F-secure MOBILE SECURITY FOR S60 User Manual

F-Secure
Mobile Security
for S60
User’s Guide
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372 GB2366691 GB2366692 GB2366693 GB2367933 GB2368233 GB2374260
Copyright © 2004-2009 F-Secure Corporation. All rights reserved. 12000066-9F30
Contents
About This Guide 1
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3
Symbols ...................................................................................................................... 3
Chapter 1 Introduction 5
1.1 F-Secure Mobile Security.............................................................................................6
1.2 Key Features................................................................................................................6
Chapter 2 Installation 7
2.1 System Requirements......................................................... .... ... ... ... .... ... ... ... ... .... ... .....8
2.2 Getting the Product Running on Your Device ..............................................................8
2.2.1 Installation........................................................................................................8
2.2.2 Activating the Update Service ........................................................................10
2.3 Transferring Subscription to a New Device................................................................11
2.4 Uninstalling.................................................................................................................11
Chapter 3 Using F-Secure Mobile Security 12
3.1 Opening and Closing the Application.........................................................................13
3.2 Scanning for Viruses.................................. ... ... ... ....................................... ... ... .... ... ...14
3.2.1 Selecting the Virus Protection Mode ..............................................................14
3.2.2 Processing Infected Files ...............................................................................15
3.3 Using Firewall.............................................................................................................17
iii
3.3.1 Selecting the Protection Level........................................................................17
3.4 Protecting Confidential Information............................................................................18
3.4.1 Using the Device Lock....................................................................................18
3.4.2 Using the Remote Anti-theft...........................................................................19
3.4.3 Using the SMS Alert.......................................................................................20
3.5 Keeping the Application Up-to-Date...........................................................................20
3.5.1 Selecting the Update Mode............................................................................21
3.5.2 Application Updates........................................................................................22
3.6 Purchasing Subscription Service Time ......................................................................23
3.7 Troubleshooting .........................................................................................................24
Technical Support 25
Overview ............................................................................................................................ 26
Virus Descriptions on the Web ...........................................................................................26
Electronic Mail Support ......................................................................................................26
About F-Secure Corporation
iv

ABOUT THIS GUIDE

How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides....................................... 3
1
2

How This Guide Is Organized

F-Secure Mobile Security User’s Guide is divided into the following chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation. Gives instructions on installing and activating
F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes the F-Secure
Mobile Security user interface.
Technical Support About F-Secure Corporation. Describes the company background and
products.
. Provides the contact information for assistance.

Conventions Used in F-Secure Guides

This section describes the symbols, fonts, and terminology used in this manual.

Symbols

WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data.
IMPORTANT: An exclam ation mark provides important information that you need to consider.
REFERENCE - A book refers you to related information on the topic available in another document.
NOTE - A note provides additional information that you should consider.
l
3
Fonts
TIP - A tip provides information that can help you perf or m a task more quickly or easily.
An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals. Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Arial underlined (blue)
is used for user interface links.
4
PDF Document
For More Information
This manual is provided in PDF (Portable Document Format). The PDF document can be used for online viewing and printing using Adobe® Acrobat® Reader. When pr inting the manual, please print the entire manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and supp o rt contacts.
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please conta ct us at documentation@f-secure.com
.
1

INTRODUCTION

F-Secure Mobile Security............................................................. 6
Key Features................................................................................ 6
5
6

1.1 F-Secure Mobile Security

F-Secure Mobile Security is a software product that protects data stored in your S60 device against malicious code attacks and monitors incom ing and outgoing connections and protects the device from network intrusion attempts.
F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified. All infected files are immediately quarantined to protect all other data on the device. The automatic scanning happe ns tran sparently on the background.
To work effectively, antivirus software requires an always up-to-date virus definition database. F-Secure Mobile Security retrieves the latest virus definition databases automatically.

1.2 Key Features

F-Secure Mobile Security offers the following key features.
Transparent
The application runs in the background while you use your device.
Operation Extensive
Scanning
Automatic
Updates
The application automatically scans all files when they are accessed. You can also manually scan your device for viruses whenever you want.
The application automatically downloads regular updates to keep the virus definition database up-to-date.
Firewall The application protects you from potential network harm by blocking
information that does not meet the set security criteria.
Anti-theft The application protects your confidential infromation by locking the
device automatically when the SIM card is changed. You can also remotely wipe the data stored on your mobile device if it is stolen.
Loading...
+ 23 hidden pages