"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
5.2Web Club ................................................................................................................... 32
5.3Virus Descriptions on the Web................................................................................... 32
5.4Electronic Mail Support ..............................................................................................32
About F-Secure Corporation
iv
ABOUT THIS GUIDE
How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides ....................................... 3
1
2
How This Guide Is Organized
F-Secure Mobile Security User’s Guide is divided into the following
chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation. Gives instructions on installing and setting up
F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes how to use
F-Secure Mobile Security.
Chapter 4. Troubleshooting. Provides solutions to common problems.
Chapter 5. Technical Support. Provides the contact information for
assistance.
About F-Secure Corporation. Describes the company background and
products.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this
manual.
Symbols
WARNING: The warning symbol indicates a situation with a
risk of irreversible destruction to data.
IMPORTANT: An exclamation mark provides important information
that you need to consider.
REFERENCE - A book refers you to related information on the
topic available in another document.
NOTE - A note provides additional information that you should
consider.
l
About This Guide3
Fonts
TIP - A tip provides information that can help you perform a task
more quickly or easily.
⇒ An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Courier New is used for messages on your computer screen.
4
Courier New bold is used for information that you must type.
SMALLCAPS (BLACK) is used for a key or key combination on your
keyboard.
PDF Document
For More Information
Arial underlined (blue)
Times New Roman regular is used for window and dialog box names.
This manual is provided in PDF (Portable Document Format). The PDF
document can be used for online viewing and printing using Adobe®
Acrobat® Reader. When printing the manual, please print the entire
manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training
courses, downloads, and service and support contacts.
If you have any questions, comments, or suggestions about this or any
other F-Secure document, please contact us at
documentation@f-secure.com
is used for user interface links.
.
1
INTRODUCTION
F-Secure Mobile Security ............................................................. 6
Key Features ................................................................................ 6
5
6
1.1F-Secure Mobile Security
F-Secure Mobile Security is a software product that protects data stored
in your device against malicious code attacks.
F-Secure Mobile Security scans all files for viruses automatically when
they are accessed. All infected files are immediately quarantined to
protect all other data on the device. The automatic scanning happens
transparently in the background.
To work effectively, antivirus software requires an always up-to-date virus
definition database. F-Secure Mobile Security gets the latest virus
definition databases automatically.
1.2Key Features
F-Secure Mobile Security offers the following key features.
Transparent
The application runs in the background while you use your device.
Operation
Extensive scanningThe application automatically scans all files when they are accessed. You
can also manually scan your device for viruses whenever you want.
Automatic updatesThe application automatically downloads regular updates to keep the
virus definition database up-to-date.
FirewallThe application protects you from potential network harm by blocking
information that does not meet the set security criteria.
2
INSTALLATION
System Requirements .................................................................. 8
Installing F-Secure Mobile Security .............................................. 8
Uninstalling F-Secure Mobile Security........................................ 10
7
8
2.1System Requirements
To use F-Secure Mobile Security, your device must meet the following
requirements:
Device:Nokia Series 80 devices (Nokia 9300 and Nokia
9500)
Available memory:400 KB
2.2Installing F-Secure Mobile Security
IMPORTANT: F-Secure Mobile Security cannot be installed on a
memory card.
To install F-Secure Mobile Security:
1. Open the inbox and scroll to the message that contains the
installation package.
For more information, refer to the User’s Guide that came
with your device.
2. Open the message, and press Yes to confirm the installation.
3. Read the License agreement, and press Ok.
4. Wait until the installation is complete.
5. Enter your subscription number when prompted.
Your subscription cannot be authenticated if you have tried to
transfer the F-Secure Mobile Security service subscription onto
another device more than four times.
6. Press Yes to update the virus definition database.
7. F-Secure Mobile Security retrieves the latest virus definition database
update from the Internet. For more information, see “Keeping
F-Secure Mobile Security Up-To-Date”, 19.
IMPORTANT: F-Secure Mobile Security cannot detect the latest
viruses with an outdated database. You must keep the virus
definition database up-to-date.
2.2.1Activating The Update Service
Before you can use F-Secure Mobile Security, you have to activate the
update service with the activation code.
If you have given your mobile phone number to your retailer, you will
receive the activation message as an SMS message. If you do not
receive it, enter your subscription number when you start the F-Secure
Mobile Security for the first time. To activate the update service later,
press Activate in the main view.
If you do not know your subscription number, contact your
service provider or retailer.
CHAPTER 29
Installation
Trial versionIf you want a trial version of F-Secure Mobile Security, select 30 days
evaluation. To continue using it after the 30-day trial period, see
“Purchasing Subscription Service Time”, 21.
10
2.3Uninstalling F-Secure Mobile Security
IMPORTANT: Remove all quarantined and infected files from your
device before you uninstall F-Secure Mobile Security.
To uninstall F-Secure Mobile Security:
1. Open F-Secure Mobile Security.
2. Open Tool s men u and select Uninstall Mobile Security.
F-Secure Mobile Security scans all accessed and modified data on your
device automatically for malicious content when the real-time scanning is
enabled. If you do not want to use the real-time scanning, you can
manually scan all the data for viruses whenever you want.
When F-Secure Mobile Security detects an infected file, you can delete or
quarantine it. If you delete the file, it is removed completely while the
quarantined file is locked up so that it cannot be accessed.
3.2Starting F-Secure Mobile Security
To open F-Secure Mobile Security, select the Security icon in Desk and
press Open.
When the real-time scanning mode is selected, F-Secure Mobile
Security runs in the background automatically. For more
information, see “Real-time Scanning”, 15.
3.3Main View
The F-Secure Mobile Security main view opens when you start the
application.
Figure 3-1 Main view in F-Secure Mobile Security
The main view displays the virus protection and firewall settings, and the
product status. For more information about Virus protection, see
“Selecting the Virus Protection”, 14.
CHAPTER 313
Using F-Secure Mobile Security
Virus protectionDisplays the type of virus scan in use. For more
information, see “Selecting the Virus Protection”,
14.
Firewall protectionDisplays the firewall protection level.
UpdatesDisplays the date when you received the last
update. For more information, see “Update
Settings”, 19.
SubscriptionDisplays the subscription status. You should
renew your license before it expires. For more
information, see “Purchasing Subscription
Service Time”, 21, or contact your retailer.
InfectionsDisplays the number of infected files that have
been found.
Press Scan all to scan all files on your device and on the inserted
memory card for viruses. For more information, see “Running A Manual
Scan”, 15.
Press Update to get the latest virus definition database update. For more
information, see “Keeping F-Secure Mobile Security Up-To-Date”, 19.
14
Press Settings to change the protection and automatic update settings.
Closing the Main ViewSelect File menuÆHide Mobile Security, or press Hide to close the
main view. If you have selected real-time scanning, F-Secure Mobile
Security keeps running in the background.
To shut down F-Secure Mobile Security completely, select File
menuÆExit.
IMPORTANT: If you shut down the application, the infected files
are not quarantined, and the system is not protected against
viruses.
3.4Selecting the Virus Protection
You can set F-Secure Mobile Security to scan all files for viruses
automatically when they are accessed, or you can scan files for viruses
manually.
To change the scanning type:
1. Press Settings in the main view.
2. Select VirusProtection, then select one of the following:
›Real-time - F-Secure Mobile Security runs in the background and
scans files when they are accessed or modified. All infected files
are quarantined automatically. For more information, see
“Real-time Scanning”, 15.
›Manual Scan - F-Secure Mobile Security scans files only when
you run the virus scan yourself. For more information, see
“Manual Scanning”, 15.
IMPORTANT: If you do not select real-time scanning, you should
manually scan your device each time you transfer new data to it.
3. Press Done to accept the settings.
3.4.1Real-time Scanning
The real-time scan scans files for malicious content automatically when
files are accessed or modified.
Real-time scanning runs in the background, and when it detects a virus, it
is immediately quarantined and added to the Infections list. For more
information, see “Infections List”, 17.
Virus alertsWhen F-Secure Mobile Security detects a virus during a real-time scan, it
displays the following warning:
Figure 3-2 Virus alert in F-Secure Mobile Security
Press View to view a list of all infected files. For more information, see
“Infections List”, 17.
CHAPTER 315
Using F-Secure Mobile Security
3.4.2Manual Scanning
With manual scanning, you can scan your device and the inserted
memory card.
Running A Manual Scan
To manually scan your device and the inserted memory card:
1. Press Scan all to start the manual scan.
You can press Cancel to stop the scan at any time.
2. After the virus scan is finished, the application displays the following
information:
16
Figure 3-3 Virus scan results in F-Secure Mobile Security
ScannedThe number of files that were scanned.
InfectedThe number of infections found. Press
Infections to to view a list of infected files.
For more information about removing
infected files, see ”Processing Infected
Files”, 17.
Not ScannedThe number of files that were not scanned. A
file cannot be scanned if another program is
using the file during the scan.
Press Not scanned to view a list of files that
could not be scanned. Select the file from the
list and press Details to view why it could not
be scanned.
Press Close to exit the scan. All infected files are quarantined and
cannot be accessed when F-Secure Mobile Security is running in the
background.
3.5Processing Infected Files
When F-Secure Mobile Security finds a virus in a file, you can remove the
infected file completely, or lock it up so that the infected file cannot be
accessed.
3.5.1Infections List
The Infections list is opened automatically if F-Secure Mobile Security
detects any infections during the scan. The Infections list displays all
detected infected files in the device.
Figure 3-4 Infections list in F-Secure Mobile Security
CHAPTER 317
Using F-Secure Mobile Security
The list displays the name of the infected file and the current infection
status.
›A Quarantined file is locked and cannot be accessed.
›A Released file is infected but is not quarantined.
Select the infected files, and press Process to choose one of the
following actions:
›Quarantine - Quarantine the infected file. Quarantined files
cannot be accessed when F-Secure Mobile Security is running in
the background.
›Delete - Delete the infected file. Deleted files are removed
completely. To restore the deleted file, reinstall it or restore it from
the backup copy.
›Release - Release the quarantined file. If you release the file, you
can access it and use it, but at your own risk.
18
Press Details to view more details about the selected file. The Infection
details view displays the path and file name of the infected file, and the
name of the virus that has infected the file.
You can find in-depth virus descriptions in the F-Secure web site:
http://www.f-secure.com/virus-info/
Press Close to close the Infections list and return to the main view.
.
CHAPTER 319
Using F-Secure Mobile Security
3.6Keeping F-Secure Mobile Security Up-To-Date
You can keep F-Secure Mobile Security up to date by downloading the
latest virus definition database from the update service.
The virus definition database contains information about all the viruses
that the application can find during the scan. An up-to-date virus definition
database gives you the best possible protection.
You must have an active connection to the Internet for F-Secure Mobile
Security to check for updates.
Your copy of F-Secure Mobile Security includes a license. During
this time, you can freely update your F-Secure Mobile Security.
When your license expires, you can update your copy only after
renewing your license.
3.6.1Update Settings
You can get F-Secure Mobile Security updates automatically every time
you open a connection to the Internet or manually whenever you want.
If the update service has not been activated, you cannot receive
any updates. Press Activate to activate the update service. For
more information, see “Activating The Update Service”, 9.
Automatic Updates
You can set F-Secure Mobile Security to download updates automatically
once a day when the device has an active connection to the Internet.
F-Secure Mobile Security does not open a connection, but it
recognizes a connection being opened by, for example, a Web
browser.
To select automatic updates:
1. Press Settings.
2. Change Automatic Updates to Enabled.
20
3. Press Done to exit the settings.
IMPORTANT: Automatic Updates can be selected only if real-time
scanning is on.
If you have selected real-time scanning, F-Secure Mobile Security detects
open internet connections. F-Secure Mobile Security downloads the virus
definition database update automatically if more than 24 hours have
passed since the last update.
It is recommended that you scan your device for viruses after you receive
a new virus definition database update
Manual Updates
To update F-Secure Mobile Security manually:
1. Press Update.
2. Select the Internet access point to connect to the update server.
F-Secure Mobile Security connects to the update server and
downloads the latest virus definition database. The application takes
the virus definition database update into use immediately.
For more information, see the User Guide of your device.
3. When the update is complete, press OK to scan your device for
viruses. For more information on scanning, see “Running A Manual
Scan”, 15.
3.6.2Upgrading the Application
When a new F-Secure Mobile Security version is available, F-Secure
Mobile Security prompts you to download the software update.
Using F-Secure Mobile Security
Figure 3-5 Upgrading F-Secure Mobile Security
Press Yes to get the latest version of F-Secure Mobile Security. If the
updated virus definition database requires a software update to work
properly, the upgrade is downloaded automatically.
The new version is installed automatically.
3.6.3Purchasing Subscription Service Time
To keep your device continuously protected, you should purchase
additional service time well before the expiration date. The additional
service time purchased is either added to the time remaining in your
previous order or to your free evaluation period.
CHAPTER 3 21
To purchase more service subscription time through your PC
browser:
1. Open http://www.f-secure.com/estore/ in the web browser with the PC
computer.
2. Enter your subscription number in the Subscription Number field to
identify your subscription.
F-Secure eStore accepts the most commonly used credit cards
and wire/bank transfers.
3. Follow the instructions on the screen.
22
3.7Firewall
The firewall in F-Secure Mobile Security works quietly in the background.
It monitors incoming and outgoing Internet and network information, and
protects you from intrusion attempts.
The firewall protection level has been set to Normal. This level gives you
good protection and does not affect using the most common applications.
Figure 3-6 Firewall Settings with Normal protection level.
3.7.1Protection Levels
The firewall has five protection levels:
LevelDescriptionProtection
Allow All
Normal
Allows all network traffic. Does not stop
any incoming or outgoing connections.
Allows all outgoing connections and does
not stop preinstalled applications.
Recommended level.
No protection.
Good
protection.
CHAPTER 323
Using F-Secure Mobile Security
High
Deny All
Custom
Custom Level Rules
The Custom protection level has three types of rules you can add:
RuleDescription
NormalTo allow TCP or UDP ports in or out.
Trig g e rFor more complex connections. You need to set an “if -
CustomTo define a protocol number that is allowed in and out.
Allows preinstalled applications to connect,
but may stop rarely used applications.
Stops all network traffic. You cannot use
your e-mail, MMS or web services.
Allows preinstalled applications to connect,
but may stop rarely used applications. You
can add three types of rules: Normal,
Trigger, Custom (see “Custom Level
Rules”, 23).
then” structure to define a protocol and ports that trig a
rule on for another protocol and port.
High protection
Total protection.
High protection
Add a Normal rule
You need to specify the following:
›Rule name - define the rule name
›Rule Type - Normal
›Protocol - TCP or UDP
›Direction - incoming or outgoing
›Ports - set the destination port range (from 1 to 65535)
24
Add a Trigger rule
You need to specify the following:
›Rule name - define the rule name
›Rule Type - Trigger
›Define the rule under If connection exists: that trigs the rule
defined under Then allow connection to:
Add a Custom rule
You need to specify the following:
›Rule name - define the rule name
›Rule Type - Custom
›Protocol number - set a protocol number between 0 to 255.
Terminology
ConnectionA connection is made every time information is sent between two devices.
When a device wants to make a connection to another, it has to create, or
open, a port so that it can listen to the response.
IP protocolThe Internet uses Internet Protocol (IP) packets to deliver information
from one device to another. IP packets include other protocols, which are
designed for different kinds of tasks.
PortA port is an address inside a protocol where information can be sent, or
an address that an Internet server can listen to.
ProtocolProtocols are the agreed form for how information is sent between two
devices. Different protocols are used for sending different kinds of
information. The devices must support the same protocols to be able to
communicate.
RuleA rule is an instruction for the firewall to restrict incoming and/or outgoing
information. A simple rule can be the following: “allow outgoing TCP
packets to port 80, any address”. This means that the firewall allows all
information to and from port 80.
CHAPTER 325
Using F-Secure Mobile Security
TCP, TCP/IP protocolThe Transmission Control Protocol (TCP) makes it possible for two
devices to make a connection and exchange information. TCP
guarantees that the information is delivered in exactly the same form it
was sent. TCP is often referred to as TCP/IP.
UDP protocolUser Datagram Protocol (UDP) is used for sending audio or video
Q. When trying to connect to the update server, I get a notification
that no Internet access points are configured. What causes this?
A. You may have deleted the Internet access point that you selected
during the activation. With no defined Internet access point, the
application cannot check for updates. Go to the Update settings view
and select one of the Internet access points or create a new one.
Q. I have defined an Internet access point, but I am unable to get
the updates. What can I do?
A. Check the Internet access point settings with your operator. You
should also check that the date and time settings in your device are
correct. If you have problems connecting through WAP access points,
you should connect through the Internet.
The Internet access point settings are operator specific.
Q. I get a notification that the update service cannot authenticate
my device. Why?
A. This error message is displayed when the update server cannot
authenticate the subscription. Reasons for the authentication failure
can be as follows:
›The F-Secure F-Secure Mobile Security installation folder files
have been tampered.
›There have been more than four attempts to move the F-Secure
F-Secure Mobile Security installation and service subscription to
another device.
28
Q. My virus definition database seems to be corrupted. What
should I do?
A. You should immediately update your virus definition database. After
that, in the Scan settings view, first go to the Scan view and change
the scanning mode to Real-time. Then, go to the Update view and
change automatic updates to Enabled. Select to Scan All.
Q. How much data traffic automatic updates generate?
A. When the Automatic Update feature is enabled and when the
connection to the Internet is active, F-Secure Mobile Security checks
for updates once a day at most. Depending on the amount of
available updates, every checking generates 2-4 KB. For example, if
you are connected to the Internet at least once a day, automatic
updates generate approximately an extra 100 KB a month. If your
GSM operator bills you one euro per 1MB, the automatic updates add
approximately 10 cents to your phone bill.
If an updated application is also available, because of the large
amount of data, F-Secure Mobile Security displays the amount of
data to be downloaded and prompts you for confirmation before
starting to download the updated application.
Q. The application upgrade was interrupted. How can I continue it?
A. You cannot cancel the upgrade process. However, if you interrupt it
by, for example, removing the battery while new files are being
installed, an 'Update AV' message is displayed next time you restart
F-Secure Mobile Security. Press Update F-Secure Security to
resume the upgrade process.
Q. The application upgrade did not finish because there was not
enough storage space. What can I do?
A. If there is not enough storage space to complete the application
upgrade, F-Secure Mobile Security prompts you either to delete some
files before continuing the upgrade process or to cancel the upgrade
process and continue it at a later time.
4.2Subscription
Q. I receive an ‘Invalid subscription number’ error message when I
enter my subscription number. What should I do?
A. You have entered an invalid subscription number. You should check
your subscription number and re-enter it.
Q. What should I do when my subscription is about to exipre or has
expired?
A. If your subscription has expired and you want to renew it, press Yes
to purchase more subscription service time. For more information,
see “Purchasing Subscription Service Time”, 21.
4.3Firewall
Q. How can I use IM++ with F-Secure Mobile Security?
A. IM++ works with Allow All and Normal protection levels. If you are
using High protection, you have to make a new rule. The new rule
depends on the service provider:
A. Go to the Firewall Protection settings and select Deny All as the
protection level. The Deny All protection level closes all connections
to and from the Internet, and you will get a failed connection error
message. Remember to change the protection level back to Normal
after the test.
30
4.4Uninstallation
Q. I can’t uninstall F-Secure Mobile Security, what should I do?
A. Check that you don’t have an active or open connection through the
Web Club.................................................................................... 32
Virus Descriptions on the Web ................................................... 32
Electronic Mail Support............................................................... 32
31
5.1Overview
5.2Web Club
CHAPTER 532
Technical Support
F-Secure Technical Support is available by e-mail and from our Web site.
You can access our Web site from within F-Secure Mobile Security or
from your Web browser.
For Technical Support of all F-Secure products, go to F-Secure Support
Center at: http://support.f-secure.com/enu/home/
The F-Secure Web Club provides assistance to the users of F-Secure
products. To connect to the Web Club on our Web site, open the Web
Club page, and click Web Club on the Web Club tab of the General
property page.
To connect to the Web Club directly from within your Web browser, go to
http://www.f-secure.com/webclub/
.
.
5.3Virus Descriptions on the Web
F-Secure Corporation maintains a comprehensive collection of
virus-related information on its Web site. To view the Virus Information
Database, connect to: http://www.F-Secure.com/virus-info/
5.4Electronic Mail Support
If you have questions about F-Secure Mobile Security not covered in the
manual or online services at http://www.F-Secure.com/
your local F-Secure distributor or F-Secure Corporation directly.
.
, you can contact
33
For technical assistance, please contact your local F-Secure Business
Partner. Send your e-mail to: Anti-Virus-<country>@F-Secure.com
Example: Anti-Virus-Norway@F-Secure.com
If there is no authorized F-Secure Anti-Virus Business Partner in your
country, you can request basic technical assistance from:
Anti-Virus-Support@F-Secure.com
When contacting support, prepare and include the following information in
your support request:
›Name and version number of your F-Secure software program
(including the build number, if available).
›Name and version number of your operating system (including
the build number).
›A detailed description of the problem, including any error
messages displayed by the program, and any other details, which
could help us duplicate the problem.
When contacting F-Secure support by telephone, please do the following
so that we may help you more effectively and save time:
›have your device at hand, so you can follow instructions given by
the support technician, or be prepared to write down instructions.
›Have your device turned on and (if possible) in the state it was in
when the problem occurred.
About F-Secure Corporation
F-Secure Corporation is the fastest growing publicly listed company in the
antivirus and intrusion prevention industry with more than 50% revenue
growth in 2004. Founded in 1988, F-Secure has been listed on the Helsinki
Stock Exchange since 1999. We have our headquarters in Helsinki, Finland,
and offices in USA, France, Germany, Italy, Sweden, the United Kingdom and
Japan. F-Secure is supported by service partners, value added resellers and
distributors in over 50 countries. F-Secure protection is also available through
mobile handset manufacturers such as Nokia and as a service through major
Internet Service Providers, such as Deutsche Telekom, France Telecom and
Charter Communications. The latest real-time virus threat scenario news are
available at the F-Secure Antivirus Research Team weblog at
http://www.f-secure.com/weblog/
Services for Individuals and Businesses
F-Secure services and software protect individuals and businesses against
computer viruses and other threats coming through the Internet or mobile
networks. Our award-winning solutions include antivirus and desktop firewall
with intrusion prevention, antispam and antispyware solutions. Our key
strength is our proven speed of response to new threats. For businesses our
solutions feature a centrally-managed and well-integrated suite of solutions
for workstations and servers alike. Focused partners offer security as a
service for companies that do not wish to build in-house security expertise.
.
Visit our website at http://www.f-secure.com/products/
products and services.
to learn more about our
www.f-secure.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.