Symantec Mobile Security 7.2 Implementation Guide

Article:DOC5661  |  Created: 2012-05-31  |  Updated: 2012-07-10  |  Article URL http://www.symantec.com/docs/DOC5661
Article Type
Documentation


Description



Symantec Mobile Security 7.2 Implementation Guide

Contents

I. Setting up Symantec Mobile Security 7.2
1. Introducing Symantec Mobile Security 7.2
What's new in Symantec Mobile Security 7.2
Getting started
Terms and component names to know
Using the Symantec Management Console
2. Installing Symantec Mobile Security 7.2
Downloading and installing Symantec Mobile Security 7.2
Accessing the Symantec Mobile Security user interface
3. Distributing the Symantec Mobile Security 7.2 Agent app
About distributing the Agent app to device owners
Distributing the Agent app to Android device owners
Distributing the Agent app to Windows Mobile device owners
Installing the Mobile Security Agent app on mobile devices
4. Server Configuration
Configuring the Symantec Mobile Security server
Configuring Symantec Mobile Security Gateway server
Setting up Android Cloud-to-Device Messaging (C2DM)
Securing the management console
Configuring Microsoft Active Directory for enrolling mobile devices
5. Adding additional Gateway servers
Adding additional Gateway servers
Gateway server best-practices
II. Securing Android mobile devices
6. Common Android security tasks
Locating a lost or stolen Android device
Locking a lost or stolen Android device
Wiping data from a lost or stolen Android device
Triggering an alarm on a lost or stolen Android device
Configuring the default Android security policy
Configuring a new Android security policy
Checking Android mobile device compliance
Identifying the Android mobile devices that are at risk
Checking Android Web security events
Assigning Android policies to a specific device or group of devices
Pushing a command to an Android device to initiate a security scan or policy update
Verifying Android device enrollment
7. Configuring Android security settings and options
Configuring Android enrollment and management settings
Configuring how Android devices appear in lists and reports
III. Securing Windows Mobile devices
8. Managing Windows Mobile device protection
Managing Windows Mobile device security
Creating and applying Windows Mobile security policies
Managing Windows Mobile antivirus protection
Excluding files from scans
Auto-Protect actions
About managing the firewall
Creating a custom protection level for the firewall
Rules for High firewall protection level
Rules for Medium firewall protection level
Rules for Low firewall protection level
Scan automatically after specific actions
9. Configuring the File Access Log policy
About the File Access Log
Configuring the File Access Log policy for Windows Mobile devices
About managing a lost or stolen Windows device
Retrieving the Windows Mobile File Access Log
Decrypting the File Access Log
How to read the File Access Log
IV. Maintaining Symantec Mobile Security
10. Licensing Symantec Mobile Security 7.2
Licensing basics
Using the trial license
Using a license purchased before installing Symantec Mobile Security
Adding or updating a Symantec Mobile Security license
Licensing alerts and reports
11. Migrating to, or updating Symantec Mobile Security 7.2
Migration and upgrade overview
Migrating Symantec Management Platform and Symantec Mobile Security together
12. Managing Updates
About updating devices
Repackaging LiveUpdate content
LiveUpdate Repackager command-line syntax
13. Monitoring and reporting
About monitoring device security in Symantec Management Platform
About mobile security reports
About Windows Mobile event logging
About setting up notifications and alerts for mobile security
14. Database maintenance
Purging Android mobile device data from the database
A. Symantec Mobile Security 7.2 System Requirements
Server requirements
Mobile device requirements
B. C2DM quota request form
Completing a C2DM quota request form
C. Third-party attributions
Third-Party Legal Notices
Bouncy Castle Crypto C#
Iquery
Log4Net

Attachments

Mob_Sec_7_2_MR_1_IG_v721.pdf (1.1 MBytes)

Legacy ID



v75323350_v75363890


Article URL http://www.symantec.com/docs/DOC5661


Terms of use for this information are found in Legal Notices