F-secure MOBILE SECURITY FOR UIQ User Manual

F-Secure Mobile Security™
for UIQ

1. Installing and Activating

Installing To install:
Download the installation file to your computer and move it to the device,
Download the installation file to your computer and install the product via
Sony Ericsson PC Suite, or
Download the installation directly to your device. Installation starts
After the installation, restart the device if the installation asks you to do so. When the installation is ready, you need to activate the product. The product does not protect your device if you have not activated it.
Activating To start the activation:
1. Open the application. The Welcome screen is displayed.
2. Press Continue to continue.
3. Select the activation type:
To start the evaluation period, select Free evaluation as the activation
type if it is available and press Done, or
To have the fully licensed version, select Subscription code as the
activation type, and press Done. Enter your subscription number and press Done.
4. Press Yes and select the Internet access point to connect to the update
service and start downloading the updates, or press No to cancel the activation.
The application connects to the update service and submits your subscription number. During the first update, the application downloads the latest virus definition database.
5. When the download is complete, a message informs you that the
registration was successful and that the application is activated. Press
Continue to finish the activation.
6. After you have finished the activation, scan your device for viruses to make
sure your device is clean. See the Scanning for Viruses section below.
You should scan your device whenever the application asks you to.

2. Scanning for Viruses

F-Secure Mobile Security works in the background and scans your files automatically.
1. If a virus is found during the real-time scan, a message is displayed. Press
Yes to view the infected file(s), or No to close the dialog.
2. The Infections view contains a list of infected files on the device and the
state of the file (either quarantined or released).
3. To view more details about an infected file, select the file and select Details
from the menu.
Processing
Infected Files
To process infected files:
1. In the Infections view, select the infected file to be processed.
2. Select Process marked from the menu.
3. From the Process marked menu, select the desired action.
You can process the infected files in one of the following ways:
Quarantine - quarantine the infected file. A quarantined file is locked and
cannot harm your device when F-Secure Mobile Security is on.
Delete - delete the infected file. This is the recommended option. The file
will be removed completely from your device.
Release - release the quarantined file. If you release a file, it will not be
locked any more. You access it at your own risk.

3. Preventing Unauthorized Network Traffic

The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. The predefined firewall levels allow you to instantly change the level of protection according to your needs.
Selecting
Firewall Level
To select the firewall level:
1. In any of the views, select Settings from the menu.
2. Select Firewall protection and select the desired firewall level:
Allow All - allows all network traffic.
Normal - allows all outgoing connections and blocks all incoming traffic.
High - allows most commonly used applications and blocks all incoming
traffic.
Deny All - stops all network traffic.
3. Press Select.

4. Keeping the Product Up-to-Date

Automatic
Updates
F-Secure Mobile Security includes an automatic update service, which means that the virus definition database in the application is updated regularly. Only an up-to-date virus definition database protects your device against the latest viruses. Automatic updates are in use after you have activated the product.
The application requires an active Internet connection for the updates. When a connection to the Internet is available, the application checks when the virus definition database was last updated and downloads new updates if necessary.
Loading...
+ 1 hidden pages