COMPUTER ASSOCIATES ETRUST ANTIVIRUS 2002 POUR POCKET PC User Manual

e
Trust™ Antivirus for Pocket PC
2002
User Guide
2.0
This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. (“CA”) at any time.
This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies.
This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user’s responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed.
To the extent permitted by applicable law, CA provides this documentation “as is” without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage.
The use of any product referenced in this documentation and this documentation is governed by the end user’s applicable license agreement.
The manufacturer of this documentation is Computer Associates International, Inc.
Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions.
2003 Computer Associates International, Inc.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Contents

Chapter 1: Welcome to eTrust Antivirus for Pocket PC 2002
Overview ................................................................................... 1-1
Installation Procedure ........................................................................ 1-2
Uninstalling eTrust Antivirus for Pocket PC 2002 ........................................... 1-2
Testing Your Installation.................................................................. 1-2
Chapter 2: Using eTrust Antivirus for Pocket PC 2002
Setting Scan Options ......................................................................... 2-1
Ask User ................................................................................ 2-2
Report Only ............................................................................. 2-3
Cure File ................................................................................ 2-3
Delete File............................................................................... 2-3
Monitor File Updates..................................................................... 2-3
Scan storage cards on insert ............................................................... 2-3
Scanning for Viruses ......................................................................... 2-4
Scan All Files ............................................................................ 2-4
Scan a Specific Folder .................................................................... 2-4
Scan a Specific File ....................................................................... 2-4
Using the Activity Log ....................................................................... 2-5
Getting Signature Updates.................................................................... 2-6
Getting a Signature Update From Your Desktop Computer .................................. 2-6
Contents iii
Loading...
+ 9 hidden pages