F-secure MOBILE SECURITY FOR SERIES 80 User Manual

F-Secure
Mobile Security
for Series 80
User’s Guide
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372 GB2366691 GB2366692 GB2366693 GB2367933 GB2368233
GB2374260
Copyright © 2005 F-Secure Corporation. All rights reserved. 12000077-5F22
Contents
About This Guide 1
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides ................................................................................ 3
Chapter 1 Introduction 5
1.1 F-Secure Mobile Security............................................................................................. 6
1.2 Key Features................................................................................................................6
Chapter 2 Installation 7
2.1 System Requirements.................................................................................................. 8
2.2 Installing F-Secure Mobile Security.............................................................................. 8
2.2.1 Activating The Update Service ......................................................................... 9
2.3 Uninstalling F-Secure Mobile Security .......................................................................10
Chapter 3 Using F-Secure Mobile Security 11
3.1 Overview .................................................................................................................... 12
3.2 Starting F-Secure Mobile Security .............................................................................12
3.3 Main View...................................................................................................................13
3.4 Selecting the Virus Protection .................................................................................... 14
3.4.1 Real-time Scanning ........................................................................................15
3.4.2 Manual Scanning............................................................................................15
3.5 Processing Infected Files ........................................................................................... 17
3.5.1 Infections List.................................................................................................. 17
iii
3.6 Keeping F-Secure Mobile Security Up-To-Date .........................................................19
3.6.1 Update Settings.............................................................................................. 19
3.6.2 Upgrading the Application .............................................................................. 20
3.6.3 Purchasing Subscription Service Time........................................................... 21
3.7 Firewall.......................................................................................................................22
3.7.1 Protection Levels............................................................................................ 22
Chapter 4 Troubleshooting 26
4.1 Updates......................................................................................................................27
4.2 Subscription ............................................................................................................... 29
4.3 Firewall.......................................................................................................................29
4.4 Uninstallation..............................................................................................................30
Chapter 5 Technical Support 31
5.1 Overview .................................................................................................................... 32
5.2 Web Club ................................................................................................................... 32
5.3 Virus Descriptions on the Web................................................................................... 32
5.4 Electronic Mail Support ..............................................................................................32
About F-Secure Corporation
iv

ABOUT THIS GUIDE

How This Guide Is Organized...................................................... 2
Conventions Used in F-Secure Guides ....................................... 3
1
2
How This Guide Is Organized
F-Secure Mobile Security User’s Guide is divided into the following chapters:
Chapter 1. Introduction. Provides general information about F-Secure
Mobile Security.
Chapter 2. Installation. Gives instructions on installing and setting up
F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes how to use
F-Secure Mobile Security.
Chapter 4. Troubleshooting. Provides solutions to common problems.
Chapter 5. Technical Support. Provides the contact information for
assistance.
About F-Secure Corporation. Describes the company background and
products.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this manual.
Symbols
WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data.
IMPORTANT: An exclamation mark provides important information that you need to consider.
REFERENCE - A book refers you to related information on the topic available in another document.
NOTE - A note provides additional information that you should consider.
l
About This Guide 3
Fonts
TIP - A tip provides information that can help you perform a task more quickly or easily.
An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table captions, and for directory tree names.
Courier New is used for messages on your computer screen.
4
Courier New bold is used for information that you must type.
SMALL CAPS (BLACK) is used for a key or key combination on your
keyboard.
PDF Document
For More Information
Arial underlined (blue)
Times New Roman regular is used for window and dialog box names.
This manual is provided in PDF (Portable Document Format). The PDF document can be used for online viewing and printing using Adobe® Acrobat® Reader. When printing the manual, please print the entire manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and support contacts.
If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at
documentation@f-secure.com
is used for user interface links.
.
1

INTRODUCTION

F-Secure Mobile Security ............................................................. 6
Key Features ................................................................................ 6
5
6

1.1 F-Secure Mobile Security

F-Secure Mobile Security is a software product that protects data stored in your device against malicious code attacks.
F-Secure Mobile Security scans all files for viruses automatically when they are accessed. All infected files are immediately quarantined to protect all other data on the device. The automatic scanning happens transparently in the background.
To work effectively, antivirus software requires an always up-to-date virus definition database. F-Secure Mobile Security gets the latest virus definition databases automatically.

1.2 Key Features

F-Secure Mobile Security offers the following key features.
Transparent
The application runs in the background while you use your device.
Operation
Extensive scanning The application automatically scans all files when they are accessed. You
can also manually scan your device for viruses whenever you want.
Automatic updates The application automatically downloads regular updates to keep the
virus definition database up-to-date.
Firewall The application protects you from potential network harm by blocking
information that does not meet the set security criteria.
2

INSTALLATION

System Requirements .................................................................. 8
Installing F-Secure Mobile Security .............................................. 8
Uninstalling F-Secure Mobile Security........................................ 10
7
8

2.1 System Requirements

To use F-Secure Mobile Security, your device must meet the following requirements:
Device: Nokia Series 80 devices (Nokia 9300 and Nokia
9500)
Available memory: 400 KB

2.2 Installing F-Secure Mobile Security

IMPORTANT: F-Secure Mobile Security cannot be installed on a memory card.
To install F-Secure Mobile Security:
1. Open the inbox and scroll to the message that contains the installation package.
For more information, refer to the User’s Guide that came with your device.
2. Open the message, and press Yes to confirm the installation.
3. Read the License agreement, and press Ok.
4. Wait until the installation is complete.
5. Enter your subscription number when prompted.
Your subscription cannot be authenticated if you have tried to transfer the F-Secure Mobile Security service subscription onto another device more than four times.
6. Press Yes to update the virus definition database.
Loading...
+ 27 hidden pages