KASPERSKY Endpoint Security for Smartphone Android 8.0 User Manual

Kaspersky Endpoint Security 8 for Smartphone
for Android
OS
PROGRAM VERSION: 8.0
2
Dear User!
Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
Note! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document for which the rights are held by third parties, or for any potential or actual losses associated with the use of these materials.
Document last revised on: February 8, 2012
© 2012 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3
TABLE OF CONTENTS
ABOUT THIS HELP ....................................................................................................................................................... 6
Document conventions ............................................................................................................................................. 6
ADDITIONAL DATA SOURCES .................................................................................................................................... 7
Information sources for further research ................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 8
Contacting the Documentation Development Group ................................................................................................ 8
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 9
Hardware and software requirements ....................................................................................................................... 9
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................. 10
About installing the application via the computer .................................................................................................... 10
Installing the application via the computer .............................................................................................................. 10
About installing the application after receiving a email message ............................................................................ 12
Installing the application after receiving email ........................................................................................................ 12
UNINSTALLING THE APPLICATION .......................................................................................................................... 14
MANAGING APPLICATION SETTINGS ...................................................................................................................... 15
MANAGING THE LICENSE ......................................................................................................................................... 16
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 16
Installing a license .................................................................................................................................................. 17
Viewing license information .................................................................................................................................... 17
SYNCHRONIZATION WITH THE REMOTE ADMINISTRATION SYSTEM ................................................................. 18
Start synchronization manually ............................................................................................................................... 19
Changing the synchronization settings ................................................................................................................... 20
GETTING STARTED.................................................................................................................................................... 21
Starting the application ........................................................................................................................................... 21
Setting the secret code ........................................................................................................................................... 21
Enabling the option to recover the secret code ....................................................................................................... 22
Recovering the secret code ................................................................................................ .................................... 23
Viewing information about the application .............................................................................................................. 23
APPLICATION INTERFACE ........................................................................................................................................ 24
Home screen .......................................................................................................................................................... 24
Home screen widget ............................................................................................................................................... 25
FILE SYSTEM PROTECTION ..................................................................................................................................... 26
About Protection ..................................................................................................................................................... 26
Enabling / disabling Protection ............................................................................................................................... 27
Configuring the protection area .............................................................................................................................. 28
Selecting the action to be performed on detected objects ...................................................................................... 29
SCANNING THE DEVICE ............................................................................................................................................ 30
About scanning the device...................................................................................................................................... 30
Starting a scan manually ........................................................................................................................................ 30
Starting a scheduled scan ...................................................................................................................................... 32
Selection of object type to be scanned ................................................................................................................... 33
U S E R G U I D E
4
Configuring archive scans ...................................................................................................................................... 34
Selecting the action to be performed on detected objects ...................................................................................... 34
QUARANTINING MALWARE OBJECTS ..................................................................................................................... 36
About Quarantine ................................................................................................................................................... 36
Viewing quarantined objects ................................................................................................................................... 36
Restoring objects from Quarantine ......................................................................................................................... 37
Deleting objects from Quarantine ........................................................................................................................... 37
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 38
About Anti-Spam .................................................................................................................................................... 38
About Anti-Spam modes ......................................................................................................................................... 39
Changing the Anti-Spam mode ............................................................................................................................... 39
Creating a Black List ............................................................................................................................................... 40
Adding entries to the Black List ......................................................................................................................... 40
Editing entries in the Black List ......................................................................................................................... 42
Deleting entries from the Black List ................................................................................................................... 42
Creating a White List. ............................................................................................................................................. 43
Adding entries to the White List ........................................................................................................................ 43
Editing entries in the White List ......................................................................................................................... 45
Deleting entries from the White List .................................................................................................................. 45
Responding to SMS messages and calls from contacts not in the phone book...................................................... 46
Responding to SMS messages from non-numeric numbers................................................................................... 47
Selecting a response to incoming SMS .................................................................................................................. 48
Selecting a response to incoming calls ................................ ................................................................................... 49
Viewing Log records ............................................................................................................................................... 50
DATA PROTECTION IN THE EVENT OF DEVICE LOSS OR THEFT ........................................................................ 51
About Anti-Theft ...................................................................................................................................................... 51
Blocking the device ................................................................................................................................................. 52
Deleting personal data ................................ ................................ ............................................................................ 54
Creating a list of folders to delete ........................................................................................................................... 55
Monitoring the replacement of a SIM card on the device ................................ ........................................................ 57
Determining the device geographical coordinates .................................................................................................. 58
Remote start of the Anti-Theft functionality ............................................................................................................. 60
PRIVACY PROTECTION ............................................................................................................................................. 61
Privacy Protection ................................................................................................................................................... 61
Privacy Protection modes ....................................................................................................................................... 61
Changing the Privacy Protection mode .................................................................................................................. 62
Enabling Privacy Protection automatically .............................................................................................................. 63
Enabling Privacy Protection remotely ..................................................................................................................... 64
Selecting data to hide: Privacy Protection .............................................................................................................. 65
Creating a list of private numbers ........................................................................................................................... 66
Adding a number to the list of private numbers ................................................................................................. 67
Editing a number in the list of private numbers ................................................................................................. 68
Deleting a number from the list of private numbers ........................................................................................... 68
UPDATING THE APPLICATION'S DATABASES ........................................................................................................ 69
About updating the application databases .............................................................................................................. 69
Starting updates manually ...................................................................................................................................... 70
Starting scheduled updates .................................................................................................................................... 70
T A B L E O F C O N T E N T S
5
CONFIGURING ADDITIONAL SETTINGS .................................................................................................................. 71
Changing the secret code ....................................................................................................................................... 71
Displaying hints ...................................................................................................................................................... 71
Configuring sound notifications ............................................................................................................................... 72
Notifications in the status bar .................................................................................................................................. 72
Using the Home screen widget ............................................................................................................................... 72
GLOSSARY ................................................................................................................................................................. 74
KASPERSKY LAB ZAO ............................................................................................................................................... 76
INFORMATION ABOUT THIRD-PARTY CODE .......................................................................................................... 77
Distributed program code ....................................................................................................................................... 77
ADB .................................................................................................................................................................. 77
ADBWINAPI.DLL .............................................................................................................................................. 77
ADBWINUSBAPI.DLL ....................................................................................................................................... 78
Other information .................................................................................................................................................... 80
TRADEMARK NOTICE (ANDROID) ............................................................................................................................ 81
INDEX .......................................................................................................................................................................... 82
6

ABOUT THIS HELP

IN THIS SECTION
Document conventions ...................................................................................................................................................... 6
SAMPLE TEXT
DOCUMENT CONVENTIONS DESCRIPTION
Note that...
Warnings are highlighted in red and enclosed in frames. Warnings contain important information, for example, on safety-critical computer operations.
It is recommended to use...
Notes are enclosed in frames. Notes contain additional and reference information.
Example:
...
Examples are given by section, on a yellow background, and under the heading "Example".
Update means...
New terms are marked by italics.
ALT+F4
Names of keyboard keys appear in a bold typeface and are capitalized. Names of the keys followed by a "plus" sign indicate the use of a key
combination.
Enable
Names of interface elements, for example, input fields, menu commands, buttons, etc., are marked in a bold typeface.
To configure a task schedule:
Instruction introductory phrases are marked in italics.
help
Texts in the command line or texts of messages displayed on the screen have a special font.
<IP address of your computer>
Variables are enclosed in angle brackets. Instead of variables, the corresponding values are placed in each case (angle brackets are omitted).
This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The document is designed for a wide audience.
Objectives of the document:
help the users independently set up the application on a mobile device, activate it and optimize the application
for their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving

DOCUMENT CONVENTIONS

technical support.
Conventions described in the table below, are used in this document.
Таблица 1. Document conventions
7

ADDITIONAL DATA SOURCES

IN THIS SECTION
Information sources for further research ........................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 8
Contacting the Documentation Development Group ......................................................................................................... 8
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers from them, using various sources of information. You can choose the most suitable source according to how important or urgent your request is.

INFORMATION SOURCES FOR FURTHER RESEARCH

You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application Knowledge Base page at the Technical Support Service website;
the Help system;
documentation.
Page on Kaspersky Lab website
http://www.kaspersky.com/endpoint-security-smartphone
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and options.
The application page at the Technical Support Service website (Knowledge Base)
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics, such as "Working with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also contain news from the Technical Support Service.
The Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
U S E R G U I D E
8
Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF format). This document describes how to install and uninstall the application, manage its settings, start working with the application, configure the settings of its components. The document describes the application interface and the capabilities offered for typical application tasks.

DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE WEB FORUM

If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine for specific enquiries.

CONTACTING THE DOCUMENTATION DEVELOPMENT GROUP

If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment, please contact our User documentation development group. To contact the Documentation Development Group send an email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8 for Smartphone".
9
KASPERSKY ENDPOINT SECURITY 8 FOR
IN THIS SECTION
Hardware and software requirements ............................................................................................................................... 9
SMARTPHONE
Kaspersky Endpoint Security 8 for Smartphone provides protection for mobile devices (herein "devices") running the Android operating system. The application can protect information on the device from infection by known threats, prevent unwanted SMS messages and calls, protect information on the device in case of theft or loss, and hide information relating to confidential contacts. Every type of threat is processed in separate components of the program. This allows to fine-tune the application settings depending on user needs.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Virus folder. It protects the file system of the mobile device from viruses and other malicious applications.
Anti-Virus can detect and neutralize malicious objects on your device and update the application's anti-virus databases.
Anti-Spam section. Scans all incoming SMS messages and calls for spam. The component allows the flexible
blocking of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored there, and pinpoint its geographic location using SMS commands from another device. Furthermore, Anti-Theft allows you to lock your device if the SIM card is replaced or if the device is activated without a SIM card.
Privacy Protection. It hides information related to confidential numbers from the contact list. Privacy Protection
hides entries in Contacts, call and SMS history, and incoming calls and SMS messages for these numbers.
Kaspersky Endpoint Security 8 for Smartphone does not back up and subsequently restore data.

HARDWARE AND SOFTWARE REQUIREMENTS

Kaspersky Endpoint Security 8 can be installed on mobile devices running versions 1.6, 2.0, 2.1, 2.2, 2.3, 3.x, and 4.0 of the Android operating system.
10
INSTALLING KASPERSKY ENDPOINT
IN THIS SECTION
About installing the application via the computer ............................................................................................................ 10
Installing the application via the computer....................................................................................................................... 10
About installing the application after receiving a email message .................................................................................... 12
Installing the application after receiving email ................................................................................................................. 12
SECURITY 8 FOR SMARTPHONE
The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration tools. According to the user's means of administration, installation can be automatic or require further input from the user.
If the user's further input is needed to install the application, the installation will proceed in one of the following ways:
The similar-named for installing the Kaspersky Endpoint Security 8 for Smartphone application installed on your
computer. With this utility, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile device.
You receive the email from the administrator with the distribution package or an indication to download it. You
install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using information from the email.
This section gives the preparatory actions for installing Kaspersky Endpoint Security 8 for Smartphone, it describes the different ways of installing applications on the mobile device and what the user has to do for each of them.
ABOUT INSTALLING THE APPLICATION VIA THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can install Kaspersky Endpoint Security 8 for Smartphone to mobile devices connected to this computer. The Kaspersky Endpoint Security 8 for Smartphone supply utility contains the application distribution package and sends it to the mobile device. After it is installed on the workstation, the utility automatically launches and monitors the connection of mobile devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the device satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application on it.

INSTALLING THE APPLICATION VIA THE COMPUTER

If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices to the computer.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11
To install the application on a mobile device:
1. Connect the mobile device to the computer. If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1. Kaspersky Endpoint Security 8 for Smartphone installation application
2. Press the Continue button. The KES 8 window opens with a list of connected devices found. If more than one device which satisfies the system requirements is connected to the computer, they are shown
in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be installed. To do this, check the boxes next to the device names (see Figure below).
Figure 2. Selection of devices for installation of Kaspersky Endpoint Security 8 for Smartphone
U S E R G U I D E
12
4. Press Install button.
The utility puts the distribution package on the selected devices. The KES 8 window on the computer shows the status of the transfer of the distribution package.
After the distribution package is transferred onto the chosen devices, application installation starts automatically.
Contact the administrator, if any errors occur during the installation process.
To prevent Kaspersky Endpoint Security 8 for Smartphone from installation to the connected devices,
in the KES 8 window check the Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone Installation Wizard box.
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A EMAIL MESSAGE
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.

INSTALLING THE APPLICATION AFTER RECEIVING EMAIL

To install Kaspersky Endpoint Security 8 for Smartphone:
1. On the mobile device or the workstation, open the message from the administrator which contains the application installation settings.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
If you download the distribution package to a mobile device, it will be saved by default to the storage card.
3. Perform one of the following actions:
if you downloaded the distribution package to the mobile device, open it;
if you downloaded the distribution package to the workstation, connect the device to the workstation, copy
the distribution package to the device, and open it.
Installation starts automatically and the application will be installed on the device.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
13
4. Run the application (see "Starting the application" on page 21). To do so, switch from the Home screen to the applications screen, and select Endpoint Security 8 for Smartphone.
The Synchronization settings screen opens (see fig. below).
Figure 3. Synchronization settings
5. Show the values for the settings to connect to the remote administration system if they were given when you received the message from the administrator. Enter the values for the following settings:
Server; Port; Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will not be present.
6. In the Your email address field, enter your business email address and tap Continue. The email address is used for registering the device in the remote administration system. Please keep in mind
that the email address specified during application installation cannot be changed.
7. Set the application secret code (see "Setting the secret code" on page. 21). To do this, you have to fill in the Set secret code and Confirm code fields and tap Enter.
8. Enable the option to recover the secret code (see "Enabling the option to recover the secret code" on page 22).
Contact the administrator, if any errors occur during the installation process.
14

UNINSTALLING THE APPLICATION

The application can only be uninstalled from the device if hiding of confidential information is disabled. Before uninstalling the application, you should ensure that this condition is fulfilled.
To uninstall Kaspersky Endpoint Security 8 for Smartphone:
1. Disable Privacy Protection (on page 61).
2. From the Home screen go to the applications screen and select Settings Applications Manage applications.
3. Select Kaspersky Endpoint Security 8 for Smartphone from the list of applications. The About the application screen opens.
4. Tap the Delete button.
A confirm deletion window opens.
5. Confirm the deletion of Kaspersky Endpoint Security 8 for Smartphone by tapping OK.
The application is deleted from the device.
6. Tap the ОК button when deletion is complete.
15

MANAGING APPLICATION SETTINGS

All Kaspersky Endpoint Security 8 for Smartphone settings including the license are configured by the administrator through the remote administration system. The administrator can set the user permission to change the values of these settings.
You can change the application settings on your mobile device if the administrator has not disabled the capability to change these parameters.
The administrator can block changing all or some components. If the component settings screen has a lock icon and a warning message, the settings of the component cannot be accessed to be changed on the mobile device.
If the administrator changed the application settings, they are transferred to the device via the remote administration system. In this case the values of the application settings blocked by the administrator will change. Settings that were not blocked by the administrator will remain unchanged.
If the application settings were not transferred to the device, or you want to restore the values set by the administrator, use the function to synchronize the device with the remote administration system (see "Synchronizing with the remote administration system" on page 18).
Only use the synchronization function under the administrator's guidance.
16

MANAGING THE LICENSE

IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 16
Installing a license ........................................................................................................................................................... 17
Viewing license information ............................................................................................................................................. 17
This section gives information about the application license, how to activate it and view information about it.

ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE LICENSES

A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
License term – a period during which the additional services are offered:
technical support;
update the application's anti-virus databases.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license period of validity, all application functions are accessible. Upon expiration of its validity period, Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens, only the following actions are available:
disabling hiding of personal data;
viewing the application's help system;
synchronizing with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
On termination of its commercial license's validity, Kaspersky Endpoint Security 8 for Smartphone limits the application's functionality. You can continue to use the Anti-Spam component, perform an anti-virus scan of the mobile device and use protection components, but only on the basis of anti-virus databases that are current on the date of the license expiry. For other application components, only the following actions are available:
M A N A G I N G T H E L I C E N S E
17
disabling hiding of personal data;
viewing the application's help system;

INSTALLING A LICENSE

The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is installed. During this time, the administrator installs the license through the remote administration system and the application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are accessible in this mode:
start virus scan;
configure additional application settings;
start synchronization of the device with the remote administration system;
disabling hiding of personal data;
viewing application help system.
If the license was not installed within three days of installation, use the function to synchronize the device with the remote administration system to install the license.
synchronizing with the remote administration system.

VIEWING LICENSE INFORMATION

You can view the following license information: license number, type, activation date, expiration date, number of days to expiration and device serial number.
To view the license information:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab.
This will open the Additional window.
2. Select the License item.
18
SYNCHRONIZATION WITH THE REMOTE
IN THIS SECTION
Start synchronization manually ....................................................................................................................................... 18
Changing the synchronization settings ............................................................................................................................ 20
ADMINISTRATION SYSTEM
During synchronization, the application settings configured by the administrator are transferred to the device. Operational reports on the application components are transferred from the device to the remote administration system.
The device is automatically synchronized with the remote administration system.
If synchronization does not perform automatically, you can start it manually.
Manual synchronization is required, if the license was not installed within three days after application installation.
According to the remote administration system chosen by the administrator to manage the application, the user may be asked to enter connection settings to the remote administration system. In this case, the values set by the user manually are accessible for changes in the application (see "Changing the synchronization settings" on page 20).
Change the settings for connection to the remote administration system only under the administrator's guidance.
S Y N C H R O N I Z A T I O N W I T H T H E R E M O T E A D M I N I S T R A T I O N S Y S T E M
19

START SYNCHRONIZATION MANUALLY

To manually synchronize the device with the remote administration system after the application is installed,
after the warning on the Home screen tap Start synchronization (see Figure below).
Figure 4. Starting synchronization
The option to start synchronization on the Home screen of Kaspersky Endpoint Security 8 for Smartphone after the application is installed is available if automatic connection to the remote administration system failed.
When synchronization is complete, the application settings are applied on the device, the license is installed, and the Start synchronization button is not displayed on the Home screen.
To manually synchronize the device with the remote administration system:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab. This will open the Additional window.
2. Tap Synchronize. If the user was not prompted to enter settings to connect to the remote administration system during installation,
a connection is established with the remote administration system. If the user was prompted to enter settings to connect to the remote administration system during installation, the
menu item is called Synchronization and the Synchronization screen opens. Tap Synchronize. Internet connection with the remote administration system will be set.
U S E R G U I D E
20

CHANGING THE SYNCHRONIZATION SETTINGS

Change the settings of connection to the remote administration system only if directed by the administrator.
To change settings for connection to the remote administration:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional section.
This will open the Additional window.
2. Select Synchronization.
The Synchronization screen opens (see figure below).
Figure 5. Synchronization settings
3. Change the values of the following settings in the Synchronization settings section:
Server;
Port;
Group.
21

GETTING STARTED

IN THIS SECTION
Starting the application .................................................................................................................................................... 21
Setting the secret code.................................................................................................................................................... 21
Enabling the option to recover the secret code ............................................................................................................... 22
Recovering the secret code ............................................................................................................................................. 23
Viewing information about the application ....................................................................................................................... 23
This section provides information about how to start using Kaspersky Endpoint Security 8 for Smartphone: activate it, set a secret code for the application, enable the option of secret code recovery, recover the secret code, and start the application.

STARTING THE APPLICATION

To start Kaspersky Endpoint Security 8 for Smartphone:
1. Switch from the Home screen to the applications screen.
2. Select Kaspersky Endpoint Security 8 for Smartphone.
3. Enter the secret code of the application and tap Enter.
The Home screen opens.

SETTING THE SECRET CODE

After starting the application you will be asked to enter the application secret code. Application secret code prevents any unauthorized access to the application settings.
You can later change the secret code installed.
Kaspersky Endpoint Security 8 for Smartphone prompts for the secret code in the following cases:
for access to the application;
when sending an SMS command from another mobile device to start the following functions remotely: Block,
The secret code is comprised of numerals. The minimum number of characters is four.
Data Wipe, SIM Watch, GPS Find, Privacy Protection.
If you forget the application secret code, you can restore it (see the "Recovering the secret code" section on page 23). For this purpose, the recovery of secret code option must be enabled in advance (see the "Recovering the secret code" section on page 23).
U S E R G U I D E
22
To enter the secret code:
1. After activating the application, enter in the Enter secret code field the figures which will be your code.
The code entered is automatically verified.
If the code is deemed invalid according to the results of the verification, a warning message is displayed and the application requests confirmation. In order to use the code, press Yes. In order to create a new code, press No. Enter a new application secret code.
2. Re-enter the same code in the Confirm new code field.

ENABLING THE OPTION TO RECOVER THE SECRET CODE

After the initial activation of the application, you can enable the option of secret code recovery. Then, in the future, you will be able to recover the secret code if it is forgotten.
If you have canceled the option enabling during the initial activation of the application, you can enable it after reinstallation of Kaspersky endpoint Security 8 for Smartphone on the device.
You can only recover the application secret code (see the "Recovering the secret code" section on page 23) if the recovery of secret code option is enabled. If you forget the password, and the recovery of secret code option is disabled, it will not be possible to manage the functions of Kaspersky Endpoint Security 8 for Smartphone.
To enable the recovery of secret code option:
1. After you have installed the secret code for the application (see the "Setting the secret code" section on page 21) enter your email address on the Enabling the option to recover the secret code screen.
2. Confirm the enabling of the option of secret code recovery, by tapping Enable.
The email address that you give will be used during recovery of the secret code.
The application will establish an Internet connection with the secret code recovery server, send the information entered and enable the recovery of secret code option.
The secret code is now set.
23

RECOVERING THE SECRET CODE

You can only recover the secret code enabling the recovery of secret code option in advance (see "Enabling the option to recover the secret code" on page 22).
To recover the application secret code:
1. Switch from the Home screen to the applications screen.
2. Select Kaspersky Endpoint Security 8 for Smartphone.
3. Tap Menu Recovery of secret code.
The following information will then be displayed on the screen:
Kaspersky Lab's website to recover the secret code;
device identification code.
4. Tap Go.
The website for your secret code recovery http://mobile.kaspersky.com/recover-code opens.
5. Enter the following information in the appropriate fields:
the email address that you previously designated for recovery of the secret code;
device identification code.
As a result, the recovery code will be sent to the email address that you indicated.
6. Switch to the Kaspersky Endpoint Security 8 screen.
7. Tap Menu Enter recovery code and enter the recovery code that you received.
8. Enter the new application secret code. To do so, enter the new secret code in the Set new secret code and Confirm new secret code fields.
9. Tap Enter.

VIEWING INFORMATION ABOUT THE APPLICATION

You can view general information about Kaspersky Endpoint Security 8 for Smartphone and its version.
To view information about the application:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab.
This will open the Additional window.
2. In the Information section, select the About the application item.
24

APPLICATION INTERFACE

IN THIS SECTION
Home screen ................................................................................................................................................................... 24
Home screen widget ....................................................................................................................................................... 25
This section provides information on the basic elements of Kaspersky Endpoint Security 8 for Smartphone interface.

HOME SCREEN

When the application starts, the Home screen opens (see fig. below). Dropdown sections are located on the Home screen. Each section can be used to configure a component or run
protection tasks. The Home screen also displays the status of the main components. The following information is shown under the name of each section:
Anti-Virus – protection status of the device against viruses and other threats (see "File system protection" on
page 26).
Privacy Protection – mode for hiding confidential information. Anti-Theft – status of the Anti-Theft functions. Anti-Spam – mode for filtering calls and SMS messages. Additional – information about additional application settings grouped in this section (see "Configuring
additional settings" on page 71).
Figure 6. Home screen
A P P L I C A T I O N I N T E R F A C E
25

HOME SCREEN WIDGET

The Home screen of Kaspersky Endpoint Security 8 includes a widget (see fig. below).
Figure 7. Home screen widget
The color indicator of the Home screen widget informs you about the protection status of your device, Privacy Protection and the license, and allows you to configure the application settings.
The color scheme is used:
a green shield indicates that Protection is enabled;
a grey shield indicates that Protection is disabled;
a green background indicates the confidential information is hidden;
a grey background indicates that confidential information is displayed;
an exclamation mark in a yellow triangle indicates that the license has expired or it is not installed.
26

FILE SYSTEM PROTECTION

IN THIS SECTION
About Protection .............................................................................................................................................................. 26
Enabling / disabling Protection ........................................................................................................................................ 26
Configuring the protection area ....................................................................................................................................... 28
Selecting the action to be performed on detected objects ............................................................................................... 29
This section provides information on the Protection component which enables avoidance of infections of your device's file system. The section also describes how to activate/stop the Protection and adjust its operation settings.

ABOUT PROTECTION

Protection starts when operation system starts up and is always found in the device's memory. Protection scans all files that can be opened, saved or executed (including ones located on storage cards), and installed applications.
File scanning is performed as follows:
1. Protection scans every file when the user accesses it.
Protection analyses the file for the presence of malicious objects. Malicious objects are detected by comparison with the application's anti-virus databases. The anti-virus databases contain descriptions of all currently known malicious objects, and methods for neutralizing them.
2. According to the file analysis results, the following types of Protection behavior are possible:
If malicious code is detected in a file, Protection performs an action in accordance with the settings (see
"Selecting an action to be performed on detected objects" on page 29);
If no malicious code is discovered in the file, it will be immediately made accessible.
Protection scans the installed application for viruses when it is first started. Protection performs the scan on the basis of the anti-virus databases. If Protection detects a virus during the scan, it prompts the user to delete the application.
Application scanning is performed as follows:
1. Protection scans the installed application for malicious objects when it is first started.
Protection uses the anti-virus database to perform the scanning procedure according to the selected mode.
2. Based on the scan results, Protection may take the following steps:
If malicious code is revealed during application scanning, Protection will suggest removing that application.
If no malicious code is found during application scan, the application becomes available.
Loading...
+ 58 hidden pages