Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers
regarding this software product.
Note! This document is a property of Kaspersky Lab's and all rights to this document are reserved by the copyright laws
of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof
result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation.
Any type of reproduction and distribution of any materials, including translation thereof, is allowed only by a written
permission of Kaspersky Lab.
This document and graphic images related to it can be used exclusively for information, non-commercial or personal
purposes.
This document can be amended without prior notification. For the latest version of this document refer to Kaspersky Lab's
website at http://www.kaspersky.com/docs.
Kaspersky Lab does not assume any liability for the content, quality, relevancy or accuracy of the materials used in this
document, the rights for which are held by any third parties and for the potential damages associated with the use of such
documents.
This document includes registered and non-registered trademarks. All said trademarks are the property of their
corresponding owners.
KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7
Obtaining information about the application ............................................................................................................. 8
Data sources for independent research ............................................................................................................. 8
Contacting the Sales Department ...................................................................................................................... 9
Contacting the Technical Support Service ......................................................................................................... 9
Discussion of Kaspersky Lab applications in web forum .................................................................................. 10
Hardware and software requirements .................................................................................................................... 10
Distribution kit ........................................................................................................................................................ 10
KASPERSKY MOBILE SECURITY FOR SYMBIAN OS ............................................................................................. 11
Installing Kaspersky Mobile Security...................................................................................................................... 11
Getting started ....................................................................................................................................................... 13
Activating the program ..................................................................................................................................... 13
Starting the program ........................................................................................................................................ 14
About Real-Time Protection ............................................................................................................................. 18
Enabling and disabling the Real-Time Protection ............................................................................................. 18
Selecting objects to be scanned ....................................................................................................................... 19
Selecting actions for objects ............................................................................................................................. 20
Display of the protection icon ........................................................................................................................... 21
About on-demand scan .................................................................................................................................... 23
Starting a scan manually .................................................................................................................................. 23
Configuring a scheduled scan .......................................................................................................................... 25
Selecting objects to be scanned ....................................................................................................................... 26
Selecting actions to be performed with objects ................................................................................................ 27
Configuring ROM scan ..................................................................................................................................... 29
Configuring the scan of archives ................................................................ ...................................................... 30
Managing the backlight .................................................................................................................................... 31
About Quarantine ............................................................................................................................................. 32
About Anti-Spam .............................................................................................................................................. 36
Creating a Black list ......................................................................................................................................... 37
Creating a White List ........................................................................................................................................ 41
Response to messages and calls from the phonebook contacts ...................................................................... 45
Response to messages from non-numeric numbers ........................................................................................ 45
Selecting an action to be performed with incoming messages ......................................................................... 47
Selecting an action to be performed with incoming calls .................................................................................. 48
Page 4
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
4
Parental control ...................................................................................................................................................... 48
About Parental control ...................................................................................................................................... 49
Parental control modes .................................................................................................................................... 49
Creating a Black List ........................................................................................................................................ 50
Creating a White List ........................................................................................................................................ 54
About Anti-Theft ............................................................................................................................................... 58
The SMS-Block function ................................................................................................................................... 58
Blocking the device .......................................................................................................................................... 59
The SMS-Clean function .................................................................................................................................. 60
Deleting personal data ..................................................................................................................................... 61
The SIM-Watch function ................................................................................................................................... 62
The SMS-Find function..................................................................................................................................... 63
Determining the device location ....................................................................................................................... 64
The Stealth SMS function................................................................................................................................. 65
About firewall .................................................................................................................................................... 67
About Encryption .............................................................................................................................................. 69
Data encryption ................................................................ ................................................................................ 69
Data decryption ................................................................ ................................................................................ 70
Information about encrypted data ..................................................................................................................... 71
Blocking access to encrypted data ................................................................................................................... 72
Updating the program bases .................................................................................................................................. 73
About program bases update ........................................................................................................................... 73
Viewing bases information ............................................................................................................................... 73
Updating while roaming .................................................................................................................................... 75
Program logs ......................................................................................................................................................... 77
About logs ........................................................................................................................................................ 77
Viewing Log records ......................................................................................................................................... 78
Deleting Log records ........................................................................................................................................ 78
Displaying the status window ................................................................................................................................. 78
Managing the license ............................................................................................................................................. 80
Viewing the license information ........................................................................................................................ 80
Renewing the license ....................................................................................................................................... 81
Uninstalling the program ........................................................................................................................................ 82
KASPERSKY MOBILE SECURITY FOR MICROSOFT WINDOWS MOBILE ............................................................. 86
Installing Kaspersky Mobile Security...................................................................................................................... 86
Getting started ....................................................................................................................................................... 88
Activating the program ..................................................................................................................................... 88
Starting the program ........................................................................................................................................ 89
Graphical user interface ................................................................................................................................... 90
About Real-Time Protection ............................................................................................................................. 93
Enabling and disabling Real-Time Protection ................................................................................................... 93
Selecting an action to be performed with objects ................................................................ ............................. 94
About on-demand scan .................................................................................................................................... 96
Starting a scan manually .................................................................................................................................. 96
Configuring a scheduled scan start .................................................................................................................. 98
Selecting objects to be scanned ....................................................................................................................... 99
Selecting an action to be performed with objects ................................................................ ........................... 100
About Quarantine ........................................................................................................................................... 102
About Anti-Spam ............................................................................................................................................ 106
Creating a Black List ...................................................................................................................................... 107
Creating a White List ...................................................................................................................................... 110
Response to messages and calls from the phonebook contacts .................................................................... 114
Response to messages from non-numeric numbers ...................................................................................... 115
Selecting an action to be performed with incoming messages ....................................................................... 117
Selecting an action to be performed with incoming calls ................................................................................ 118
Parental control .................................................................................................................................................... 118
About Parental control .................................................................................................................................... 119
Parental control modes .................................................................................................................................. 119
Creating a Black List ...................................................................................................................................... 120
Creating a White List ...................................................................................................................................... 123
About Anti-Theft ............................................................................................................................................. 127
The SMS-Block function ................................................................................................................................. 128
Blocking the device ........................................................................................................................................ 128
The SMS-Clean function ................................................................................................................................ 129
Deleting personal data ................................................................................................................................... 130
The SIM-Watch function ................................................................................................................................. 131
The SMS-Find function................................................................................................................................... 132
Determining the device location ..................................................................................................................... 133
The Stealth SMS function............................................................................................................................... 134
About firewall .................................................................................................................................................. 135
Selecting the Firewall security level ............................................................................................................... 136
About Encryption ............................................................................................................................................ 137
Data encryption ................................................................ .............................................................................. 137
Data decryption ................................................................ .............................................................................. 139
Blocking access to encrypted data ................................................................................................................. 139
Page 6
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
6
Updating the program bases ................................................................................................................................ 141
About updating of program bases .................................................................................................................. 141
Viewing bases information ............................................................................................................................. 142
Program logs ....................................................................................................................................................... 144
About logs ...................................................................................................................................................... 144
Viewing Log records ....................................................................................................................................... 145
Deleting Log records ...................................................................................................................................... 145
Managing the license ........................................................................................................................................... 146
Viewing the license information ...................................................................................................................... 147
Renewing the license ..................................................................................................................................... 147
Uninstalling the program ...................................................................................................................................... 148
CRYPTO EX LTD. ..................................................................................................................................................... 156
INDEX ....................................................................................................................................................................... 157
Page 7
7
IN THIS SECTION
Obtaining information about the program .......................................................................................................................... 8
Hardware and software requirements.............................................................................................................................. 10
Distribution kit .................................................................................................................................................................. 10
KASPERSKY MOBILE SECURITY 8.0
Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft
Windows Mobile against malware programs, unsolicited calls and messages: The program offers the following
functionality:
Real-Time Protection of the file system of the device - interception and scan of:
all incoming objects transmitted using wireless connections (IR port, Bluetooth), EMS and MMS messages,
during synchronization with the personal computer and downloading files using a browser;
files opened on the mobile device;
programs installed from the device's interface.
Scanning of the file system's objects on the mobile device or on the connected expansion cards by user's
demand or according to the schedule.
Reliable isolation of infected objects in the quarantine storage.
Updating of Kaspersky Mobile Security bases used to scan for malware programs and delete dangerous
objects.
Blocking unwanted incoming and outgoing SMS messages and calls.
Blocking access to or erasing user's data in case of unauthorized actions with the device, as, for instance,
theft.
Protection of the mobile device at the network level.
Protection with encryption of a folder (except system folders) in the device's memory or on the memory
expansion card (through the encrypting functions embedded in the system).
Receiving geographical coordinates of the device.
You can use the capabilities providing flexible control of the Kaspersky Mobile Security operation settings, viewing the
current protection status and the event log in which the program's actions are recorded.
The program includes a menu system and supports an easy-to-use user's interface.
Once a malware program is detected, Kaspersky Mobile Security can disinfect the infected object detected (if disinfection
is possible), delete it or place it into the Quarantine. In this case no copies of the object being deleted will be saved.
Page 8
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
8
IN THIS SECTION
Data sources for indepenendent research ......................................................................................................................... 8
Contacting the Sales Department ...................................................................................................................................... 9
Contacting the Technical Support service ......................................................................................................................... 9
Discussion of Kaspersky Lab applications in web forum ................................................................................................. 10
OBTAINING INFORMATION ABOUT THE APPLICATION
If you have any questions regarding purchasing, installing or using Kaspersky Mobile Security, answers are readily
available.
Kaspersky Lab provides various sources of information about the program. You can select the source that suits you best
depending on the importance and urgency of your question.
DATA SOURCES FOR INDEPENDENT RESEARCH
You can view the following sources of information about the program:
program page at the web site of Kaspersky Lab;
program page at the web site of the Technical Support Server (in the Knowledge Base);
online help system;
documentation.
Application page at the web site of Kaspersky Lab.
Use this page to obtain general information about Kaspersky Mobile Security, its capabilities and features of
operation. You can purchase Kaspersky Mobile Security or extend license required to use it at our E-Store.
Application page at the web site of the Technical Support Server (Knowledge Base)
http://support.kaspersky.com/desktop
This page contains articles published by experts from the Technical Support Service.
The articles contain useful information, guidelines and answers to frequent questions pertaining to the purchase,
installation and use of Kaspersky Mobile Security. They are arranged in topics, such as "Work with key files",
"Database updates" or "Troubleshooting". The articles can answer questions pertaining not only to Kaspersky Mobile
Security, but also other products of Kaspersky Lab; they can contain general news from the Technical Support
Service.
Online help system
If you have a question about a specific application window or a tab of Kaspersky Mobile Security, you can use the
context help.
In order to open the context help, open the corresponding tab and select Help.
Page 9
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
9
Documentation
The User Guide contains detailed information about the application's functions, how to work with them, includes
advices and recommendations on its configuration.
Files containing the documents in PDF format are included into the product package of Kaspersky Mobile Security.
You can also download electronic files containing these documents from Kaspersky Lab's website.
CONTACTING THE SALES DEPARTMENT
If you have questions regarding selecting or purchasing Kaspersky Mobile Security or extending the period of its use, you
can phone Sales Department specialists in our Central Office in Moscow at:
You can send your questions to the Sales Department to e-mail address sales@kaspersky.com.
CONTACTING THE TECHNICAL SUPPORT SERVICE
If you already purchased Kaspersky Mobile Security, you can obtain information about this application from the Technical
Support service by phone or via Internet.
Experts from the Technical Support Service will answer your questions regarding the installation and use of the program,
and if your device is infected, they will assist you in eliminating the consequences of malware activity.
Before contacting the Technical support service, please read the Support rules
(http://support.kaspersky.com/support/rules).
E-mailing your question to the Technical Support Service
You can forward your question to the Technical Support Service specialists by filling out a Helpdesk web form at
(http://support.kaspersky.com/helpdesk.html).
You can send your inquiry in the Russian, English, German, French or Spanish language.
In order to send an e-mail message with your question, you must indicate the Customer ID obtained during the
registration at the Technical Support service website along with your password.
If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration form at Helpdesk web
form (https://support.kaspersky.com/personalcabinet/registration/form/). During registration enter the activation code for
your application or the license key filename.
You will receive a Technical Support service specialist's response in your Personal Cabinet
(https://support.kaspersky.com/PersonalCabinet) and at the e-mail address you specify in your inquiry.
Please describe your problem with all possible details in the help request web form. Specify in the mandatory fields:
Prompt type. Select the topic which is the closest to the problem encountered, for example, "Product
Installation/Removal Problem" or "Anti-Virus scan/virus removal problem". If you find no suitable section, select
"General question".
Application name and version number.
Prompt text. Describe the problem you have encountered with as much detail as possible.
Page 10
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
10
Customer ID and password. Enter the customer ID and password received during registration at the Technical
Support Service web site.
E-mail address. The experts from the Technical Support Service will send their reply to your inquiry to that
address.
Technical support over the phone
If you have an urgent problem, you can call the Technical Support Service in your city. Before contacting your local
(http://support.kaspersky.com/support/support_local) or international
(http://support.kaspersky.com/support/international) technical support service, collect information
(http://support.kaspersky.com/support/details) about your device and about the anti-virus application installed on it.
This will enable our specialists to help you faster.
DISCUSSION OF KASPERSKY LAB APPLICATIONS IN WEB FORUM
If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other users of
Kaspersky Lab's anti-virus applications in our forum located at Kaspersky Lab's web forum http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, create new topics, use search.
HARDWARE AND SOFTWARE REQUIREMENTS
Kaspersky Mobile Security 8.0 is designed for installation on mobile devices running one of the following operating
systems:
Symbian OS 9.1, 9.2 and 9.3 Series 60 UI.
Microsoft Windows Mobile 5.0, 6.0, 6.1.
DISTRIBUTION KIT
You can purchase Kaspersky Mobile Security via Internet (the program distribution kit and documentation are provided in
the electronic form). Kaspersky Mobile Security can be also purchased in mobile communication offices. For detailed
information and the methods of purchase and the distribution kit, please contact our sales department at
sales@kaspersky.com.
Page 11
11
IN THIS SECTION
Installing Kaspersky Mobile Security ............................................................................................................................... 11
Getting started ................................................................................................................................................................. 12
Parental control ............................................................................................................................................................... 48
Updating the program bases ........................................................................................................................................... 73
Program logs ................................................................................................................................................................... 77
Displaying the status window .......................................................................................................................................... 78
Managing the license....................................................................................................................................................... 80
Uninstalling the program .................................................................................................................................................. 82
KASPERSKY MOBILE SECURITY FOR
SYMBIAN OS
This section contains description of the operation of Kaspersky Mobile Security 8.0 for smartphones running Symbian
version 9.1, 9.2 and 9.3 Series 60 UI.
INSTALLING KASPERSKY MOBILE SECURITY
In order to install Kaspersky Mobile Security, perform the following steps:
1. Copy the program distribution package to your smartphone. You can do it using one of the following methods:
from the download page of Kaspersky Lab's website;
using program Nokia PC Suite;
using a memory expansion card.
2. Start the installation using one of the following methods:
Page 12
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
12
using program Nokia PC Suite;
by starting the distribution package on the device.
3. A prompt (see Figure below) will appear on the screen; select Yes to confirm the installation of the program.
Figure 1: Prompt to confirm the installation
4. Review additional information about the program: name, version, certificates. Press Continue.
5. If the operating system's and of Kaspersky Mobile Security's language versions do not match, a corresponding
message will then be displayed on the screen. In order to proceed with the installation in English, press OK.
6. Read the License Agreement (see the Figure below). If you agree to all terms of the agreement, press OK. If
you do not agree with the terms of the License Agreement, press Cancel. Installation of Kaspersky Mobile
Security will be terminated.
7. Make sure that there is no other anti-virus software installed on the phone. Press OK. Kaspersky Mobile
Security will then be installed on the device.
The installed Kaspersky Mobile Security is not intended for backup and restore.
Figure 2: License Agreement
Page 13
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
13
IN THIS SECTION
Activating the program ..................................................................................................................................................... 13
Starting the program ........................................................................................................................................................ 14
Viewing information about the program ........................................................................................................................... 17
GETTING STARTED
This section contains information on starting the program, what is required to activate it, how you should use the program
interface and set up the secret code.
ACTIVATING THE PROGRAM
To start using Kaspersky Mobile Security you must activate it first. The activation procedure involves entering the
activation code and then receiving a key to be used by the program to determine your rights and the period during which
you can use the program.
You can purchase the activation code at website http://www.kaspersky.com/globalstore or from Kaspersky Lab's
distributors.
To activate Kaspersky Mobile Security on your smartphone, you must have an Internet connection configured.
Before activating the application, make sure that the devices' system date settings match the actual date and time.
In order to activate Kaspersky Mobile Security, perform the following actions:
1. Open the device’s main menu.
2. Switch to the Applications menu.
3. Select KMS 8.0 and start the program using the Open item from the Options menu.
4. Select Enter code from the Options menu.
Kaspersky Mobile Security activation window will appear on the smartphone screen (see Figure below).
Page 14
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
14
Figure 3: The program activation window
5. Enter the code into the four fields. The activation code consists of Latin alphabet characters and digits (the code
is case-insensitive). After you have entered the activation code, select Activate in the Options menu.
6. When you request an access point, select the connection type to be used to connect to the server.
The program will send an http query to Kaspersky Lab's activation server and will then download and install the
key file.
If the activation code you entered appears invalid for any reason, a corresponding message will be displayed on your
smartphone's screen.
If the key file installation is successful, information about the license will be displayed on the screen. To start using the
program press OK.
STARTING THE PROGRAM
In order to start Kaspersky Mobile Security, perform the following actions:
1. Open the device’s main menu.
2. Switch to the Applications menu.
3. Select KMS 8.0 and start the program using the Open item from the Options menu.
After the program is started a window with main components of Kaspersky Mobile Security (see Figure below) will be
displayed on the screen.
Real-Time Protection – Real-Time Protection status (see section “Real-Time Protection” on page 16).
Last full scan – the date of the last anti-virus scan of the device (see section “On-demand scan” on page 22).
Databases date – release date of the bases installed on the device (see section “Updating the program bases”
on page 73).
Anti-Spam – status of protection against unsolicited incoming messages and calls (see section “Anti-Spam” on
page 35).
Page 15
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
15
Firewall – level of device protection against unwanted network activities (see section “Firewall” on page 66).
Figure 4: The program component status window
In order to switch to the program graphic interface, press OK.
GRAPHIC INTERFACE
The program components are grouped in logical groups and their settings are provided on seven tabs:
Anti-Virus contains settings of the Real-Time Protection, on-demand protection, program bases update and
quarantine as well as the settings of the schedule for the scan and update tasks.
Anti-Theft contains settings used to block the device and erase information if the device is stolen or lost.
Encryption contains settings used to protect information resident on the device using encryption.
Anti-Spam contains the settings used to filter unwanted incoming messages and calls.
Parental control contains settings used to block unwanted outgoing calls and messages.
Firewall contains all settings used for the operation of the network protection of the device.
Information contains general settings used for the operation of the program, information about the program and
the bases used. The tab also includes information about the license installed and the availability of its renewal.
Page 16
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
16
To navigate from one tab to another, use the joystick of the device or select the Open tab item in the Options menu (see
Figure below).
Figure 5: The Options menu
In order to return to the program components status window,
select the Current status item from the Options menu.
SECRET CODE
The secret code is used to prevent unauthorized access to the settings of Anti-Theft, Parental control and Encryption,
during the creation of Stealth SMS, for removing the program and accessing the encrypted data.
You can set up the secret code using one of the following methods:
In the settings of the Anti-Theft, Parental control or Encryption components.
Using item Change code in menu Settings on the Information tab.
We recommend using a secret code consisting of at least 7 digits.
In order to set up the secret code on the Information tab, do the following:
1. Select the Information tab.
2. On the tab select Settings, then select Change code.
3. In the Enter new code entry field enter digits which will constitute your code, press OK. Then enter this code
again in the Confirm code field.
Also, if the code is not set up, you can enter it when you first access the settings of Anti-Theft, Encryption or Parental
control. Also entry field Enter new code and Confirm code will be displayed
In order to change the secret code, do the following:
1. Select the Information tab.
2. On the tab select Settings, then select Change code.
Page 17
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
17
IN THIS SECTION
About Real-Time Protection ............................................................................................................................................ 18
Enabling and disabling the Real-Time Protection ............................................................................................................ 18
Selecting objects to be scanned ...................................................................................................................................... 19
Selecting actions for objects ............................................................................................................................................ 20
Display of the protection icon .......................................................................................................................................... 21
3. Enter the current code in the Enter code entry field. Then enter new code in the Enter new code field and enter
it once again in the Confirm code entry field to confirm.
If you forgot the secret code, you will not be able to manage Kaspersky Mobile Security functions that require entering the
code and to delete the program.
VIEWING INFORMATION ABOUT THE PROGRAM
You can view general information about the program, its version and copyright details.
In order to view the information about the program,
select Information on the About tab (see Figure below).
Figure 6: Viewing information about the program
REAL-TIME PROTECTION
This section contains information about Real-Time Protection of your device, how to enable it and configure its settings.
Page 18
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
18
ABOUT REAL-TIME PROTECTION
Real-Time Protection is launched at the operation system startup, is permanently loaded in the device's RAM and
monitors all opened, saved or run files. Files are scanned according to the following algorithm:
1. The component intercepts each attempt of access to each file from the part of the user or a program.
2. The file is scanned for the presence of malware object. Malicious objects are detected by comparison with
program databases. The databases contain descriptions of all the malicious objects known to date and methods
for neutralizing them.
After the analysis, Kaspersky Mobile Security may take the following courses of action:
If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and performs an action
in accordance with the settings.
If no malicious code is discovered in the file, it will be immediately restored.
Information about the results of the scan is saved to the program log (see section “Program logs” on page 77).
ENABLING AND DISABLING THE REAL-TIME PROTECTION
The program allows managing the status of the Real-Time Protection of the device against malware objects.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To enable Real-Time Protection, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select value On for the Protection setting.
4. Press Back to save the changes.
Page 19
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
19
Figure 7: Enabling Real-Time Protection
To disable Real-Time Protection, do the following:
1. Select the Settings item in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select value Off for the Protection setting.
4. Press Back to save the changes.
Kaspersky Lab's specialists strongly recommend that you should not disable protection because this may lead to
infecting your device with viruses and data loss.
SELECTING OBJECTS TO BE SCANNED
You can select the type of objects to be scanned by Real-Time Protection.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To select the type of objects to be scanned, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
Page 20
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
20
3. Select the type of files to be scanned by Real-Time Protection using the Objects to be scanned settings:
All files: scan files of all types.
Executables only: scan only executable program files (for example *.exe, *.sis, *.mdl, *.app).
4. Select OK to save changes.
Fugure 8: Selecting objects to be scanned
SELECTING ACTIONS FOR OBJECTS
You can configure the program's response when it detects a malware object.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the program’s response when it detects a malware object, perform the following actions (see Figure
below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select the program's response when it detects an infected object for the Action setting.
Log event: skip the malware object and record the information about its detection in the program log.
Page 21
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
21
Delete: delete malware objects without notifying the user.
Quarantine: quarantine malware objects.
4. Select OK to save changes.
Figure 9: Configuring the program's response when it detects a malware object
DISPLAY OF THE PROTECTION ICON
The icon reflects the real-time protection status on the device screen. If the real-protection is enabled, the color icon will
be displayed, otherwise the icon will be grey color.
You can configure the protection status icon display on the device screen.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the protection status icon display, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select Show protection icon. Configure the protection status icon display on the device screen:
Always: the program icon to be displayed on the device screen.
Page 22
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
22
In menu only: the program icon in the device menu and Kaspersky Mobile Security menu.
Never: the icon will not be displayed.
4. Select OK to save changes.
Figure 10: Configuring the protection status icon
Page 23
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
23
IN THIS SECTION
About on-demand scan ................................................................................................................................................... 23
Starting a scan manually ................................................................................................................................................. 23
Configuring a scheduled scan ......................................................................................................................................... 25
Selecting objects to be scanned ...................................................................................................................................... 26
Selecting actions to be performed with objects ............................................................................................................... 27
Configuring ROM scan .................................................................................................................................................... 29
Configuring the scan of archives ..................................................................................................................................... 30
Managing the backlight .................................................................................................................................................... 31
ON-DEMAND SCAN
This section contains information about the Scan component, how to scan your device for viruses, configure the device
scan settings and the automatic scheduled scan launch.
ABOUT ON-DEMAND SCAN
Kaspersky Mobile Security allows to perform a full or partial scan of the device's memory, storage cards, messages and
of the system memory for the presence of malware objects.
The file is scanned for the presence of malware objects. Malicious objects are detected by comparison with the
application databases. The databases contain descriptions of all the malicious objects known to date and methods for
neutralizing them. If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and performs an
action in accordance with the settings.
A scan can be launched manually or according to the schedule.
Information about the results of the on-demand scan is saved to the program log (see section “Program logs” on page
77).
STARTING A SCAN MANUALLY
You can launch a manual scan at any time convenient to you, for example, when the device is not occupied with other
tasks.
In order to start an anti-virus scan manually, perform the following actions:
1. Select Scan in the Anti-Virus tab.
2. In the Scan window (see Figure below) select the device scan scope:
Full scan: scanning the entire memory of the device and the storage cards.
Scan RAM : scanning of the processes running in the system memory and corresponding process files.
Scan messages: scanning of all messages.
Page 24
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
24
Scan folder: selecting and scanning of a certain folder in the device's file system or on the connected
storage card.
When Scan folder item is selected, a window displaying the device’s file system will open. In order navigate
through the file system use the joystick buttons. In order to scan a folder, select the folder you wish to scan
and select Scan from the Options menu.
Figure 11: The Scan tab
Immediately after the scan is started, the scan process window will open in which its current status will be displayed: the
number of scanned objects, the path to the object being scanned at the time and the percentage indicator of the progress
(see Figure below).
Figure 12: The Scan window
When an infected object is detected, an action specified in the Action setting will be performed (see section “Selecting an
action to be performed with objects” on page 27) in the scan settings.
A prompt for an action to be performed with an object (see Figure below) will be displayed by the program only if the Ask user value is assigned to the Action setting.
Page 25
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
25
Figure 13: Message about a virus detected
Once the scan is complete the general statistics about detected and deleted malware objects will be displayed on the
screen.
By default, during the scan the screen backlight goes off in order to save the battery charge. You can turn the backlight
on using the Backlight setting in the Settings menu on the Information tab.
CONFIGURING A SCHEDULED SCAN
Kaspersky Mobile Security allows you to create a schedule for automatic device scan to be performed at a specified time.
The scan is performed in the background mode. When detecting an infected object, an action selected in the Scan
settings will be performed with such object.
By default scheduled scan is disabled.
To configure a scheduled scan, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select Scan schedule in the window that will open.
3. Configure the Auto scan settings:
Daily: perform the scan every day. Specify the Auto scan time in the entry field.
Weekly: perform the scan once a week. Specify the Auto scan day and Auto scan time.
Off: disable the scheduled scan launch.
4. Press Back to save the changes.
Page 26
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
26
Figure 14: Configuring a scheduled scan
SELECTING OBJECTS TO BE SCANNED
The program allows to determine the type of objects to be scanned for the presence of malicious code.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To select objects to be scanned, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Scan in the window that will open.
3. Specify the value for the Objects to be scanned setting:
All files: scan all files.
Executables only: scan only executable program files (for example *.exe, *.sis, *.mdl, *.app).
4. Press OK to save the changes.
Page 27
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
27
Figure 15: Selecting objects to be scanned
SELECTING ACTIONS TO BE PERFORMED WITH OBJECTS
You can configure the application's actions to be performed when the application detects a malicious object.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the program's response, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Scan in the Settings window (see Figure below).
Page 28
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
28
Figure 16: Configuring actions to be performed with objects
3. Using the Action item, select the application's response when it detects a malware object (see Figure below):
Delete: delete detected malware objects without notifying the user.
Ask user: when an infected object is detected, display a notification with a prompt for action.
Log event: skip a malware object and record the information about its detection in the program log.
Try to disinfect – disinfect malware objects. If the disinfection is not possible, perform an action specified in
the If disinfection fails item.
Page 29
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
29
Figure 17: Selecting actions to be performed with objects
4. If you selected Try to disinfect as the application's response, use If disinfection fails (see Figure below) select
an action to be performed by the application when it is impossible to disinfect the infected object:
Delete: delete malware objects without notifying the user.
Quarantine: quarantine objects.
Ask user: prompt the user for action when an infected object is detected.
Log event: record the information about the detection of the infected object in the program log.
Figure 18: Selecting the second action
5. Press OK to save the changes.
CONFIGURING ROM SCAN
ROM contains system files required for loading the device's operating system. You can enable or disable the scan of
ROM.
Page 30
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
30
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To enable the scan the device's ROM, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select the Scan in the Settings window.
3. Select value Yes for the Scan ROM setting.
4. Press Back to save the changes.
To disable the scan the device's ROM, perform the following actions:
1. Select Settings in the Anti-Virus tab.
2. Select the Scan in the Settings window.
3. Select value No for the Scan ROM setting.
4. Press Back to save the changes.
CONFIGURING THE SCAN OF ARCHIVES
You can enable or disable unpacking of archives to scan their content.
Figure 19: Enabling the scan of device's ROM
Page 31
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
31
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To enable unpacking of archives, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select the Scan in the Settings window.
3. Select value Yes for the Unpack archives setting.
4. Press Back to save the changes.
Figure 20: Configuring the scan of archives
MANAGING THE BACKLIGHT
The program allows configuring the use of the backlight while an anti-virus scan is in progress.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the application uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure backlight, perform the following actions (see Figure below):
1. Select the Settings item in the Information tab.
Page 32
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
32
IN THIS SECTION
About Quarantine ............................................................................................................................................................ 32
Restoring objects from Quarantine .................................................................................................................................. 33
Deleting objects from Quarantine .................................................................................................................................... 34
2. Select the required value for the Backlight item in the window that will open:
If you wish the backlight to stay permanently on while an anti-virus scan is in progress, select the Yes value.
If you wish the backlight to automatically go off, select the No value.
3. Press Back to save the changes.
Figure 21: Managing the backlight
QUARANTINE
This section contains information about the Quarantine and managing quarantined infected objects.
ABOUT QUARANTINE
Quarantine is a special storage into which Kaspersky Mobile Security places potentially malicious objects detected during
a scan or by Real-Time Protection.
Quarantined objects are stored in an archived form which rules out their activation and, thus, they do not impose any
threat for the device. Objects can later be deleted or restored by the user.
Page 33
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
33
SEE ALSO
About Quarantine ............................................................................................................................................................ 32
Restoring objects from Quarantine .................................................................................................................................. 34
Deleting objects from Quarantine .................................................................................................................................... 34
VIEWING QUARANTINED OBJECTS
To view the list of quarantined objects,
select Quarantine on the Anti-Virus tab (see Figure below).
Figure22: The Anti-Virus tab
This will open the Quarantine window which contains a list of objects stored in the quarantine (see Figure below).
Figure 23: The Quarantine window
Page 34
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
34
RESTORING OBJECTS FROM QUARANTINE
Select the Quarantine item in the Anti-Virus tab.
1. Select the Quarantine item in the Anti-Virus tab.
2. In the Quarantine window that will open select an object you wish to restore.
3. Select Restore from the Options menu. The object selected will be restored from the quarantine into the
original folder.
Figure 24: Restoring objects from Quarantine
DELETING OBJECTS FROM QUARANTINE
To delete a certain object from the Quarantine, perform the following actions (see Figure below):
1. Select the Quarantine item in the Anti-Virus tab.
2. In the Quarantine window that will open select an object you wish to delete.
3. Select Delete from the Options menu. The selected object will be deleted.
Page 35
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
35
Figure 25: Deleting an object from quarantine
In order to delete all quarantined objects:
1. Select the Quarantine item in the Anti-Virus tab.
2. In the Options menu that will open, select Delete all. All quarantined objects will be deleted.
Page 36
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
36
IN THIS SECTION
About Anti-Spam ............................................................................................................................................................. 36
Creating a Black List........................................................................................................................................................ 37
Creating a White List ....................................................................................................................................................... 41
Response to messages and calls from the phonebook contacts ..................................................................................... 45
Response to messages from non-numeric numbers ....................................................................................................... 45
Selecting an action to be performed with incoming messages ................................................................ ........................ 47
Selecting an action to be performed with incoming calls ................................................................................................. 48
ANTI-SPAM
This section contains information about the Anti-Spam component as well as the description of how to compile the Black
and White Lists, configure Anti-Spam modes and other Anti-Spam settings.
ABOUT ANTI-SPAM
Anti-Spam component allows to protect device against receiving unwanted messages and calls. Such protection is based
on filtering incoming SMS messages and calls using the Black and the White Lists. These lists contain phone and/or
sample phrases characteristic of spam or non-spam SMS messages.
If at least one match of a phone number or a phrase from the White List is detected, no further check will be performed
and the call or the message will be received by the device. An SMS message or a call from a phone number found in the
Black List or an SMS message containing a text found in the Black List will be blocked.
Information about blocked SMS messages and calls is registered in the Log (see section “Program logs” on page 77).
ANTI-SPAM MODES
An Anti-Spam mode is a set of parameters on which protection of your device against spam messages and unwanted
calls is based.
The following Anti-Spam modes are provided:
Both lists - filtering of incoming SMS messages and calls using the Black and the White Lists. Once an SMS
message or a call is received from a phone number not found in either of the lists, Anti-Spam will notify you and
will suggest to block or allow receipt of such SMS message or a call and to add this phone number to the White
or the Black List. This level is set by default.
Black List – blocking of SMS messages and calls matching entries in the Black List. All other SMS messages
and calls will be passed through.
White List – passing through SMS messages and calls matching entries in the White List. All other SMS
messages and calls will be blocked.
Disable – no filtering of SMS messages and calls will be performed.
Page 37
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
37
IN THIS SECTION
Adding a new entry .......................................................................................................................................................... 38
Editing an existing entry .................................................................................................................................................. 39
Deleting an individual entry ............................................................................................................................................. 40
Deleting all entries ........................................................................................................................................................... 40
To select an Anti-Spam mode, perform the following actions (see Figure below):
1. Open the Anti-Spam tab.
2. Select Settings and then - Anti-Spam from the menu.
3. In the window that will open, select the required mode and press OK to save the changes and close the window.
CREATING A BLACK LIST
This list contains entries with phone numbers, SMS and calls from which will be blocked by Anti-Spam and the text which,
if found in an SMS message received, will cause such message to be blocked.
Information about blocked SMS messages and calls will be registered in the Log (see section “Program logs” on page
77).
Figure 26: Selecting an Anti-Spam mode
Page 38
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
38
ADDING A NEW ENTRY
To add an entry to the Anti-Spam Black List, perform the following actions (see Figure below):
1. Select Black List in the Anti-Spam tab.
2. Select Add entry from the Options menu.
3. Set the following settings in the window that will open:
Message type - action to be performed with a message and/or call:
SMS only: block incoming SMS messages only.
Calls only: block incoming calls only.
SMS and calls: block incoming calls and SMS messages.
Phone number – phone number for which the receipt of SMS message and/or calls will be blocked. The
number should only be comprised of alphanumeric characters; it may begin with a digit, a letter, or be
preceded with the "+" symbol. Additionally when entering a number, you can use masks "?" and "*" (where
“*”represents a sequence of characters and “?” - any one character).
Text - text upon detection of which in the SMS message received, such message will be blocked. This
setting is accessible only if value SMS only is selected.
4. Press Back to save the changes.
Figure 27: Adding a new entry
Page 39
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
39
EDITING AN EXISTING ENTRY
To edit settings of an existing entry, perform the following actions (see Figure below):
1. Select Black List in the Anti-Spam tab.
2. Select Edit entry from the Options menu.
3. Set the following entry settings in the window that will open:
Message type - an action to be performed with a message and/or call:
SMS only: block incoming SMS messages only.
Calls only: block incoming calls only.
SMS and calls: block incoming calls and SMS messages.
Phone number – phone number for which the receipt of SMS message and/or calls will be blocked. The
number should only be comprised of alphanumeric characters; it may begin with a digit, a letter, or be
preceded with the "+" symbol. Additionally when entering a number, you can use masks "?" and "*" (where
“*” represents a sequence of characters and “?” - any one character).
Text - text upon detection of which in the SMS message received, such message will be blocked. This
setting is accessible only if value SMS only is selected.
4. Press Back to save the changes.
Figure 28: Editing an existing entry
Page 40
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
40
DELETING AN INDIVIDUAL ENTRY
To delete an individual entry from the Black List, perform the following actions (see Figure below):
1. Select Black List in the Anti-Spam tab.
2. Select an entry in the list which you wish to delete.
3. Select Delete entry from the Options menu.
Figure 29: Deleting an individual entry
DELETING ALL ENTRIES
To delete all entries, perform the following actions (see Figure below):
1. Select Black List from the menu in the Anti-Spam tab.
2. Select Delete all from the Options menu.
Page 41
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
41
IN THIS SECTION
Adding a new entry .......................................................................................................................................................... 41
Editing an existing entry .................................................................................................................................................. 42
Deleting an individual entry ............................................................................................................................................. 43
Deleting all entries ........................................................................................................................................................... 44
Figure 30: Deleting all entries
CREATING A WHITE LIST
The White List contains entries with phone numbers, SMS and calls from which will be passed through by Anti-Spam
and text upon detection of which in a received SMS message it will be passed through.
ADDING A NEW ENTRY
To add an entry to the Anti-Spam White List, perform the following actions (see Figure below):
1. Select White List in the Anti-Spam tab.
2. Select Add entry from the Options menu.
3. Set the following new entry settings in the window that will open:
Message type - action to be performed with a message and/or call:
Page 42
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
42
SMS only: allow incoming SMS messages only.
Calls only: allow incoming calls only.
SMS and calls: allow incoming calls and SMS messages.
Phone number – phone number for which the receipt of SMS message and/or calls will be allowed. The
number should only be comprised of alphanumeric characters; it may begin with a digit, a letter, or be
preceded with the "+" symbol. Additionally when entering a number, you can use masks "?" and "*" (where
“*” represents a sequence of characters and “?” - any one character).
Text - text upon detection of which in the SMS message received, such message will be passed through.
This setting is accessible only if value SMS only is selected.
4. Press Back to save the changes.
EDITING AN EXISTING ENTRY
To edit settings of an existing entry, perform the following actions (see Figure below):
1. Select White List in the Anti-Spam tab.
2. Select Edit entry from the Options menu.
3. Set the following entry settings in the window that will open:
Message type - action to be performed with a message and/or call:
SMS only: allow incoming SMS messages only.
Figure 31: Adding a new entry
Page 43
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
43
Calls only: allow incoming calls only.
SMS and calls: allow incoming calls and SMS messages.
Phone number – phone number for which the receipt of SMS message and/or calls will be allowed. The
number should only be comprised of alphanumeric characters; it may begin with a digit, a letter, or be
preceded with the "+" symbol. Additionally when entering a number, you can use masks "?" and "*" (where
“*” represents a sequence of characters and “?” - any one character).
Text - text upon detection of which in the SMS message received, such message will be passed through.
This setting is accessible only if value SMS only is selected.
4. Press Back to save the changes.
Figure 32: Editing an existing entry
DELETING AN INDIVIDUAL ENTRY
To delete an individual entry from the Black List, perform the following actions (see Figure below):
1. Select White List from the menu in the Anti-Spam tab.
2. Select an entry in the list which you wish to delete.
3. Select Delete entry from the Options menu.
Page 44
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
44
Figure 33: Deleting an individual entry
DELETING ALL ENTRIES
To delete all entries, perform the following actions (see Figure below):
1. Select White List from the menu in the Anti-Spam tab.
2. Select Delete all from the Options menu.
Figure 34: Deleting all entries
Page 45
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
45
RESPONSE TO MESSAGES AND CALLS FROM THE PHONEBOOK
CONTACTS
You can configure Anti-Spam response to SMS messages and calls from numbers found in the phone book irrespective
of the settings of the Black and White Lists.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the Anti-Spam response, perform the following actions (see Figure below):
1. Select Settings in the Anti-Spam tab.
2. Using the window that will open, select the value for setting Allow contacts:
If you wish Anti-Spam to allow receipt of SMS messages and calls from numbers found in the phonebook,
select value Yes.
If you wish Anti-Spam to perform filtering based on whether the phone number is found in the White or
Black List, select value No.
3. Press Back to save the changes.
Figure 35: Allowing contacts from the phonebook
RESPONSE TO MESSAGES FROM NON-NUMERIC NUMBERS
You can configure the program's response when SMS messages are received from non-numeric numbers (which
includes only letters).
Page 46
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
46
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the Anti-Spam response, perform the following actions (see Figure below):
1. Select Settings in the Anti-Spam tab.
2. Using the window that will open, select the value for setting Block non-numeric:
To enable automatic deletion of messages from non-numeric numbers, select Yes.
If you wish Anti-Spam to operate based on whether the phone number is found in the White or Black List,
select value No.
3. Press Back to save the changes.
Figure 36:Blocking messages and calls from non-numeric numbers
Page 47
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
47
SELECTING AN ACTION TO BE PERFORMED WITH INCOMING
MESSAGES
Anti-Spam suggests that you configure its response to SMS messages from phone numbers not found in either the Black
or the White List. Such messages will be intercepted by Anti-Spam if the mode Both lists is set (see section “Anti-Spam
modes” on page 36), and a notification will be displayed on the device's screen (see Figure below).
Figure 37: Anti-Spam warning
Using the Options menu items you can select one of the following actions to be performed with the message:
Add to White List – allow receipt of messages and add the sender's phone number to the White List.
Add to Black List – block messages and add the sender's phone number to the Black List.
Skip – allow the receipt of the message. In this case the sender's phone number will not be added to either of
the lists.
Information about blocked messages is saved to the program log (see section “Program logs” on page 77).
Page 48
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
48
IN THIS SECTION
About Parental control ..................................................................................................................................................... 49
Parental control modes .................................................................................................................................................... 49
Creating a Black List........................................................................................................................................................ 50
Creating a White List ....................................................................................................................................................... 54
SELECTING AN ACTION TO BE PERFORMED WITH INCOMING CALLS
Anti-Spam suggests that you configure its response to calls from phone numbers not found in either the Black or the
White List. After the call is complete, a notification will be displayed on the device's screen (see Figure below).
Figure 38: Selecting actions to be performed with incoming calls
Using the Options menu items, you can select one of the following actions for the number from which the call was
received:
Add to White List - add the caller's phone number to the White List.
Add to Black List - add the caller's phone number to the Black List.
Skip – do not add the caller's number to either list.
Information about the blocked calls is saved to the program log (see section “Program logs” on page 77).
PARENTAL CONTROL
This section contains information about the Parental control component as well as the description of how to compile the
Black and White Lists, configure the component modes and other settings.
Page 49
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
49
ABOUT PARENTAL CONTROL
The operation of the Parental control component is based on filtering of outgoing SMS messages and calls using the
Black and the White Lists.
If at least one match is detected, the scan will be stopped. SMS messages and calls matching any entry in the Black List
will be blocked and message and calls matching an entry in the White List will be allowed.
Parental control blocks SMS messages sent only using standard tools of the device.
When you access Parental control for the first time, you should set up a secret code (on page 16) (if it was not set up
earlier). The secret code is used to prevent unauthorized access to the Parental control settings. The code will also be
used to access the settings of the Encryption and Anti-Theft components.
Information about the component's operation will be saved to the program log (see section “Program logs” on page 77).
PARENTAL CONTROL MODES
A Parental control mode is a set of parameters on which protection of your device against spam messages and unwanted
calls is based.
The following modes of Parental control are provided:
Black List – blocking of SMS messages and/or calls only to numbers matching entries in the Black List. All
other messages will be allowed.
White List – allowing of SMS messages and/or calls only to numbers matching entries in the White List. All
other messages will be blocked.
Off – Parental control is turned off. No filtering of SMS messages and calls will be performed.
To select the Parental control mode, perform the following actions (see Figure below):
1. Select the Parental control tab.
2. Select Settings and then - Parental control from the menu.
3. Select the mode you require and press OK to save changes.
Page 50
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
50
IN THIS SECTION
Adding a new entry .......................................................................................................................................................... 50
Editing an existing entry .................................................................................................................................................. 51
Deleting an individual entry ............................................................................................................................................. 52
Deleting all entries ........................................................................................................................................................... 53
Figure 39: Modes of Parental control
CREATING A BLACK LIST
The Black List contains entries with phone numbers, SMS and calls to which will be blocked by Parental control.
Information about blocked SMS messages and calls will be saved in the Log section (see section “Program logs” on
page 77).
ADDING A NEW ENTRY
To add an entry to the Parental control Black List, perform the following actions (see Figure below):
1. Select Black List in the Parental control tab.
2. Select Add entry from the Options menu.
3. Set the following new entry settings in the window that will open:
Message type - action to be performed with a message and/or call:
Page 51
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
51
SMS only: block outgoing SMS messages only.
Calls only: block outgoing calls only.
SMS and calls: block outgoing calls and SMS messages.
Phone number - phone number SMS message and/or outgoing calls to which will be blocked. This number
may begin with a digit or with a "+" and must contain digits. Additionally when entering a number, you can
use masks "?" and "*" (where “*” represents a sequence of characters and “?” - any one character).
4. Press Back to save the changes.
Figure 40: Adding a new entry
EDITING AN EXISTING ENTRY
To edit settings of an existing entry, perform the following actions (see Figure below):
1. Select Black List from the menu in the Parental control tab.
2. Select Edit entry from the Options menu.
3. Set the following entry settings in the window that will open:
Message type - action to be performed with a message and/or cal:
SMS only: block outgoing SMS messages only.
Calls only: block outgoing calls only.
SMS and calls: block outgoing calls and SMS messages.
Page 52
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
52
Phone number - phone number SMS message and/or outgoing calls to which will be blocked. This number
may begin with a digit or with a "+" and must contain digits. Additionally when entering a number, you can
use masks "?" and "*" (where “*” represents a sequence of characters and “?” - any one character).
4. Press Back to save the changes.
Figure 41: Editing an existing entry
DELETING AN INDIVIDUAL ENTRY
In order to delete an individual entry from the Black List:
1. Select Black List from the menu in the Parental control tab.
2. Select an entry you wish to delete.
3. Select Delete entry from the Options menu.
Page 53
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
53
Figure 42: Deleting an individual entry
DELETING ALL ENTRIES
To delete all entries, perform the following actions (see Figure below):
1. Select Black List from the menu in the Parental control tab.
2. Select Delete all from the Options menu.
Page 54
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
54
IN THIS SECTION
Adding a new entry .......................................................................................................................................................... 54
Editing an existing entry .................................................................................................................................................. 55
Deleting an individual entry ............................................................................................................................................. 56
Deleting all entries ........................................................................................................................................................... 57
Figure 43: Deleting all entries
CREATING A WHITE LIST
The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control.
ADDING A NEW ENTRY
To add an entry to the Parental control White List, perform the following actions (see Figure below):
1. Select White List in the Parental control tab.
2. Select Add entry from the Options menu.
3. Set the following new record settings in the window that will open:
Message type - action to be performed with a message and/or call:
SMS only: allow outgoing SMS messages only.
Calls only: allow outgoing calls only.
Page 55
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
55
SMS and calls: allow outgoing calls and SMS messages.
Phone number - phone number SMS message and/or outgoing calls to which will be allowed. This number
may begin with a digit or with a "+" and must contain digits. Additionally when entering a number, you can
use masks "?" and "*" (where “*” represents a sequence of characters and “?” - any one character).
4. Press Back to save the changes.
Figure 44: Adding a new entry
EDITING AN EXISTING ENTRY
To edit settings of an existing entry, perform the following actions (see Figure below):
1. Select White List from the menu in the Parental control tab.
2. Select Add entry from the Options menu.
3. Set the following entry settings in the window that will open:
Message type - action to be performed with a message and/or call:
SMS only: allow outgoing SMS messages only.
Calls only: allow outgoing calls only.
SMS and calls: allow outgoing calls and SMS messages.
Phone number - phone number SMS message and/or outgoing calls to which will be allowed. This number
may begin with a digit or with a "+" and must contain digits. Additionally when entering a number, you can
use masks "?" and "*" (where “*” represents a sequence of characters and “?” - any one character).
4. Press Back to save the changes.
Page 56
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
56
Figure 45: Editing an existing entry
DELETING AN INDIVIDUAL ENTRY
To delete an individual entry from the White List, perform the following actions (see Figure below):
1. Select White List from the menu in the Parental control tab.
2. Select an entry you wish to delete.
3. Select Delete entry from the Options menu.
Page 57
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
57
Figure 46: Deleting an individual entry
DELETING ALL ENTRIES
To delete all entries, perform the following actions (see Figure below):
1. Select White List from the menu in the Parental control tab.
2. Select Detele all from the Options menu.
Figure 47: Deleting all entries
Page 58
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
58
IN THIS SECTION
About Anti-Theft .............................................................................................................................................................. 58
The SMS-Block function .................................................................................................................................................. 58
Blocking the device.......................................................................................................................................................... 59
The SMS-Clean function ................................................................................................................................................. 60
Deleting personal data..................................................................................................................................................... 61
The SIM-Watch function .................................................................................................................................................. 62
The SMS-Find function .................................................................................................................................................... 63
Determining the device location ...................................................................................................................................... 64
The Stealth SMS function ................................................................................................................................................ 65
ANTI-THEFT
This section contains information about the Anti-Theft component designed to protect information stored on the device in
case the device is lost.
ABOUT ANTI-THEFT
The Anti-Theftcomponent is designed to ensure protection of data stored on the mobile device against unauthorized
access to it in case the device was lost or stolen.
This component includes the following functions:
SMS-Block allows blocking the device at the user's discretion.
SMS-Clean allows to erase user's personal data (all contacts, messages, gallery, calendar, log, network
connection settings), data from the storage card and files from folder C:\Data.
SIM-Watch allows to send to the specified phone number and/or to e-mail address the new phone number and
to block the stolen device if the SIM card was replaced or the device was turned on without it.
SMS-Find allows to determine the geographical coordinates of the device and to send them to the requesting
devices or to a certain e-mail address using an SMS message. This function only works with devices with in-built
GPS receiver.
Stealth SMS allows to erase personal data from the device, block it and obtain its geographical coordinates
using a special SMS message.
When you access Anti-Theft for the first time, you should set up a secret code (on page 16) (if it was not set up earlier).
The secret code is used to prevent unauthorized access to the Anti-Theft settings. This code will also be used to access
the settings of the Parental control and Encryption components and for creating a Slealth SMS.
Information about the component's operation will be saved to the program log (see section “Program logs” on page 77).
THE SMS-BLOCK FUNCTION
The SMS-Block function allows blocking the device if it is required. You can unblock the device only after you enter the
secret code.
Page 59
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
59
To enable the SMS-Block function, perform the following actions (see Figure below):
1. Select Settings on the Anti-Theft tab.
2. Select SMS-Block in the window that will open.
3. Using the Change item in the Options menu, set value On.
4. Press Back to save the changes.
Figure 48: Enabling the SMS-Block function
BLOCKING THE DEVICE
You can block the device with the SMS-Block function using the following methods:
by using the Stealth SMS function on another device with Kaspersky Mobile Security installed;
by using the standard SMS feature on your phone.
To create an SMS message using Slealth SMS, perform the following actions (see Figure below).
1. Select Stealth SMS in the Anti-Theft tab.
2. Select SMS-Block and press Next.
3. Enter the phone number of the device you wish to block. Press Next.
4. Enter the secret code and press Send.
Page 60
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
60
Figure 49: Blocking the device
To create an SMS message using your phone's standard functions for creating SMS messages:
send to the device you need to block an SMS message containing text block:<code> (where <code> is
secret code set on the device to be blocked). The message is not case sensitive and spaces before or after the
colon do not matter.
THE SMS-CLEAN FUNCTION
The SMS-Clean function allows to erase user's personal data (all contacts, messages, gallery, calendar, log, network
connection settings), data from the storage card and files from folder C:\Data once the device receives a special SMS
message.
To configure the operation of the SMS-Clean function, perform the following actions (see Figure below):
1. Select Settings on the Anti-Theft tab.
2. In the window that will open select SMS-Clean.
3. In the window that will open select data to be erased once the device receives a special SMS message.
If you wish personal data to be deleted, select Delete data and set value to Yes.
Contacts will be deleted from the phonebook stored on the device and on the SIM card.
Page 61
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
61
If you wish personal files (from folder C:\Data) to be deleted, select Delete data and set value to Yes.
To erase data from all installed storage cards, select Delete card files and set the value to Yes.
4. Press OK to save the changes.
Figure 50: Configuring the SMS-Clean function
DELETING PERSONAL DATA
You can delete personal data from the device with the SMS-Clean function enabled using the following methods:
by using the Stealth SMS function on another device with Kaspersky Mobile Security installed;
by using your phone's standard functions for creating SMS messages.
To create an SMS message using Slealth SMS, perform the following actions (see Figure below).
1. Select Stealth SMS in the Anti-Theft tab.
2. Select SMS-Clean and press Next.
3. Enter the phone number of the device on which data must be deleted. Press Next.
4. Enter the secret code entered on the device receiving the message and press Send.
Page 62
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
62
Figure 51: Deleting personal data
To create an SMS message using your phone's standard functions for creating SMS messages:
send to the device you need to block an SMS message containing text clean:<code> (where <code> is
secret code set on the receiving device. The message is not case sensitive and spaces before or after the colon
do not matter.
THE SIM-WATCH FUNCTION
SIM-Watch allows to send to the specified phone number and/or to e-mail address a new phone number and to block the
stolen device if the SIM card was replaced in such stolen or lost device.
By default the SIM-Watch function is disabled.
To configure the operation of the SIM-Watch function, perform the following actions (see Figure below):
1. Select Settings on the Anti-Theft tab.
2. Select SIM-Watch in the window that will open.
3. In the menu that will open (see Figure below) configure the settings to monitor the replacement of the SIM card
on the device.
In the Phone number field, enter the phone number to which a message from the new phone number will
be sent in case the SIM card is replaced in your device. Such number may begin with a digit or with a "+"
and must contain digits only.
Page 63
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
63
Using the E-mail address field enter the e-mail address on which you wish to receive an e-mail message
about the new phone number.
In order to block the device once the SIM card is replaced or the device is turned on without it, set the value
for the Block device item to Yes. You can unblock the device by entering the secret code. By default
blocking of the device is disabled.
4. Press OK to save the changes you have made.
Figure 52: Configuring the SIM-Watch function
THE SMS-FIND FUNCTION
The SMS-Find function allows to determine the geographical coordinates of the device and to send them to the
requesting devices and to a certain e-mail address using an SMS message.
This function only works with devices with in-built GPS receiver. If necessary the receiver will be activated automatically.
You can receive the coordinates only if the device is within the area reached by satellites. If the satellites are nor
available at the moment of the inquiry, periodic attempts to find the satellites will be made until the device is restarted.
To enable the SMS-Find function, perform the following actions (see Figure below):
1. Select Settings on the Anti-Theft tab.
2. In the window that will open select SMS-Find.
3. In the window that will open, specify the e-mail address (the E-mail address setting) if you wish to receive the
device's coordinates by e-mail, in addition to the SMS message, and press OK.
4. Select Yes in the window that will open.
Page 64
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
64
Figure 53: Configuring the SMS-Find function
DETERMINING THE DEVICE LOCATION
You can receive the coordinates of the device with the SMS-Find function enabled using the following methods:
by using the Stealth SMS function on another device with Kaspersky Mobile Security installed;
by using your phone's standard functions for creating SMS messages.
To create an SMS message using Slealth SMS, perform the following actions (see Figure below):
1. Select Stealth SMS in the Anti-Theft tab.
2. Select SMS-Find and press Next.
3. Enter the phone number of the device data on which must be deleted. Press Next.
4. Enter the secret code entered on the device receiving the message and press Send.
Page 65
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
65
Figure 54:Determining the location of the device
To create an SMS message the standard SMS feature on your phone:
send to the device you need to block an SMS message containing text find:<code> (where <code> is secret
code set on the receiving device. The message is not case sensitive and spaces before or after the colon do not
matter.
An SMS message with the device's coordinates will be sent to the phone number from which the request for coordinates
was received and to the e-mail address if it was specified in the function's settings (see section “The SMS-Find Function”
on page 63).
THE STEALTH SMS FUNCTION
The Stealth SMS function allows creating a special SMS message to block the device, erase personal data or receive
coordinates and sending it to the lost device.
To create a Stealth SMS, perform the following actions (see Figure below):
1. Select Stealth SMS in the Anti-Theft tab.
2. Select the required function:
SMS-Block (see section “The SMS-Block function” on page 58).
Page 66
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
66
SMS-Clean (see section "The SMS-Clean function” on page 60).
SMS-Find (see section “The SMS-Find function” on page 63).
The function being used must be enabled on the receiving device.
Press Next.
3. Enter the number of the device to which the message will be sent. Press Next.
4. Enter secret code specified on the receiving SMS device and press Send.
Figure 55: Configuring the Stealth SMS function
Page 67
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
67
IN THIS SECTION
About Firewall .................................................................................................................................................................. 67
Configuring notifications about connection attempts ....................................................................................................... 68
FIREWALL
This section contains information about the Firewall component which monitors the network activity of the device and
protection of the device on the network level.
ABOUT FIREWALL
Firewall allows the user to determine which of the network connections will be allowed and which connections will be
blocked.
Information about the Firewall's operation will be saved to the program log (see section “Program logs” on page 77).
SELECTING FIREWALL SECURITY LEVEL
Operation of the Firewall component is based on the security levels. The security level set will determine which network
protocols will be allowed to be used to transfer information and which of them will be blocked.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the application uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To select the Firewall security level, perform the following actions (see Figure below):
1. Select Settings on the Firewall tab.
2. Select the Firewall. In the window that will open select the required security level:
High: block any network activity except updating of database and renewing the license.
Medium: block all incoming connections, outgoing connections can only be established using SSH, HTTP,
HTTPS, IMAP, SMTP, POP3 ports.
Low: block only incoming connections.
Off: allow any network activity.
3. Select Back to save changes and return to the Settings window.
Page 68
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
68
Figure 56: Configuring the Firewall security level
CONFIGURING NOTIFICATIONS ABOUT CONNECTION ATTEMPTS
You can configure the display of user notifications about connection attempts blocked at the selected Firewall
security level;
1. Select Settings on the Firewall tab.
2. Set value On for the Notifications setting.
Figure 57: Configuring notifications about connection attempts
Page 69
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
69
IN THIS SECTION
About Encryption ............................................................................................................................................................. 69
Data encryption ............................................................................................................................................................... 69
Data decryption ............................................................................................................................................................... 70
Information about encrypted data .................................................................................................................................... 71
Blocking access to encrypted data .................................................................................................................................. 72
ENCRYPTION
This section contains information about the component that ensures data protection on the device using encryption.
ABOUT ENCRYPTION
Encryption is designed to protect data in a certain folder against being viewed by unauthorized persons even if they have
access to the device.
When you access Encryption for the first time you will have to set up a secret code (if it has not been set up earlier). The
secret code is used to prevent unauthorized access to the Encryption settings and to the encrypted data. The code can
also be used to access the Anti-Theft and Parental control settings.
The data in the folder will be encrypted once command Encrypt is executed and then data will be encrypted and
decrypted "on the fly" at the moment there data is placed into the folder, extracted from it or accessed.
Information about the component's work will be entered into the program log (see section “Program logs” on page 77).
DATA ENCRYPTION
Using the Encryption component you can encrypt any non-system folder residing in the device memory or on the memory
expansion card.
To protect a folder on the device using encryption, perform the following actions (see Figure below):
1. Select Encrypt on the Encryption tab.
2. In the window that will open select a folder that you wish to encrypt.
In order to move around the file system use the stylus or joystick buttons of your device: Up, Down – to move
within the selected folder, Left, Right – to move one level up or down from the current folder.
To start the process of encryption of the selected folder, use Encrypt in the Options menu.
Page 70
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
70
Figure 58: Data encryption
The data in the folder will be encrypted once the command is executed and then data will be encrypted and decrypted
"on the fly" at the moment there data is placed into the folder, extracted from it or accessed.
You can encrypt only one folder using the Encryption function. If you wish to encrypt another folder, you have to decrypt
the current encrypted folder. After encryption, the Encrypt item will turn into Decrypt and using it you can decrypt the
encrypted data (see section “Data decryption” on page70).
DATA DECRYPTION
You can completely decrypt data which was previously encrypted (see section “Data encryption” on page69).
For full dencryption of the folder encrypted earlier,
select Decrypt on the Encryption tab (see Figure below).
Page 71
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
71
Figure 59: Data decryption
After decryption, the Decrypt item will turn into Encrypt and you can use it again to encrypt data (see section “Data
encryption” on page 69).
INFORMATION ABOUT ENCRYPTED DATA
If encryption is enabled, you can check which folder is currently encrypted.
In order to view which folder is currently encrypted, perform the following actions (see Figure below):
1. Open the Encryption tab.
2. Select Information. The path to the encrypted folder will be displayed.
Figure 60: Information about encrypted data
Page 72
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
72
BLOCKING ACCESS TO ENCRYPTED DATA
You can block access to encrypted data instantly or with a delay. After this you will have to enter your secret code to
access the encrypted data.
To ensure data protection when the device is switched into the sleep mode, you can configure automatic blocking of data
access.
The Block access setting determines the device's idle time after the backlight is turned off and the device is switched to
the sleep mode, after which you will need to enter the secret code to access the encrypted data.
By default the access is blocked immediately after the backlight is turned off (value No delay is selected).
To enable delayed blocking, perform the following actions (see Figure below):
1. Select Settings on the Encryption tab.
2. Select Block access in the window that will open.
3. Set up the time you wish: 1 minute, 5 minutes, 15 minutes or 1 hour.
4. Press OK to save changes.
You can also instantly block access to the encrypted data and enable the prompt for the secret code.
For instant access blocking,
press buttons 0 and 1 at the same time.
Figure 61: Blocking access to encrypted data
Page 73
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
73
IN THIS SECTION
About program bases update .......................................................................................................................................... 73
Viewing bases information ............................................................................................................................................... 73
Updating while roaming ................................................................................................................................................... 75
This section contains information about the Update component. Regular bases update is necessary to ensure reliable
operation of Kaspersky Mobile Security.
ABOUT PROGRAM BASES UPDATE
The search for malware programs is performed based on the program bases records which contain description of all
currently known malware programs and methods for their treatment as well as description of other unwanted objects. It is
extremely important to keep your bases up-to-date.
You can update bases manually or according to a schedule. Updates are performed from Kaspersky Lab's update
servers via Internet, this requires an Internet connection.
To view detailed information about bases currently used select Databases info on the Information tab.
Information about the bases updates will be saved to the program log (see section “Program logs” on page 77).
VIEWING BASES INFORMATION
In order to view information about the installed bases (see Figure below),
select Databases info on the Information tab.
Figure 62: The Information tab
Page 74
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
74
MANUAL UPDATING
You can start the updating process manually at any time convenient to you.
To start a manual update of anti-virus bases,
select Update on the Anti-Virus tab (see Figure below). The program will start the bases updating from the server
using the connection selected during the activation of the program. If necessary you can change the access point in
the update settings (see section “Configuring connection settings” on page 76).
Figure 63: Manual update
SCHEDULED UPDATING
Timely updates are a prerequisite of the effective device protection against malware objects. For your convenience you
can configure automatic updates of bases at any time convenient to you.
To configure a schedule to automatic program bases update, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. In the window that will open select Update schedule and configure the settings of Auto update.
Off: do not perform scheduled updates.
Daily: perform updates every day. Specify the update time in the corresponding field.
Weekly: perform the update once a week. Specify the update date and time in the corresponding fields.
3. Select Back to save changes and return to the Settings window.
Page 75
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
75
Figure 64: Configuring scheduled updates
You can also configure the automatic update settings when your phone is in the roaming mode (see section “Updating
while roaming” on page 75).
UPDATING WHILE ROAMING
You can configure automatic disabling of scheduled updating while your phone is in roaming mode. Manual updating will
be available in the regular mode.
For automatic disabling of the scheduled updates while your phone is in roaming, perform the following actions (see
Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Update schedule in the window that will open.
3. Select value No for setting Allow in roaming.
4. Select Back to save changes and return to the Settings window.
Page 76
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
76
Figure 65: Configuring updates in roaming
CONFIGURING CONNECTION SETTINGS
To configure the connection settings, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Update in the window that will open.
3. Select the access point (Access point setting) which will be used to connect to the update server.
The access point will be configured using settings specified by the provider.
By default updates are performed from Kaspersky Lab's update server:
http://ftp.kaspersky.com/index/mobile.xml.
4. Press OK to save the changes.
Page 77
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
77
IN THIS SECTION
About logs ....................................................................................................................................................................... 77
Viewing Log records ........................................................................................................................................................ 78
Deleting Log records ....................................................................................................................................................... 78
Figure 66: Configuring connection settings
After the update is complete, the connection open for the update will automatically close. If the connection had been
established before the update was started, it will be used for further operation.
PROGRAM LOGS
This section contains information about the logs and managing of the information they contain.
ABOUT LOGS
Logs store records about events that occurred during Kaspersky Mobile Security operation sorted by the time of the
record starting with newest entries first.
Page 78
K A S P E R S K Y M OBI L E S E C U R I T Y 8 . 0
78
VIEWING LOG RECORDS
To view all records stored in the Log, perform the following actions:
1. Select the corresponding item in the Log menu on the tab of the component information about operation of
which you wish to obtain (for example, Log item on the Anti-Virus tab).
2. Use joystick buttons to navigate through the Log. Up, Down – to move through the messages of the selected
component, Left, Right – to switch to the messages of other components.
To view more detailed information about a record in the log,
select a message and use the Details item from the Options menu.
DELETING LOG RECORDS
To delete all messages from the Log:
1. Select the Log item from the menu on the tab of any component (for example, the Log item on the Anti-Virus
tab).
2. Select the Clear Log item from the Options menu. All records from the Log for every component will be deleted.
DISPLAYING THE STATUS WINDOW
You can enable or disable the display of the status window at the application startup.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure the display of the status window, perform the following actions (see Figure below):
1. Select the Settings item in the Information tab.
2. Select the required value for the Show status screen item in the window that will open:
To display the status window at the program startup, select Yes.
If you do not want the status window to be displayed, select the No value.
3. Press Back to save the changes.
Page 79
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
79
Figure 67: Configuring the status window display
MANAGING SOUND NOTIFICATION
You can configure the use of the sound notification in case of certain events (detection of an infected object, message
about an application status, etc.) By default the playback of the sound signal in case of a virus detection depends on the
device profile (the setting’s valueProfile dependent).
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to
restore the recommended values after you modified the settings, open the Settings window and select Restore from the
Options menu.
To configure sound notification, perform the following actions (see Figure below):
1. Select the Settings item in the Information tab.
2. Select Sound in the window that will open.
3. Set the required value:
If you wish the sound notification to be performed irrespective of the selected device profile, set the value to
Enabled.
If you wish the playback of the sound signal in case of a virus detection to depend on the device profile set
the value to Profile dependent.
To disable the sound notification, set the value to Disabled.
4. Select OK to save the changes.
Page 80
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
80
IN THIS SECTION
Viewing the license information ....................................................................................................................................... 80
Renewing the license ...................................................................................................................................................... 81
Figure 68: Managing sound notification
MANAGING THE LICENSE
Kaspersky Mobile Security allows viewing information about the current license and renew it if necessary.
VIEWING THE LICENSE INFORMATION
To view information about the license, perform the following actions (see Figure below):
1. Select About license on the Information tab.
2. Select License in the window that will open.
Page 81
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
81
Figure 69: Viewing the license information
RENEWING THE LICENSE
To renew your license, perform the following actions (see Figure below):
1. Select About license on the Information tab.
2. Select Renew in the window that will open.
The code entry window will open on the smartphone's screen.
3. Enter the code into the four fields. The activation code consists of Latin alphabet characters and digits (the code
is case-insensitive). After you have entered the activation code, select Activate in the Options menu.
4. When you request an access point, select the connection type to be used to connect to the server.
The program will send an http query to Kaspersky Lab's activation server and will then download and install the
key.
Page 82
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
82
Figure 70: Renewing the license
If the activation code you entered appears invalid for any reason, a corresponding message will be displayed on your
smartphone's screen.
If the key installation is successful, information about the license will be displayed on the screen. To proceed using the
program press OK.
UNINSTALLING THE PROGRAM
In order to uninstall Kaspersky Mobile Security, perform the following actions:
1. Make sure that there are no encrypted data (see section “Data enctryption” on page 69).
2. Close Kaspersky Mobile Security. To do this:
a. Press and hold the Menu button.
b. Select KMS 8.0 in the list of running programs.
Page 83
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
83
c. Select Exit from the Options menu (see Figure below).
Figure 71: Exiting the program.
3. Uninstall Kaspersky Mobile Security
a. Open the device’s main menu.
b. Switch to the Tools menu and select App. mgr. (see Figure below).
Figure 72: Starting the Application manager
Page 84
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
84
c. Select KMS 8 in the list of programs and press the Options button (see Figure below).
Figure 73: Selecting the application
d. Select the Remove menu item(see Figure below).
Figure 74: Uninstalling the application
e. Press the Yes button in the prompt to confirm the program removal.
f. If you are prompted to enter the secret code, enter it.
Page 85
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
85
g. If you wish to save the program settings, quarantined objects or Anti-Spam lists, check the corresponding
fields next to the required settings (see Figure below).
Figure 75: The list of settings to be saved
h. Restart the phone to complete the program removal process.
Page 86
86
IN THIS SECTION
Installing Kaspersky Mobile Security ............................................................................................................................... 86
Getting started ................................................................................................................................................................. 87
Parental control ............................................................................................................................................................. 118
Updating program bases ............................................................................................................................................... 141
Program logs ................................................................................................................................................................. 144
Managing the license..................................................................................................................................................... 146
Uninstalling the program ................................................................................................................................................ 148
KASPERSKY MOBILE SECURITY FOR
MICROSOFT WINDOWS MOBILE
This section contains description of the operation of Kaspersky Mobile Security for mobile devices running one of the
following operating systems:
Microsoft Windows Mobile 5.0.
Microsoft Windows Mobile 6.0, 6.1.
INSTALLING KASPERSKY MOBILE SECURITY
In order to install Kaspersky Mobile Security, perform the following steps:
1. Copy the cab archive with program installation package to your mobile device. You can do it using one of the
following methods:
from the download page of Kaspersky Lab's website;
using Microsoft ActiveSync application;
using a memory expansion card.
2. Run installation (open the cab archive with the distribution package on your mobile device).
Page 87
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
87
3. Read the License Agreement (see the Figure below). If you agree to all the terms, press OK. Kaspersky Mobile
Security will then be installed on the device. If you do not agree with the terms of the License Agreement, press
Cancel.
Figure 76: License Agreement
4. Select Kaspersky Mobile Security interface language (see the Figure below) and click ОК.
Figure 77: Selecting the localization language for the program
5. After the installation a message with a recommendation to reboot the device will be displayed. To reboot the
device, press Reboot.
Page 88
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
88
IN THIS SECTION
Activating the program ..................................................................................................................................................... 88
Starting the program ........................................................................................................................................................ 89
Graphical user interface .................................................................................................................................................. 90
Viewing information about the program ........................................................................................................................... 92
GETTING STARTED
This section contains information on starting the program, what is required to activate it, how you should use the program
interface and set up the secret code.
ACTIVATING THE PROGRAM
To start using Kaspersky Mobile Security you must activate it first. The activation procedure involves entering the activate
code and then receiving a key to be used by the program to determine your rights and the period during which you can
use the program.
You can purchase the activation code at website http://www.kaspersky.com/globalstore of from Kaspersky Lab's
distributors.
To activate Kaspersky Mobile Security on your smartphone, you must have an Internet connection configured.
Before activating the program, make sure that the devices' system date settings match the actual date and time.
In order to activate Kaspersky Mobile Security, perform the following actions:
1. Select Programs from the Start menu.
2. Select KMS8 and start the program using your stylus or the central button of your joystick.
3. Select Enter code in the window that will open.
Page 89
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
89
The Kaspersky Mobile Security activation window will open on the device's screen (see Figure below).
Figure 78: Entering the code
4. Enter the code into the four fields. The activation code consists of Latin alphabet characters and digits (the code
is case-insensitive). Press the Activate button after you have entered the activation code.
5. The program will send an http query to Kaspersky Lab's activation server and will then download and install the
key.
If the activation code you entered appears invalid for any reason, a corresponding message will be displayed on
your smartphone's screen.
If the key installation is successful, an information message about the successful key installation and the license will be
displayed on the screen. To start using the program press OK.
STARTING THE PROGRAM
In order to start Kaspersky Mobile Security, perform the following actions:
1. Select Programs from the Start menu.
2. Select KMS8 and start the program using your stylus or the central button of your joystick.
After the program is started a window with main components of Kaspersky Mobile Security (see Figure below) will be
displayed on the screen.
Last scanned – date of the last anti-virus device scan.
Databases date – release date of the bases installed on the device.
Firewall – level of the device protection against unwanted network activity.
Page 90
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
90
Anti-Spam – status of the protection against unwanted incoming messages.
Figure 79: The program component status window
You can start a full scan of the device for malware objects using the Scan button or switch to selecting the tab using
Menu.
GRAPHICAL USER INTERFACE
The program components are grouped logically and their settings are provided on seven tabs:
The Anti-Virus tab contains settings of Real-Time Protection, on-demand scan, program and quarantine bases
update as well as the settings used by scan and update tasks.
The Anti-Theft tab contains the settings used to block the device and erase information from it in case the
device is lost or stolen.
The Encryption tab contains the settings used to protection information on the device using encryption.
The Anti-Spam tab contains settings used for filtering unwanted incoming messages and calls.
The Parental control tab contains settings used to block unwanted outgoing calls and messages.
The Firewall contains tab contains settings used for the operation of the network protection of the device.
The Information tab contains general settings used for the operation of the program, information about the
program and the bases used. The tab also includes information about the license installed and the availability of
its renewal.
Page 91
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
91
To navigate through the tabs, press the Menu button and select the required tab (see Figure below).
Figure 80: Program menu
To return to the program component status window,
select Protection status.
To exit the program,
select Exit.
SECRET CODE
The secret code is used to prevent unauthorized access to the settings of Anti-Theft, Parental control and Encryption,
during the creation of Stealth SMS and for deleting the program and to access encrypted data.
You can set up the secret code using one of the following methods:
When configuring the following component:
Anti-Theft (on page 126).
Parental control (on page 118).
Encryption (on page 137).
Using Change code on the Information tab.
We recommend using a secret code consisting of at least seven digits.
In order to set up the secret code on the Information tab, do the following:
1. Select Change Code on the Information tab.
2. In the Enter new code entry field enter digits which will constitute your code, press OK. Then enter this code
again in the Confirm field.
Also, if the code is not set up, you can enter it when you first access the settings of Anti-Theft, Encryption or Parental
control. Also entry field Enter new code and Confirm will be displayed.
Page 92
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
92
In order to change the secret code, do the following:
1. Select the Information tab.
2. On the tab select Settings, then select Change code.
3. Enter the current code in the Enter code entry field. Then enter new code in the Enter new code field and enter
it once again in the Confirm entry field to confirm.
If you forgot the secret code, you will not be able to manage Kaspersky Mobile Security functions and to delete the
application.
VIEWING INFORMATION ABOUT THE PROGRAM
You can view general information about the program, its version and copyright details.
In order to view the information about the program,
select Information on the About program tab (see Figure below).
Figure 81: The Information tab
Page 93
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
93
IN THIS SECTION
About Real-Time Protection ............................................................................................................................................ 93
Enabling and disabling Real-Time Protection .................................................................................................................. 93
Selecting an action to be performed with objects ............................................................................................................ 94
SEE ALSO
Program logs ................................................................................................................................................................. 144
REAL-TIME PROTECTION
This section contains information about Real-Time Protection of your device, how to enable it and configure its settings.
ABOUT REAL-TIME PROTECTION
Real-Time Protection loads when you start your operating system and runs in your device memory, scanning all files that
are opened, saved, or executed. Files are scanned according to the following algorithm:
1. The component intercepts each attempt of access to each file from the part of the user or a program.
2. The file is scanned for the presence of malware object. Malicious objects are detected by comparison with
program databases. The databases contain descriptions of all the malicious objects known to date and methods
for neutralizing them.
After the analysis, Kaspersky Mobile Security may take the following courses of action:
If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and performs an action
in accordance with the settings.
If no malicious code is discovered in the file, it will be immediately restored.
Information about the results of the scan is saved to the program log (see section “Program logs” on page 144).
ENABLING AND DISABLING REAL-TIME PROTECTION
The program allows managing the status of the Real-Time Protection of the device against malware objects.
To modify the values of the settings, use device's joystick or stylus.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists.
To enable Real-Time Protection, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select the Protection Settings in the screen that will open.
Page 94
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
94
3. Check the Enable Protection box next to the Real-Time Protection state box in the screen that will open.
Figure 82: Enabling Real-Time Protection
To disable Real-Time Protection, do the following:
1. Select the Settings item in the Anti-Virus tab.
2. Select the Protection Settings in the screen that will open.
3. Uncheck the Enable Protection box next to the Real-Time Protection state box in the screen that will open.
Kaspersky Lab's specialists strongly recommend that you should not disable protection because this may lead to
infecting your device with viruses and data loss.
SELECTING AN ACTION TO BE PERFORMED WITH OBJECTS
You can configure the program's actions to be performed when the program detects a malware object.
To modify the values of the settings, use device's joystick or stylus.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists.
Page 95
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
95
To configure the program's response to a malware object, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select the Protection Settings in the screen that will open.
3. Select the program's response when it detects an infected object for the If a virus detected setting.
Quarantine: quarantine malware objects.
Delete: delete malware objects without notifying the user.
Log event: skip the malware object, record information about its detection into the program's log.
4. Press OK to save the changes.
Figure 83: Selecting an action to be performed with the object
Page 96
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
96
IN THIS SECTION
About on-demand scan ................................................................................................................................................... 96
Starting a scan manually ................................................................................................................................................. 96
Configuring a scheduled scan start ................................................................................................................................. 98
Selecting objects to be scanned ...................................................................................................................................... 99
Selecting an action to be performed with objects .......................................................................................................... 100
ON-DEMAND SCAN
This section contains information about the Scan component, how to scan your device for viruses, configure the device
scan settings and the automatic scheduled scan launch.
ABOUT ON-DEMAND SCAN
Kaspersky Mobile Security allows to perform a full or partial memory scan of the device and system memory for the
presence of malware objects.
The file is scanned for the presence of malware objects. Malicious objects are detected by comparison with application
databases used by the program. The databases contain descriptions of all the malicious objects known to date and
methods for neutralizing them. If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and
performs an action in accordance with the settings.
A scan can be launched manually or according to the schedule.
Information about the results of the on-demand scan is saved to the program log (see section “Program logs” on page
144).
STARTING A SCAN MANUALLY
You can launch an on-demand scan manually at any time convenient to you, for example, when the device's processor is
not occupied performing other tasks.
To start an anti-virus scan, perform the following actions (see Figure below):
1. Select Scan in the Anti-Virus tab.
2. In the screen that will open select the device scan scope:
Full scan – scanning the entire memory of the device and the storage cards.
Memory scan – scanning of the processes running in the system memory and corresponding process files.
Folder scan – selecting and scanning a certain folder in the device's file system or on the connected
storage card for scanning.
Page 97
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
97
When Folder scan is selected, a screen displaying the device’s file system will open. In order navigate
through the file system use the joystick buttons. In order to scan a folder, select the folder you wish to scan
and select Scan from Menu.
Figure 84: Launching a scan manually
After the scan is started, the scan process window (see Figure below) will open in which the current status of the task will
be displayed: the number of scanned objects, the path to the object being scanned at the time.
Figure 85: The Scan window
Page 98
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
98
Once an infected object is detected (see Figure below) an action will be performed with this object in accordance with the
scan setting (see section “Selecting an action to be performed with objects” on page 100).
A prompt for an action to be performed with an object (see Figure below) will be displayed by the program only if the Ask user value is assigned to the Action setting.
Figure 86: Notification about virus detection
Once the scan is complete the general statistics about detected and deleted malware objects will be displayed on the
screen.
CONFIGURING A SCHEDULED SCAN START
Kaspersky Mobile Security allows to create a schedule according to which the scan will be automatically started at the
specified time. The scan is performed in the background mode. Once an infected object is detected, the program will
perform an action selected in the scan settings (see section “Selecting an action to be performed with objects” on page
100).
By default scheduled scan is disabled.
To configure a scheduled scan, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select Scan schedule in the screen that will open.
3. In the screen that will open create a scan launch schedule:
Daily: perform the scan every day. Specify the Time in the entry field.
Weekly: perform the scan once a week. Specify Day of week and Time.
Off: disable the scheduled scan launch.
4. Press OK to save the changes.
Page 99
K A S P E R S K Y M O B I L E SE C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E
99
Figure 87: Configuring an automatic scan schedule
SELECTING OBJECTS TO BE SCANNED
The program allows to determine the type of objects to be scanned for the presence of malicious code.
To modify the values of the settings, use device's joystick or stylus.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists.
To select objects to be scanned, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select the Scan settings in the screen that will open.
3. Configure the Objects to be scanned setting:
Page 100
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
100
IF YOU CHECK BOX...
DURING THE SCAN THE PROGRAM WILL BE
PERFORMING THE FOLLOWING ACTIONS...
Archives
unpacking and scanning of the entire archive
content; scanning all file types
Executables only
scanning only executable program files (for example
*.exe, *.mdl, *.app); archives will not be unpacked
Archives and Executables only
scanning executable program files (for example
*.exe, *.mdl, *.app); unpacking of archives and
scanning of executable program files stored in the
archives;
Unpacking of the following types of archives is supported: *.zip, *.sis and *.cab.
4. Press OK to save the changes.
SELECTING AN ACTION TO BE PERFORMED WITH OBJECTS
You can configure the program's actions to be performed when the program detects a malware object.
To modify the values of the settings, use device's joystick or stylus.
Figure 88: Selecting objects to scan
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.