Kaspersky ENDPOINT SECURITY 8.0 FOR MAC User Manual

Page 1
Kaspersky Endpoint Security 8 for Smartphone
for BlackBerry
®
OS
PROGRAM VERSION: 8.0
Page 2
2
Dear User!
Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
Warning! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document for which the rights are held by third parties, or for any potential or actual losses associated with the use of these materials.
In this document, registered trademarks and service trademarks are used which are the property of the corresponding rights holders.
Revision date: 20.10.2010
© 1997-2010 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
Page 3
3
TABLE OF CONTENTS
ABOUT THIS GUIDE ..................................................................................................................................................... 5
ADDITIONAL DATA SOURCES .................................................................................................................................... 6
Information sources for further research ................................ ................................................................................... 6
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 7
Contacting the Documentation Development Group ................................................................................................ 7
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 8
HARDWARE AND SOFTWARE REQUIREMENTS ....................................................................................................... 9
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................... 9
About installing the application through the computer .............................................................................................. 9
Installing the application through the computer ...................................................................................................... 10
About installing the application after receiving a message by email ....................................................................... 12
Installing the application after receiving a message by email ................................................................................. 12
MANAGING APPLICATION SETTINGS ...................................................................................................................... 13
UNINSTALLING THE APPLICATION .......................................................................................................................... 14
MANAGING THE LICENSE ......................................................................................................................................... 15
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 15
Installing a license .................................................................................................................................................. 16
Viewing license information .................................................................................................................................... 16
SYNCHRONIZING THE DEVICE WITH THE REMOTE ADMINISTRATION SYSTEM ............................................... 16
Start synchronization manually ............................................................................................................................... 17
Changing the synchronization settings ................................................................................................................... 18
GETTING STARTED.................................................................................................................................................... 19
Starting the application ........................................................................................................................................... 19
Entering the secret code ......................................................................................................................................... 19
Viewing information about the application .............................................................................................................. 20
APPLICATION INTERFACE ........................................................................................................................................ 20
Application menu .................................................................................................................................................... 20
Protection status window ........................................................................................................................................ 21
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 21
About Anti-Spam .................................................................................................................................................... 22
Anti-Spam modes ................................................................................................................................................... 22
Changing the Anti-Spam mode ............................................................................................................................... 23
Creating a Black List ............................................................................................................................................... 24
Adding entries to the Black List ......................................................................................................................... 24
Editing entries in the Black List ................................................................................................ ......................... 25
Deleting entries from the Black List ................................................................................................................... 26
Creating a White List .............................................................................................................................................. 26
Adding entries to the White List ........................................................................................................................ 27
Editing entries in the White List ......................................................................................................................... 28
Deleting entries from the White List .................................................................................................................. 29
Responding to SMS messages and calls from contacts not in the phone book...................................................... 30
Page 4
U S E R G U I D E
4
Responding to SMS messages from non-numeric numbers................................................................................... 31
Selecting a response to incoming SMS .................................................................................................................. 32
Selecting a response to incoming calls ................................................................................................ ................... 33
DATA PROTECTION IN THE EVENT OF LOSS OR THEFT OF THE DEVICE .......................................................... 34
About Anti-Theft ...................................................................................................................................................... 34
Blocking the device ................................................................................................................................................. 35
Deleting personal data ............................................................................................................................................ 36
Creating a list of folders to delete ........................................................................................................................... 38
Monitoring the replacement of a SIM card on the device ................................................................ ........................ 40
Determining the device's geographical coordinates................................................................................................ 41
Remote start of the Anti-Theft functions ................................................................................................................. 43
APPLICATION LOGS................................................................................................................................................... 44
About logs ............................................................................................................................................................... 44
Viewing Log records ............................................................................................................................................... 44
Deleting Log records .............................................................................................................................................. 44
CONFIGURING ADDITIONAL SETTINGS .................................................................................................................. 45
Changing the secret code ....................................................................................................................................... 45
Displaying prompts ................................................................................................................................................. 45
GLOSSARY ................................................................................................................................................................. 46
KASPERSKY LAB ........................................................................................................................................................ 48
INFORMATION ABOUT THIRD-PARTY CODE .......................................................................................................... 49
INDEX .......................................................................................................................................................................... 50
Page 5
5

ABOUT THIS GUIDE

This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The document is designed for a wide audience.
Objectives of the document:
help the user independently set up the application on a mobile device, activate it and optimize the application for
their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving
technical support.
Page 6
6

ADDITIONAL DATA SOURCES

IN THIS SECTION
Information sources for further research ........................................................................................................................... 6
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 7
Contacting the Documentation Development Group ......................................................................................................... 7
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers from them, using various sources of information. You can choose the most suitable source according to how important or urgent your request is.

INFORMATION SOURCES FOR FURTHER RESEARCH

You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application's Knowledge Base page at the Technical Support Service website;
the installed Help system;
the installed application documentation.
Page on Kaspersky Lab website
http://www.kaspersky.com/endpoint-security-smartphone
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and options.
The application's page at the Technical Support Service website (Knowledge Base).
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics, such as "Work with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also contain news from the Technical Support Service.
The installed Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
Page 7
A D D I T I O N A L D A T A S O U R C E S
7
The installed Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF format). This document describes how to install and uninstall the application, manage its settings, start working with the application, configure the settings of its components. The document describes the application interface and the capabilities offered for typical application tasks.

DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE WEB FORUM

If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine for specific enquiries.

CONTACTING THE DOCUMENTATION DEVELOPMENT GROUP

If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment, please contact our User documentation development group. To contact the Documentation Development Group send an email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8 for Smartphone".
Page 8
8

KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

Kaspersky Endpoint Security 8 for Smartphone protects mobile devices running BlackBerry OS. The application controls incoming SMS and calls, protects information on the device in case of theft or loss, and hides information relating to confidential contacts. Every type of threat is processed in separate components of the program. This allows to fine-tune the application settings depending on user needs. The administrator installs the application and configures and updates settings using the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Spam. Scans all incoming SMS messages and calls for spam. The component allows the flexible blocking
of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored there, and pinpoint its geographic location (if your mobile device has a GPS receiver) using SMS commands from another device. Furthermore, Anti-Theft allows you to lock your device if the SIM card is replaced or if the device is activated without a SIM card.
Besides, the application contains a set of service features. These increase the application's possible uses, as well as helping the user in their work:
Protection status. The status of the program's components is displayed on screen. Based on the information
presented, you can evaluate the current information protection status on your device.
Events log. Each of the program's components has its own events log, which contains information about the
component's operations (e.g. remote launch of the Anti-Theft function, status of the program's license validity period). Reports on the operation of components are given in the remote administration system and remain in it.
Uninstalling the application. To prevent access to protected information, Kaspersky Endpoint Security 8 for
Smartphone can only be uninstalled from the application's interface.
Kaspersky Endpoint Security 8 for Smartphone does not back up and subsequently restore data.
Page 9
H A R D W A R E A N D S O F T W A R E R E Q U I R E M E N T S
9
IN THIS SECTION
About installing the application through the computer ....................................................................................................... 9
Installing the application through the computer ............................................................................................................... 10
About installing the application after receiving a message by email ................................................................................ 11
Installing the application after receiving a message by email .......................................................................................... 12

HARDWARE AND SOFTWARE REQUIREMENTS

Kaspersky Endpoint Security 8 for Smartphone can be installed on mobile devices using the BlackBerry OS 4.5, 4.6, 4.7,
5.0 and 6.0 operating systems.

INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration. Installing the application requires additional action from the user.
The application is installed by following one of the following procedures:
The Kaspersky Endpoint Security 8 for Smartphone application installation utility of the same name is installed
on your computer. With its help, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile device.
A message from the administrator with the distribution package or an indication to download it comes to your
email address. You install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using information from the message.
This section gives the preparatory actions for installing Kaspersky Endpoint Security 8 for Smartphone and describes the different ways of installing applications on the mobile device and what the user has to do for each of them.
ABOUT INSTALLING THE APPLICATION THROUGH THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can install Kaspersky Endpoint Security 8 for Smartphone on the mobile devices connected to this computer. The Kaspersky Endpoint Security 8 for Smartphone supply utility contains the application distribution package and provides it to the mobile device. After it is installed on the workstation, the utility automatically launches and monitors the connection of mobile devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the device satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application on it.
Installation is only possible if Blackberry Desktop Manager is installed on the computer.
Page 10
U S E R G U I D E
10

INSTALLING THE APPLICATION THROUGH THE COMPUTER

If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices to the computer.
To install the application on a mobile device through a workstation, perform the following:
1. Connect the mobile device to the workstation using Blackberry Desktop Manager. If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1: Installer for Kaspersky Endpoint Security 8 for Smartphone
Page 11
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11
2. Click the Continue button.
The KES 8 window opens with a list of connected devices found.
If more than one device which satisfies the system requirements is connected to the computer, they are shown in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be installed. To do this, check the boxes next to the desired objects (see Figure below).
Figure 2: Selecting devices for installation of Kaspersky Endpoint Security 8 for Smartphone
4. Press Install button.
The Application Download Wizard window opens on the computer. After the distribution package is transferred onto the chosen devices, application installation starts automatically. After the installation has completed, press Close on the Application Download Wizard window.
The status of transmitting the application distribution package to the device is also displayed on the computer in the Kaspersky Endpoint Security 8 for Smartphone window.
Contact the administrator if any errors occur during the installation process.
To stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices to
the computer,
check in the KES 8 window the box Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone Installation Wizard.
Page 12
U S E R G U I D E
12
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A MESSAGE BY EMAIL
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application's connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.
INSTALLING THE APPLICATION AFTER RECEIVING A
MESSAGE BY EMAIL
If you have received an email message with application settings, you can only install the application through the mobile device itself. In this case, installation of Kaspersky Endpoint Security 8 for Smartphone through a computer is not supported.
To install Kaspersky Endpoint Security 8 for Smartphone:
1. Open the message containing the application's installation settings from the administrator on the mobile device.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
Installation starts automatically and the application will be installed on the device.
Page 13
M A N A G I N G A P P L I C A T I O N S E T T I N G S
13
3. Run the application (see "Starting the application" on page 19). To do this, select Menu Download KES 8 and launch the application by using the scroll bar or selecting Menu Open.
4. Set the application secret code (see "Entering the secret code" on page. 19). To this end, fill in the Enter new code and Confirm code fields and press ENTER.
This will open Synchronization settings window.
Figure 3: Synchronization settings
5. Show the values for the settings to connect to the remote administration system if they were given when you received the message from the administrator. Enter the values for the following settings:
Server;
Port;
Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will not be present.
6. In the Your email address field, enter your business email address and press OK.
Enter the email address correctly since it is used to register the device on the remote administration system.
Contact the administrator if any errors occur during the installation process.

MANAGING APPLICATION SETTINGS

All the operation settings for Kaspersky Endpoint Security 8 for Smartphone, including the license, are configured by the administrator through the remote administration system. The administrator can then allow or block the user changing the values of these settings.
You can change the operating settings of the application on your mobile device if the administrator has not blocked the changing of these parameters.
If the component settings screen has a lock icon and a warning message at the top, the component settings cannot be accessed to be changed on the mobile device.
Page 14
U S E R G U I D E
14
If the administrator changed the application settings, they will be transferred to the device through the remote administration system. In this case the values of the application settings which the administrator has blocked will change. Settings which the administrator has not blocked remain unchanged with the values that were configured earlier.
If the application settings were not received on the device or if you want to configure the values set by the administrator, use synchronization of the device with the remote administration system (see "Start synchronization manually" on page 17).
Only use the synchronization function under the administrator's guidance.

UNINSTALLING THE APPLICATION

The application can only be uninstalled from the device manually by the user.
The application can only be uninstalled from the device if hiding of confidential information is disabled. Before uninstalling the application, the user should ensure that this condition is fulfilled.
To uninstall Kaspersky Endpoint Security 8 for Smartphone manually:
7. Select Delete application on the Additional tab (see Figure below).
Figure 4: Uninstalling the application
A confirm deletion window opens.
8. Confirm the deletion of Kaspersky Endpoint Security 8 for Smartphone by clicking Yes.
The deletion of the application begins.
9. Restart the device in order to complete the uninstalling of the application.
Page 15
M A N A G I N G T H E L I C E N S E
15
IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 15
Installing a license ........................................................................................................................................................... 16
Viewing license information ............................................................................................................................................. 16

MANAGING THE LICENSE

This section gives information about the application license, how to activate it and view information about it.

ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE LICENSES

A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
The license validity period is the period for which you are provided with technical support.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license's period of validity, all application functions are accessible. Upon expiration of its validity period, Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens, only the following actions are available:
viewing application help system;
synchronization with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
On termination of the commercial license's term of validity, Kaspersky Endpoint Security 8 for Smartphone switches to the limited functionality mode. The following are accessible in this mode:
disabling hiding of personal data;
viewing application's help system;
synchronization with the remote administration system.
Page 16
U S E R G U I D E
16

INSTALLING A LICENSE

The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is installed. During this time, the administrator installs the license through the remote administration system and the application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are accessible in this mode:
disabling all components;
disabling hiding confidential data;
viewing application's help system.
If the license was not installed within three days, install it using synchronization of the device with the remote administration system (see "Start synchronization manually" on page 17).

VIEWING LICENSE INFORMATION

You can view the following license information: license number, type, activation date, expiration date, number of days to expiration and device serial number.
To view the license information:
1. Open the Additional tab.
2. Select About license.
This will open the About license window.

SYNCHRONIZING THE DEVICE WITH THE REMOTE ADMINISTRATION SYSTEM

During synchronization, the application settings configured by the administrator are transferred to the device. Operational reports on the application components are transferred from the device to the remote administration system.
The device is automatically synchronized with the remote administration system.
If synchronization does not perform automatically, you can start it manually.
Manual synchronization is required in the following situations:
if the license was not installed within three days of the application being installed;
According to the remote administration system chosen by the administrator to manage the application, the user may be asked to enter connection settings to the remote administration system. In this case, the values set by the user manually are accessible for changes from the application (see "Changing the synchronization settings" on page 17).
if the application settings given by the administrator were not received by the device.
Page 17
S Y N C H R O N I Z I N G T H E D E V I C E W I T H T H E R E M O T E A D M I N I S T R A T I O N S Y S T E M
17

START SYNCHRONIZATION MANUALLY

To manually synchronize the device with the remote administration system:
1. Open the Additional tab.
2. Select the Synchronization item (see Figure below).
Figure 5: Manual synchronization
If the user was not asked to enter the settings for connection to the remote administration system when installing the application, a window appears with confirmation of the Internet connection setting. Allow connection by clicking on Yes. Internet connection with the remote administration system will be set.
If the user was asked to enter settings for connection to the remote administration system when installing the application, the Synchronization screen opens. Select Start synchronization. Allow connection to the Internet by clicking on Yes. Internet connection with the remote administration system will be set.
Page 18
U S E R G U I D E
18

CHANGING THE SYNCHRONIZATION SETTINGS

Change the settings for connection to the remote administration system only under the administrator's guidance.
To change settings for connection to the remote administration:
1. Open the Additional tab.
2. Select Synchronization.
This will open the Synchronization window.
3. Select Synchronization settings.
4. Change the following settings (see Figure below):
Server;
Port;
Group.
5. Select Menu Save.
Figure 6: Changing the synchronization settings
Page 19
G E T T I N G S T A R T E D
19
IN THIS SECTION
Starting the application .................................................................................................................................................... 19
Entering the secret code ................................................................................................................................................. 19
Viewing information about the application ....................................................................................................................... 20

GETTING STARTED

This section contains information about getting started with Kaspersky Endpoint Security 8 for Smartphone: how to set a secret code for the application, start the application and view information about it.

STARTING THE APPLICATION

To start Kaspersky Endpoint Security 8 for Smartphone:
1. Open the device’s main menu.
2. Select the folder Download KMS 8.
The application installation folder may vary depending on the mobile device model.
3. Start the application. To do this, use the scroll bar or select Menu Open.
4. Enter the application secret code (see Section "Entering the secret code" on page 19) and press ENTER on the keyboard.
A window opens showing the protection status of Kaspersky Endpoint Security 8 for Smartphone (see the "Protection status window" on page 21).

ENTERING THE SECRET CODE

After launching the application, you will be prompted to enter a secret code. The secret code prevents unauthorized access to the application settings. You can later change the secret code installed.
The secret code is requested in the following instances:
for access to the application;
when sending an SMS command from another mobile device to start the following functions remotely: Block,
Data Wipe, SIM Watch, GPS Find.
Keep the secret code in mind. If you forget it, you will not be able to manage the functions of Kaspersky Endpoint Security 8 for Smartphone or uninstall the application.
The secret code is comprised of numerals. The minimum number of characters is four.
Page 20
U S E R G U I D E
20
To enter the secret code:
IN THIS SECTION
Application menu ............................................................................................................................................................. 20
Protection status window................................................................................................................................................. 21
1. Confirm that you wish to create an application secret code. To do this, after the application first launches, press OK in the Notifications window.
The screen for entering the application secret code opens.
2. Enter the figures that will form your code in the Enter new code field.
3. Re-enter the same code in the Confirm code field.
4. Press ENTER on the keyboard.
The code entered is automatically verified.
If the secret code entered is valid, the protection status window opens.
If the code is deemed invalid according to the results of the verification, a warning message is displayed and the application requests confirmation. To use the current code, click the Yes button.
To make a new code, press No button. The Enter new code and Confirm code fields will empty. Enter a new application secret code.

VIEWING INFORMATION ABOUT THE APPLICATION

You can view general information about Kaspersky Endpoint Security 8 for Smartphone and its version.
To view information on the application,
select the Additional, select About.

APPLICATION INTERFACE

The Kaspersky Endpoint Security 8 for Smartphone interface is simple and convenient. This section provides information on its main elements.

APPLICATION MENU

The application components are arranged logically and are accessible on the application tabs. Every tab ensures access to the settings of the component selected and its tasks.
The Kaspersky Endpoint Security 8 for Smartphone menu contains the following tabs:
Protection status – shows the status of all application components.
Anti-Theft – protection of information on the device in the event of theft or loss.
Anti-Spam: filtering of unwanted incoming calls and SMS.
Page 21
F I L T E R I N G O F I N C O M I N G C A L L S A N D SMS
21
Additional – general application settings, start of synchronization of the device with the remote administration
system, uninstalling the application, information about application and license.
You can switch between tabs by using the scroll bar.

PROTECTION STATUS WINDOW

The status of the main application components is displayed in the protection status window (see Figure below).
Figure 7: Current status window
The status window is immediately accessible after starting the application and contains the following information:
Anti-Spam is the SMS and call filtering mode (see "Filtering of incoming calls and SMS" on page 21).
Block, Data Wipe, SIM Watch, GPS Find represent the Anti-Theft status (see Section "Data protection in the
event of loss or theft of the device" on page 33). The Enabled status means that the Anti-Theft function is enabled. The Disabled status means that the Anti-
Theft function is disabled.
The protection status window is displayed when the application launches. You can also go to the protection status window by selecting the Protection status tab.

FILTERING OF INCOMING CALLS AND SMS

This section gives information about Anti-Spam which prevents unwanted calls and messages according to the Black and White Lists you create. The section also describes how to select the mode in which Anti-Spam filters incoming calls and SMS messages, how to configure additional filtering settings for incoming SMS messages and calls and also how to create Black and White Lists.
Page 22
U S E R G U I D E
22
IN THIS SECTION
About Anti-Spam ............................................................................................................................................................. 22
Anti-Spam modes ............................................................................................................................................................ 22
Changing the Anti-Spam mode ....................................................................................................................................... 23
Creating a Black List ....................................................................................................................................................... 23
Creating a White List ....................................................................................................................................................... 26
Responding to SMS messages and calls from contacts not in the phone book ................................ .............................. 29
Responding to SMS from non-numeric numbers ............................................................................................................ 30
Selecting a response to incoming SMS ........................................................................................................................... 31
Selecting a response to incoming calls ........................................................................................................................... 32

ABOUT ANTI-SPAM

Anti-Spam blocks unwanted calls and messages based on a White and a Black list you compile.
The lists consist of entries. An entry in either list contains the following information:
The telephone number information from which Anti-Spam blocks for the Black List and delivers for the White
List.
The type of event that Anti-Spam blocks for the Black List and allows for the White List. The following types of
communications are available: calls and SMS, calls only, and SMS only.
Key phrase used by Anti-Spam to identify wanted and unwanted SMS. For the Black List, Anti-Spam blocks
SMS messages, which contain this phrase, while delivering the ones, which do not contain it. For the White List, Anti-Spam delivers SMS messages, which contain this phrase, while blocking the ones, which do not contain it.
Anti-Spam filters incoming messages and calls according to the chosen mode (see "Anti-Spam modes" on page 22). According to the mode, Anti-Spam scans every incoming SMS or call and then determines whether this SMS or call is wanted or unwanted (spam). As soon as Anti-Spam assigns the wanted or unwanted status to an SMS or call, the scan is finished.
Information about blocked SMS and calls is registered in the application's log (see section "Application logs" on page 44).

ANTI-SPAM MODES

The mode defines the rules according to which Anti-Spam filters incoming calls and SMS messages.
The following Anti-Spam modes are available:
Off – all incoming calls and SMS are allowed.
Black List – all calls and SMS are allowed except those originating from numbers on the Black List.
White List – only calls and SMS originating from numbers on the White List are allowed.
Page 23
F I L T E R I N G O F I N C O M I N G C A L L S A N D S M S
23
Both lists – incoming calls and SMS from White List numbers are allowed while those from Black List numbers
are blocked. Following a conversation with or the reading of an SMS message from a number on neither list, Anti-Spam will prompt you to enter the number in either one of the lists.
You can change the Anti-Spam mode (see the "Changing the Anti-Spam mode" section on page 23). The current Anti­Spam mode is displayed in the Anti-Spam tab next to the Mode menu item.

CHANGING THE ANTI-SPAM MODE

To select an Anti-Spam operation mode:
1. Select the Mode item in the Anti-Spam tab.
This will open the Anti-Spam window.
2. Select a value for the Anti-Spam mode setting (see Figure below).
3. Select Menu Save to save the changes.
Figure 8: Changing the Anti-Spam mode
Page 24
U S E R G U I D E
24

CREATING A BLACK LIST

IN THIS SECTION
Adding entries to the Black List ....................................................................................................................................... 24
Editing entries in the Black List ....................................................................................................................................... 25
Deleting entries from the Black List ................................................................................................................................. 26
The Black List contains entries of banned numbers, i.e., the numbers from which Anti-Spam blocks calls and SMS. Each entry contain the following information:
Phone number from which Anti-Spam blocks calls and / or SMS.
Types of events from this number that Anti-Spam blocks. The following types of events are available: calls and
SMS, calls only, and SMS only.
Key phrase that Anti-Spam uses to classify an SMS as unsolicited (spam). Anti-Spam only blocks SMS that
contain this key phrase, while delivering all other ones.
Anti-Spam will block those calls and SMS that satisfy all the criteria of a Black List entry. Calls and SMS that fail to satisfy even one of the criteria in a Black List entry will be allowed in by Anti-Spam.
You cannot add a phone number with identical filtering criteria to both the Black List and the White List.
Information about blocked SMS and calls is registered in the log (see the "Application logs" section on page 44).

ADDING ENTRIES TO THE BLACK LIST

Bear in mind that the same number with identical filtering criteria cannot be included in the Black and White lists of Anti­Spam numbers at the same time. If a number with such filtering criteria is already saved on either of the lists, Kaspersky Endpoint Security 8 for Smartphone will notify you of this event, and a relevant message will appear on the screen.
To add an entry to the Anti-Spam Black List:
1. Select Black List in the Anti-Spam tab.
This will open the Black List window.
2. Select Menu Add.
This will open the New entry window.
3. Set values for the following settings (see Figure below):
Block incoming – type of event from a telephone number which Anti-Spam blocks for Black List numbers:
Calls and SMS: block incoming calls and SMS messages.
Calls only: block incoming calls only.
SMS only: block incoming SMS messages only.
Page 25
F I L T E R I N G O F I N C O M I N G C A L L S A N D S M S
25
Phone number – telephone number for which Anti-Spam blocks incoming information. The phone number
should comprise only alphanumeric characters; it may begin with a digit, a letter, or be preceded by the "+" symbol. As a number, it is also possible to use the masks "*" or "?" (where "*" is any amount of symbols, and "?" any one symbol). For example, *1234? on the Black List. Anti-Spam blocks calls or SMS from a number in which any symbol follows the figure 1234.
Containing text – key phrase indicating that the received SMS message is unwanted (spam). Anti-Spam
only blocks those messages that have the key phrase, it allows all other SMS messages.
If you want all incoming SMS from a specific number on the Black List to be blocked, leave this entry’s Containing text field blank.
Figure 9: Properties of an entry on the Black List
4. Select Menu Save to save the changes.

EDITING ENTRIES IN THE BLACK LIST

You can change the values of all settings for entries from the Black List.
To edit an entry in the Anti-Spam Black List:
1. Select Black List in the Anti-Spam tab.
This will open the Black List window.
2. Select the element from the list which you wish to edit and then select Menu Change.
The Changing an entry screen opens.
3. Change the necessary settings:
Block incoming – type of event from a telephone number which Anti-Spam blocks for Black List numbers:
Calls and SMS: block incoming calls and SMS messages.
Calls only: block incoming calls only.
SMS only: block incoming SMS messages only.
Page 26
U S E R G U I D E
26
Phone number – telephone number for which Anti-Spam blocks incoming information. The phone number
should comprise only alphanumeric characters; it may begin with a digit, a letter, or be preceded by the "+" symbol. As a number, it is also possible to use the masks "*" or "?" (where "*" is any amount of symbols, and "?" any one symbol). For example, *1234? on the Black List. Anti-Spam blocks calls or SMS from a number in which any symbol follows the figure 1234.
Containing text – key phrase indicating that the received SMS message is unwanted (spam). Anti-Spam
only blocks those messages that have the key phrase, it allows all other SMS messages.
If you want all incoming SMS from a specific number on the Black List to be blocked, leave this entry’s
Containing text field blank.
4. Select Menu Save to save the changes.

DELETING ENTRIES FROM THE BLACK LIST

You can delete a number from the Black list. Furthermore, you can clear the Anti-Spam Black List by removing all the entries from it.
To delete an entry from thethe Parental Control Black List:
1. Select Black List in the Anti-Spam tab.
This will open the Black List window.
2. Select the entry to be deleted on the list and then select Menu Delete.
The confirmation window opens.
3. Confirm the deletion by pressing the Yes button.
To clear theAnti-Spam Black List:
1. Select Black List in the Anti-Spam tab.
This will open the Black List window.
2. Select Menu Delete all.
The confirmation window opens.
3. Confirm the deletion by pressing the Yes button.
The list is emptied.

CREATING A WHITE LIST

The White List contains entries of allowed numbers, i.e., numbers from which Anti-Spam delivers calls and SMS to the user. Each entry contain the following information:
Phone number from which Anti-Spam delivers calls and / or SMS.
Type of events that Anti-Spam delivers from this number. The following types of events are available: calls and
SMS, calls only, and SMS only.
Key phrase used by Anti-Spam to classify an SMS as solicited (not spam). Anti-Spam only delivers SMS that
contain this key phrase, while blocking all other ones.
Page 27
F I L T E R I N G O F I N C O M I N G C A L L S A N D S M S
27
IN THIS SECTION
Adding entries to the White List ....................................................................................................................................... 27
Editing entries in the White List ....................................................................................................................................... 28
Deleting entries from the White List ................................................................................................................................ 29
Anti-Spam allows only calls and SMS that satisfy all the criteria of an entry in the White List. Calls and SMS that fail to satisfy even one of the criteria in a White List entry will be blocked by Anti-Spam.

ADDING ENTRIES TO THE WHITE LIST

Bear in mind that the same number with identical filtering criteria cannot be included in the Black and White lists of Anti­Spam numbers at the same time. If a number with such filtering criteria is already saved on either of the lists, Kaspersky Endpoint Security 8 for Smartphone will notify you of this event, and a relevant message will appear on the screen.
To add an entry to the Anti-Spam White List:
1. On the Anti-Spam tab, select the White List.
This will open the White List window.
2. Select the Menu Add.
3. Make the following settings for the new entry (see Figure below):
Allow incoming – type of event from a telephone number which Anti-Spam allows for Black List numbers:
Calls and SMS: allow incoming calls and SMS messages.
Calls only: allow incoming calls only.
SMS only: allow incoming SMS messages only.
Page 28
U S E R G U I D E
28
Phone number – telephone number for which Anti-Spam allows incoming information. The phone number
should comprise only alphanumeric characters; it may begin with a digit, a letter, or be preceded by the "+" symbol. As a number, it is also possible to use the masks "*" or "?" (where "*" is any amount of symbols, and "?" any one symbol). For example, *1234? in the White List. Anti-Spam delivers calls or SMS from a number in which any symbol follows the figure 1234.
Containing text – key phrase indicating that the received SMS message is wanted. For numbers on the
White List, Anti-Spam only delivers SMS messages containing the key phrase and blocks all others.
If you want all incoming SMS from a specific number on the White List to be delivered, leave this entry’s Containing text field blank.
Figure 10: Properties of an entry on the White List
4. Select Menu Save to save the changes.

EDITING ENTRIES IN THE WHITE LIST

For an entry from the White list of allowed numbers, you can change the values of all settings.
To edit an entry in the Anti-Spam White List:
1. On the Anti-Spam tab, select the White List.
This will open the White List window.
2. Select the element from the list which you wish to edit and then select Menu Change.
The Changing an entry screen opens.
3. Change the necessary settings:
Allow incoming – type of event from a telephone number which Anti-Spam allows for Black List numbers:
Calls and SMS: allow incoming calls and SMS messages.
Calls only: allow incoming calls only.
SMS only: allow incoming SMS messages only.
Page 29
F I L T E R I N G O F I N C O M I N G C A L L S A N D S M S
29
Phone number – telephone number for which Anti-Spam allows incoming information. The phone number
should comprise only alphanumeric characters; it may begin with a digit, a letter, or be preceded by the "+" symbol. As a number, it is also possible to use the masks "*" or "?" (where "*" is any amount of symbols, and "?" any one symbol). For example, *1234? in the White List. Anti-Spam delivers calls or SMS from a number in which any symbol follows the figure 1234.
Containing text – key phrase indicating that the received SMS message is wanted. For numbers on the
White List, Anti-Spam only delivers SMS messages containing the key phrase and blocks all others.
If you want all incoming SMS from a specific number on the White List to be delivered, leave this entry’s Containing text field blank.
4. Select Menu Save to save the changes.

DELETING ENTRIES FROM THE WHITE LIST

You can delete one entry from the White List as well as completely clear it.
To delete an entry from theAnti-Spam White List:
1. On the Anti-Spam tab, select the White List.
This will open the White List window.
2. Select the entry to be deleted on the list and then select Menu Delete.
The confirmation window opens.
3. Confirm the uninstalling by pressing the Yes button.
To clear theAnti-Spam White List:
1. On the Anti-Spam tab, select the White List.
This will open the White List window.
2. Press Menu Delete all.
The confirmation window opens.
3. Confirm the uninstalling by pressing the Yes button.
The White List is emptied.
Page 30
U S E R G U I D E
30
RESPONDING TO SMS MESSAGES AND CALLS FROM
CONTACTS NOT IN THE PHONE BOOK
If the Both lists or White List mode is selected for Anti-Spam (see section "Anti-Spam modes" on page 22), you can also set an Anti-Spam response to SMS messages and calls from subscribers whose numbers are not stored in the Contacts. In addition, Anti-Spam allows expansion of the White List by adding numbers from the list of contacts to it.
To select Anti-Spam's response to a number not included in the phonebook:
1. Select the Mode item in the Anti-Spam tab.
This will open the Anti-Spam window.
2. Select the required value for setting Allow Contacts (see Figure below):
for Anti-Spam to count numbers from Contacts as additional White List and block SMS messages and calls
from subscribers not in Contacts, check the Allow Contacts box;
to enable Anti-Spam to filter SMS messages and calls based on the Anti-Spam mode, uncheck the Allow
Contacts box.
Figure 11: Anti-Spam response to numbers not included in the device's phone book
3. Select Menu Save to save the changes.
Page 31
F I L T E R I N G O F I N C O M I N G C A L L S A N D SM S
31
RESPONDING TO SMS MESSAGES FROM NON-NUMERIC
NUMBERS
If the Anti-Spam mode Both lists or Black List is selected (see the "Anti-Spam modes" section on page 22), you can also expand the Black List by including all non-numeric numbers (including letters). In this case, Anti-Spam processes calls and SMS messages from non-numeric numbers the same way as from numbers on the Black List.
To set Anti-Spam's response when receiving SMS messages from non-numeric numbers:
1. Select the Mode item in the Anti-Spam tab.
2. This will open the Anti-Spam window.
3. Select a value for the Block non-numeric numbers setting (see Figure below):
in order for Anti-Spam to automatically block SMS from non-numeric numbers, check the Block non-
numeric numbers box;
if you want Anti-Spam to filter SMS from non-numeric numbers on the basis of the Anti-Spam mode set,
uncheck the Block non-numeric numbers box.
Figure 12: Selecting Anti-Spam action when receiving SMS from non-numeric numbers
4. Select Menu Save to save the changes.
Page 32
U S E R G U I D E
32

SELECTING A RESPONSE TO INCOMING SMS

If the Both lists mode is set (see "Anti-Spam Modes" on page 22), Anti-Spam scans incoming SMS messages according to the Black and White Lists.
After receiving an SMS message from a number that is not included on either list, Anti-Spam will prompt you to enter the number in one of the lists.
You can select one of the following actions to be performed in respect of the SMS:
To block the SMS message and add the sender's telephone number to the Black List, select Add to Black List.
To deliver the SMS message and add the sender's telephone number to the White List, select Add to White
List.
To deliver the SMS message without adding the sender's telephone number to either list, press Skip.
Figure 13: Anti-Spam notification on SMS received
Information about blocked SMS is registered in the application's log (see the "Application logs" section on page 44).
Page 33
F I L T E R I N G O F I N C O M I N G C A L L S A N D S M S
33

SELECTING A RESPONSE TO INCOMING CALLS

If Both lists mode is set (see "Anti-Spam modes" on page 22), Anti-Spam checks incoming calls according to the Black and White Lists. Following a call from a number not on either list, Anti-Spam will prompt you to enter the number in one of the lists (see figure below).
You can select one of the following actions for the number from which the call was made:
To add the caller's telephone number to the Black List, select Add to Black List.
To add the caller's telephone number to the White List, select Add to White List.
If you don't want to add the caller's telephone number to either list, press Skip.
Figure 14: Anti-Spam notification on SMS received
Information about blocked calls is registered in the application's log (see the "Application logs" section on page 44).
Page 34
U S E R G U I D E
34
DATA PROTECTION IN THE EVENT OF
IN THIS SECTION
About Anti-Theft .............................................................................................................................................................. 34
Blocking the device ......................................................................................................................................................... 35
Deleting personal data .................................................................................................................................................... 36
Creating a list of folders to delete .................................................................................................................................... 38
Monitoring the replacement of a SIM card on the device ................................................................................................ 39
Determining the device's geographical coordinates ................................................................ ........................................ 41
Remote start of the Anti-Theft functions .......................................................................................................................... 42
LOSS OR THEFT OF THE DEVICE
This section gives information about Anti-Theft which, in the case of theft or loss, blocks unauthorized access to data saved on your mobile device and makes it easy to find the device.
This section also specifies how to enable/disable the Anti-Theft function, set the parameters of its operation and start Anti-Theft from another mobile device remotely.

ABOUT ANTI-THEFT

Anti-Theft protects information stored on your mobile device from unauthorized access.
Anti-Theft includes the following functions:
Block – allows blocking the device remotely and gives the text to be displayed on the screen of the blocked
device.
Data Wipe – allows deleting the user's personal data remotely from the device (entries in Contacts, messages,
picture gallery, calendar, logs, Internet connection settings) and information from the storage cards, folders from list for deletion.
SIM Watch allows obtaining the current phone number in the event that the SIM card is replaced, as well as
locking the device in the event the SIM card is replaced or the device is activated without a SIM card. Information about a new telephone number is sent as a message to a phone number and / or email that you have specified.
The GPS Find functionality enables you to locate a device. The geographical coordinates of the device are sent
as a message to the phone number from which a special SMS command was sent, and to an email address.
Page 35
D A T A P R O T E C T I O N I N T H E E V E N T O F L O S S O R T H E F T O F T H E D E V I CE
35
Kaspersky Endpoint Security 8 for Smartphone can start Anti-Theft remotely if you send an SMS command from another mobile device (see "Remote start of the Anti-Theft functions" on page 42).
To start Anti-Theft remotely, you must know the application secret code that was set when Kaspersky Endpoint Security 8 for Smartphone was first started.
The current status of every function is displayed in the Anti-Theft screen next to the name of the function.
Information about the component's operation is entered in the application's log (see "Application Logs" on page 44).

BLOCKING THE DEVICE

After a special SMS command is received, the Block function allows you to remotely block access to the device and data stored on it. The device can only be unblocked by entering the secret code.
This function does not block the device but simply enables the remote blocking option.
To enable the Block function:
1. Select the Block item on the Anti-Theft tab.
This will open the Block window.
2. Check the Enable Block box.
3. Enter the message which is displayed on the device's screen in blocked mode in the Text when blocked field (see Figure below).. By default, the standard text in which you can add the owner's telephone is used for the message.
Figure 15: Block function settings
4. Select Menu Save to save the changes.
If the Block function is enabled on another device, you can block it using any of the following methods:
Use a Kaspersky Lab mobile application, such as Kaspersky Endpoint Security 8 for Smartphone, on another
mobile device to create and send an SMS command to your device. To create a special SMS command, use the Send command function. As a result, your device will receive a covert SMS, and the device will be blocked.
Page 36
U S E R G U I D E
36
On another mobile device, create and send an SMS with the special text and the secret code previously set for
the receiving device.
Outgoing SMS messages will be billed at the rates set by the other mobile device’s mobile service provider.
To block the device remotely, it is advised that you use the secure method with the Sending a command function. The application secret code is then sent in encrypted form.
To send an SMS command to another device using the Sending a command function:
1. Select the Send command menu item on the Additional tab.
This will open the Send command window.
2. For the Select SMS command setting, select Block.
3. In the Phone number field, enter the phone number of the device that receives the SMS command.
4. In the Remote device code field, enter the application secret code set on the device that receives the SMS command.
5. Select Menu Send.
To create an SMS message with the phone's standard SMS creation functions,
send a standard SMS to another device; it should contain the text block:<code>, where <code> is the secret code of the application set on another device. The message is not case sensitive, and spaces before or after the colon are ignored.

DELETING PERSONAL DATA

After a special SMS command is received, the Data Wipe function allows deleting the following information stored in the device:
the user's personal data (entries in Contacts, calendar, email messages, call log);
information on storage card;
files from the list of objects for deletion (see the "Creating a list of folders to delete" section on page 38).
This function does not delete the data saved on the device, but includes the option to delete them.
To enable the Data Wipe function:
1. Select the Data Wipe item on the Anti-Theft tab.
This will open the Data Wipe screen.
2. Select the Mode item.
This will open the Data Wipe screen.
3. Check the Enable Data Wipe box.
Page 37
D A T A P R O T E C T I O N I N T H E E V E N T O F L O S S O R T H E F T O F T H E D E V I C E
37
4. Select information that you want to delete. To do this, check the boxes next to the required settings in the Delete section (see Figure below).
to delete personal data, check the Personal data box;
to delete files from folders on the memory card and from the list of objects for deletion, check the
box Selected folders.
Figure 16: Data Wipe function settings
5. Go to creation of a list of objects for deletion (see the "Creating a list of folders to delete" section on page 38).
6. Select Menu Save to save the changes.
You can delete personal data from the device with the function enabled by using the following methods:
Use a Kaspersky Lab mobile application, such as Kaspersky Endpoint Security 8 for Smartphone, on another
mobile device to create and send an SMS command to your device. As a result, your device receives a covert SMS message after which the information is deleted. To create a special SMS command, use the Sending a command function.
On another mobile device, create and send an SMS with the special text and the secret code previously set for
the receiving device. As a result, your device receives an SMS message after which the information is deleted.
Outgoing SMS messages will be billed at the rates set by the other mobile device’s mobile service provider.
To delete information from the device remotely, you are advised to use the secure method with the Sending a command function. The application secret code is then sent in encrypted form.
To send an SMS command to another device using the Sending a command function:
1. Select Send command on the Additional tab.
This will open the Send command window.
2. For the Select SMS command setting, select Data Wipe.
3. In the Phone number field, enter the phone number of the device that receives the SMS command.
Page 38
U S E R G U I D E
38
4. In the Remote device code field, enter the application secret code set on the device that receives the SMS command.
5. Select Menu Send.
To create an SMS with the phone's standard SMS creation functions:
from another telephone, send an SMS containing the text wipe:<code>, where <code> is the application secret code set on the other device. The message is not case sensitive, and spaces before or after the colon are ignored.

CREATING A LIST OF FOLDERS TO DELETE

The Data Wipe function allows creating a list of folders to be deleted after a special SMS command is received. For Anti-Theft to delete the objects from the list after receiving a special SMS command, ensure that Selected folders is
checked on the Anti-Theft Data Wipe tab.
The administrator may add to the list of folders to be deleted. These folders cannot be deleted from the list.
To add a folder to the list of folders to be deleted:
1. Select the Data Wipe item on the Anti-Theft tab.
This will open the Data Wipe screen.
2. Go to the list of objects for deletion.
3. Select Menu Add folder (see Figure below).
Figure 17: Adding folders
Page 39
D A T A P R O T E C T I O N I N T H E E V E N T O F L O S S O R T H E F T O F T H E D E V I C E
39
4. Select the necessary folder from the folder tree and press Menu Select.
The folder is added to the Selected folders list.
5. Select Menu Save.
To remove a folder from the list:
1. Select the Data Wipe item on the Anti-Theft tab.
This will open the Data Wipe screen.
2. Go to the list of objects for deletion.
3. Select the folder from the list and then select Menu Delete folder.
The confirmation window opens.
4. Confirm the deleting of the folder by pressing Yes.
The folder will be deleted from the Selected folders list.
5. Select Menu Save.
Page 40
U S E R G U I D E
40
MONITORING THE REPLACEMENT OF A SIM CARD ON THE
DEVICE
If the SIM card is replaced, SIM Watch allows you to send a message with the new number to your phone number and / or email, or lock the device.
To enable the SIM Watch function and monitor the replacement of the SIM card:
1. Select the SIM Watch item on the Anti-Theft tab.
This will open the SIM Watch window.
2. Check the Enable SIM Watch box.
3. To check the replacement of the SIM card on the device, make the following settings (see Figure below):
To automatically receive an SMS message with the new number being used in your telephone, enter the
telephone number to which the SMS message should be sent in the SMS to phone number field within the When the SIM card is replaced, send the new number box.
The phone number may begin with a digit or with a "+", and must contain digits only.
To receive an email with the new telephone number, in the When the SIM card is replaced, send the new
number block in the Message to email address field, enter the email address.
To block the device if the SIM card is replaced, or if the device is turned on with the SIM card removed,
check the Block device box in the Additional block. You can unblock the device only by entering the application secret code.
To display a message on the screen in blocked mode, enter it in the Text when blocked field. By default,
the standard text in which you can add the owner's number is used for the message.
Figure 18: SIM Watch function settings
4. Select Menu Save to save the changes.
Page 41
D A T A P R O T E C T I O N I N T H E E V E N T O F L O S S O R T H E F T O F T H E D E V I C E
41
DETERMINING THE DEVICE'S GEOGRAPHICAL
COORDINATES
After a special SMS command is received, GPS Find allows detecting the device's location and sending the geographical coordinates by SMS and email to the requesting device and an email address.
Outgoing SMS messages are billed at your mobile service provider’s current rate.
This function only works with devices with in-built GPS receiver. The GPS receiver is enabled automatically after the device receives a special SMS command. If the device is within the area reached by satellites, the GPS Find function receives and sends the geographical coordinates of the device. If the satellites are unavailable at the time of the query, GPS Find will periodically re-attempt to find them and send device location results.
To enable the GPS Find function:
1. Select the GPS Find item on the Anti-Theft tab.
This will open the GPS Find window.
2. Check the Enable GPS Find box.
After receiving a special SMS command, Kaspersky Endpoint Security 8 for Smartphone sends the device's coordinates by return SMS.
3. To receive the coordinates of the device by email in the Send device coordinates block for the setting Message to email address enter email address (see Figure below).
Figure 19: GPS Find function settings
4. Select Menu Save to save the changes.
You can request the coordinates of a device on which GPS Find is enabled, using the following methods:
Use a Kaspersky Lab mobile application, such as Kaspersky Endpoint Security 8, on another mobile device to
create and send an SMS command to your device. As a result, your device will receive a covert SMS, and the application will send the device's coordinates. To create a special SMS command, use the Sending a command function.
On another mobile device, create and send an SMS with the special text and the secret code previously set for
the receiving device. As a result, your device will receive the SMS, and the application will send the coordinates of the device.
Page 42
U S E R G U I D E
42
Outgoing SMS messages will be billed at the rates set by the other mobile device’s mobile service provider.
To receive the device's location, you are advised to use the secure method with the Send command function. The application secret code is then sent in encrypted mode.
To send a command to another device using the Sending a command function:
1. Select the Send command menu item on the Additional tab.
This will open the Send command window.
2. Select the GPS Find value for the Select SMS command setting.
3. In the Phone number field, enter the phone number of the device that receives the SMS command.
4. In the Remote device code field, enter the application secret code set on the device that receives the SMS command.
5. Select Menu Send.
To create an SMS message with the phone's standard SMS creation functions,
send a standard SMS message to another device; it should contain the text find:<code>, where <code> is the application secret code set on another device. The message is not case sensitive, and spaces before or after the colon are ignored.
An SMS message with the device's coordinates will be sent to the phone number from which the SMS command has been sent and to an email address if you have previously specified one in the options of GPS Find.
Page 43
D A T A P R O T E C T I O N I N T H E E V E N T O F L O S S O R T H E F T O F T H E D E V I C E
43

REMOTE START OF THE ANTI-THEFT FUNCTIONS

The application allows sending a special SMS command to run Anti-Theft functions remotely on another device with Kaspersky Endpoint Security 8 for Smartphone installed on it. An SMS command is sent as an encrypted SMS and contains the application secret code set on the other device. Reception of the SMS command will not be noticed.
SMS is billed at your mobile service provider’s current rate.
To send an SMS command to another device:
1. Select the Send command menu item on the Additional tab.
This will open the Send command window.
2. Select the function for remote launch on another mobile device. Select one of the proposed values for the Select SMS command setting (see Figure below):
Block device (on page 35).
Data Wipe (see "Deleting personal data" section on page 36).
GPS Find (see the "Determining the device's geographical coordinates" section on page 41).
Figure 20: Remote startup of Anti-Theft function
3. In the Phone number field, enter the phone number of the device that receives the SMS command.
4. In the Remote device code field, enter the application secret code set on the device that receives the SMS command.
5. Select Menu Send.
Page 44
U S E R G U I D E
44

APPLICATION LOGS

IN THIS SECTION
About logs ....................................................................................................................................................................... 44
Viewing Log records ................................................................ ........................................................................................ 44
Deleting Log records ....................................................................................................................................................... 44
This section gives information about logs, in which each component's operations are recorded, as well as each task that is completed (e.g. synchronization with the remote administrative system, receipt of an SMS command from another device).

ABOUT LOGS

The log stores reports about events occurring when Kaspersky Endpoint Security 8 for Smartphone is running. For every component, a separate events log is used. You are able to select and review a report of activity in the time the component has been running. Entries in the report are sorted in reverse chronological order.

VIEWING LOG RECORDS

To view the entries in a component's log,
on the tab of the necessary component, select the item Events log.
The selected component's log opens.
Use the scroll bar to scroll through the log.
To view detailed log record information,
select the necessary entry and press ENTER on the keyboard.

DELETING LOG RECORDS

You can clear all logs. This deletes information about the operation of all Endpoint Security 8 for Smartphone components.
To clear all logs:
1. On the tab of any component, select the Events log.
The Events log window opens.
2. Select Menu Clear Log.
3. Confirm the uninstalling by pressing the Yes button.
All entries from all components' logs will be deleted.
Page 45
C O N F I G U R I N G A D D I T I O N A L S E T T I N G S
45
IN THIS SECTION
Changing the secret code ............................................................................................................................................... 45
Displaying prompts ................................................................................................................................ .......................... 45

CONFIGURING ADDITIONAL SETTINGS

This section gives information about additional features of Kaspersky Endpoint Security 8 for Smartphone: how to change the application secret code, manage the Anti-Spam sound notifications, and enable/disable the display of prompts when configuring the settings for each component.

CHANGING THE SECRET CODE

You can change the secret code set after the first start up of the application.
To change the secret code:
1. Select Additional settings on the Additional tab.
The Additional settings screen opens.
2. Select Change code.
3. Enter the current secret code of the application in the Enter code entry field.
4. Enter the new secret code in the Enter new code and Confirm code fields.
The code entered is automatically verified.
If the secret code entered is valid, it will be saved.
If the code is deemed invalid according to the results of the verification, a warning message is displayed and the application requests confirmation. To use the code, press Yes.
In order to create a new code, press No. The Enter new code and Confirm code fields will empty. Enter a new application secret code.

DISPLAYING PROMPTS

When you configure the settings of components, Kaspersky Endpoint Security 8 for Smartphone displays by default a prompt with a short description of the function selected. You can set the display of the program's prompts for Kaspersky Endpoint Security 8 for Smartphone.
To configure the display of prompts, perform the following steps:
1. Select the Additional settings menu item on the Additional tab.
The Additional settings screen opens.
2. Enable / disable the display of prompts. To do this, select Hints.
The status of the display of prompts will be shown next to the Hints menu item. The radio button icon to the right changes according to the status of the display of prompts.
Page 46
46

GLOSSARY

A

A C T I V A T I N G T H E A P P L I C A T I O N

Switching the application into full-function mode. The user needs a license to activate the application.

A P P L I C A T I O N S E C R E T C O DE

The secret code prevents unauthorized access to the application settings and to blocked information on the device. The user sets it on first starting the application and it consists of at least four characters. The secret code is requested in the following instances:
for access to application settings;
when sending an SMS command from another mobile device to start the following functions remotely: Block, Data Wipe, SIM Watch, GPS Find.
B

B L A C K L I S T

The entries in this list contain the following information:
Phone number from which Anti-Spam blocks calls and / or SMS.
Types of events from this number that Anti-Spam blocks. The following types of events are available: calls and
SMS, calls only, and SMS only.
Key phrase that Anti-Spam uses to classify an SMS as unsolicited (spam). Anti-Spam only blocks SMS that
contain this key phrase, while delivering all other ones.
D

D E L E T I N G S M S M E S S A G E S

Method of processing an SMS message containing SPAM features, by deleting it. You are advised to use this method with SMS messages which definitely contain spam.
N

N ON- N U M E R I C N U M B E R

A phone number that includes letters or consists only of letters.
R

R E M O T E A D M I N I S T R A T I O N S Y S T E M

The system which remotely manages settings and administers them in real time.
Page 47
G L O S S A R Y
47
S

S Y N C H R O N I Z A T I O N

Process to connect the mobile device with the remote administration system and transfer data. During synchronization, the application settings configured by the administrator are transferred to the device. Operational reports on the application components are transferred from the device to the remote administration system.
T

T E L E P H O N E N U M B E R M A SK

Putting a telephone number in the Black or White List using wildcards. The two basic wildcards used in telephone number masks are "*" and "?", (where "*" represents any number of characters and "?" stands for any single character). For example, *1234? on the Black List. Anti-Spam blocks calls or SMS from a number in which any symbol follows the figure 1234.
W

W H I T E L I S T

The entries in this list contain the following information:
Phone number from which Anti-Spam delivers calls and / or SMS.
Type of events that Anti-Spam delivers from this number. The following types of events are available: calls and
SMS, calls only, and SMS only.
Key phrase used by Anti-Spam to classify an SMS as solicited (not spam). Anti-Spam only delivers SMS that
contain this key phrase, while blocking all other ones.
Page 48
48

KASPERSKY LAB

Kaspersky Lab website
http://www.kaspersky.com
Virus Encyclopedia:
http://www.securelist.com/
Anti-virus laboratory:
newvirus@kaspersky.com (only for sending suspicious objects in archives)
http://support.kaspersky.com/virlab/helpdesk.html
(for sending requests to virus analysts)
Kaspersky Lab was founded in 1997. Today it is the leading developer of a wide range of high-performance information security software products, including anti-virus, anti-spam and anti-hacking systems.
Kaspersky Lab is an international company. Headquartered in the Russian Federation, the company has offices in the United Kingdom, France, Germany, Japan, the Benelux countries, China, Poland, Romania and the USA (California). A new company department, the European Anti-Virus Research Centre, has recently been established in France. Kaspersky Lab's partner network includes over 500 companies worldwide.
Today, Kaspersky Lab employs over a thousand highly qualified specialists, including 10 MBA degree holders and 16 PhD degree holders. All the Kaspersky Lab's senior anti-virus experts are members of the Computer Anti-Virus Researchers Organization (CARO).
Kaspersky Lab offers best-of-breed security solutions, based on its unique experience and knowledge, and gained in over 14 years of fighting computer viruses. A thorough analysis of computer virus activities enables the company's specialists to foresee trends in the development of malware and to provide our users with timely protection against new types of attacks. This advantage is the basis of Kaspersky Lab's products and services. At all times, the company’s products remain at least one step ahead of many other vendors in delivering extensive anti-virus coverage for home users and corporate customers alike.
Years of hard work have made the company one of the top anti-virus software developers. Kaspersky Lab was the first to develop many of the modern standards for anti-virus software. The company's flagship product, Kaspersky Anti-Virus, reliably protects all types of computer systems against virus attacks, including workstations, file servers, mail systems, firewalls, Internet gateways and hand-held computers. Kaspersky Lab's customers benefit from a wide range of additional services that ensure both stable operation of the company's products, and compliance with specific business requirements. Many well-known manufacturers use the Kaspersky Anti-Virus ®kernel in their products, including: Nokia ICG (USA), Aladdin (Israel), Sybari (USA), G Data (Germany), Deerfield (USA), Alt-N (USA), Microworld (India), and BorderWare (Canada).
Kaspersky Lab's customers enjoy a wide range of additional services that ensure both stable operation of the company's
products, and full compliance with the customer’s specific business requirements. We plan, install, and support corporate
anti-virus suites. Kaspersky Lab's anti-virus database is updated hourly. The company provides its customers with 24­hour technical support service in several languages.
If you have any questions, comments, or suggestions, you can contact us through our dealers, or at Kaspersky Lab directly. Detailed consultations are provided by phone or email. You will receive full answers to all of your questions.
Page 49
49

INFORMATION ABOUT THIRD-PARTY CODE

Third party code is used to create the application.
To create and verify digital signatures, Kaspersky Endpoint Security 8 for Smartphone security software library by CryptoEx LLC.
CryptoEx LLC corporate website: http://www.cryptoex.ru.
Page 50
50

INDEX

A
Adding
Anti-Spam Black List .............................................................................................................................................. 24
Anti-Spam White List .............................................................................................................................................. 27
Anti-Spam
action to be performed on a call ............................................................................................................................. 33
action to be performed on an SMS message.......................................................................................................... 32
Black List ................................................................................................................................................................ 24
modes ................................................................ ................................ ..................................................................... 22
non-numeric numbers ............................................................................................................................................. 31
numbers not in Contacts ......................................................................................................................................... 30
White List ................................................................................................................................................................ 26
Anti-Theft
Block ....................................................................................................................................................................... 35
Data Wipe ......................................................................................................................................................... 36, 38
GPS Find ................................................................................................................................................................ 41
SIM Watch .............................................................................................................................................................. 40
APPLICATION INTERFACE ........................................................................................................................................ 20
Application secret code .......................................................................................................................................... 19, 45
Application tabs ............................................................................................................................................................ 20
B
Black List
Anti-Spam ............................................................................................................................................................... 24
Blocking
device ..................................................................................................................................................................... 35
incoming calls ................................................................................................................................................... 24, 26
incoming SMS messages ....................................................................................................................................... 24
C
Code
application secret code ........................................................................................................................................... 19
D
Data
remote delete .......................................................................................................................................................... 36
Deleting
Anti-Spam Black List .............................................................................................................................................. 26
Anti-Spam White List .............................................................................................................................................. 29
Log records ............................................................................................................................................................. 44
Determining the device's location ................................................................................................................................. 41
Disabling
Anti-Spam ......................................................................................................................................................... 22, 23
Display
Protection status window ........................................................................................................................................ 21
E
Editing
Anti-Spam Black List .............................................................................................................................................. 25
Anti-Spam White List .............................................................................................................................................. 28
Enabling
Anti-Spam ............................................................................................................................................................... 23
Entry
Anti-Spam Black List .............................................................................................................................................. 24
Anti-Spam White List .............................................................................................................................................. 27
Page 51
I N D E X
51
Events log
deleting entries ....................................................................................................................................................... 44
viewing entries ........................................................................................................................................................ 44
F
FILTERING
INCOMING CALLS ................................................................................................................................................. 21
INCOMING SMS MESSAGES ............................................................................................................................... 21
H
HARDWARE REQUIREMENTS .................................................................................................................................... 9
I
INSTALLING THE APPLICATION ................................................................................................................................. 9
K
KASPERSKY LAB ........................................................................................................................................................ 48
L
License
information .............................................................................................................................................................. 16
installation ............................................................................................................................................................... 16
M
Modes
Anti-Spam ......................................................................................................................................................... 22, 23
P
Protection status. ......................................................................................................................................................... 21
S
Send SMS command ................................................................................................................................................... 43
Starting
application .............................................................................................................................................................. 19
U
UNINSTALLING
APPLICATION ........................................................................................................................................................ 14
W
White List
Anti-Spam ............................................................................................................................................................... 26
Wipe
information saved on the device ............................................................................................................................. 36
Loading...