"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
The F-Secure Product Family.................................................................................. 88
v
vi
ABOUT THIS GUIDE
How This Guide Is Organized...................................................... 8
Conventions Used in F-Secure Guides....................................... 9
7
8
How This Guide Is Organized
F-Secure Mobile Anti-Virus for Series 60 User’s Guide is divided into the
following chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Anti-Virus.
Chapter 2. Installation. Gives instructions on installing and setting up
F-Secure Mobile Anti-Virus.
Chapter 3. User Interface. Describes the F-Secure Mobile Anti-Virus
user interface.
Chapter 4. Startup and Shutdown. Explains how to start and shut down
F-Secure Mobile Anti-Virus.
Chapter 5. Configuration. Gives instructions on configuring the scan,
update and excluded files settings.
Chapter 6. Virus S c an. Explains how to scan files for viruses.
Chapter 7. Processing Infected Files. Explains how to view details of
infected files and how to process the infected files.
Chapter 8. Updating. Explains how to keep F-Secure Mobile Anti-Virus
up to date.
Chapter 9. T roubleshooting.Provides solutions to common problems.
Chapter 10. Technical Support. Provides the contact information for
assistance.
Appendix A. Purchasing Subscription Service Time. Provides
information about purchasing F-Secure Mobile Anti-Virus.
About F-Secure Corporation
products.
. Describes the company background and
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, terminology used in this
manual.
Symbols
WARNING: The warning symbol indicate s a situation with a
risk of irreversible destruction to data.
IMPORTANT: An exclamation mark provides important information
that you need to consider.
REFERENCE - A book refers you to related information on the
topic available in another document.
NOTE - A note provides additional information that you should
consider.
l
About This Guide9
Fonts
TIP - A tip provides information that can help you perform a task
more quickly or easily.
⇒ An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Courier New is used for messages on your computer screen and for
information that you must type.
10
SMALLCAPS (BLACK) is used for a key or key combination on your
keyboard.
PDF Document
For More Information
Arial underlined (blue)
Times New Roman regular is used for window and dialog box names.
This manual is provided in PDF (Portable Document Format). The PDF
document can be used for online viewing and printing using Adobe®
Acrobat® Reader. When printing the manual, please print the entire
manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training
courses, downloads, and service and support contacts.
In our constant attempts to improve our documentation, we would
welcome your feedback. If you have any questions, comments, or
suggestions about this or any other F-Secure document, please contact
us at documentation@f-secure.com
is used for user interface links.
.
1
INTRODUCTION
F-Secure Mobile Anti-Virus......................................................... 12
F-Secure Mobile Anti-Virus consists of the F-Secure Mobile Services
platform and the F-Secure Mobile Anti-Virus client. The F-Secure Mobile
Services platform manages and secures user access and acts as a
platform for different services.The F-Secure Mobile Anti-Virus client is a
software product that protects data stored in your Series 60 device
against malicious code attacks.
This guide is intended to introduce the main features of the F-Secure
Mobile Anti-Virus client for Series 60, and explain its use. In this manual,
the F-Secure Mobile Anti-Virus client for Series 60 is referred to as
F-Secure Mobile Anti-Virus.
F-Secure Mobile Anti-Virus is designed to be as transparent as possible.
It automatically scans all files when they are accessed. When F-Secure
Mobile Anti-Virus detects an infected file, it immediately quarantines it to
protect all other data on the device. The automatic scanning happens
transparently on the background.
To work effectively, the anti-virus software requires an always up-to-date
virus definition database. With F-Secure Mobile Anti-Virus, you can
download the latest virus definition database automatically from your
update server.
1.2Key features
This section lists the F-Secure Mobile Anti-Virus key featur es.
Transparent
Operation
Extensive scanningThe application automatically scans all files when they are accessed. You
The application runs in the background while you use your device.
can also manually scan your device for viruses whenever you want or set
a date and time for scheduled scanning.
CHAPTER 113
Introduction
Automatic updatesThe application automatically downloads regular updates to keep the
virus definition database up to date. This enables finding and removing
even the most recently found viruses.
14
2
INSTALLATION
System requirements.................................................................. 16
Installing F-Secure Mobile Anti-Virus......................................... 16
Transferring Subscrip tion to a New Device........... .... ..... ............ 17
Uninstalling F-Secure Mobile Anti-Virus..................................... 19
15
16
2.1System requirements
To use F-Secure Mobile Anti-Virus, your device must meet the following
requirements:
Platform:Nokia Series 60 devices (Nokia 3660, Nokia
6600, Nokia 7650, Nokia 7610, Nokia 3650,
N-Gage and Nokia 6670)
Available memory:650KB.
If your F-Secure Mobile Anti-Virus version
includes the SMS-Based Purchase functionality,
an extra 300 KB of memory is needed.
2.2Installing F-Secure Mobile Anti-Virus
Before you start the installation process, prepare your device as follows:
›If you have a previous version of F-Secure Mobile Anti-Virus
installed, you must close it. No uninstalling is needed as the new
version automatically removes the earlier version.
To install F-Secure Mobile Anti-Virus on your device:
IMPORTANT: F-Secure Mobile Anti-Virus cannot be installed on a
memory card.
1.Open the inbox and scroll to the message that contains the
installation package.
For more information, refer to the User’s Guide that came
with your device.
2. Open the message, and press Yes to confirm installing F-Secure
Mobile Anti-Virus. In the License agreement screen, read the
agreement and press Ok to continue.
CHAPTER 217
Installation
When the installation is complete, we recommend starting the
application only after you have received the activation message (does
not apply to evaluation versions).
If you have left your mobile phone number to your retailer, you receive the
activation message as an SMS message. If you do not receive it, enter
the subscription number when you start your F-Secure Mobile Anti-Virus
for the first time.
If you do not know your subscription number, contact your
service provider or retailer.
3. After installing F-Secure Mobile Anti-Virus, you need to update the
virus definition database. Press Yes to update it immediately. For
more information, see “Updating”, 65.
The automatic update feature is enabled by default. A connection to the
update server is established twice a day, providing there is Internet
activity over the preferred Intern et acces s point.
IMPORTANT: F-Secure Mobile Anti-Virus cannot detect the latest
viruses with an outdated database.
4. After you have installed F-Secure Mobile Anti-Virus, we recommend
scanning your device for viruses. For more information. see “Virus
Scan”, 53.
2.3Transferring Subscription to a New Device
Before transferring your F-Secure Mobile Anti-Virus service subscription
to another device, prepare your device as follows:
›If you have a previous version of F-Secure Mobile Anti-Virus
installed, you must close it. No uninstalling is needed as the new
version automatically removes the earlier version.
18
T o transfer your Anti-Virus service subscription to another device:
IMPORTANT: F-Secure Mobile Anti-Virus cannot be installed on a
memory card.
1.Open the inbox and scroll to the message that contains the
installation package.
For more information, refer to the User’s Guide that came with
your device.
2. Open the message, and press Yes to confirm that you want to install
F-Secure Mobile Anti-Virus. In the License agreement screen, read
the agreement and press Ok to continue.
3. Wait until the installation is complete. During the start-up process,
when prompted, enter the subscription number.
4. Connect to the update server to update the virus definition database
by pressing Yes in the message that is displayed.
5. If you successfully transferred your subscription, at this stage, a
message is displayed informing you that your subscription has been
transferred to a new device. Press any key to dismiss the message.
F-Secure Mobile Anti-Virus starts downloading the virus definition
database update and, if available, a new software version.
If the update server is unable to authenticate your subscription, an
error message is displayed. The server cannot authenticate the
subscription in the following case s:
› The files in the F-Secure Mobile Anti-Virus installation folder
are corrupted or have been changed
› You have tried to transfer the F-Secure Mobile Anti-Virus
service subscription into another device more than four times
2.4Uninstalling F-Secure Mobile Anti-Virus
IMPORTANT: If you need to uninstall F-Secure Mobile Anti-Virus
from your device, make sure that you do not have any quarantined
or infected files in your device.
To uninstall F-Secure Mobile Anti-Virus:
1.Open F-Secure Mobile Anti-Virus.
2. Scroll to the Main view and select OptionsÆUninstall.
The F-Secure Mobile Anti-Virus main user interface has four main views
and three setting views. Additionally, there are the About Anti-Virus and
Subscription Info views. You can toggle between the main views by
moving the joystick or pressing the scroll key left and right. The three
setting views can be accessed through the four Main views and the two
additional views can be accessed through the Main view. In the
navigation bar, tabs (small arrows) show you if there are more views,
folders or files you can move to.
The F-Secure Mobile Anti-Virus four main views are:
›Main view
›Status view
›Log view
›Infections view (available only when an infection is found on your
device)
3.2.1Main View
The Main view displays:
›Current scanning mode
›Update status
›Subscription status
›Infection status
CHAPTER 3 23
User Interface
The Options menu in the Main view has the following commands:
›Scan all - scan all files on your device and on the inserted
memory card for viruses
›Update Anti-Virus - download the latest update; available only if
activation has been completed
›Activate Anti-Virus - activate the application (first-time start-up);
available only if activation has not been completed
›Subscription - display the subscription number and update
instructions
›Settings - edit the Scan, Update and Excluded file settings
›About Anti-Virus - display information about the application
›Help - launch context sensitive (online) help (available only if
your device supports context sensitive online help)
›Uninstall - uninstall the application
›Exit - shut down the application
IMPORTANT: If you shut down the application, the infected files
are not quarantined and the system is not protected against
viruses.
Pressing the Done soft key hides the user interface, but keeps the
application running on the background, scanning your files for viruses
automatically when they are accessed (only when the real-time scanning
mode is enabled).
24
The following table shows the Main view status indicator icons and
explains their meaning:
IconsUpdatesSubscriptionNo infections/
One or more
infections
Up to dateValidNone
3.2.2Status View
The Status view displays:
Last updated 3
days ago
Last updated 7
days ago
Activation
sequence
cancelled, OR
virus definition
database missing
or corrupted
Expires in 10
days
Expires in 5 daysone or more
Expired OR
activation
sequence
cancelled
›Subscription status
›Date and time of the last update
›Date and time of the last full scan
one or more
infections detected,
full scan not
performed at restart
and possible
infections in the
system
infections detected,
but not all processed
-
CHAPTER 325
User Interface
The Options menu in the Status view has the following commands:
›Scan all - scan all files on your device and on the inserted
memory card for viruses
›Update Anti-Virus - download the latest update; available only if
activation has been completed
›Settings - edit the Scan, Update and Excluded file settings
›Help - launch context sensitive (online) help (available only if
your device supports context sensitive online help)
›Exit - shut down the application
IMPORTANT: If you shut down the application, the infected files
are not quarantined and the system is not protected against
viruses.
Pressing the Done soft key hides the user interface, but keeps the
application running on the background, scanning your files for viruses
automatically when they are accessed (only when the real-time scanning
mode is enabled).
3.2.3Log View
The Log view displays a chronological list of the latest events. Each log
entry consist of an icon, the date and time, and a brief description of the
event. The event log can contain up to 20 events. The last event occurred
appears at the top of the list. To see all the logs, you can scroll through
the view with the joystick/scroll key.
26
An entry is added to the log file in the following cases:
›Incremental update via SMS
›Failed or successful automatic or manual update
›Starting, stopping or finishing of a scheduled or manual scan
›Receiving of update requests
›Receiving of subscription period related messages (renewed/
expiring/expired)
›Starting or shutting down the application
›Detecting of a new infection in real-time scanning mode
›Detecting of a missing fingerprint while adding an incremental
update into database
›Detecting of a corrupted or missing database upon start-up
The Options menu in the Log view has the following commands:
›Scan all - scan all files on your device and on the inserted
memory card for viruses
›Update Anti-Virus - download the latest update; available only if
activation has been completed
›Settings - edit the Scan, Update and Excluded file settings
›Clear log- remove all entries from the event log
›Help - launch context sensitive (online) help (available only if
your device supports context sensitive online help)
›Exit - shut down the application
IMPORTANT: If you shut down the application, the infected files
are not quarantined and the system is not protected against
viruses.
Pressing the Done soft key hides the user interface, but keeps the
application running on the background, scanning your files for viruses
automatically when they are accessed (only when the real-time scanning
mode is enabled).
3.2.4Infections View
The Infections view displays a list of infected files detected on the device.
Each entry consists of a file type dependent icon, a line indicating the
state of the file, another line containing the name of the infected file. If an
infected file has not been processed and its details have not been viewed,
a red exclamation mark icon is displayed on the right hand side of the
infection status text.
The Options menu in the Infections view has the following commands:
›Scan all - scan all files on your device and on the inserted
›Update Anti-Virus - download the latest update; available only if
›Details - display more information of the selected infected file
›Process selected - process the selected infected file
›Settings - edit the Scan, Update and Excluded file settings
›Help - launch context sensitive (online) help (available only if
›Exit - shut down the application
CHAPTER 3 27
User Interface
The Infections view is available only when an infection is found on
your device.
memory card for viruses
activation has been completed
your device supports context sensitive online help)
IMPORTANT: If you shut down the application, the infected files
are not quarantined and the system is not protected against
viruses.
Pressing the Done soft key hides the user interface, but keeps the
application running on the background, scanning your files for viruses
automatically when they are accessed (only when the real-time scanning
mode is enabled).
Loading...
+ 63 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.