ESET Mobile Security
Copyright ©2011 by ESET, spol. s.r.o.
ESET Mobile Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV. 3.2.2011
Contents
..............................................31.
Installation of ESET Mobile Security
....................................................................3Minimum system requirements1.1
....................................................................3Installation1.2
.......................................................................3Installation on your device1.2.1
.......................................................................3Installation using your computer1.2.2
....................................................................4Uninstallation1.3
..............................................52.
Product activation
....................................................................5Activation using login and password2.1
....................................................................5Activation using registration key2.2
..............................................63.
Update
....................................................................6Settings3.1
..............................................74.
On-access scanner
....................................................................7Settings4.1
..............................................85.
On-demand scanner
....................................................................8Running a whole device scan5.1
....................................................................8Scanning a folder5.2
....................................................................9General settings5.3
....................................................................9Extensions settings5.4
..............................................106.
Threat found
....................................................................10Quarantine6.1
..............................................117.
Anti-Theft
....................................................................11Settings7.1
..............................................138.
Firewall
....................................................................13Settings8.1
..............................................149.
Security audit
....................................................................14Settings9.1
..............................................1610.
Antispam
....................................................................16Settings10.1
....................................................................16Whitelist / Blacklist10.2
....................................................................17Locating spam messages10.3
....................................................................17Deleting spam messages10.4
..............................................1811.
Viewing logs and statistics
..............................................2012.
Troubleshooting and support
....................................................................20Troubleshooting12.1
.......................................................................20Unsuccessful installation12.1.1
.......................................................................20Connection to update server failed12.1.2
.......................................................................20Timeout downloading file12.1.3
....................................................................20Technical support12.2