Kaspersky MOBILE SECURITY 8.0 User Manual

USER GUIDE
KASPERSKY MOBILE
SECURITY 8.0
2
Dear User!
Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers regarding this software product.
Note! This document is a property of Kaspersky Lab's and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation.
Any type of reproduction and distribution of any materials, including translation thereof, is allowed only by a written permission of Kaspersky Lab.
This document and graphic images related to it can be used exclusively for information, non-commercial or personal purposes.
This document can be amended without prior notification. For the latest version of this document refer to Kaspersky Lab's website at http://www.kaspersky.com/docs.
Kaspersky Lab does not assume any liability for the content, quality, relevancy or accuracy of the materials used in this document, the rights for which are held by any third parties and for the potential damages associated with the use of such documents.
This document includes registered and non-registered trademarks. All said trademarks are the property of their corresponding owners.
© Kaspersky Lab 1997-2009
+7 (495) 645-79-39,
Tel., fax: +7 (495) 797-87-00,
+7 (495) 956-70-00
http://www.kaspersky.com
http://support.kaspersky.com
Revision date: April 1, 2009
3
TABLE OF CONTENTS
KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7
Obtaining information about the application ............................................................................................................. 8
Data sources for independent research ............................................................................................................. 8
Contacting the Sales Department ...................................................................................................................... 9
Contacting the Technical Support Service ......................................................................................................... 9
Discussion of Kaspersky Lab applications in web forum .................................................................................. 10
Hardware and software requirements .................................................................................................................... 10
Distribution kit ........................................................................................................................................................ 10
KASPERSKY MOBILE SECURITY FOR SYMBIAN OS ............................................................................................. 11
Installing Kaspersky Mobile Security...................................................................................................................... 11
Getting started ....................................................................................................................................................... 13
Activating the program ..................................................................................................................................... 13
Starting the program ........................................................................................................................................ 14
Graphic interface .............................................................................................................................................. 15
Secret code ...................................................................................................................................................... 16
Viewing information about the program ............................................................................................................ 17
Real-Time Protection ............................................................................................................................................. 17
About Real-Time Protection ............................................................................................................................. 18
Enabling and disabling the Real-Time Protection ............................................................................................. 18
Selecting objects to be scanned ....................................................................................................................... 19
Selecting actions for objects ............................................................................................................................. 20
Display of the protection icon ........................................................................................................................... 21
On-demand scan ................................................................................................................................................... 23
About on-demand scan .................................................................................................................................... 23
Starting a scan manually .................................................................................................................................. 23
Configuring a scheduled scan .......................................................................................................................... 25
Selecting objects to be scanned ....................................................................................................................... 26
Selecting actions to be performed with objects ................................................................................................ 27
Configuring ROM scan ..................................................................................................................................... 29
Configuring the scan of archives ................................................................ ...................................................... 30
Managing the backlight .................................................................................................................................... 31
Quarantine ............................................................................................................................................................. 32
About Quarantine ............................................................................................................................................. 32
Viewing quarantined objects ............................................................................................................................ 33
Restoring objects from Quarantine ................................................................................................................... 34
Deleting objects from Quarantine ..................................................................................................................... 34
Anti-Spam .............................................................................................................................................................. 36
About Anti-Spam .............................................................................................................................................. 36
Anti-Spam modes ............................................................................................................................................. 36
Creating a Black list ......................................................................................................................................... 37
Creating a White List ........................................................................................................................................ 41
Response to messages and calls from the phonebook contacts ...................................................................... 45
Response to messages from non-numeric numbers ........................................................................................ 45
Selecting an action to be performed with incoming messages ......................................................................... 47
Selecting an action to be performed with incoming calls .................................................................................. 48
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
4
Parental control ...................................................................................................................................................... 48
About Parental control ...................................................................................................................................... 49
Parental control modes .................................................................................................................................... 49
Creating a Black List ........................................................................................................................................ 50
Creating a White List ........................................................................................................................................ 54
Anti-Theft ............................................................................................................................................................... 58
About Anti-Theft ............................................................................................................................................... 58
The SMS-Block function ................................................................................................................................... 58
Blocking the device .......................................................................................................................................... 59
The SMS-Clean function .................................................................................................................................. 60
Deleting personal data ..................................................................................................................................... 61
The SIM-Watch function ................................................................................................................................... 62
The SMS-Find function..................................................................................................................................... 63
Determining the device location ....................................................................................................................... 64
The Stealth SMS function................................................................................................................................. 65
Firewall .................................................................................................................................................................. 67
About firewall .................................................................................................................................................... 67
Selecting Firewall security level ....................................................................................................................... 67
Configuring notifications about connection attempts ........................................................................................ 68
Encryption .............................................................................................................................................................. 69
About Encryption .............................................................................................................................................. 69
Data encryption ................................................................ ................................................................................ 69
Data decryption ................................................................ ................................................................................ 70
Information about encrypted data ..................................................................................................................... 71
Blocking access to encrypted data ................................................................................................................... 72
Updating the program bases .................................................................................................................................. 73
About program bases update ........................................................................................................................... 73
Viewing bases information ............................................................................................................................... 73
Manual updating ............................................................................................................................................... 74
Scheduled updating ......................................................................................................................................... 74
Updating while roaming .................................................................................................................................... 75
Configuring connection settings ....................................................................................................................... 76
Program logs ......................................................................................................................................................... 77
About logs ........................................................................................................................................................ 77
Viewing Log records ......................................................................................................................................... 78
Deleting Log records ........................................................................................................................................ 78
Displaying the status window ................................................................................................................................. 78
Managing sound notification .................................................................................................................................. 79
Managing the license ............................................................................................................................................. 80
Viewing the license information ........................................................................................................................ 80
Renewing the license ....................................................................................................................................... 81
Uninstalling the program ........................................................................................................................................ 82
KASPERSKY MOBILE SECURITY FOR MICROSOFT WINDOWS MOBILE ............................................................. 86
Installing Kaspersky Mobile Security...................................................................................................................... 86
Getting started ....................................................................................................................................................... 88
Activating the program ..................................................................................................................................... 88
Starting the program ........................................................................................................................................ 89
Graphical user interface ................................................................................................................................... 90
T A B L E O F C O N T E N T S
5
Secret code ...................................................................................................................................................... 91
Viewing information about the program ............................................................................................................ 92
Real-Time Protection ............................................................................................................................................. 93
About Real-Time Protection ............................................................................................................................. 93
Enabling and disabling Real-Time Protection ................................................................................................... 93
Selecting an action to be performed with objects ................................................................ ............................. 94
On-demand scan ................................................................................................................................................... 96
About on-demand scan .................................................................................................................................... 96
Starting a scan manually .................................................................................................................................. 96
Configuring a scheduled scan start .................................................................................................................. 98
Selecting objects to be scanned ....................................................................................................................... 99
Selecting an action to be performed with objects ................................................................ ........................... 100
Quarantine ........................................................................................................................................................... 102
About Quarantine ........................................................................................................................................... 102
Viewing quarantined objects .......................................................................................................................... 103
Restoring objects from Quarantine ................................................................................................................. 103
Deleting objects from Quarantine ................................................................................................................... 104
Anti-Spam ............................................................................................................................................................ 106
About Anti-Spam ............................................................................................................................................ 106
Anti-Spam modes ........................................................................................................................................... 106
Creating a Black List ...................................................................................................................................... 107
Creating a White List ...................................................................................................................................... 110
Response to messages and calls from the phonebook contacts .................................................................... 114
Response to messages from non-numeric numbers ...................................................................................... 115
Selecting an action to be performed with incoming messages ....................................................................... 117
Selecting an action to be performed with incoming calls ................................................................................ 118
Parental control .................................................................................................................................................... 118
About Parental control .................................................................................................................................... 119
Parental control modes .................................................................................................................................. 119
Creating a Black List ...................................................................................................................................... 120
Creating a White List ...................................................................................................................................... 123
Anti-Theft ............................................................................................................................................................. 127
About Anti-Theft ............................................................................................................................................. 127
The SMS-Block function ................................................................................................................................. 128
Blocking the device ........................................................................................................................................ 128
The SMS-Clean function ................................................................................................................................ 129
Deleting personal data ................................................................................................................................... 130
The SIM-Watch function ................................................................................................................................. 131
The SMS-Find function................................................................................................................................... 132
Determining the device location ..................................................................................................................... 133
The Stealth SMS function............................................................................................................................... 134
Firewall ................................................................................................................................................................ 135
About firewall .................................................................................................................................................. 135
Selecting the Firewall security level ............................................................................................................... 136
Encryption ............................................................................................................................................................ 137
About Encryption ............................................................................................................................................ 137
Data encryption ................................................................ .............................................................................. 137
Data decryption ................................................................ .............................................................................. 139
Blocking access to encrypted data ................................................................................................................. 139
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
6
Updating the program bases ................................................................................................................................ 141
About updating of program bases .................................................................................................................. 141
Viewing bases information ............................................................................................................................. 142
Manual updating ............................................................................................................................................. 142
Scheduled udpating ....................................................................................................................................... 143
Program logs ....................................................................................................................................................... 144
About logs ...................................................................................................................................................... 144
Viewing Log records ....................................................................................................................................... 145
Deleting Log records ...................................................................................................................................... 145
Managing the license ........................................................................................................................................... 146
Viewing the license information ...................................................................................................................... 147
Renewing the license ..................................................................................................................................... 147
Uninstalling the program ...................................................................................................................................... 148
GLOSSARY ............................................................................................................................................................... 151
KASPERSKY LAB ..................................................................................................................................................... 154
CRYPTO EX LTD. ..................................................................................................................................................... 156
INDEX ....................................................................................................................................................................... 157
7
IN THIS SECTION
Obtaining information about the program .......................................................................................................................... 8
Hardware and software requirements.............................................................................................................................. 10
Distribution kit .................................................................................................................................................................. 10

KASPERSKY MOBILE SECURITY 8.0

Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft Windows Mobile against malware programs, unsolicited calls and messages: The program offers the following functionality:
Real-Time Protection of the file system of the device - interception and scan of:
all incoming objects transmitted using wireless connections (IR port, Bluetooth), EMS and MMS messages,
during synchronization with the personal computer and downloading files using a browser;
files opened on the mobile device;
programs installed from the device's interface.
Scanning of the file system's objects on the mobile device or on the connected expansion cards by user's
demand or according to the schedule.
Reliable isolation of infected objects in the quarantine storage.
Updating of Kaspersky Mobile Security bases used to scan for malware programs and delete dangerous
objects.
Blocking unwanted incoming and outgoing SMS messages and calls.
Blocking access to or erasing user's data in case of unauthorized actions with the device, as, for instance,
theft.
Protection of the mobile device at the network level.
Protection with encryption of a folder (except system folders) in the device's memory or on the memory
expansion card (through the encrypting functions embedded in the system).
Receiving geographical coordinates of the device.
You can use the capabilities providing flexible control of the Kaspersky Mobile Security operation settings, viewing the current protection status and the event log in which the program's actions are recorded.
The program includes a menu system and supports an easy-to-use user's interface.
Once a malware program is detected, Kaspersky Mobile Security can disinfect the infected object detected (if disinfection is possible), delete it or place it into the Quarantine. In this case no copies of the object being deleted will be saved.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
8
IN THIS SECTION
Data sources for indepenendent research ......................................................................................................................... 8
Contacting the Sales Department ...................................................................................................................................... 9
Contacting the Technical Support service ......................................................................................................................... 9
Discussion of Kaspersky Lab applications in web forum ................................................................................................. 10

OBTAINING INFORMATION ABOUT THE APPLICATION

If you have any questions regarding purchasing, installing or using Kaspersky Mobile Security, answers are readily available.
Kaspersky Lab provides various sources of information about the program. You can select the source that suits you best depending on the importance and urgency of your question.

DATA SOURCES FOR INDEPENDENT RESEARCH

You can view the following sources of information about the program:
program page at the web site of Kaspersky Lab;
program page at the web site of the Technical Support Server (in the Knowledge Base);
online help system;
documentation.
Application page at the web site of Kaspersky Lab.
http://www.kaspersky.com/kaspersky_mobile_security
Use this page to obtain general information about Kaspersky Mobile Security, its capabilities and features of operation. You can purchase Kaspersky Mobile Security or extend license required to use it at our E-Store.
Application page at the web site of the Technical Support Server (Knowledge Base)
http://support.kaspersky.com/desktop
This page contains articles published by experts from the Technical Support Service.
The articles contain useful information, guidelines and answers to frequent questions pertaining to the purchase, installation and use of Kaspersky Mobile Security. They are arranged in topics, such as "Work with key files", "Database updates" or "Troubleshooting". The articles can answer questions pertaining not only to Kaspersky Mobile Security, but also other products of Kaspersky Lab; they can contain general news from the Technical Support Service.
Online help system
If you have a question about a specific application window or a tab of Kaspersky Mobile Security, you can use the context help.
In order to open the context help, open the corresponding tab and select Help.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
9
Documentation
The User Guide contains detailed information about the application's functions, how to work with them, includes advices and recommendations on its configuration.
Files containing the documents in PDF format are included into the product package of Kaspersky Mobile Security.
You can also download electronic files containing these documents from Kaspersky Lab's website.

CONTACTING THE SALES DEPARTMENT

If you have questions regarding selecting or purchasing Kaspersky Mobile Security or extending the period of its use, you can phone Sales Department specialists in our Central Office in Moscow at:
+7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00
The service is provided in Russian or English.
You can send your questions to the Sales Department to e-mail address sales@kaspersky.com.

CONTACTING THE TECHNICAL SUPPORT SERVICE

If you already purchased Kaspersky Mobile Security, you can obtain information about this application from the Technical Support service by phone or via Internet.
Experts from the Technical Support Service will answer your questions regarding the installation and use of the program, and if your device is infected, they will assist you in eliminating the consequences of malware activity.
Before contacting the Technical support service, please read the Support rules (http://support.kaspersky.com/support/rules).
E-mailing your question to the Technical Support Service
You can forward your question to the Technical Support Service specialists by filling out a Helpdesk web form at (http://support.kaspersky.com/helpdesk.html).
You can send your inquiry in the Russian, English, German, French or Spanish language.
In order to send an e-mail message with your question, you must indicate the Customer ID obtained during the registration at the Technical Support service website along with your password.
If you are not yet a registered user of Kaspersky Lab's applications, you can fill out a registration form at Helpdesk web form (https://support.kaspersky.com/personalcabinet/registration/form/). During registration enter the activation code for your application or the license key filename.
You will receive a Technical Support service specialist's response in your Personal Cabinet (https://support.kaspersky.com/PersonalCabinet) and at the e-mail address you specify in your inquiry.
Please describe your problem with all possible details in the help request web form. Specify in the mandatory fields:
Prompt type. Select the topic which is the closest to the problem encountered, for example, "Product
Installation/Removal Problem" or "Anti-Virus scan/virus removal problem". If you find no suitable section, select "General question".
Application name and version number.
Prompt text. Describe the problem you have encountered with as much detail as possible.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
10
Customer ID and password. Enter the customer ID and password received during registration at the Technical
Support Service web site.
E-mail address. The experts from the Technical Support Service will send their reply to your inquiry to that
address.
Technical support over the phone
If you have an urgent problem, you can call the Technical Support Service in your city. Before contacting your local (http://support.kaspersky.com/support/support_local) or international (http://support.kaspersky.com/support/international) technical support service, collect information (http://support.kaspersky.com/support/details) about your device and about the anti-virus application installed on it. This will enable our specialists to help you faster.

DISCUSSION OF KASPERSKY LAB APPLICATIONS IN WEB FORUM

If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other users of Kaspersky Lab's anti-virus applications in our forum located at Kaspersky Lab's web forum http://forum.kaspersky.com.
In the forum you can view existing discussions, leave your comments, create new topics, use search.

HARDWARE AND SOFTWARE REQUIREMENTS

Kaspersky Mobile Security 8.0 is designed for installation on mobile devices running one of the following operating systems:
Symbian OS 9.1, 9.2 and 9.3 Series 60 UI.
Microsoft Windows Mobile 5.0, 6.0, 6.1.

DISTRIBUTION KIT

You can purchase Kaspersky Mobile Security via Internet (the program distribution kit and documentation are provided in the electronic form). Kaspersky Mobile Security can be also purchased in mobile communication offices. For detailed information and the methods of purchase and the distribution kit, please contact our sales department at
sales@kaspersky.com.
11
IN THIS SECTION
Installing Kaspersky Mobile Security ............................................................................................................................... 11
Getting started ................................................................................................................................................................. 12
Real-Time Protection ....................................................................................................................................................... 16
On-demand scan ............................................................................................................................................................. 22
Quarantine ....................................................................................................................................................................... 31
Anti-Spam ........................................................................................................................................................................ 35
Parental control ............................................................................................................................................................... 48
Anti-Theft ......................................................................................................................................................................... 58
Firewall ............................................................................................................................................................................ 66
Encryption ....................................................................................................................................................................... 69
Updating the program bases ........................................................................................................................................... 73
Program logs ................................................................................................................................................................... 77
Displaying the status window .......................................................................................................................................... 78
Managing sound notification ............................................................................................................................................ 79
Managing the license....................................................................................................................................................... 80
Uninstalling the program .................................................................................................................................................. 82

KASPERSKY MOBILE SECURITY FOR SYMBIAN OS

This section contains description of the operation of Kaspersky Mobile Security 8.0 for smartphones running Symbian version 9.1, 9.2 and 9.3 Series 60 UI.

INSTALLING KASPERSKY MOBILE SECURITY

In order to install Kaspersky Mobile Security, perform the following steps:
1. Copy the program distribution package to your smartphone. You can do it using one of the following methods:
from the download page of Kaspersky Lab's website;
using program Nokia PC Suite;
using a memory expansion card.
2. Start the installation using one of the following methods:
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
12
using program Nokia PC Suite;
by starting the distribution package on the device.
3. A prompt (see Figure below) will appear on the screen; select Yes to confirm the installation of the program.
Figure 1: Prompt to confirm the installation
4. Review additional information about the program: name, version, certificates. Press Continue.
5. If the operating system's and of Kaspersky Mobile Security's language versions do not match, a corresponding message will then be displayed on the screen. In order to proceed with the installation in English, press OK.
6. Read the License Agreement (see the Figure below). If you agree to all terms of the agreement, press OK. If you do not agree with the terms of the License Agreement, press Cancel. Installation of Kaspersky Mobile Security will be terminated.
7. Make sure that there is no other anti-virus software installed on the phone. Press OK. Kaspersky Mobile Security will then be installed on the device.
The installed Kaspersky Mobile Security is not intended for backup and restore.
Figure 2: License Agreement
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
13
IN THIS SECTION
Activating the program ..................................................................................................................................................... 13
Starting the program ........................................................................................................................................................ 14
Graphic interface ............................................................................................................................................................. 15
Secret code ..................................................................................................................................................................... 16
Viewing information about the program ........................................................................................................................... 17

GETTING STARTED

This section contains information on starting the program, what is required to activate it, how you should use the program interface and set up the secret code.

ACTIVATING THE PROGRAM

To start using Kaspersky Mobile Security you must activate it first. The activation procedure involves entering the activation code and then receiving a key to be used by the program to determine your rights and the period during which you can use the program.
You can purchase the activation code at website http://www.kaspersky.com/globalstore or from Kaspersky Lab's distributors.
To activate Kaspersky Mobile Security on your smartphone, you must have an Internet connection configured.
Before activating the application, make sure that the devices' system date settings match the actual date and time.
In order to activate Kaspersky Mobile Security, perform the following actions:
1. Open the device’s main menu.
2. Switch to the Applications menu.
3. Select KMS 8.0 and start the program using the Open item from the Options menu.
4. Select Enter code from the Options menu.
Kaspersky Mobile Security activation window will appear on the smartphone screen (see Figure below).
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
14
Figure 3: The program activation window
5. Enter the code into the four fields. The activation code consists of Latin alphabet characters and digits (the code is case-insensitive). After you have entered the activation code, select Activate in the Options menu.
6. When you request an access point, select the connection type to be used to connect to the server.
The program will send an http query to Kaspersky Lab's activation server and will then download and install the key file.
If the activation code you entered appears invalid for any reason, a corresponding message will be displayed on your smartphone's screen.
If the key file installation is successful, information about the license will be displayed on the screen. To start using the program press OK.

STARTING THE PROGRAM

In order to start Kaspersky Mobile Security, perform the following actions:
1. Open the device’s main menu.
2. Switch to the Applications menu.
3. Select KMS 8.0 and start the program using the Open item from the Options menu.
After the program is started a window with main components of Kaspersky Mobile Security (see Figure below) will be displayed on the screen.
Real-Time Protection – Real-Time Protection status (see section Real-Time Protection on page 16).
Last full scan – the date of the last anti-virus scan of the device (see section On-demand scan on page 22).
Databases date – release date of the bases installed on the device (see section Updating the program bases
on page 73).
Anti-Spam – status of protection against unsolicited incoming messages and calls (see section Anti-Spam on
page 35).
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
15
Firewall – level of device protection against unwanted network activities (see section Firewall on page 66).
Figure 4: The program component status window
In order to switch to the program graphic interface, press OK.

GRAPHIC INTERFACE

The program components are grouped in logical groups and their settings are provided on seven tabs:
Anti-Virus contains settings of the Real-Time Protection, on-demand protection, program bases update and
quarantine as well as the settings of the schedule for the scan and update tasks.
Anti-Theft contains settings used to block the device and erase information if the device is stolen or lost.
Encryption contains settings used to protect information resident on the device using encryption.
Anti-Spam contains the settings used to filter unwanted incoming messages and calls.
Parental control contains settings used to block unwanted outgoing calls and messages.
Firewall contains all settings used for the operation of the network protection of the device.
Information contains general settings used for the operation of the program, information about the program and
the bases used. The tab also includes information about the license installed and the availability of its renewal.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
16
To navigate from one tab to another, use the joystick of the device or select the Open tab item in the Options menu (see Figure below).
Figure 5: The Options menu
In order to return to the program components status window,
select the Current status item from the Options menu.

SECRET CODE

The secret code is used to prevent unauthorized access to the settings of Anti-Theft, Parental control and Encryption, during the creation of Stealth SMS, for removing the program and accessing the encrypted data.
You can set up the secret code using one of the following methods:
In the settings of the Anti-Theft, Parental control or Encryption components.
Using item Change code in menu Settings on the Information tab.
We recommend using a secret code consisting of at least 7 digits.
In order to set up the secret code on the Information tab, do the following:
1. Select the Information tab.
2. On the tab select Settings, then select Change code.
3. In the Enter new code entry field enter digits which will constitute your code, press OK. Then enter this code again in the Confirm code field.
Also, if the code is not set up, you can enter it when you first access the settings of Anti-Theft, Encryption or Parental control. Also entry field Enter new code and Confirm code will be displayed
In order to change the secret code, do the following:
1. Select the Information tab.
2. On the tab select Settings, then select Change code.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
17
IN THIS SECTION
About Real-Time Protection ............................................................................................................................................ 18
Enabling and disabling the Real-Time Protection ............................................................................................................ 18
Selecting objects to be scanned ...................................................................................................................................... 19
Selecting actions for objects ............................................................................................................................................ 20
Display of the protection icon .......................................................................................................................................... 21
3. Enter the current code in the Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm code entry field to confirm.
If you forgot the secret code, you will not be able to manage Kaspersky Mobile Security functions that require entering the code and to delete the program.

VIEWING INFORMATION ABOUT THE PROGRAM

You can view general information about the program, its version and copyright details.
In order to view the information about the program,
select Information on the About tab (see Figure below).
Figure 6: Viewing information about the program

REAL-TIME PROTECTION

This section contains information about Real-Time Protection of your device, how to enable it and configure its settings.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
18

ABOUT REAL-TIME PROTECTION

Real-Time Protection is launched at the operation system startup, is permanently loaded in the device's RAM and monitors all opened, saved or run files. Files are scanned according to the following algorithm:
1. The component intercepts each attempt of access to each file from the part of the user or a program.
2. The file is scanned for the presence of malware object. Malicious objects are detected by comparison with program databases. The databases contain descriptions of all the malicious objects known to date and methods for neutralizing them.
After the analysis, Kaspersky Mobile Security may take the following courses of action:
If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and performs an action
in accordance with the settings.
If no malicious code is discovered in the file, it will be immediately restored.
Information about the results of the scan is saved to the program log (see section Program logs on page 77).

ENABLING AND DISABLING THE REAL-TIME PROTECTION

The program allows managing the status of the Real-Time Protection of the device against malware objects.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To enable Real-Time Protection, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select value On for the Protection setting.
4. Press Back to save the changes.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
19
Figure 7: Enabling Real-Time Protection
To disable Real-Time Protection, do the following:
1. Select the Settings item in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select value Off for the Protection setting.
4. Press Back to save the changes.
Kaspersky Lab's specialists strongly recommend that you should not disable protection because this may lead to infecting your device with viruses and data loss.

SELECTING OBJECTS TO BE SCANNED

You can select the type of objects to be scanned by Real-Time Protection.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To select the type of objects to be scanned, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
20
3. Select the type of files to be scanned by Real-Time Protection using the Objects to be scanned settings:
All files: scan files of all types.
Executables only: scan only executable program files (for example *.exe, *.sis, *.mdl, *.app).
4. Select OK to save changes.
Fugure 8: Selecting objects to be scanned

SELECTING ACTIONS FOR OBJECTS

You can configure the program's response when it detects a malware object.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To configure the program’s response when it detects a malware object, perform the following actions (see Figure
below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select the program's response when it detects an infected object for the Action setting.
Log event: skip the malware object and record the information about its detection in the program log.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
21
Delete: delete malware objects without notifying the user.
Quarantine: quarantine malware objects.
4. Select OK to save changes.
Figure 9: Configuring the program's response when it detects a malware object

DISPLAY OF THE PROTECTION ICON

The icon reflects the real-time protection status on the device screen. If the real-protection is enabled, the color icon will be displayed, otherwise the icon will be grey color.
You can configure the protection status icon display on the device screen.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To configure the protection status icon display, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Real-Time Protection in the Settings window.
3. Select Show protection icon. Configure the protection status icon display on the device screen:
Always: the program icon to be displayed on the device screen.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
22
In menu only: the program icon in the device menu and Kaspersky Mobile Security menu.
Never: the icon will not be displayed.
4. Select OK to save changes.
Figure 10: Configuring the protection status icon
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
23
IN THIS SECTION
About on-demand scan ................................................................................................................................................... 23
Starting a scan manually ................................................................................................................................................. 23
Configuring a scheduled scan ......................................................................................................................................... 25
Selecting objects to be scanned ...................................................................................................................................... 26
Selecting actions to be performed with objects ............................................................................................................... 27
Configuring ROM scan .................................................................................................................................................... 29
Configuring the scan of archives ..................................................................................................................................... 30
Managing the backlight .................................................................................................................................................... 31

ON-DEMAND SCAN

This section contains information about the Scan component, how to scan your device for viruses, configure the device scan settings and the automatic scheduled scan launch.

ABOUT ON-DEMAND SCAN

Kaspersky Mobile Security allows to perform a full or partial scan of the device's memory, storage cards, messages and of the system memory for the presence of malware objects.
The file is scanned for the presence of malware objects. Malicious objects are detected by comparison with the application databases. The databases contain descriptions of all the malicious objects known to date and methods for neutralizing them. If malicious code was detected in the file, Kaspersky Mobile Security blocks the file and performs an action in accordance with the settings.
A scan can be launched manually or according to the schedule.
Information about the results of the on-demand scan is saved to the program log (see section Program logs on page
77).

STARTING A SCAN MANUALLY

You can launch a manual scan at any time convenient to you, for example, when the device is not occupied with other tasks.
In order to start an anti-virus scan manually, perform the following actions:
1. Select Scan in the Anti-Virus tab.
2. In the Scan window (see Figure below) select the device scan scope:
Full scan: scanning the entire memory of the device and the storage cards.
Scan RAM : scanning of the processes running in the system memory and corresponding process files.
Scan messages: scanning of all messages.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
24
Scan folder: selecting and scanning of a certain folder in the device's file system or on the connected
storage card. When Scan folder item is selected, a window displaying the device’s file system will open. In order navigate
through the file system use the joystick buttons. In order to scan a folder, select the folder you wish to scan and select Scan from the Options menu.
Figure 11: The Scan tab
Immediately after the scan is started, the scan process window will open in which its current status will be displayed: the number of scanned objects, the path to the object being scanned at the time and the percentage indicator of the progress (see Figure below).
Figure 12: The Scan window
When an infected object is detected, an action specified in the Action setting will be performed (see section Selecting an action to be performed with objects on page 27) in the scan settings.
A prompt for an action to be performed with an object (see Figure below) will be displayed by the program only if the Ask user value is assigned to the Action setting.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
25
Figure 13: Message about a virus detected
Once the scan is complete the general statistics about detected and deleted malware objects will be displayed on the screen.
By default, during the scan the screen backlight goes off in order to save the battery charge. You can turn the backlight on using the Backlight setting in the Settings menu on the Information tab.

CONFIGURING A SCHEDULED SCAN

Kaspersky Mobile Security allows you to create a schedule for automatic device scan to be performed at a specified time. The scan is performed in the background mode. When detecting an infected object, an action selected in the Scan settings will be performed with such object.
By default scheduled scan is disabled.
To configure a scheduled scan, perform the following actions (see Figure below):
1. Select the Settings item in the Anti-Virus tab.
2. Select Scan schedule in the window that will open.
3. Configure the Auto scan settings:
Daily: perform the scan every day. Specify the Auto scan time in the entry field.
Weekly: perform the scan once a week. Specify the Auto scan day and Auto scan time.
Off: disable the scheduled scan launch.
4. Press Back to save the changes.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
26
Figure 14: Configuring a scheduled scan

SELECTING OBJECTS TO BE SCANNED

The program allows to determine the type of objects to be scanned for the presence of malicious code.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To select objects to be scanned, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Scan in the window that will open.
3. Specify the value for the Objects to be scanned setting:
All files: scan all files.
Executables only: scan only executable program files (for example *.exe, *.sis, *.mdl, *.app).
4. Press OK to save the changes.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
27
Figure 15: Selecting objects to be scanned

SELECTING ACTIONS TO BE PERFORMED WITH OBJECTS

You can configure the application's actions to be performed when the application detects a malicious object.
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To configure the program's response, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select Scan in the Settings window (see Figure below).
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
28
Figure 16: Configuring actions to be performed with objects
3. Using the Action item, select the application's response when it detects a malware object (see Figure below):
Delete: delete detected malware objects without notifying the user.
Quarantine: quarantine detected malicious objects.
Ask user: when an infected object is detected, display a notification with a prompt for action.
Log event: skip a malware object and record the information about its detection in the program log.
Try to disinfect – disinfect malware objects. If the disinfection is not possible, perform an action specified in
the If disinfection fails item.
K A S P E R S K Y M O B I L E SE C U R I T Y F O R S Y M B I A N OS
29
Figure 17: Selecting actions to be performed with objects
4. If you selected Try to disinfect as the application's response, use If disinfection fails (see Figure below) select an action to be performed by the application when it is impossible to disinfect the infected object:
Delete: delete malware objects without notifying the user.
Quarantine: quarantine objects.
Ask user: prompt the user for action when an infected object is detected.
Log event: record the information about the detection of the infected object in the program log.
Figure 18: Selecting the second action
5. Press OK to save the changes.

CONFIGURING ROM SCAN

ROM contains system files required for loading the device's operating system. You can enable or disable the scan of ROM.
K A S P E R S K Y M O B I L E SE C U R I T Y 8. 0
30
In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu.
By default the program uses the values of the settings recommended by Kaspersky Lab's specialists. If you wish to restore the recommended values after you modified the settings, open the Settings window and select Restore from the Options menu.
To enable the scan the device's ROM, perform the following actions (see Figure below):
1. Select Settings in the Anti-Virus tab.
2. Select the Scan in the Settings window.
3. Select value Yes for the Scan ROM setting.
4. Press Back to save the changes.
To disable the scan the device's ROM, perform the following actions:
1. Select Settings in the Anti-Virus tab.
2. Select the Scan in the Settings window.
3. Select value No for the Scan ROM setting.
4. Press Back to save the changes.

CONFIGURING THE SCAN OF ARCHIVES

You can enable or disable unpacking of archives to scan their content.
Figure 19: Enabling the scan of device's ROM
Loading...
+ 130 hidden pages