"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
Virus Descriptions on the Web ...........................................................................................26
Electronic Mail Support ......................................................................................................26
About F-Secure Corporation
iv
ABOUT THIS GUIDE
How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides....................................... 3
1
2
How This Guide Is Organized
F-Secure Mobile Security User’s Guide is divided into the following
chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation. Gives instructions on installing and activating
F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes the F-Secure
Mobile Security user interface.
Technical Support
About F-Secure Corporation. Describes the company background and
products.
. Provides the contact information for assistance.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this
manual.
Symbols
WARNING: The warning symbol indicates a situation with a
risk of irreversible destruction to data.
IMPORTANT: An exclam ation mark provides important information
that you need to consider.
REFERENCE - A book refers you to related information on the
topic available in another document.
NOTE - A note provides additional information that you should
consider.
l
3
Fonts
TIP - A tip provides information that can help you perf or m a task
more quickly or easily.
An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Arial underlined (blue)
is used for user interface links.
4
PDF Document
For More Information
This manual is provided in PDF (Portable Document Format). The PDF
document can be used for online viewing and printing using Adobe®
Acrobat® Reader. When pr inting the manual, please print the entire
manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training
courses, downloads, and service and supp o rt contacts.
In our constant attempts to improve our documentation, we would
welcome your feedback. If you have any questions, comments, or
suggestions about this or any other F-Secure document, please conta ct
us at documentation@f-secure.com
.
1
INTRODUCTION
F-Secure Mobile Security............................................................. 6
F-Secure Mobile Security is a software product that protects data stored
in your S60 device against malicious code attacks and monitors incom ing
and outgoing connections and protects the device from network intrusion
attempts.
F-Secure Mobile Security scans all files for viruses automatically when
they are saved, copied, downloaded, synchronized or otherwise modified.
All infected files are immediately quarantined to protect all other data on
the device. The automatic scanning happe ns tran sparently on the
background.
To work effectively, antivirus software requires an always up-to-date virus
definition database. F-Secure Mobile Security retrieves the latest virus
definition databases automatically.
1.2Key Features
F-Secure Mobile Security offers the following key features.
Transparent
The application runs in the background while you use your device.
Operation
Extensive
Scanning
Automatic
Updates
The application automatically scans all files when they are accessed. You
can also manually scan your device for viruses whenever you want.
The application automatically downloads regular updates to keep the
virus definition database up-to-date.
FirewallThe application protects you from potential network harm by blocking
information that does not meet the set security criteria.
Anti-theftThe application protects your confidential infromation by locking the
device automatically when the SIM card is changed. You can also
remotely wipe the data stored on your mobile device if it is stolen.
Loading...
+ 23 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.