile platform. The application can protect information on the device from infection by known threats, prevent unwanted SMS messages and calls, control the network connection on the device, encrypt information, hide it for confidential contacts and also protect information if the device is lost or stolen. Every type of threat is processed in separate components of the program. This allows to fine-tune the application settings depending on user needs. The administrator installs the application and configures settings using the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Virus folder. It protects the file system of the mobile device from viruses and other malicious applications.
Anti-Virus can detect and neutralize malicious objects on your device and update the application's anti-virus databases.
Anti-Spam. Scans all incoming SMS messages and calls for spam. The component allows the flexible blocking
of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored there, and pinpoint its geographic location (if your mobile device has a GPS receiver) using SMS commands from another device. Furthermore, Anti-Theft allows you to lock your device if the SIM card is replaced or if the device is activated without a SIM card.
Privacy Protection. It hides information related to confidential numbers from the contact list. For these
numbers, Privacy Protection hides entries in Contacts, SMS messages in the call log and new SMS messages received and incoming calls.
Firewall folder. Checks the network connections on your mobile device. Firewall sets the connections which will
be permitted or prohibited.
Encryption folder. This protects information in encrypted mode. The component encrypts any amount of non-
system folders which are in the device memory or on storage cards. Access to files from encrypted folders is only possible after entering the secret application code.
Furthermore, the application contains a series of service functions which allow maintaining the application in up-to-date condition, expanding the application's options of use and supporting the user in his operations:
Protection status. The status of the program's components is displayed on screen. Based on the information
presented, you can evaluate the current information protection status on your device.
Update the application's anti-virus databases. The function allows you to keep Kaspersky Endpoint Security 8
for Smartphone databases up to date.
Events log. The application for each component has its own Events log with information on the operation of the
component (e.g. scan report, update of anti-virus databases, information about blocked files). Reports on the operation of components are given in the remote administration system and remain in it.
Kaspersky Endpoint Security 8 for Smartphone does not back up and then restore data.
U S E R GU I D E
10
IN THIS SECTION
What's new in Kaspersky Endpoint Security 8 for Smartphone ....................................................................................... 10
Hardware and software requirements ............................................................................................................................. 10

WHAT'S NEW IN KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

Let's take a closer look at the innovations in Kaspersky Endpoint Security 8 for Smartphone.
New protection:
Access to the application is protected by a secret code.
The list of executable files scanned by Protection and Scan in the event of the type of executable files being
limited is expanded. The application's executable files of the following formats are scanned: EXE, DLL, MDL, APP, RDL, PRT, PXT, LDD, PDD, CLASS. The list of scanned archives is also expanded. The application unpacks and scans the archives of the following formats: ZIP, JAR, JAD, RAR and CAB.
Privacy Protection can hide the following information for confidential contacts: entries in Contacts, SMS
correspondence and new incoming SMS messages and incoming calls. Confidential information is accessible for viewing for hiding is disabled.
Encryption allows encrypting folders saved in the device's memory or on a memory card. The component
protects confidential data in encrypted mode and allows access to encrypted information only when the application secret code is entered.
A new function GPS Find is enabled in the updated Anti-Theft: if the device is lost or stolen, its geographical
coordinates can be picked up on a telephone number or indicated email address. Also, in Anti-Theft, an updated function Data Wipe can remotely delete not just the user's personal information kept in the memory of the telephone or on the storage card, but also files from the list of folders to be deleted.
To economize on traffic, an option has been added to automatically disable application database updates when
the mobile device is in a roaming zone.
A new service function has been added, called Display prompts: Kaspersky Endpoint Security 8 for Smartphone
shows a short description of a component before configuration of its settings.

HARDWARE AND SOFTWARE REQUIREMENTS

Kaspersky Endpoint Security 8 for Smartphone is designed for installation on mobile devices running one of the following operating systems:
Microsoft Windows Mobile 5.0;
Microsoft Windows Mobile 6.0, 6.1, 6.5.
For some remote administration systems, devices with Microsoft Windows Mobile 5.0 are not supported. Check with the administrator which operating systems are supported.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11

INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration. According to the user's means of administration, installation can be automatic or require further input from the user.
If the user's further input is needed to install the application, the installation will proceed in one of the following ways:
The Kaspersky Endpoint Security 8 for Smartphone application installation utility of the same name is installed
on your computer. With its help, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile device.
A message from the administrator with the distribution package or an indication to download it comes to your
email address. You install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using information from the message.
This section gives the preparatory actions for installing Kaspersky Endpoint Security 8 for Smartphone, it describes the different ways of installing applications on the mobile device and what the user has to do for each of them.

AUTOMATIC INSTALLATION OF THE APPLICATION

The Administrator installs the application on the device using remote administration.
As a result, the Kaspersky Endpoint Security 8 for Smartphone distribution package is sent to your device and the application is automatically installed.
Installation is by one of the following means:
The application automatically installs on the device without the user's intervention. The application's installation
status is not given.
The application shows the installation status. At the end of installation, an installation successful message will
appear on the screen of the device.
The automatic installation process depends on the remote administration with which the administrator performs remote installation of the application.
Contact the administrator if any errors occur during the installation process.
ABOUT INSTALLING THE APPLICATION THROUGH THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can install Kaspersky Endpoint Security 8 for Smartphone on the mobile devices connected to this computer. The Kaspersky Endpoint Security 8 for Smartphone supply utility contains the application distribution package and provides it to the mobile device. After it is installed on the workstation, the utility automatically launches and monitors the connection of mobile devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the device satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application on it.
Installation is only possible if Microsoft ActiveSync® is installed on the computer.
U S E R GU I D E
12

INSTALLING THE APPLICATION THROUGH THE COMPUTER

If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices to the computer.
To install the application on a mobile device:
1. Connect the mobile device to the computer using Microsoft ActiveSync. If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1: Kaspersky Endpoint Security 8 for Smartphone installation application
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
13
2. Press the Continue button.
The KES 8 window opens with a list of connected devices found.
If more than one device which satisfies the system requirements is connected to the computer, they are shown in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be installed. Do this by checking the boxes next to the names of the devices.
Figure 2: Selection of devices for installation of Kaspersky Endpoint Security 8 for Smartphone
4. Press Install button.
The utility puts the distribution package on the selected devices. The KES 8 window on the computer shows the status of the transfer of the distribution package.
After the distribution package is transferred onto the chosen devices, application installation starts automatically.
If during the application installation process errors occurred, contact the administrator. To block the installation of
Kaspersky Endpoint Security 8 for Smartphone with the following devices connected to the computer,
check in the KES 8 window the box Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone Installation Wizard.
U S E R GU I D E
14
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A MESSAGE BY EMAIL
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application's connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.
INSTALLING THE APPLICATION AFTER RECEIVING A
MESSAGE BY EMAIL
To install Kaspersky Endpoint Security 8 for Smartphone:
1. On the mobile device or the workstation, open the message from the administrator which contains the application installation settings.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
If you download the distribution package to a mobile device, it will be saved by default into My documents.
3. Perform one of the following actions:
if you downloaded the distribution package to the mobile device, open it;
if you downloaded the distribution package to the workstation connect the device to it with Microsoft
ActiveSync, copy the distribution package to the device and open it.
Installation starts automatically and the application will be installed on the device.
4. Run the application (see "Starting the application" on page 21). Select Start Applications KES 8 and launch the application using the stylus or the central button on your joystick.
5. Set the application secret code (see "Entering the secret code" on page. 22). To do this you have to fill in the Enter new code and Confirm code fields and press OK.
This will open Synchronization settings window.
U N I N S T A L L I N G T H E A P P L I C A T I O N
15
6. Show the values for the settings to connect to the remote administration system if they were given when you received the message from the administrator. Enter the values for the following settings:
Server;
Port;
Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will not be present.
7. In the Your email address field, enter your business email address and press OK.
Enter the email address correctly since it is used to register the device on the remote administration system.
Contact the administrator if any errors occur during the installation process.

UNINSTALLING THE APPLICATION

The application can be deleted from the device in one of the following ways:
manually by the user (see section "Manual deletion of the application" on page. 15);
remotely by the administrator with the remote administration system.
The following actions are performed automatically when deleting:
Hiding of information is automatically disabled.
Data on the device is decrypted if it was encrypted by Kaspersky Endpoint Security 8 for Smartphone.
On automatic deletion (see Section "Automatic deletion of the application" on page 17), if the secret code was set for the application, the user may have to take additional action in the following cases.
If the application did not start and the secret code was not set, then automatic deletion will occur without input from the user.
U S E R GU I D E
16

MANUAL DELETION OF THE APPLICATION

To manually delete the application:
1. Close Kaspersky Endpoint Security 8 for Smartphone. To do this, press Menu Exit.
2. Uninstall Kaspersky Endpoint Security 8 for Smartphone. To do this, perform the following actions:
a. Press Start Settings.
b. Select Remove Programs on the System tab (see Figure below).
Figure 3: The System tab
c. Select KES 8 from the list of installed applications and press Delete.
d. Confirm deletion of the application by clicking Yes in the window that opens.
e. Enter the secret code and press OK.
f. Specify whether it is necessary to keep the application settings and objects in Quarantine:
to save the application settings and the quarantined objects, press Save;
in order to delete the application in full, press Delete.
The deletion of the application begins.
If hiding confidential information is enabled on your device and / or just one folder is encrypted by Kaspersky Endpoint Security 8 for Smartphone, the application invites you to disable hiding confidential data and / or decrypt all folders.
3. Restart the device in order to complete the uninstalling of the application.
M A N A G I N G A P P L I C A T I O N S E T T I N G S
17

AUTOMATIC DELETION OF THE APPLICATION

If the administrator deletes the application through remote administration and you have given the secret application code, the Kaspersky Endpoint Security 8 for Smartphone screen automatically opens, where you will be asked to take the necessary actions to delete the application.
To delete the application,
enter the secret code and click OK on the Kaspersky Endpoint Security 8 for Smartphone screen.
A window opens with confirmation of the application being deleted. Confirm the uninstalling of the application by pressing the Yes button.
If hiding confidential information is enabled on your device and / or just one folder is encrypted by Kaspersky Endpoint Security 8 for Smartphone, the application invites you to disable hiding confidential data and / or decrypt all folders.
The application is deleted from the device and no notification of the deletion of the application is shown.
If you refuse to delete the application, deletion is canceled. In this case, a second attempt at deletion will be made on the next synchronization with the remote administration system. You will then be asked to delete the application again.

MANAGING APPLICATION SETTINGS

All the operation settings for Kaspersky Endpoint Security 8 for Smartphone, including the license, are configured by the administrator through the remote administration system. The administrator can then allow or block the user changing the values of these settings.
You can change the operating settings of the application on your mobile device if the administrator has not blocked the changing of these parameters.
The administrator can block changing all or some components. If the component settings screen has a lock icon and a warning message, the settings of the component cannot be accessed to be changed on the mobile device.
If the administrator changed the application settings, they will be transferred to the device through the remote administration system. In this case the values of the application settings which the administrator has blocked will change. Settings which the administrator has not blocked remain unchanged with the values that were configured earlier.
If the application settings were not received on the device or if you want to configure the values set by the administrator, use synchronization of the device with the remote administration system (see Section "Start synchronization manually" on page 20).
Only use the synchronization function under the administrator's guidance.
U S E R GU I D E
18

MANAGING THE LICENSE

IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 18
Installing a license ........................................................................................................................................................... 19
Viewing license information ............................................................................................................................................. 19
This section gives information about the application license, how to activate it and view information about it.

ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE LICENSES

A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
License term – a period during which the additional services are offered:
technical support;
update the application's anti-virus databases.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license's period of validity, all application functions are accessible. Upon expiration of its validity period, Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens, only the following actions are available:
disabling the Encryption and Privacy Protection components;
users can decrypt folders previously selected by them for encryption;
disabling hiding of personal data;
viewing the application's help system;
synchronization with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
M A N A G I N G T H E L I C E N S E
19
On termination of its commercial license's validity, Kaspersky Endpoint Security 8 for Smartphone limits the application's functionality. You can continue to use the Anti-Spam and Firewall components, perform an anti­virus scan and use the protection components, but only using the anti-virus databases last updated on the date of terminating the license's term of validity. For other application components, only the following actions are available:
disabling Encryption, Anti-Theft, Privacy Protection components;
decryption of folders selected by the user for encryption;
disabling hiding of personal data;
viewing the application's help system;

INSTALLING A LICENSE

The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is installed. During this time, the administrator installs the license through the remote administration system and the application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are accessible in this mode:
disabling all components;
encryption of one or several folders;
disabling hiding of personal data;
viewing application's help system.
If the license was not installed within three days, install it using synchronization of the device with the remote administration system (see "Start synchronization manually" on page 20).
synchronization with the remote administration system.

VIEWING LICENSE INFORMATION

You can view the following license information: license number, type, activation date, expiration date, number of days to expiration and device serial number.
To view the license information:
1. Select Menu Additional.
This will open the Additional window.
2. Select About license.
U S E R GU I D E
20

SYNCHRONIZATION WITH THE REMOTE ADMINISTRATION SYSTEM

During synchronization, the application settings configured by the administrator are transferred to the device. Operational reports on the application components are transferred from the device to the remote administration system.
The device is automatically synchronized with the remote administration system.
If synchronization does not perform automatically, you can start it manually.
Manual synchronization is required in the following situations:
if the license was not installed within three days of the application being installed;
if the application settings given by the administrator were not received by the device.
According to the remote administration system chosen by the administrator to manage the application, the user may be asked to enter connection settings to the remote administration system. In this case, the values set by the user manually are accessible for changes from the application (see "Changing the synchronization settings" on page 20).
Change the settings for connection to the remote administration system only under the administrator's guidance.

START SYNCHRONIZATION MANUALLY

To manually synchronize the device with the remote administration system:
1. Select Menu Additional.
This will open the Additional window.
2. Select Start synchronization.
If the user was not asked to enter the settings for connection to the remote administration system when installing the application, a window appears with confirmation of the Internet connection setting. Allow connection by pressing Yes. Internet connection with the remote administration system will be set.
If the user was asked to enter settings for connection to the remote administration system when installing the application, the Synchronization screen opens. Select Start synchronization. Allow connection to the Internet by pressing Yes. Internet connection with the remote administration system will be set.
G E T T I N G S T A R T E D
21
IN THIS SECTION
Starting the application .................................................................................................................................................... 21
Entering the secret code ................................................................................................................................................. 22
Updating the application's databases .............................................................................................................................. 22
Scanning the device for viruses ...................................................................................................................................... 23
Viewing information about the application ....................................................................................................................... 23

CHANGING THE SYNCHRONIZATION SETTINGS

Change the settings for connection to the remote administration system only under the administrator's guidance.
To change settings for connection to the remote administration:
1. Select Menu Additional.
This will open the Additional window.
2. Select Synchronization.
This will open the Synchronization window.
3. Select Server settings.
4. Change the following settings:
Server;
Port.
5. Press OK.

GETTING STARTED

This section contains information about how to start working with Kaspersky Endpoint Security 8 for Smartphone: set the application secret code, start the application, update anti-virus databases and scan the device for viruses.

STARTING THE APPLICATION

To start Kaspersky Endpoint Security 8 for Smartphone:
1. Select Start Applications.
2. Select KES 8 and start the application, using your stylus or the central button of your joystick.
3. Start entering the secret code of the application (see section "Entering the secret code" on page 22).
U S E R GU I D E
22

ENTERING THE SECRET CODE

After starting the application you will be asked to enter the application secret code. The secret code prevents unauthorized access to the application settings. You can later change the secret code installed.
The secret code is requested in the following instances:
for access to the application;
for access to encrypted folders;
when sending an SMS command from another mobile device to start the following functions remotely: Block,
Data Wipe, SIM Watch, GPS Find, Privacy Protection;
when uninstalling the application.
Keep the secret code in mind. If you forget it, it will be impossible to manage the functions of Kaspersky Mobile Security 8 or to obtain access to encrypted files and uninstall the application.
The secret code is comprised of numerals. It must contain at least four characters.
To enter the secret code:
1. After start for the first time, in the Enter new code field the figures which will be your code.
2. Re-enter the same code in the Confirm code field.
The code entered is automatically verified.
3. If the scan shows that the code is not reliable, a warning message appears and the application prompts for confirmation. To use the code, press OK. In order to create a new code, press No.
4. On completion, press OK.
G E T T I N G S T A R T E D
23

UPDATING THE APPLICATION'S DATABASES

Kaspersky Endpoint Security 8 for Smartphone scans for threats based on the application's anti-virus databases, which contain descriptions of all the malicious programs known to date and methods for neutralizing them and descriptions of other unwanted objects. When installing the application, the anti-virus databases in the Kaspersky Endpoint Security 8 for Smartphone distribution package may be out of date.
We recommend you to update the application's anti-virus databases immediately after the application installation.
To update the application's anti-virus databases, you must have an Internet connection configured on your mobile device.
To start the anti-virus database update process:
1. Select Menu Anti-Virus.
This will open the Anti-Virus window.
2. Select the Update item.
This will open the Update window.
3. Select the Update item.
The application starts the database updating process from the server indicated by the administrator. Information on the update process is displayed on the screen.

SCANNING THE DEVICE FOR VIRUSES

After installing the application, it is recommended to immediately run a scan of your mobile device for malware objects.
You can start the scan with the current settings or set them in advance (see "Scan settings" on page 31).
To run a full scan of the device:
1. Select Menu Anti-Virus.
This will open the Anti-Virus window.
2. Select the Scan item.
This will open the Scan window.
3. Select Full scan.
U S E R GU I D E
24

VIEWING INFORMATION ABOUT THE APPLICATION

You can view general information about Kaspersky Endpoint Security 8 for Smartphone and its version.
To view information about the application:
1. Select Menu Additional.
This will open the Additional window.
2. Select the About tab (see Figure below).
Figure 4: Information about the application
A P P L I C A T I O N I N T E R F A C E
25
IN THIS SECTION
Protection status window................................................................................................................................................. 25
Application menu ............................................................................................................................................................. 27

APPLICATION INTERFACE

The Kaspersky Endpoint Security 8 for Smartphone interface is simple and convenient. This section provides information on its main elements.

PROTECTION STATUS WINDOW

The status of the application's main components is displayed in the current status window.
There are three possible statuses for every component, each is displayed with a color similar to the code of traffic lights. The green light means that the protection of your device is provided at the necessary level. Yellow and red indicate various types of threats. Threats do not only include outdated anti-virus application databases, but also, for instance, disabled protection components or minimum application operation settings.
The status window is immediately accessible after starting the application and contains the following information:
Protection is the protection status in real-time mode (see "File system protection" section on page 28).
The green status icon displays that the Protection is active and ensured at the required level, and the application's anti-virus databases are up to date.
The yellow icon indicates that the databases have not been updated for several days.
The red icon indicates problems that might lead to loss of data or infection of the device: for example, protection is disabled or the application has not updated for more than two weeks.
Firewall is the level of protection of the device from unwanted network activity (see "Filtering network activity.
Firewall" section on page 78).
The green status icon shows that the component is active. Firewall mode is selected.
The red icon indicates that the firewall is disabled.
Anti-Theft – status of data protection in case the device is lost or stolen (see "Data protection in the event of
loss or theft of the device" section on page 55).
The green status icon means that the Anti-Theft function is active; its name is displayed under the component's status.
The red colored icon shows that all Anti-Theft functions are disabled.
Privacy Protection is the status of hiding confidential information (see "Hiding confidential information" on
page 69).
The green status icon indicates that hiding confidential information is enabled. Confidential information is hidden.
The yellow icon warns that hiding confidential information is disabled. Confidential information can be viewed.
U S E R GU I D E
26
License is the license's validity period (see the section "Managing the license" on page 17).
The green status icon means that the license's validity period ends within more than 14 days.
The yellow status icon means that the license's validity period ends within less than 14 days.
The red icon indicates that the license has expired or that it is not installed.
Figure 5: The application component status window
You can also go to the status window by selecting Menu Protection status.
A P P L I C A T I O N I N T E R F A C E
27

APPLICATION MENU

The application components are logically grouped and accessible in the application menu. Every menu item allows going to the parameters of the selected component and protection tasks (see Figure below).
Figure 6: Application menu
The Kaspersky Endpoint Security 8 for Smartphone menu contains the following:
Anti-Virus: protection of the file system from viruses, on-demand scan and updating the application's anti-virus
databases.
Anti-Theft – protection of information on the device in the event of theft or loss.
Privacy Protection – hiding confidential information on the device.
Encryption – encryption of data on the device.
Anti-Spam: filtering of unwanted incoming calls and SMS.
Firewall – control of network activity.
Additional – general settings, start of synchronization of the device with the remote administration system,
information about application and license.
Protection status – information about the main application components.
Exit – exit from application settings configuration.
U S E R GU I D E
28
In order to open the application menu,
IN THIS SECTION
About Protection .............................................................................................................................................................. 28
Activate/Deactivate Protection ........................................................................................................................................ 28
Selecting the action to be performed on malicious objects.............................................................................................. 30
select Меnu.
To navigate through the application menu, use the device's joystick or stylus.
To return to the application:
select Menu Protection status.
To exit the application:
select Menu Exit.

FILE SYSTEM PROTECTION

This section provides information on the Protection component which enables avoidance of infections of your device's file system. The section also describes how to activate/stop the Protection and adjust its operation settings.

ABOUT PROTECTION

Protection starts when operation system starts up and is always found in the device's memory. Protection is used to monitor changes in file system the background mode and scans files for the malicious objects. Files are scanned according to the following algorithm:
1. Protection scans every file when the user accesses it.
2. Protection analyses the file for the presence of malicious objects. Malicious objects are detected by comparison with the application's anti-virus databases. Anti-virus databases contain descriptions of all currently known malicious objects, and methods for neutralizing them.
3. According to the analysis results, the following types of Protection are possible:
If malicious code was detected in the file, the Protection blocks access to the file and performs the action
specified in the settings;
If no malicious code is discovered in the file, it will be immediately restored.
Information on results from the operation of Protection is saved in the application's log (see "Application logs" on page
92).
F I L E S Y S T E M P R O T E C T I O N
29

ACTIVATE/DEACTIVATE PROTECTION

When activating the Protection, all actions in the system are under permanent control.
To ensure the protection from malicious objects, the resources of the device are used. In order to reduce the load on the device when executing several tasks, you can temporarily stop Protection.
The Kaspersky Lab specialists strongly recommend that you do not disable Protection, since this could lead to the infection of your computer and data loss.
The current Protection status is displayed on the Anti-Virus tab next to the Protection menu item.
You can enable/disable the Protection as follows:
from the component settings menu;
from the Anti-Virus menu.
To modify the values of the settings, use the device's joystick or stylus.
To enable Protection:
1. Select Menu Anti-Virus.
This will open the Anti-Virus window.
2. Select the Protection item.
This will open the Settings window.
3. Check the Enable Protection box (see Figure below).
Figure 7: Enabling Protection
4. Press OK to save the changes.
U S E R GU I D E
30
To disable Protection:
1. Select Menu Anti-Virus.
This will open the Anti-Virus window.
2. Select the Protection item.
This will open the Settings window.
3. Uncheck the Enable Protection box.
4. Press OK to save the changes.
To quickly enable/disable the Protection:
1. Select Menu Anti-Virus.
2. This will open the Anti-Virus window.
3. Press the Enable / Disable. The name of the menu item will change to the opposite depending on the current Protection status.
SELECTING THE ACTION TO BE PERFORMED ON
MALICIOUS OBJECTS
You can choose the activity which Kaspersky Endpoint Security 8 for Smartphone fulfills on the detected malicious object.
To modify the values of the settings, use the device's joystick or stylus.
In order to change the values settings of the Protection, ensure that it is activated.
Loading...
+ 75 hidden pages