Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers
regarding this software product.
Note! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this
document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction
and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written
permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and
personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version
of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document
for which the rights are held by third parties, or for any potential or actual losses associated with the use of these
materials.
ABOUT THIS HELP ....................................................................................................................................................... 6
ADDITIONAL DATA SOURCES .................................................................................................................................... 7
Information sources for further research ................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 8
Contacting the Documentation Development Group ................................................................................................ 8
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 9
Hardware and software requirements ....................................................................................................................... 9
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................. 10
About installing the application via the computer .................................................................................................... 10
Installing the application via the computer .............................................................................................................. 10
About installing the application after receiving a email message ............................................................................ 12
Installing the application after receiving email ........................................................................................................ 12
UNINSTALLING THE APPLICATION .......................................................................................................................... 14
MANAGING THE LICENSE ......................................................................................................................................... 16
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 16
Installing a license .................................................................................................................................................. 17
Viewing license information .................................................................................................................................... 17
SYNCHRONIZATION WITH THE REMOTE ADMINISTRATION SYSTEM ................................................................. 18
Starting the application ........................................................................................................................................... 21
Setting the secret code ........................................................................................................................................... 21
Enabling the option to recover the secret code ....................................................................................................... 22
Recovering the secret code ................................................................................................ .................................... 23
Viewing information about the application .............................................................................................................. 23
Home screen .......................................................................................................................................................... 24
Home screen widget ............................................................................................................................................... 25
FILE SYSTEM PROTECTION ..................................................................................................................................... 26
About Protection ..................................................................................................................................................... 26
Configuring the protection area .............................................................................................................................. 28
Selecting the action to be performed on detected objects ...................................................................................... 29
SCANNING THE DEVICE ............................................................................................................................................ 30
About scanning the device...................................................................................................................................... 30
Starting a scan manually ........................................................................................................................................ 30
Starting a scheduled scan ...................................................................................................................................... 32
Selection of object type to be scanned ................................................................................................................... 33
About Quarantine ................................................................................................................................................... 36
Restoring objects from Quarantine ......................................................................................................................... 37
Deleting objects from Quarantine ........................................................................................................................... 37
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 38
About Anti-Spam .................................................................................................................................................... 38
About Anti-Spam modes ......................................................................................................................................... 39
Changing the Anti-Spam mode ............................................................................................................................... 39
Creating a Black List ............................................................................................................................................... 40
Adding entries to the Black List ......................................................................................................................... 40
Editing entries in the Black List ......................................................................................................................... 42
Deleting entries from the Black List ................................................................................................................... 42
Creating a White List. ............................................................................................................................................. 43
Adding entries to the White List ........................................................................................................................ 43
Editing entries in the White List ......................................................................................................................... 45
Deleting entries from the White List .................................................................................................................. 45
Responding to SMS messages and calls from contacts not in the phone book...................................................... 46
Responding to SMS messages from non-numeric numbers................................................................................... 47
Selecting a response to incoming SMS .................................................................................................................. 48
Selecting a response to incoming calls ................................ ................................................................................... 49
Viewing Log records ............................................................................................................................................... 50
DATA PROTECTION IN THE EVENT OF DEVICE LOSS OR THEFT ........................................................................ 51
About Anti-Theft ...................................................................................................................................................... 51
Blocking the device ................................................................................................................................................. 52
Deleting personal data ................................ ................................ ............................................................................ 54
Creating a list of folders to delete ........................................................................................................................... 55
Monitoring the replacement of a SIM card on the device ................................ ........................................................ 57
Determining the device geographical coordinates .................................................................................................. 58
Remote start of the Anti-Theft functionality ............................................................................................................. 60
Selecting data to hide: Privacy Protection .............................................................................................................. 65
Creating a list of private numbers ........................................................................................................................... 66
Adding a number to the list of private numbers ................................................................................................. 67
Editing a number in the list of private numbers ................................................................................................. 68
Deleting a number from the list of private numbers ........................................................................................... 68
UPDATING THE APPLICATION'S DATABASES ........................................................................................................ 69
About updating the application databases .............................................................................................................. 69
Notifications in the status bar .................................................................................................................................. 72
Using the Home screen widget ............................................................................................................................... 72
KASPERSKY LAB ZAO ............................................................................................................................................... 76
INFORMATION ABOUT THIRD-PARTY CODE .......................................................................................................... 77
Distributed program code ....................................................................................................................................... 77
Other information .................................................................................................................................................... 80
INDEX .......................................................................................................................................................................... 82
Warnings are highlighted in red and enclosed in frames. Warnings contain
important information, for example, on safety-critical computer operations.
It is recommended to use...
Notes are enclosed in frames. Notes contain additional and reference
information.
Example:
...
Examples are given by section, on a yellow background, and under the heading
"Example".
Update means...
New terms are marked by italics.
ALT+F4
Names of keyboard keys appear in a bold typeface and are capitalized.
Names of the keys followed by a "plus" sign indicate the use of a key
combination.
Enable
Names of interface elements, for example, input fields, menu commands,
buttons, etc., are marked in a bold typeface.
To configure a task schedule:
Instruction introductory phrases are marked in italics.
help
Texts in the command line or texts of messages displayed on the screen have a
special font.
<IP address of your computer>
Variables are enclosed in angle brackets. Instead of variables, the corresponding
values are placed in each case (angle brackets are omitted).
This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The
document is designed for a wide audience.
Objectives of the document:
help the users independently set up the application on a mobile device, activate it and optimize the application
for their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving
DOCUMENT CONVENTIONS
technical support.
Conventions described in the table below, are used in this document.
Таблица 1. Document conventions
7
ADDITIONAL DATA SOURCES
IN THIS SECTION
Information sources for further research ........................................................................................................................... 7
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 8
Contacting the Documentation Development Group ......................................................................................................... 8
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers
from them, using various sources of information. You can choose the most suitable source according to how important or
urgent your request is.
INFORMATION SOURCES FOR FURTHER RESEARCH
You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application Knowledge Base page at the Technical Support Service website;
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and
options.
The application page at the Technical Support Service website (Knowledge Base)
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and
cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics,
such as "Working with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions
about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also
contain news from the Technical Support Service.
The Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can
view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
U S E R G U I D E
8
Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF
format). This document describes how to install and uninstall the application, manage its settings, start working with
the application, configure the settings of its components. The document describes the application interface and the
capabilities offered for typical application tasks.
DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE
WEB FORUM
If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in
our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine
for specific enquiries.
CONTACTING THE DOCUMENTATION DEVELOPMENT
GROUP
If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment,
please contact our User documentation development group. To contact the Documentation Development Group send an
email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8
for Smartphone".
9
KASPERSKY ENDPOINT SECURITY 8 FOR
IN THIS SECTION
Hardware and software requirements ............................................................................................................................... 9
SMARTPHONE
Kaspersky Endpoint Security 8 for Smartphone provides protection for mobile devices (herein "devices") running the
Android operating system. The application can protect information on the device from infection by known threats,
prevent unwanted SMS messages and calls, protect information on the device in case of theft or loss, and hide
information relating to confidential contacts. Every type of threat is processed in separate components of the program.
This allows to fine-tune the application settings depending on user needs.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Virus folder. It protects the file system of the mobile device from viruses and other malicious applications.
Anti-Virus can detect and neutralize malicious objects on your device and update the application's anti-virus
databases.
Anti-Spam section. Scans all incoming SMS messages and calls for spam. The component allows the flexible
blocking of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored
there, and pinpoint its geographic location using SMS commands from another device. Furthermore, Anti-Theft
allows you to lock your device if the SIM card is replaced or if the device is activated without a SIM card.
Privacy Protection. It hides information related to confidential numbers from the contact list. Privacy Protection
hides entries in Contacts, call and SMS history, and incoming calls and SMS messages for these numbers.
Kaspersky Endpoint Security 8 for Smartphone does not back up and subsequently restore data.
HARDWARE AND SOFTWARE REQUIREMENTS
Kaspersky Endpoint Security 8 can be installed on mobile devices running versions 1.6, 2.0, 2.1, 2.2, 2.3, 3.x, and 4.0 of
the Android operating system.
10
INSTALLING KASPERSKY ENDPOINT
IN THIS SECTION
About installing the application via the computer ............................................................................................................ 10
Installing the application via the computer....................................................................................................................... 10
About installing the application after receiving a email message .................................................................................... 12
Installing the application after receiving email ................................................................................................................. 12
SECURITY 8 FOR SMARTPHONE
The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration tools. According to
the user's means of administration, installation can be automatic or require further input from the user.
If the user's further input is needed to install the application, the installation will proceed in one of the following ways:
The similar-named for installing the Kaspersky Endpoint Security 8 for Smartphone application installed on your
computer. With this utility, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile device.
You receive the email from the administrator with the distribution package or an indication to download it. You
install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using information from the email.
This section gives the preparatory actions for installing Kaspersky Endpoint Security 8 for Smartphone, it describes the
different ways of installing applications on the mobile device and what the user has to do for each of them.
ABOUT INSTALLING THE APPLICATION VIA THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can
install Kaspersky Endpoint Security 8 for Smartphone to mobile devices connected to this computer. The Kaspersky
Endpoint Security 8 for Smartphone supply utility contains the application distribution package and sends it to the mobile
device. After it is installed on the workstation, the utility automatically launches and monitors the connection of mobile
devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the device
satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application on it.
INSTALLING THE APPLICATION VIA THE COMPUTER
If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile
devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for
Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices
to the computer.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11
To install the application on a mobile device:
1. Connect the mobile device to the computer.
If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1. Kaspersky Endpoint Security 8 for Smartphone installation application
2. Press the Continue button.
The KES 8 window opens with a list of connected devices found.
If more than one device which satisfies the system requirements is connected to the computer, they are shown
in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be
installed. To do this, check the boxes next to the device names (see Figure below).
Figure 2. Selection of devices for installation of Kaspersky Endpoint Security 8 for Smartphone
U S E R G U I D E
12
4. Press Install button.
The utility puts the distribution package on the selected devices. The KES 8 window on the computer shows the
status of the transfer of the distribution package.
After the distribution package is transferred onto the chosen devices, application installation starts automatically.
Contact the administrator, if any errors occur during the installation process.
To prevent Kaspersky Endpoint Security 8 for Smartphone from installation to the connected devices,
in the KES 8 window check the Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone Installation Wizard box.
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A EMAIL MESSAGE
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.
INSTALLING THE APPLICATION AFTER RECEIVING EMAIL
To install Kaspersky Endpoint Security 8 for Smartphone:
1. On the mobile device or the workstation, open the message from the administrator which contains the
application installation settings.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
If you download the distribution package to a mobile device, it will be saved by default to the storage card.
3. Perform one of the following actions:
if you downloaded the distribution package to the mobile device, open it;
if you downloaded the distribution package to the workstation, connect the device to the workstation, copy
the distribution package to the device, and open it.
Installation starts automatically and the application will be installed on the device.
I N S T A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
13
4. Run the application (see "Starting the application" on page 21). To do so, switch from the Home screen to the
applications screen, and select Endpoint Security 8 for Smartphone.
The Synchronization settings screen opens (see fig. below).
Figure 3. Synchronization settings
5. Show the values for the settings to connect to the remote administration system if they were given when you
received the message from the administrator. Enter the values for the following settings:
Server;
Port;
Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will
not be present.
6. In the Your email address field, enter your business email address and tap Continue.
The email address is used for registering the device in the remote administration system. Please keep in mind
that the email address specified during application installation cannot be changed.
7. Set the application secret code (see "Setting the secret code" on page. 21). To do this, you have to fill in the Set secret code and Confirm code fields and tap Enter.
8. Enable the option to recover the secret code (see "Enabling the option to recover the secret code" on page 22).
Contact the administrator, if any errors occur during the installation process.
14
UNINSTALLING THE APPLICATION
The application can only be uninstalled from the device if hiding of confidential information is disabled. Before uninstalling
the application, you should ensure that this condition is fulfilled.
To uninstall Kaspersky Endpoint Security 8 for Smartphone:
1. Disable Privacy Protection (on page 61).
2. From the Home screen go to the applications screen and select SettingsApplicationsManage applications.
3. Select Kaspersky Endpoint Security 8 for Smartphone from the list of applications.
The About the application screen opens.
4. Tap the Delete button.
A confirm deletion window opens.
5. Confirm the deletion of Kaspersky Endpoint Security 8 for Smartphone by tapping OK.
The application is deleted from the device.
6. Tap the ОК button when deletion is complete.
15
MANAGING APPLICATION SETTINGS
All Kaspersky Endpoint Security 8 for Smartphone settings including the license are configured by the administrator
through the remote administration system. The administrator can set the user permission to change the values of these
settings.
You can change the application settings on your mobile device if the administrator has not disabled the capability to
change these parameters.
The administrator can block changing all or some components. If the component settings screen has a lock icon and a
warning message, the settings of the component cannot be accessed to be changed on the mobile device.
If the administrator changed the application settings, they are transferred to the device via the remote administration
system. In this case the values of the application settings blocked by the administrator will change. Settings that were not
blocked by the administrator will remain unchanged.
If the application settings were not transferred to the device, or you want to restore the values set by the administrator,
use the function to synchronize the device with the remote administration system (see "Synchronizing with the remote
administration system" on page 18).
Only use the synchronization function under the administrator's guidance.
16
MANAGING THE LICENSE
IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 16
Installing a license ........................................................................................................................................................... 17
Viewing license information ............................................................................................................................................. 17
This section gives information about the application license, how to activate it and view information about it.
ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR
SMARTPHONE LICENSES
A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it
as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
License term – a period during which the additional services are offered:
technical support;
update the application's anti-virus databases.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license period of validity, all application functions are accessible. Upon expiration of its validity
period, Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens,
only the following actions are available:
disabling hiding of personal data;
viewing the application's help system;
synchronizing with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
On termination of its commercial license's validity, Kaspersky Endpoint Security 8 for Smartphone limits the
application's functionality. You can continue to use the Anti-Spam component, perform an anti-virus scan of the
mobile device and use protection components, but only on the basis of anti-virus databases that are current on
the date of the license expiry. For other application components, only the following actions are available:
M A N A G I N G T H E L I C E N S E
17
disabling hiding of personal data;
viewing the application's help system;
INSTALLING A LICENSE
The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is
installed. During this time, the administrator installs the license through the remote administration system and the
application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are
accessible in this mode:
start virus scan;
configure additional application settings;
start synchronization of the device with the remote administration system;
disabling hiding of personal data;
viewing application help system.
If the license was not installed within three days of installation, use the function to synchronize the device with the remote
administration system to install the license.
synchronizing with the remote administration system.
VIEWING LICENSE INFORMATION
You can view the following license information: license number, type, activation date, expiration date, number of days to
expiration and device serial number.
To view the license information:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab.
Changing the synchronization settings ............................................................................................................................ 20
ADMINISTRATION SYSTEM
During synchronization, the application settings configured by the administrator are transferred to the device. Operational
reports on the application components are transferred from the device to the remote administration system.
The device is automatically synchronized with the remote administration system.
If synchronization does not perform automatically, you can start it manually.
Manual synchronization is required, if the license was not installed within three days after application installation.
According to the remote administration system chosen by the administrator to manage the application, the user may be
asked to enter connection settings to the remote administration system. In this case, the values set by the user manually
are accessible for changes in the application (see "Changing the synchronization settings" on page 20).
Change the settings for connection to the remote administration system only under the administrator's guidance.
S Y N C H R O N I Z A T I O N W I T H T H E R E M O T E A D M I N I S T R A T I O N S Y S T E M
19
START SYNCHRONIZATION MANUALLY
To manually synchronize the device with the remote administration system after the application is installed,
after the warning on the Home screen tap Start synchronization (see Figure below).
Figure 4. Starting synchronization
The option to start synchronization on the Home screen of Kaspersky Endpoint Security 8 for Smartphone after the
application is installed is available if automatic connection to the remote administration system failed.
When synchronization is complete, the application settings are applied on the device, the license is installed, and the
Start synchronization button is not displayed on the Home screen.
To manually synchronize the device with the remote administration system:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab.
This will open the Additional window.
2. Tap Synchronize.
If the user was not prompted to enter settings to connect to the remote administration system during installation,
a connection is established with the remote administration system.
If the user was prompted to enter settings to connect to the remote administration system during installation, the
menu item is called Synchronization and the Synchronization screen opens. Tap Synchronize. Internet
connection with the remote administration system will be set.
U S E R G U I D E
20
CHANGING THE SYNCHRONIZATION SETTINGS
Change the settings of connection to the remote administration system only if directed by the administrator.
To change settings for connection to the remote administration:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional section.
This will open the Additional window.
2. Select Synchronization.
The Synchronization screen opens (see figure below).
Figure 5. Synchronization settings
3. Change the values of the following settings in the Synchronization settings section:
Server;
Port;
Group.
21
GETTING STARTED
IN THIS SECTION
Starting the application .................................................................................................................................................... 21
Setting the secret code.................................................................................................................................................... 21
Enabling the option to recover the secret code ............................................................................................................... 22
Recovering the secret code ............................................................................................................................................. 23
Viewing information about the application ....................................................................................................................... 23
This section provides information about how to start using Kaspersky Endpoint Security 8 for Smartphone: activate it, set
a secret code for the application, enable the option of secret code recovery, recover the secret code, and start the
application.
STARTING THE APPLICATION
To start Kaspersky Endpoint Security 8 for Smartphone:
1. Switch from the Home screen to the applications screen.
2. Select Kaspersky Endpoint Security 8 for Smartphone.
3. Enter the secret code of the application and tap Enter.
The Home screen opens.
SETTING THE SECRET CODE
After starting the application you will be asked to enter the application secret code. Application secret code prevents any
unauthorized access to the application settings.
You can later change the secret code installed.
Kaspersky Endpoint Security 8 for Smartphone prompts for the secret code in the following cases:
for access to the application;
when sending an SMS command from another mobile device to start the following functions remotely: Block,
The secret code is comprised of numerals. The minimum number of characters is four.
Data Wipe, SIM Watch, GPS Find, Privacy Protection.
If you forget the application secret code, you can restore it (see the "Recovering the secret code" section on page 23).
For this purpose, the recovery of secret code option must be enabled in advance (see the "Recovering the secret code"
section on page 23).
U S E R G U I D E
22
To enter the secret code:
1. After activating the application, enter in the Enter secret code field the figures which will be your code.
The code entered is automatically verified.
If the code is deemed invalid according to the results of the verification, a warning message is displayed and the
application requests confirmation. In order to use the code, press Yes. In order to create a new code, press No.
Enter a new application secret code.
2. Re-enter the same code in the Confirm new code field.
ENABLING THE OPTION TO RECOVER THE SECRET CODE
After the initial activation of the application, you can enable the option of secret code recovery. Then, in the future, you
will be able to recover the secret code if it is forgotten.
If you have canceled the option enabling during the initial activation of the application, you can enable it after
reinstallation of Kaspersky endpoint Security 8 for Smartphone on the device.
You can only recover the application secret code (see the "Recovering the secret code" section on page 23) if the
recovery of secret code option is enabled. If you forget the password, and the recovery of secret code option is disabled,
it will not be possible to manage the functions of Kaspersky Endpoint Security 8 for Smartphone.
To enable the recovery of secret code option:
1. After you have installed the secret code for the application (see the "Setting the secret code" section on
page 21) enter your email address on the Enabling the option to recover the secret code screen.
2. Confirm the enabling of the option of secret code recovery, by tapping Enable.
The email address that you give will be used during recovery of the secret code.
The application will establish an Internet connection with the secret code recovery server, send the information
entered and enable the recovery of secret code option.
The secret code is now set.
23
RECOVERING THE SECRET CODE
You can only recover the secret code enabling the recovery of secret code option in advance (see "Enabling the option to
recover the secret code" on page 22).
To recover the application secret code:
1. Switch from the Home screen to the applications screen.
2. Select Kaspersky Endpoint Security 8 for Smartphone.
3. Tap MenuRecovery of secret code.
The following information will then be displayed on the screen:
Kaspersky Lab's website to recover the secret code;
device identification code.
4. Tap Go.
The website for your secret code recovery http://mobile.kaspersky.com/recover-code opens.
5. Enter the following information in the appropriate fields:
the email address that you previously designated for recovery of the secret code;
device identification code.
As a result, the recovery code will be sent to the email address that you indicated.
6. Switch to the Kaspersky Endpoint Security 8 screen.
7. Tap MenuEnter recovery code and enter the recovery code that you received.
8. Enter the new application secret code. To do so, enter the new secret code in the Set new secret code and
Confirm new secret code fields.
9. Tap Enter.
VIEWING INFORMATION ABOUT THE APPLICATION
You can view general information about Kaspersky Endpoint Security 8 for Smartphone and its version.
To view information about the application:
1. On the Home screen of Kaspersky Endpoint Security 8 for Smartphone, open the Additional tab.
This will open the Additional window.
2. In the Information section, select the About the application item.
24
APPLICATION INTERFACE
IN THIS SECTION
Home screen ................................................................................................................................................................... 24
Home screen widget ....................................................................................................................................................... 25
This section provides information on the basic elements of Kaspersky Endpoint Security 8 for Smartphone interface.
HOME SCREEN
When the application starts, the Home screen opens (see fig. below).
Dropdown sections are located on the Home screen. Each section can be used to configure a component or run
protection tasks.
The Home screen also displays the status of the main components.
The following information is shown under the name of each section:
Anti-Virus – protection status of the device against viruses and other threats (see "File system protection" on
page 26).
Privacy Protection – mode for hiding confidential information.
Anti-Theft – status of the Anti-Theft functions.
Anti-Spam – mode for filtering calls and SMS messages.
Additional – information about additional application settings grouped in this section (see "Configuring
additional settings" on page 71).
Figure 6. Home screen
A P P L I C A T I O N I N T E R F A C E
25
HOME SCREEN WIDGET
The Home screen of Kaspersky Endpoint Security 8 includes a widget (see fig. below).
Figure 7. Home screen widget
The color indicator of the Home screen widget informs you about the protection status of your device, Privacy Protection
and the license, and allows you to configure the application settings.
The color scheme is used:
a green shield indicates that Protection is enabled;
a grey shield indicates that Protection is disabled;
a green background indicates the confidential information is hidden;
a grey background indicates that confidential information is displayed;
an exclamation mark in a yellow triangle indicates that the license has expired or it is not installed.
26
FILE SYSTEM PROTECTION
IN THIS SECTION
About Protection .............................................................................................................................................................. 26
Configuring the protection area ....................................................................................................................................... 28
Selecting the action to be performed on detected objects ............................................................................................... 29
This section provides information on the Protection component which enables avoidance of infections of your device's file
system. The section also describes how to activate/stop the Protection and adjust its operation settings.
ABOUT PROTECTION
Protection starts when operation system starts up and is always found in the device's memory. Protection scans all files
that can be opened, saved or executed (including ones located on storage cards), and installed applications.
File scanning is performed as follows:
1. Protection scans every file when the user accesses it.
Protection analyses the file for the presence of malicious objects. Malicious objects are detected by comparison
with the application's anti-virus databases. The anti-virus databases contain descriptions of all currently known
malicious objects, and methods for neutralizing them.
2. According to the file analysis results, the following types of Protection behavior are possible:
If malicious code is detected in a file, Protection performs an action in accordance with the settings (see
"Selecting an action to be performed on detected objects" on page 29);
If no malicious code is discovered in the file, it will be immediately made accessible.
Protection scans the installed application for viruses when it is first started. Protection performs the scan on the basis of
the anti-virus databases. If Protection detects a virus during the scan, it prompts the user to delete the application.
Application scanning is performed as follows:
1. Protection scans the installed application for malicious objects when it is first started.
Protection uses the anti-virus database to perform the scanning procedure according to the selected mode.
2. Based on the scan results, Protection may take the following steps:
If malicious code is revealed during application scanning, Protection will suggest removing that application.
If no malicious code is found during application scan, the application becomes available.
Loading...
+ 58 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.