KASPERSKY Endpoint Security for Smartphone BlackBerry 8.0 User Manual

Kaspersky Endpoint Security 8 for Smartphone
for BlackBerry
®
OS
PROGRAM VERSION: 8.0
2
Dear User!
Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
Note! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof will result in civil, administrative or criminal liability by applicable law.
Reproduction or distribution of any materials in any format, including translations, is only allowed with the written permission of Kaspersky Lab.
This document, and graphic images related to it, may be used exclusively for informational, non-commercial, and personal purposes.
Kaspersky Lab reserves the right to amend this document without additional notification. You can find the latest version of this document at the Kaspersky Lab website, at http://www.kaspersky.com/docs.
Kaspersky Lab shall not be liable for the content, quality, relevance, or accuracy of any materials used in this document for which the rights are held by third parties, or for any potential or actual losses associated with the use of these materials.
Document last revised on: February 9, 2012
© 2012 Kaspersky Lab ZAO. All Rights Reserved.
http://www.kaspersky.com
http://support.kaspersky.com
3
TABLE OF CONTENTS
ABOUT THIS HELP ....................................................................................................................................................... 5
ADDITIONAL DATA SOURCES .................................................................................................................................... 6
Information sources for further research ................................................................................................................... 6
Discussion of Kaspersky Lab applications on the Web forum .................................................................................. 7
Contacting the Documentation Development Group ................................................................................................ 7
KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ..................................................................................... 8
HARDWARE AND SOFTWARE REQUIREMENTS ....................................................................................................... 8
INSTALLING KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE ............................................................... 9
About installing the application via the computer ...................................................................................................... 9
Installing the application via the computer ................................................................................................................ 9
About installing the application after receiving a email message ............................................................................ 11
Installing the application after receiving email ........................................................................................................ 11
MANAGING APPLICATION SETTINGS ...................................................................................................................... 13
UNINSTALLING THE APPLICATION .......................................................................................................................... 14
MANAGING THE LICENSE ......................................................................................................................................... 15
About Kaspersky Endpoint Security 8 for Smartphone licenses ............................................................................. 15
Installing a license .................................................................................................................................................. 16
Viewing license information .................................................................................................................................... 16
SYNCHRONIZING THE DEVICE WITH THE REMOTE ADMINISTRATION SYSTEM ............................................... 17
Start synchronization manually ............................................................................................................................... 17
Changing the synchronization settings ................................................................................................................... 18
GETTING STARTED.................................................................................................................................................... 19
Starting the application ........................................................................................................................................... 19
Setting the secret code ........................................................................................................................................... 19
Viewing information about the application .............................................................................................................. 20
APPLICATION INTERFACE ........................................................................................................................................ 21
Application tabs ...................................................................................................................................................... 21
Protection status window ........................................................................................................................................ 22
FILTERING OF INCOMING CALLS AND SMS ............................................................................................................ 23
About Anti-Spam .................................................................................................................................................... 23
About Anti-Spam modes ......................................................................................................................................... 24
Changing the Anti-Spam mode ............................................................................................................................... 24
Creating a Black List ............................................................................................................................................... 25
Adding entries to the Black List ......................................................................................................................... 25
Editing entries in the Black List ......................................................................................................................... 26
Deleting entries from the Black List ................................................................................................................... 27
Creating a White List. ............................................................................................................................................. 28
Adding entries to the White List ........................................................................................................................ 28
Editing entries in the White List ......................................................................................................................... 29
Deleting entries from the White List .................................................................................................................. 30
Responding to SMS messages and calls from contacts not in the phone book...................................................... 31
U S E R G U I D E
4
Responding to SMS messages from non-numeric numbers................................................................................... 32
Selecting a response to incoming SMS .................................................................................................................. 33
Selecting a response to incoming calls ................................ ................................................................................... 34
DATA PROTECTION IN THE EVENT OF DEVICE LOSS OR THEFT ........................................................................ 35
About Anti-Theft ...................................................................................................................................................... 35
Blocking the device ................................................................................................................................................. 36
Deleting personal data ................................ ................................ ............................................................................ 37
Creating a list of folders to delete ........................................................................................................................... 39
Monitoring the replacement of a SIM card on the device ................................ ........................................................ 40
Determining the device geographical coordinates .................................................................................................. 41
Remote start of the Anti-Theft functions ................................................................................................................. 43
APPLICATION LOGS................................................................................................................................................... 44
About logs ............................................................................................................................................................... 44
Viewing Log records ............................................................................................................................................... 44
Deleting Log records .............................................................................................................................................. 44
CONFIGURING ADDITIONAL SETTINGS .................................................................................................................. 45
Changing the secret code ....................................................................................................................................... 45
Displaying hints ...................................................................................................................................................... 45
GLOSSARY ................................................................................................................................................................. 46
KASPERSKY LAB ZAO ............................................................................................................................................... 48
INFORMATION ABOUT THIRD-PARTY CODE .......................................................................................................... 49
TRADEMARK NOTICE ................................................................................................................................................ 50
INDEX .......................................................................................................................................................................... 51
5

ABOUT THIS HELP

This document is the Guide for the installation, configuration and use of Endpoint Security 8 for Smartphone. The document is designed for a wide audience.
Objectives of the document:
help the users independently set up the application on a mobile device, activate it and optimize the application
for their needs;
provide a rapid information search on issues connected with the application;
give information on alternative sources of information about the application and possibilities of receiving
technical support.
6

ADDITIONAL DATA SOURCES

IN THIS SECTION
Information sources for further research ........................................................................................................................... 6
Discussion of Kaspersky Lab applications on the Web forum ........................................................................................... 7
Contacting the Documentation Development Group ......................................................................................................... 7
If you have questions about setting up or using Kaspersky Endpoint Security 8 for Smartphone, you can find answers from them, using various sources of information. You can choose the most suitable source according to how important or urgent your request is.

INFORMATION SOURCES FOR FURTHER RESEARCH

You can view the following sources of information about the application:
the Kaspersky Lab application website;
the application Knowledge Base page at the Technical Support Service website;
the Help system;
documentation.
Page on Kaspersky Lab website
http://www.kaspersky.com/endpoint-security-smartphone
Use this page to obtain general information about Kaspersky Endpoint Security 8 for Smartphone features and options.
The application page at the Technical Support Service website (Knowledge Base).
http://support.kaspersky.com/kes8m
This page contains articles written by experts from the Technical Support Service.
These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, and cover purchasing, installing and using Kaspersky Endpoint Security 8 for Smartphone. They are arranged in topics, such as "Working with key files", "Database updates" and "Troubleshooting". The articles aim to answer questions about this Kaspersky Endpoint Security 8 for Smartphone, as well as other Kaspersky Lab products. They may also contain news from the Technical Support Service.
The Help system
If you have any questions about the Kaspersky Endpoint Security 8 for Smartphone separate screen or tab, you can view the context help.
To open the context help, open the right application screen and press Help or choose Menu Help.
A D D I T I O N A L D A T A S O U R C E S
7
Documentation
The Kaspersky Endpoint Security 8 for Smartphone distribution kit includes the User Guide document (in PDF format). This document describes how to install and uninstall the application, manage its settings, start working with the application, configure the settings of its components. The document describes the application interface and the capabilities offered for typical application tasks.

DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THE WEB FORUM

If your question does not require an immediate answer, you can discuss it with Kaspersky Lab experts and other users in our forum at http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, and create new topics, or use the search engine for specific enquiries.

CONTACTING THE DOCUMENTATION DEVELOPMENT GROUP

If you have any questions about the documentation, or you have found an error in it, or would like to leave a comment, please contact our User documentation development group. To contact the Documentation Development Group send an email to docfeedback@kaspersky.com. Use the subject line: "Kaspersky Help Feedback: Kaspersky Endpoint Security 8 for Smartphone".
8

KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE

Kaspersky Endpoint Security 8 for Smartphone protects mobile devices running BlackBerry OS. The application controls incoming SMS and calls, protects information on the device in case of its theft or loss, and hides information related to confidential contacts. Every type of threat is processed in separate components of the program. This allows to fine-tune the application settings depending on user needs. The administrator installs the application and configures and updates settings using the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone includes the following protection components:
Anti-Spam. Scans all incoming SMS messages and calls for spam. The component allows the flexible blocking
of text messages and calls considered undesirable.
Anti-Theft folder. This protects information on the device from unauthorized access when it is lost or stolen and
also makes it easier to find. Anti-Theft enables you to lock your device remotely, delete any information stored there, and pinpoint its geographic location (if your mobile device has a GPS receiver) using SMS commands from another device. Furthermore, Anti-Theft allows you to lock your device if the SIM card is replaced or if the device is activated without a SIM card.
Besides, the application contains a set of service features. These enhance the capabilities of using the application, as well as help users in their work:
Protection status. The status of the program components is displayed on screen. Based on the information
presented, you can evaluate the current information protection status on your device.
Events log. Each of the program components has its own event log, which contains information about the
component operation (e.g. remote launch of the Anti-Theft function, status of the program's license validity period). Reports on the operation of components are given in the remote administration system and remain in it.
Uninstalling the application. To prevent access to protected information, Kaspersky Endpoint Security 8 for
Smartphone can only be uninstalled from the application interface.
Kaspersky Endpoint Security 8 for Smartphone does not back up and subsequently restore data.

HARDWARE AND SOFTWARE REQUIREMENTS

Kaspersky Endpoint Security 8 for Smartphone can be installed on mobile devices using the BlackBerry OS 4.5, 4.6, 4.7,
5.0 and 6.0 operating systems.
9
INSTALLING KASPERSKY ENDPOINT
IN THIS SECTION
About installing the application via the computer .............................................................................................................. 9
Installing the application via the computer......................................................................................................................... 9
About installing the application after receiving a email message .................................................................................... 11
Installing the application after receiving email ................................................................................................................. 11
SECURITY 8 FOR SMARTPHONE
The administrator installs Kaspersky Endpoint Security 8 for Smartphone using remote administration tools. Application installation requires additional steps made by the user.
The application is installed according to one of the following procedures:
The similar-named for installing the Kaspersky Endpoint Security 8 for Smartphone application installed on your
computer. With this utility, you can install Kaspersky Endpoint Security 8 for Smartphone on your mobile device.
You receive the email from the administrator with the distribution package or an indication to download it. You
install Kaspersky Endpoint Security 8 for Smartphone on your mobile device using information from the email.
This section contains the preparatory steps to be completed before installing Kaspersky Endpoint Security 8 for Smartphone and describes different ways of installing the application to a mobile device.
ABOUT INSTALLING THE APPLICATION VIA THE
COMPUTER
If the administrator installed the Kaspersky Endpoint Security 8 for Smartphone supply utility on your computer, you can install Kaspersky Endpoint Security 8 for Smartphone to mobile devices connected to this computer. The Kaspersky Endpoint Security 8 for Smartphone supply utility contains the application distribution package and sends it to the mobile device. After it is installed on the workstation, the utility automatically launches and monitors the connection of mobile devices to the computer. Each time the mobile device connects to the workstation, the utility checks whether the device satisfies the requirements of Kaspersky Endpoint Security 8 for Smartphone, and offers to install the application on it.
Installation is only possible if BlackBerry Desktop Manager is installed on the computer.

INSTALLING THE APPLICATION VIA THE COMPUTER

If the Kaspersky Endpoint Security 8 for Smartphone supply utility is installed on your computer, whenever mobile devices are connected that meet the system requirements you are prompted to install Kaspersky Endpoint Security 8 for Smartphone on them.
You can stop Kaspersky Endpoint Security 8 for Smartphone being installed on subsequent connections of the devices to the computer.
U S E R G U I D E
10
To install the application on a mobile device through a workstation, perform the following:
1. Connect the mobile device to the workstation using BlackBerry Desktop Manager. If the device meets the system requirements to install the application, the KES 8 window opens with information
on the utility (see figure below).
Figure 1: Kaspersky Endpoint Security 8 for Smartphone installation application
2. Press the Continue button. The KES 8 window opens with a list of connected devices found. If more than one device which satisfies the system requirements is connected to the computer, they are shown
in the KES 8 window in the list of detected connected devices.
3. Select one or several devices from the list of detected connected devices on which the application needs to be installed. To do this, check the boxes next to the desired objects (see Figure below).
Figure 2: Selection of devices for installation of Kaspersky Endpoint Security 8 for Smartphone
I NST A L L I N G K A S P E R S K Y E N D P O I N T S E C U R I T Y 8 F O R S M A R T P H O N E
11
4. Press Install button.
The Application Download Wizard window opens on the computer. After the distribution package is transferred onto the chosen devices, application installation starts automatically. After the installation has completed, press Close on the Application Download Wizard window.
The KES 8 window on the computer also shows the status of the transfer of the distribution package.
Contact the administrator, if any errors occur during the installation process.
To prevent Kaspersky Endpoint Security 8 for Smartphone from installation to the connected devices,
In the KES 8 window, check the box Disable automatic start of Kaspersky Endpoint Security 8 for Smartphone Installation Wizard.
ABOUT INSTALLING THE APPLICATION AFTER RECEIVING
A EMAIL MESSAGE
You will receive an email message from the administrator with the distribution package or an indication to download it.
The message contains the following information:
an attachment with the distribution package or a link to download it;
information about the application connection settings to the remote administration system.
Save this message until Kaspersky Endpoint Security 8 for Smartphone is installed on the device.

INSTALLING THE APPLICATION AFTER RECEIVING EMAIL

If you have received an email message with application settings, you can only install the application through the mobile device itself. In this case, installation of Kaspersky Endpoint Security 8 for Smartphone through a computer is not supported.
To install Kaspersky Endpoint Security 8 for Smartphone:
1. Open the message containing the application installation settings from the administrator on the mobile device.
2. Perform one of the following actions:
if the message has a link, follow it to download the distribution package;
if the distribution package is in an attachment to the message, download the distribution package.
Installation starts automatically and the application will be installed on the device.
U S E R G U I D E
12
3. Run the application (see "Starting the application" on page 19). To do this, select Menu Download KES 8 and launch the application by using the scroll bar or selecting Menu Open.
4. Set the application secret code (see "Setting the secret code" on page. 19). To this end, fill in the Enter new code and Confirm code fields and press ENTER.
This opens Synchronization settings screen.
Figure 3: Synchronization settings
5. Show the values for the settings to connect to the remote administration system if they were given when you received the message from the administrator. Enter the values for the following settings:
Server;
Port;
Group.
If it is not necessary to configure the settings for connection to the remote administration system, this step will not be present.
6. In the Your email address field, enter your business email address and press OK.
The email address is used for registering the device in the remote administration system. Please keep in mind that the email address specified during application installation cannot be changed.
Contact the administrator, if any errors occur during the installation process.
13

MANAGING APPLICATION SETTINGS

All Kaspersky Endpoint Security 8 for Smartphone settings including the license are configured by the administrator through the remote administration system. The administrator can set the user permission to change the values of these settings.
You can change the application settings on your mobile device if the administrator has not disabled the capability to change these parameters.
If the component settings screen has a lock icon and a warning message at the top, the component settings cannot be changed on the mobile device.
If the administrator changed the application settings, they are transferred to the device via the remote administration system. In this case the values of the application settings blocked by the administrator will change. Settings that were not blocked by the administrator will remain unchanged.
If the application settings have not been received on the device, or if you want to restore the values set by the administrator, use synchronization of the device with the remote administration system (see section "Start synchronization manually" on page 17).
14

UNINSTALLING THE APPLICATION

The application can only be uninstalled from the device manually by the user.
To uninstall Kaspersky Endpoint Security 8 for Smartphone manually:
1. On the Additional tab, select Uninstall application (see Figure below).
Figure 4: Application removal
A confirm deletion window opens.
2. Confirm the deletion of Kaspersky Endpoint Security 8 for Smartphone by clicking Yes.
The deletion of the application begins.
3. Restart the device in order to complete the uninstalling of the application.
15

MANAGING THE LICENSE

IN THIS SECTION
About Kaspersky Endpoint Security 8 for Smartphone licenses ...................................................................................... 15
Installing a license ........................................................................................................................................................... 16
Viewing license information ............................................................................................................................................. 16
This section gives information about the application license, how to activate it and view information about it.

ABOUT KASPERSKY ENDPOINT SECURITY 8 FOR SMARTPHONE LICENSES

A license is the right to use Kaspersky Endpoint Security 8 for Smartphone and the additional services associated with it as provided by Kaspersky Lab or its partners.
The license must be installed to be able to use the application.
Every license has a validity period and type.
The license validity period is the period for which you are provided with technical support.
The scope of services provided depends on the license type.
The following license types are available:
Trial – a free license with a limited validity period, e.g. 30 days, offered to allow you to get acquainted with
Kaspersky Endpoint Security 8 for Smartphone.
During the trial license period of validity, all application functions are accessible. Upon expiration of its validity period, Kaspersky Endpoint Security 8 for Smartphone stops performing all of its functions. When this happens, only the following actions are available:
viewing the application's help system;
synchronizing with the remote administration system.
Commercial – paid license with a limited validity period (for example, one year), provided upon purchase of
Kaspersky Endpoint Security 8 for Smartphone.
If a commercial license is activated, all application features and additional services are available.
After commercial license expiration, Kaspersky Endpoint Security 8 for Smartphone switches to the limited functionality mode. The following are accessible in this mode:
disabling Anti-Theft;
viewing the application's help system;
synchronizing with the remote administration system.
U S E R G U I D E
16

INSTALLING A LICENSE

The administrator installs the license through the remote administration system.
Kaspersky Endpoint Security 8 for Smartphone works without a license with full functionality for three days after it is installed. During this time, the administrator installs the license through the remote administration system and the application is activated.
If the license was not installed during the three days, the application works in a limited function mode. The following are accessible in this mode:
disabling all components;
viewing application help system.
If the license was not installed within three days, install it using synchronization of the device with the remote administration system (see "Start synchronization manually" on page 17).

VIEWING LICENSE INFORMATION

You can view the following license information: license number, type, activation date, expiration date, number of days to expiration and device PIN.
To view the license information:
1. Select the Additional tab.
2. Select About license.
This opens the About license screen.
Loading...
+ 36 hidden pages