"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides....................................... 3
1
2
How This Guide Is Organized
F-Secure Mobile Security User’s Guide is divided into the following
chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation and activation. Gives instructions on installing
and setting up F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes the F-Secure
Mobile Security user interface.
Chapter 4. Technical support. Provides the contact information for
assistance.
About F-Secure Corporation. Describes the company background and
products.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this
manual.
Symbols
WARNING: The warning symbol indicates a situation with a
risk of irreversible destruction to data.
IMPORTANT: An exclam ation mark provides important information
that you need to consider.
REFERENCE - A book refers you to related information on the
topic available in another document.
NOTE - A note provides additional information that you should
consider.
l
About This Guide3
Fonts
TIP - A tip provides information that can help you perf or m a task
more quickly or easily.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Arial underlined (blue)
is used for user interface links.
4
PDF Document
For More Information
This manual is provided in PDF (Portable Document Format). The PDF
document can be used for online viewing and printing using Adobe®
Acrobat® Reader. When pr inting the manual, please print the entire
manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training
courses, downloads, and service and supp o rt contacts.
In our constant attempts to improve our documentation, we would
welcome your feedback. If you have any questions, comments, or
suggestions about this or any other F-Secure document, please conta ct
us at documentation@f-secure.com
.
1
INTRODUCTION
F-Secure Mobile Security............................................................. 6
F-Secure Mobile Security is a software product that protects data stored
on your Windows Mobile device against malicious code attacks and in
case your device is lost or stolen. It also protects the device from network
intrusion attempts and protects you from web sites that may steal your
personal information.
F-Secure Mobile Security scans all files for viruses automatically when
they are saved, copied, downloaded, synchronized or otherwise modified.
All infected files are immediately quarantined to protect all other data on
the device. The automatic scanning happe ns tran sparently on the
background.
To work effectively, antivirus software requires an always up-to-date virus
definition database. F-Secure Mobile Security retrieves the latest virus
definition databases automatically.
1.2Key features
F-Secure Mobile Security offers the following key features.
CHAPTER 17
Introduction
Transparent
The application runs in the background while you use your device.
operation
Extensive
scanning
Automatic
updates
The application scans all files when they are accessed. You can also
manually scan your device for viruses whenever you want.
The application downloads regular updates to keep the virus definition
database up-to-date automatically.
FirewallThe application protects you from potential network harm by blocking
connections that do not meet the set security criteria.
Anti-theftYou can remotely lock your mobile device or wipe the data stored on the
device if it is stolen.
Browsing
protection
The application protects you from web sites that may steal your personal
information, including credit card number s, user account infor mation, and
passwords.
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.