ESET Mobile Security
Copyright ©2010 by ESET, spol. s.r.o.
ESET Mobile Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical,
photocopying, recording, scanning, or otherwise without
permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV. 10/28/2010
Contents
..............................................31. Installation of ESET Mobile Security
....................................................................3Minimum system requirements1.1
....................................................................3Installation1.2
.......................................................................3Installation on your device1.2.1
.......................................................................3Installation using your computer1.2.2
....................................................................4Uninstallation1.3
..............................................52. Product activation
....................................................................5Activation using login and password2.1
....................................................................5Activation using registration key2.2
..............................................63. Update
....................................................................6Settings3.1
..............................................74. On-access scanner
....................................................................7Settings4.1
..............................................85. On-demand scanner
....................................................................8Running a whole device scan5.1
....................................................................8Scanning a folder5.2
....................................................................9General settings5.3
....................................................................9Extensions settings5.4
..............................................106. Threat found
....................................................................10Quarantine6.1
..............................................117. Anti-Theft
....................................................................11Settings7.1
..............................................138. Firewall
....................................................................13Settings8.1
..............................................149. Security audit
....................................................................14Settings9.1
..............................................1610. Antispam
....................................................................16Settings10.1
....................................................................16Whitelist / Blacklist10.2
....................................................................17Locating spam messages10.3
....................................................................17Deleting spam messages10.4
..............................................1811. Viewing logs and statistics
..............................................2012. Troubleshooting and support
....................................................................20Troubleshooting12.1
.......................................................................20Unsuccessful installation12.1.1
.......................................................................20Connection to update server failed12.1.2
.......................................................................20Timeout downloading file12.1.3
....................................................................20Technical support12.2