F-secure MOBILE SECURITY 6 FOR WINDOWS MOBILE User Manual

F-Secure
Mobile Security
for Windows Mobile
User’s Guide
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372 GB2366691 GB2366692 GB2366693 GB2367933 GB2368233 GB2374260
Copyright © 2004-2010 F-Secure Corporation. All rights reserved. 12000066-9G22
Contents
About This Guide 1
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3
Chapter 1 Introduction 5
1.1 F-Secure Mobile Security.............................................................................................6
1.2 Key features.................................................................................................................7
Chapter 2 Installation and activation 8
2.1 System requirements ....................................................... ....................................... ... ..9
2.2 Getting the product running on your Windows Mobile .................................................9
2.2.1 Installation........................................................................................................9
2.2.2 Activating the update service..........................................................................11
2.3 Transferring subscription to a new device..................................................................12
2.4 Uninstalling F-Secure Mobile Security .......................................................................12
Chapter 3 Using F-Secure Mobile Security 14
3.1 Opening and closing the application ..........................................................................15
3.2 Scanning for viruses.................. .... ... ... ....................................... ... ... .... ... ... ... ... ..........16
3.2.1 Selecting the virus protection mode ...............................................................16
3.2.2 Processing infected files.................................................................................18
3.3 Using firewall..............................................................................................................19
3.3.1 Selecting the protection level..........................................................................19
iii
3.4 Protecting confidential information.............................................................................20
3.4.1 Using the remote Anti-theft.............................................................................20
3.4.2 Using the security code..................................................................................21
3.4.3 Using the SMS alert........................................................................................22
3.5 Protecting web browsing............................................................................................22
3.5.1 Using Browsing Protection .............................................................................22
3.6 Keeping F-Secure Mobile Security up-to-date ...........................................................23
3.6.1 Selecting the update mode.............................................................................24
3.7 Purchasing subscription service time.........................................................................26
3.8 Troubleshooting .........................................................................................................27
Chapter 4 Technical support 28
Overview ............................................................................................................................ 29
iv
ABOUT THIS GUIDE
How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides....................................... 3
1
2
How This Guide Is Organized
F-Secure Mobile Security User’s Guide is divided into the following chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation and activation. Gives instructions on installing
and setting up F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes the F-Secure
Mobile Security user interface.
Chapter 4. Technical support. Provides the contact information for
assistance.
About F-Secure Corporation. Describes the company background and
products.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this manual.
Symbols
WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data.
IMPORTANT: An exclam ation mark provides important information that you need to consider.
REFERENCE - A book refers you to related information on the topic available in another document.
NOTE - A note provides additional information that you should consider.
l
About This Guide 3
Fonts
TIP - A tip provides information that can help you perf or m a task more quickly or easily.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals. Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Arial underlined (blue)
is used for user interface links.
4
PDF Document
For More Information
This manual is provided in PDF (Portable Document Format). The PDF document can be used for online viewing and printing using Adobe® Acrobat® Reader. When pr inting the manual, please print the entire manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and supp o rt contacts.
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please conta ct us at documentation@f-secure.com
.
1

INTRODUCTION

F-Secure Mobile Security............................................................. 6
Key features................................................................................. 7
5
6

1.1 F-Secure Mobile Security

F-Secure Mobile Security is a software product that protects data stored on your Windows Mobile device against malicious code attacks and in case your device is lost or stolen. It also protects the device from network intrusion attempts and protects you from web sites that may steal your personal information.
F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified. All infected files are immediately quarantined to protect all other data on the device. The automatic scanning happe ns tran sparently on the background.
To work effectively, antivirus software requires an always up-to-date virus definition database. F-Secure Mobile Security retrieves the latest virus definition databases automatically.

1.2 Key features

F-Secure Mobile Security offers the following key features.
CHAPTER 1 7
Introduction
Transparent
The application runs in the background while you use your device.
operation
Extensive
scanning
Automatic
updates
The application scans all files when they are accessed. You can also manually scan your device for viruses whenever you want.
The application downloads regular updates to keep the virus definition database up-to-date automatically.
Firewall The application protects you from potential network harm by blocking
connections that do not meet the set security criteria.
Anti-theft You can remotely lock your mobile device or wipe the data stored on the
device if it is stolen.
Browsing
protection
The application protects you from web sites that may steal your personal information, including credit card number s, user account infor mation, and passwords.
Loading...
+ 25 hidden pages