1 Introduction 1 .......................................................................................................................................
1.1 What's new in version 4 1 ..............................................................................................................
1.2 ESET Endpoint Security for Android versions 1 .................................................................................
1.3 Minimum system requirements 2 ....................................................................................................
1.4 Changelog 2 .................................................................................................................................
2 Users connecting to ESET PROTECT and ESET PROTECT Cloud 2 ........................................................
2.1 Download the ESET Endpoint Security for Android 3 ..........................................................................
2.2 Remote installation 4 .....................................................................................................................
2.3 Local installation on the device 5 ....................................................................................................
3 Start-up wizard 5 ..................................................................................................................................
4 Uninstallation 7 ....................................................................................................................................
5 Product activation 7 .............................................................................................................................
6 Documentation for endpoints managed remotely 8 .............................................................................
6.1 Introduction to ESET PROTECT 9 .....................................................................................................
6.2 Introduction to ESET PROTECT Cloud 11 ..........................................................................................
6.3 Policies 11 ....................................................................................................................................
6.3 Apply policies 12 .........................................................................................................................
6.3 Flags 12 ...................................................................................................................................
6.3 How to use Override mode 13 ...........................................................................................................
7 Antivirus 14 ..........................................................................................................................................
7.1 Automatic Scans 16 .......................................................................................................................
7.2 Scan Logs 16 ................................................................................................................................
7.3 Ignore rules 17 .............................................................................................................................
7.4 Advanced settings 18 ....................................................................................................................
8 Anti-Theft 19 ........................................................................................................................................
8.1 Administrator contacts 20 ..............................................................................................................
8.1 How to add administrator contact 20 ...................................................................................................
8.2 Lock screen info 20 .......................................................................................................................
8.3 Trusted SIM cards 20 .....................................................................................................................
8.4 Remote commands 20 ...................................................................................................................
9 Application Control 21 ..........................................................................................................................
9.1 Blocking Rules 21 ..........................................................................................................................
9.1 Blocking by application name 22 ........................................................................................................
9.1 How to block an application by its name 23 ............................................................................................
9.1 Blocking by application category 23 ....................................................................................................
9.1 How to block an application based on its category 23 .................................................................................
9.1 Blocking by application permissions 23 .................................................................................................
9.1 How to block an application by its permissions 24 .....................................................................................
9.1 Block unknown sources 24 ...............................................................................................................
9.2 Exceptions 24 ...............................................................................................................................
9.2 How to add exceptions 25 ...............................................................................................................
9.3 Required applications 26 ...............................................................................................................
9.3 Allowed applications 26 ..................................................................................................................
9.3 Permissions 27 ...........................................................................................................................
9.3 Usage 27 ..................................................................................................................................
10 Device Security 28 .............................................................................................................................
10.1 Screen lock policy 28 ...................................................................................................................
10.2 Device settings policy 29 .............................................................................................................
11 Anti-Phishing 31 .................................................................................................................................