Junos Pulse for Google Android

quaintmayoMobile - Wireless

Dec 10, 2013 (3 years and 6 months ago)

68 views

October 2012
R1
Release
4.0
Copyright © 2012, Juniper Networks, Inc.
Junos Pulse for Google Android
User Guide
ii Copyright © 2012, Juniper Networks, Inc.
Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and
other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other trademarks, service marks,
registered trademarks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any
inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are owned by or
licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312, 6,429,706, 6,459,579,
6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785. Copyright © 2012, Juniper Networks, Inc. All rights reserved.
M10/30/12

iii
Table of Contents
Downloading and Installing Junos Pulse...........................................................1
Available Junos Pulse Features...................................................................1
Registering Security.........................................................................................2
The Mobile Security Dashboard.................................................................3
Email Address Validation...........................................................................3
Using Security Features....................................................................................3
Scan/Threats detected...............................................................................4
Backup......................................................................................................6
Remote Monitoring....................................................................................7
Web Security.............................................................................................8
Settings............................................................................................................8
Security Settings........................................................................................8
Support Info..............................................................................................9
Update.......................................................................................................9
Anti−Theft Features...........................................................................................9
Password Policies and Storage Encryption...............................................11
Scream Dismiss.......................................................................................11
Custom Button.........................................................................................11
Uninstalling or Clearing Data.........................................................................12
Adding a Secure Connection..........................................................................12
Connecting.....................................................................................................13
Viewing Connection Status Icon..............................................................13
Viewing Connection Status Window........................................................13
Limited Access.........................................................................................14
User Interface Modes.....................................................................................14
Known Issues and Limitations.......................................................................14
iv

Copyright © 2012, Juniper Networks, Inc.Downloading and Installing Junos Pulse 1
Installing and Using Junos Pulse for
Google Android
Junos Pulse lets you access protected network resources from your Google Android™
device. It also protects your device against viruses and malware, and includes tools to
reduce the inherent risks of a lost or stolen device.
Additional information for Junos Pulse, including information on supported platforms,
can be found at
http://www.juniper.net/support/products/pulse/mobile/
Downloading and Installing Junos Pulse
Use the following instructions to download and install Junos Pulse software on Google
Android devices.
Informational Note:
The Junos Pulse client is available from the Google Play
application store.
1.From your Android device, download the Junos Pulse software directly to the
device. Once downloaded, Junos Pulse installs automatically.
2.Once the application has been downloaded and installed, the
Junos Pulse icon appears in the applications menu.
3.The first time you start Junos Pulse, the End User License
Agreement appears. You must Accept the license to begin using Junos Pulse.
Available Junos Pulse Features
Informational Note:
Junos Pulse can be deployed with all available features or with a
subset of features based on your usage needs. You may not have all of the Junos Pulse
features described here on your device.
Junos Pulse can include the following features:
Security Tab

Scan/Threats Detected: Lists threats that have been found on the device and gives
you the ability to allow or remove suspicious applications. When no threats are found
this button reads “Scan.” When threats are found, this button reads “Threats
Detected.”

Backup: Lets you backup Contacts and Calendar events.

Remote Monitoring: Provides information on what device activities are being
monitored.

Anti Theft: Lists the anti−theft features that are activated on your device.

Custom Button: Provides a link to a customized URL which takes you to a web page
that is set up by your service provider
2 Registering Security Copyright © 2012, Juniper Networks, Inc.
VPN Tab
Informational Note:
This service is only offered if you are accessing your corporate
network resources securely.

Connections: Lets you add, edit, and remove corporate network connections.

Intranet: Provides Web links configured by your administrator. (Note that on Android
4.0, when VPN is enabled, the Intranet and Email buttons will be disabled. This is due
to the way the mobile client communicates with the SA gateway.)

Email: Launches your email application. (Note that on Android 4.0, when VPN is
enabled, the Intranet and Email buttons will be disabled. This is due to the way the
mobile client communicates with the SA gateway.)

Status: Lets you view, delete, and email log files, which you might need to do in a
troubleshooting operation. The log files show all security incidents, such as virus scan
times and viruses discovered. If you have an established VPN connection, you can
also view the status of that connection from this window.
Registering Security
The Junos Pulse Mobile Security Suite provides access to features that protect your
device from malware and viruses and it allows you to backup your device’s calendar and
contact information to a central server. You must register your device before you can
access the security feature set.
Your can register with automatic URL registration or using a manual registration
process.
Automatic URL Registration
Automatic URL registration requires you to select a URL provided by your administrator
or service provider. Once you select the URL, you are prompted to verify that the URL
comes from a trusted source. When you tap Yes from this prompt, the automated
security registration process takes place.
To register security features automatically, do the following:
1.Start Junos Pulse.
2.Select the registration URL provided to you via email, text message, or Web site.
3.Because the automatic registration changes the security settings on your device,
you should verify the validity of the URL. If you are certain the URL is trusted, select
Yes when prompted.
Once you select Yes, your device is automatically registered for security features.
Manual Registration
In some cases, manual registration may also require you to select a URL. Once you
select the URL, you are prompted to verify that the URL has comes from a trusted
source. When you tap Yes in the registration prompt, the manual registration window
appears.
The registration window requires that you to enter information such as a license code
provided to you by your administrator or service provider.
Informational Note:
If you are using a WIFI-only device (i.e. such as a tablet with no
cellular service), the phone number field does not appear in the registration window.
Copyright © 2012, Juniper Networks, Inc.Using Security Features 3
Installing and Using Junos Pulse for Google Android
To manually register security features, do the following:
1.Start Junos Pulse.
1.Select the URL provided via email, text message, or Web site.
2.Verify the URL is trusted and tap Yes when prompted. The registration window
appears.
3.Enter an Email address and Password.
4.Specify the License Code.
5.Your device’s phone number appears in the Phone Number box. If the number does
not appear, enter it manually including Country Code and Area Code without the
international dialing prefixes: '00' or '+'. Do not use spaces, parentheses, or special
characters. Valid phone numbers are between 11 and 15 digits (including country
code).
6.Select Register.
The Mobile Security Dashboard
The dashboard is one of the servers with which you register your device. If you are given
access to the dashboard (This access is optionally given by an administrator or service
provider.), you can login to monitor your device, control some security settings, and
change your email address and password. You can access the dashboard web interface
using a URL provided to you. For dashboard login and configuration details, please refer
to the Junos Pulse Mobile Security Dashboard documentation.
Email Address Validation
After you first login to the dashboard, you receive an email requesting that you validate
your email address. This email contains a link that you must click to validate your email
address. After you click the link, a web page notification appears informing you that your
email address has been validated.
Using Security Features
Once you have successfully registered, if your device is running Android 2.2 or higher, the
Activate device administrator prompt appears.
Informational Note:
If you do not activate the Device Administrator, some features
behave differently. See the following sections for details: “Anti−Theft Features” on
page 9 and “Uninstalling or Clearing Data” on page 12.
When security features are registered, the available features appear and are now
accessible from the Security tab. Those features are as follows:

Scan/Threats Detected: Lists threats (viruses and malware) that have been found
on the device and gives you the ability to allow or remove suspicious applications.
When no threats are found this button reads “Scan.” You can tap it go to the Scan
window. When threats are found, this button reads “Threats Detected.” You can tap it
to view the detected threats.

Backup: Lets you backup Contacts and Calendar events.
4 Using Security Features Copyright © 2012, Juniper Networks, Inc.

Remote Monitoring: Provides information on what device activities are being
monitored.

Settings: Available from the Menu key. Settings allows you to set scan intervals, view
support information and application logs, update virus signatures and update Junos
Pulse software.
Scan/Threats detected
Anti−Virus and malware detection protects your device by scanning all files and scanning
secure digital (SD) cards to prevent device infections. To view threats and configure
settings for threat detection:
1.Start Junos Pulse.
2.Select the Security tab.
3.If threats have been found, tap the Threats detected button. This takes you to the
Scan Results window.
4.The Scan Results window lists the viruses, malware, suspicious applications and
prohibited applications found on your device. If your device does not have Threat
detection enabled, you only see the prohibited applications found on your device.
Informational Note:
From the Notification bar, the following
notification appears when you have a detected threat.
Detections Tab
Each detected item is displayed in the Detections tab. You can select the orange button
beside the detected item to view more information about the detection and see the
available actions. Detection types and available actions are as follows:

Prohibited Application: This is an application that has been prohibited. To remove a
prohibited application, select the orange button beside the application name and tap
the available Uninstall button. If you do not uninstall applications that are prohibited,
the notification icon continues to appear at the top of the Junos Pulse window.
Informational Note:
On some devices, Junos Pulse can automatically uninstall
applications that are prohibited.
Copyright © 2012, Juniper Networks, Inc.Using Security Features 5
Installing and Using Junos Pulse for Google Android

Critical Malware: This is an application installed on your device that is known to be
malware. To remove malware, select the orange button beside the application name
and tap the available Uninstall button. If you do not uninstall applications that are
found to be malware, the notification icon continues to appear at the top of the Junos
Pulse window.
Informational Note:
On some devices, Junos Pulse can automatically uninstall
applications that are found to be malware.

Suspicious Application: This is an application installed on your device that appears
to be suspicious. The suspicious label is applied to an application when a set of
heuristics determine that the application may be malware. For suspicious
applications, you are given the option of allowing the application (adding it to your
While list) or uninstalling it. To allow a suspicious application, select the orange
button beside the application name and tap the available Allow button. You must
also tap Yes to confirm the Allow action and then tap OK to confirm that you realize
this action may put your device at risk. (You can choose to hide the last dialog so it
does not appear again.)
To uninstall a suspicious application, select the orange button beside the application
and tap the Uninstall button. If you do not uninstall or allow applications that are
found to be suspicious, the notification icon continues to appear at the top of the
Junos Pulse window.
Tap the View Detail button to access more information on the suspicious
applications. You can also Allow or Uninstall the application from the details window.

Virus: Viruses found during the last scan are listed in the Detections tab. It is
recommended that you delete viruses when they appear here. To delete the virus
from your device, select the orange button beside the virus name and tap the
Remove button. Tap the View Detail button to access more information on the
detected virus. You can also Remove the virus from the details window.
6 Using Security Features Copyright © 2012, Juniper Networks, Inc.

Scan button: The Scan button at the top of the Detections tab displays the how long
ago the most recent device scan occurred. You can tap the Scan button to open a
window which allows you to initiate one of three types of available device scans.
Select one of the following scan options and tap OK to start the scan.
− Application scan: Scans all non−system applications.
− Application and SD card scan: Scans all non−system applications and the SD
card.
− Full device scan: Scans all files, non−system applications, and the SD card.
Informational Note:
When you manually initiate a full device scan, a Battery usage
warning may appear. It is to inform you that scans can use large amounts of battery life.
Therefore, you may want to have your device charging during the scan.
White list Tab

When you allow a detected suspicious application, it appears in your White list tab.
From the White list tab, you can manage suspicious applications in case you change
your mind and want to uninstall an allowed application at a later time. By selecting
the orange button beside the application name and taping the available Uninstall
button, you can uninstall the white−listed application. You can also tap the View
Detail button to view more information about the application and then Uninstall the
application from the detail window.
Backup
Junos Pulse Mobile Security backs up contact and calendar appointment information to
a central location. To restore data, you must contact your administrator or access the
dashboard. A restore occurs in the form of an SMS command that tells your device to
contact the server to retrieve your backup.
To back up device data:
1.Start Junos Pulse.
2.Select the Security tab.
3.Select Backup. The time of the last backup is displayed on the Backup button.
4.From the Backup window, the number of Contacts and Calendar events previously
backed up is displayed. To initiate a backup, tap the Backup button at the top of the
window. The backup immediately begins.
Copyright © 2012, Juniper Networks, Inc.Using Security Features 7
Installing and Using Junos Pulse for Google Android
Remote Monitoring
The Remote Monitoring window lets you view the device event types and activities that
are being monitored. To view the Remote Monitoring window, do the following:
1.Start Junos Pulse.
2.Select the Security tab.
3.Select Remote Monitoring.
The Remote Monitoring window may display one or more of the following monitored
activities:
Monitoring

SMS: Inbound and outbound SMS messages are logged, including the sender, receiver
and contents of each message.

MMS: Logging MMS messages is not supported at this time.

Voice: Call history events are logged, such as initiated outgoing calls and received
incoming calls (call duration is not recorded, but the remote phone number is noted.)

Log images/pictures: If enabled from the server, the images downloaded or captured
on the device are turned into thumbnail images and uploaded to the server. This
occurs immediately and is not dependent on log limits.
Logs:

Event limit: When the total number of events (SMS, email, voice) crosses this
threshold, the full suite of logs is uploaded to the server.

File size limit: When the total combined file size of all logs (SMS, email, voice) crosses
this threshold, the full suite of logs is uploaded to the server. Note that SMS messages
are generally several hundred bytes in size. Emails are usually 2KB or larger (no
attachments included). And voice messages are typically 200 hundred bytes.
Control:

Periodic GPS updates: This update period is configured on the server. This setting
periodically queries the device position and uploads that information to the server for
tracking purposes.

Block calls: When enabled, blocks all outbound calls.
8 Settings Copyright © 2012, Juniper Networks, Inc.
Web Security
If Web Security is enabled on your device, URLs that you are attempting to access may
be blocked or monitored. If a URL is blocked by the security policy on the device, the
web browser displays a page informing you that the web site you are attempting to view
is blocked.
When Web Security is active on your device, a notification at the bottom of the Junos
Pulse screen informs you of this.
Settings
From the Settings window, you can configure security settings such as scanning options
and virus signature update intervals. You can also view support information and log
files.
From within the Junos Pulse application, you can access the Settings window through
the Settings button. Locate the Settings button by doing the following:

Select the three vertical dots on the right side of the Action bar (for Android 4.0 and
later) to access the menu. Select Settings from the menu.

Select the Menu button (Android 3.0 and earlier) to access the menu. Select Settings
from the menu.
From the Settings window, you can access the following:
Security Settings
Security settings are configured by your administrator or service provider, and changes
are downloaded to your device. You may change security settings by selecting the
orange arrow beside the Security Settings to access the following:

Scan applications on install: When enabled, a scan is initiated on an application
when it is installed. A malware scan also takes place on files downloaded to
/sdcard/download. When disabled, a scan only occurs at the scheduled interval or
when manually initiated. Select the check box to enable this feature.

Scan SD Card on Insert: Scans the SD card for malware and viruses. Select the check
box to enable this feature.
Action bar button Menu button
Copyright © 2012, Juniper Networks, Inc.Anti−Theft Features 9
Installing and Using Junos Pulse for Google Android

Scan inside archives: Scans the contents of compressed files such as .zip and .apk
files.

Optimize media scanning: Allows for faster scanning of photos, media, and music
files by not re−scanning large files that have already been scanned (unless those files
have changed).

Full device scan: Displays the time interval in which a full device scan occurs. A full
device scan scans all files, the SD card, and non−system applications. Select the arrow
beside the time interval to change the scan interval.

Profile update: Virus definitions are loaded when you register, and they are updated
on a preset schedule. Select the arrow beside the time interval to change the update
interval.
Support Info
You can view device and Junos Pulse application information as well as view and send
logs by selecting the orange arrow beside Support Info in the Settings window. This
takes you the Support Info window where you can do the following:

Tap the View Logs button to see the log file data. From this data window, you can
select which log type to view from the pulldown list and you can clear the log file by
tapping the Clear Logs button.

Tap the Send Logs button to select an application from which to send the log file.
Informational Note:
You can only send log files using an email application. No other
methods are supported at this time.
Update
You can update the virus list and the Junos Pulse application (if updates exist for both)
by selecting the orange arrow beside Update in the Settings window. This takes you to
the Update window. From here you can check for updates for the following:

Virus List: If there is an update available, tap the Update button to update your virus
list. If there is no Update button, your list is likely up to date. An available Check
button allows you to check for updates.

Application: If there is an update available for Junos Pulse, tap the Update button to
update your software. If there is no Update button, your software is likely up to date.
An available Check button allows you to check for updates.
Anti
-
Theft Features
There are a number of measures that can be taken to protect your device if it is lost or
stolen. If your Junos Pulse deployment makes these features visible to you, an Anti
Theft button appears on your Junos Pulse home screen. When you tap this button, the
anti−theft features that are activated on your device are listed.
You can tap the Manage Anti-Theft Features button from the Anti Theft window to go
to your service provider’s web site to purchase or view more anti−theft features.
Anti−theft features include:
10 Anti−Theft Features Copyright © 2012, Juniper Networks, Inc.

Lock Handset and Unlock Handset

Locks the device until an unlock command is
sent from the server or by entering a device password that matches the device
password policy. When a lock command is sent from the server to the device, a new
password can be generated, as well. This password may be sent via email to you and
you can modify it. When the lock command is triggered with this newly generated
password, the following occurs on various devices:

If the Device Administrator is enabled and the device already has a password
configured:
− When a lock command is sent with a new password, the device is locked
with the existing password. The new password from the server is not used.
− When a lock command is sent with an empty password, the device is locked
with the existing password. The password from the server is not used.

If the Device Administrator is enabled and the device does not have a password
configured:
− When a lock command is sent with a new password, the device is locked
with this new password.
− When a lock command is sent with an empty password, the device is NOT
locked.

If the Device Administrator is disabled and the device is automatically registered:
− When a lock command is sent with a new password, the device is locked
with this new password. (Irrespective of password configured on the device.)
− When a lock command is sent with an empty password, the device is NOT
locked.

If the Device Administrator is disabled and the device is registered manually:
− When a lock command is sent with a new password, the device is locked
with this new password. (Irrespective of password configured on the device.)
− When a lock command is sent with an empty password, the device is NOT
locked.

Emergency Call Button

When the device is locked, an Emergency Call button is
available from the unlock window. You can make an emergency call, to 911 for
example, when you select this button and enter an emergency number.

SIM Change
—(
On Android OS 2.2 and later) If the Device Administrator function is
activated and Wipe is enabled, a wipe command sets the device back to factory
settings. No lock is performed. If the Device Administrator function is not activated
and the SIM card is changed, the device switches on GPS Theft Mode and the device
is locked.

SIM Change
— (
On Android OS 2.1) The device switches on GPS Theft Mode and the
device is locked. If Wipe is enabled, sensitive device information is wiped
automatically.

Wipe Handset
— (
On Android OS 2.2 and later) If the Device Administrator function is
activated, a wipe command sent from the server sets the device back to factory
settings. If the Device Administrator function is not activated, a wipe command
deletes scheduling, contact and task information, SMS messages, and the memory
card.
Copyright © 2012, Juniper Networks, Inc.Anti−Theft Features 11
Installing and Using Junos Pulse for Google Android

Wipe Handset
—(
On Android OS 2.1) Deletes scheduling, contact and task
information.

Send Backup

If this data is not stored on the server, this feature gathers the backup
information from the device and emails it to the email address provided in the
registration process.

GPS Location

If your device is equipped with GPS, your administrator can locate
your device. Device location is displayed on the Junos Pulse server.

Alarm On and Off (Scream locate)

Blares a maximum volume alarm sound to
locate the device in a nearby location.

GPS Theft On and Off

Sends GPS updates to the Junos Pulse server on a 2 to 5
minute period to fine-tune GPS location if the device is stolen.
Password Policies and Storage Encryption
Junos Pulse can enforce password and storage encryption policies on your device. This
means that you are required to use a device password and set up device data
encryption that meets the criteria of the Junos Pulse security policy.
A password policy can include but is not limited to requirements such as the number of
required characters, the frequency in which you must change your password, the
number of failed password entry attempts that can occur before the device is wiped,
and the amount of time your device can remain idle before an auto−lock occurs. Also,
your password can be remotely reset and sent to you via email. For example, if your
device is remotely locked, an unlock command may reset your password with the new
password being sent to you in an email.
If you have not set a device password or if your password does not meet the password
policy requirements, you are prompted to reset your password so that it meets those
requirements.
As part of your device security policy, you may be required to encrypt your application
data. If this is the case, a prompt will inform you of this requirement. You are continually
prompted until you set the data encryption feature on your device. If you fail to meet the
security policy requirements within a given period of time, it is possible for your device to
be remotely locked or wiped.
Scream Dismiss
From the dashboard, a scream command can be sent to your device which allows you
to audibly locate the device if it’s within hearing distance, even if the speakers and ringer
are muted. Once you locate the device, you can turn off the scream from the
Notification bar. Select the Scream activated notification to dismiss the scream.
Custom Button
If your Junos Pulse deployment makes this feature visible to you, an additional button
customized by your service provider, appears on your home screen. When you tap this
button, a customized URL takes you to a web page that is set up by your service
provider. This page may offer the purchase of additional features or it may provide
additional information. This will vary by service provider.
12 Uninstalling or Clearing Data Copyright © 2012, Juniper Networks, Inc.
Uninstalling or Clearing Data
You may need to re−register your device after the initial registration or you may need to
clear your devices’ Junos Pulse settings for another reason. You can accomplish this by
uninstalling Junos Pulse or by manually clearing all settings as follows.
1.From the main menu, select Settings > Applications > Manage Applications >
Junos Pulse.
2.To uninstall Junos Pulse, select the Uninstall button.
or
3.To clear all Junos Pulse data, select the Clear data button.
If the Device Administrator function is activated, you can uninstall Junos Pulse by doing
the following:
1.From the main menu, select Settings> Location & Security (or just Security on
some devices).
2.Select Device Administrator and uncheck the Junos Pulse check box. Now you can
begin the regular uninstall process.
Adding a Secure Connection
Informational Note:
This service is only offered if you are accessing your corporate
network resources securely.
Junos Pulse uses your device’s 3G, 4G, Edge or WiFi connectivity to establish an
authenticated connection to a protected network. You can add a connection for each
different network to which you connect. This is a secure VPN connection to your
corporate network or a core access SSL channel to web bookmarks configured by your
administrator.
To define a connection, do the following:
1.Start Junos Pulse.
2.From the VPN tab, select Connections.
3.Select Add Connection.
4.Enter the connection properties as follows:

Connection name: A descriptive name.

URL: The Web address provided by your administrator.
(Note that Connection name and URL are the only required fields when creating a
connection profile. All other fields are optional.)

Username: Enter your username.

Realm: If your administrator has provided this information, enter the realm value.

Role: If your administrator has provided this information, enter the role value.

Uses Certificate: Select this check box if your administrator has provided you
with a digital certificate. If you do not use a certificate, you may have to provide a
username and password when you connect.
Copyright © 2012, Juniper Networks, Inc.Connecting 13
Installing and Using Junos Pulse for Google Android

Certificate Path: This box is available if you selected the Uses Certificate check
box. Select Pick to browse to the certificate file. (Note that this field is required if
you have selected Uses Certificate.)

Key Path: This box is available if you selected the Uses Certificate check box.
Select Pick to browse to the network key provided by your administrator. (Note
that this field is required if you have selected Uses Certificate.)
5.Select Create Connection. Your connection is now created and saved.
Connecting
Once you have configured your connection, select the Connect button.
If the Select Connection field does not default to the correct connection, you can select
it from the pulldown menu. You may have to enter additional information required by
your network when you are establishing a connection.
Viewing Connection Status Icon
The status of your current connection also appears at the bottom of the Junos Pulse
window in the form of an icon. The appearance of the icon indicates whether the
connection is active, inactive, or limited by policy non−compliance (see Limited Access
on page 14).
The active connection icon also appears in the status bar at the top of your device
window. When you close Junos Pulse, that icon remains visible as long as your VPN
connection is active.
Viewing Connection Status Window
When you have an established, full VPN connection (not all devices support full VPN
capability), selecting the Status button in the main window displays the following VPN
information:

VPN Status: Connected or Disconnected

Server: Server URL

Duration

Bytes Sent

Bytes Received

Address
From the Notification bar, the following notification also appears when you have an
active VPN connection.
Informational Note:
If you only have access to web bookmarks (Core Access rather
than VPN access) the VPN status is “Disconnected” but the Junos Pulse connection
icon will appear at the bottom of the Junos Pulse window.
Active Connection No Session Limited Access
14 User Interface Modes Copyright © 2012, Juniper Networks, Inc.
Limited Access
To ensure the integrity of mobile devices that are accessing network resources, an
administrator can enforce a security policy with which mobile devices must comply in
order to connect to the network. If a device is found to be non−compliant when
attempting a secure network connection, only limited network access may be granted.
When your device is non−compliant, you are prompted with this information and you
may be presented with a Continue button which you can tap to obtain limited network
access.
Reasons for non−compliance may include the following:

Your device has been rooted.

Your device is running an operating system that is not allowed by the security policy.

Your device is not actively registered with the appropriate Mobile Security Gateway
(MSG) and/or Junos Pulse Mobile Security Suite is not active on your device.
You must remedy the non−compliance issue on your device before you can establish a
full network connection.
User Interface Modes
Your administrator or service provider can deploy Junos Pulse to your device with varying
features sets available to you through the Junos Pulse UI. You can have a full UI with all
possible Junos Pulse features visible to you or you can have a minimal or security UI that
includes a subset of Junos Pulse features that are visible to you. The possible UI modes
that your administrator can deploy to your device are as follows:

Full UI: The full UI includes all available Junos Pulse features as described in this
manual.

Minimal UI: The minimal UI includes the Junos Pulse splash screen, the EULA, and a
Home screen that provides an About menu. For supported devices only, detected
viruses, malware, and prohibited applications are deleted automatically. For malware
and prohibited applications, a notification is displayed when an application removal
occurs. When you tap on the notification, a screen appears which provides
information on the application that was removed. You can tap the Clear button
remove the notification.

Security UI: The security UI includes only the Junos Pulse security features and does
not provide the ability to make VPN connections.
Known Issues and Limitations

Android has limitations in its support for certificates. If you experience the "No cert"
error, or if Junos Pulse closes unexpectedly when you try to connect, contact your
administrator.

At this time, you can only send log files using email. No other methods are supported.

Although Photo and Video Share appears as an option when you select Send Logs, it
is not a valid method for sending logs. You should not select that option when sending
log files.
Copyright © 2012, Juniper Networks, Inc.Known Issues and Limitations 15
Installing and Using Junos Pulse for Google Android

When the device is locked by either the Handset Lock command or the Lock on SIM
Change command, you may still be able to access the device’s Home window and the
Notifications window.

If a device does not have cell service, it cannot receive commands. For example, if a
device is connected only through WiFi, commands such as Lock and Wipe are not
received by the device.

If the Device Administrator is not activated, automatic removal of malware and
prohibited applications, as well as the automatic application removal feature, are
only available on certain Samsung devices. Please refer to the Junos Pulse Supported
Platforms Guide for details.

If your device registers with the MSG using automatic registration, and Lock on SIM
change is enabled, and you change the SIM, the only way to unlock the device is to put
the original SIM back in or to send an unlock command to the device from the
dashboard.
16 Known Issues and Limitations Copyright © 2012, Juniper Networks, Inc.
Copyright © 2012, Juniper Networks, Inc.Index 1
Index
Index
A
anti-theft features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
alarm on and off, scream locate
. . . . . . . . . . . . . . . . . . . .11
emergency call button
. . . . . . . . . . . . . . . . . . . . . . . . . .10
GPS location
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
GPS theft
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
lock handset, new passcode set
. . . . . . . . . . . . . . . . . . .10
send backup
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
SIM change
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
unlock handset, new passcode set
. . . . . . . . . . . . . . . . . .10
antivirus
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
automatic application removal
. . . . . . . . . . . . . . . . . . . . . . .4
automatic URL registration
. . . . . . . . . . . . . . . . . . . . . . . . . .2
available features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
B
back up data
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
C
clear data
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
connecting
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12, 13
add a connection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
certificate
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
key
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
realm
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
role
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
status icon
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
status screen, full VPN
. . . . . . . . . . . . . . . . . . . . . . . . . .13
URL
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
username
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
custom button
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
D
dashboard
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
Detections tab
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
device administrator
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3
download application
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
E
email address validation
. . . . . . . . . . . . . . . . . . . . . . . . . . . .3
emergency call button
. . . . . . . . . . . . . . . . . . . . . . . . . . . .10
EULA
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
I
installation
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
L
license code
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
limited access, non-compliance
. . . . . . . . . . . . . . . . . . . . . 14
M
malware applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
manual registration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Mobile Security Dashboard
. . . . . . . . . . . . . . . . . . . . . . . . . . 3
O
optimize media scanning
. . . . . . . . . . . . . . . . . . . . . . . . . . . 9
P
password policy
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
profile update
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
prohibited applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
R
remote monitoring
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
S
scan button
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
scan inside archives
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
scan results
malware
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
prohibited
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
prohibited applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . 4
suspicious
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
viruses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
scream dismiss
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
secure connection
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
security features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
antivirus, malware detection
. . . . . . . . . . . . . . . . . . . . . . . 4
automatic URL registration
. . . . . . . . . . . . . . . . . . . . . . . . 2
manual registration
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
register for
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
security settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
send logs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
storage encryption
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
support info
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
suspicious applications
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
T
threats detected
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
U
uninstall
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2 Index Copyright © 2012, Juniper Networks, Inc.
update
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
user interface modes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
V
validate email address
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
view logs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
viruses
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
W
web security
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
WIFI only devices
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2