![](/html/ee/eed9/eed9193d462c75c8ed1b8862b6a96da4f030e8ed17abff6b424e6d13e2a1b962/bg4.png)
COPYRIGHT
Copyright © 2007 McAfee, Inc. All Rights Reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form
or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.
TRADEMARK ATTRIBUTIONS
ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN
(STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA),
INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, MCAFEE, MCAFEE (AND IN KATAKANA), MCAFEE AND DESIGN,
MCAFEE.COM, MCAFEE VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE,
PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN
KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are registered trademarks or trademarks of McAfee, Inc. and/or its
affiliates in the US and/or other countries. The color red in connection with security is distinctive of McAfee brand products. All other registered
and unregistered trademarks herein are the sole property of their respective owners.
LICENSE INFORMATION
License Agreement
NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE
GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE
CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU
HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU
DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF
APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.
Attributions
This product includes or may include:
• Software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). • Cryptographic software written by Eric
A. Young and software written by Tim J. Hudson. • Some software programs that are licensed (or sublicensed) to the user under the GNU
General Public License (GPL) or other similar Free Software licenses which, among other rights, permit the user to copy, modify and redistribute
certain programs, or portions thereof, and have access to the source code. The GPL requires that for any software covered under the GPL which
is distributed to someone in an executable binary format, that the source code also be made available to those users. For any such software
covered under the GPL, the source code is made available on this CD. If any Free Software licenses require that McAfee provide rights to use,
copy or modify a software program that are broader than the rights granted in this agreement, then such rights shall take precedence over the
rights and restrictions herein. • Software originally written by Henry Spencer, Copyright 1992, 1993, 1994, 1997 Henry Spencer. • Software
originally written by Robert Nordier, Copyright © 1996-7 Robert Nordier. • Software written by Douglas W. Sauder. • Software developed by the
Apache Software Foundation (http://www.apache.org/). A copy of the license agreement for this software can be found at
www.apache.org/licenses/LICENSE-2.0.txt. • International Components for Unicode ("ICU") Copyright ©1995-2002 International Business
Machines Corporation and others. • Software developed by CrystalClear Software, Inc., Copyright ©2000 CrystalClear Software, Inc. • FEAD
Optimizer
Outside In
© 1998, 1999, 2000. • Software copyrighted by Expat maintainers. • Software copyrighted by The Regents of the University of California, © 1996,
1989, 1998-2000. • Software copyrighted by Gunnar Ritter. • Software copyrighted by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
California 95054, U.S.A., © 2003. • Software copyrighted by Gisle Aas. © 1995-2003. • Software copyrighted by Michael A. Chase, © 1999-2000.
• Software copyrighted by Neil Winton, ©1995-1996. • Software copyrighted by RSA Data Security, Inc., © 1990-1992. • Software copyrighted by
Sean M. Burke, © 1999, 2000. • Software copyrighted by Martijn Koster, © 1995. • Software copyrighted by Brad Appleton, © 1996-1999.
• Software copyrighted by Michael G. Schwern, ©2001. • Software copyrighted by Graham Barr, © 1998. • Software copyrighted by Larry Wall
and Clark Cooper, © 1998-2000. • Software copyrighted by Frodo Looijaard, © 1997. • Software copyrighted by the Python Software Foundation,
Copyright © 2001, 2002, 2003. A copy of the license agreement for this software can be found at www.python.org. • Software copyrighted by
Beman Dawes, © 1994-1999, 2002. • Software written by Andrew Lumsdaine, Lie-Quan Lee, Jeremy G. Siek © 1997-2000 University of Notre
Dame. • Software copyrighted by Simone Bordet & Marco Cravero, © 2002. • Software copyrighted by Stephen Purcell, © 2001. • Software
developed by the Indiana University Extreme! Lab (http://www.extreme.indiana.edu/). • Software copyrighted by International Business
Machines Corporation and others, © 1995-2003. • Software developed by the University of California, Berkeley and its contributors. • Software
developed by Ralf S. Engelschall <rse@engelschall.com> for use in the mod_ssl project (http:// www.modssl.org/). • Software copyrighted by
Kevlin Henney, © 2000-2002. • Software copyrighted by Peter Dimov and Multi Media Ltd. © 2001, 2002. • Software copyrighted by David
Abrahams, © 2001, 2002. See http://www.boost.org/libs/bind/bind.html for documentation. • Software copyrighted by Steve Cleary, Beman
Dawes, Howard Hinnant & John Maddock, © 2000. • Software copyrighted by Boost.org, © 1999-2002. • Software copyrighted by Nicolai M.
Josuttis, © 1999. • Software copyrighted by Jeremy Siek, © 1999-2001. • Software copyrighted by Daryle Walker, © 2001. • Software copyrighted
by Chuck Allison and Jeremy Siek, © 2001, 2002. • Software copyrighted by Samuel Krempp, © 2001. See http://www.boost.org for updates,
documentation, and revision history. • Software copyrighted by Doug Gregor (gregod@cs.rpi.edu), © 2001, 2002. • Software copyrighted by
Cadenza New Zealand Ltd., © 2000. • Software copyrighted by Jens Maurer, ©2000, 20 01. • Software copyrighted by Jaakko Järvi
(jaakko.jarvi@cs.utu.fi), ©1999, 2000. • Software copyrighted by Ronald Garcia, © 2002. • Software copyrighted by David Abrahams, Jeremy
Siek, and Daryle Walker, ©1999-2001. • Software copyrighted by Stephen Cleary (shammah@voyager.net), ©20 00. • Software copyrighted by
Housemarque Oy <http://www.housemarque.com>, © 2001. • Software copyrighted by Paul Moore, © 1999. • Software copyrighted by Dr. John
Maddock, © 1998-2002. • Software copyrighted by Greg Colvin and Beman Dawes, © 1998, 1999. • Software copyrighted by Peter Dimov,
© 2001, 2002. • Software copyrighted by Jeremy Siek and John R. Bandela, © 2001. • Software copyrighted by Joerg Walter and Mathias Koch,
© 200 0-2002. • Software copyrighted by Carnegie Mellon University © 1989, 1991, 1992. • Software copyrighted by Cambridge Broadband Ltd.,
© 2001-2003. • Software copyrighted by Sparta, Inc., © 2003-2004. • Software copyrighted by Cisco, Inc. and Information Network Center of
Beijing University of Posts and Telecommunications, © 2004. • Software copyrighted by Simon Josefsson, © 2003. • Software copyrighted by
Thomas Jacob, © 2003-2004. • Software copyrighted by Advanced Software Engineering Limited, © 2004. • Software copyrighted by Todd C.
Miller, © 1998. • Software copyrighted by The Regents of the University of California, © 1990, 1993, with code derived from software contributed
to Berkeley by Chris Torek.
®
technology, Copyright Netopsystems AG, Berlin, Germany. • Outside In® Viewer Technology ©1992-2001 Stellent Chicago, Inc. and/or
®
HTML Export, © 2001 Stellent Chicago, Inc. • Software copyrighted by Thai Open Source Software Center Ltd. and Clark Cooper,
®
Issued October 2007 / McAfee® VirusScan® Mobile software version 2.0.0
DBN-001-EN
![](/html/ee/eed9/eed9193d462c75c8ed1b8862b6a96da4f030e8ed17abff6b424e6d13e2a1b962/bg5.png)
Contents
1 Getting Started 6
2 Using VirusScan Mobile 8
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Installing VirusScan Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Uninstalling VirusScan Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Starting VirusScan Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Configuring VirusScan Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Enabling and disabling real-time scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Configuring scan options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Real-time scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Message scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
Configuring VirusScan updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
Configuring the quarantine area and log file sizes . . . . . . . . . . . . . . . . . . . . . .12
Scanning your device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
Using automatic scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Using manual scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
Managing infected file warnings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Updating VirusScan Mobile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Automatically checking for updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Manually checking for updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
Managing quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Viewing VirusScan Mobile program details . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Viewing the log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Glossary 20
Index 21
5
![](/html/ee/eed9/eed9193d462c75c8ed1b8862b6a96da4f030e8ed17abff6b424e6d13e2a1b962/bg6.png)
1
Getting Started
McAfee® VirusScan® Mobile 2.0.0 is an anti-virus solution for handheld devices, offering
comprehensive, reliable, and up-to-date virus protection. Powered by McAfee scanning
technology, VirusScan Mobile protects against threats from viruses, worms, Trojan
horses, and Java applets before they can harm your device.
VirusScan Mobile provides:
Real-time scanning — Scan files when they are accessed by you or your device.
Automatic and manual scanning — Search for viruses and potentially harmful files on
your device and removable storage cards.
Quarantine — Temporarily isolate infected and suspicious files in the quarantine folder
until an appropriate action can be taken.
Features
McAfee VirusScan Mobile software provides the following features:
Complete protection
VirusScan Mobile protects your mobile device from potentially harmful threats in
SMS and MMS messages, and email messages and attachments.
Continuous protection
VirusScan Mobile provides always-on protection, automatically scanning every file
received by your mobile device.
Up-to-date protection
Subscribers to the VirusScan Mobile security service get automatic updates to
ensure that their devices are protected from the latest threats.
Small footprint
Designed for the mobile world, VirusScan Mobile is small yet powerful, as well as
easy to download and install.
6
![](/html/ee/eed9/eed9193d462c75c8ed1b8862b6a96da4f030e8ed17abff6b424e6d13e2a1b962/bg7.png)
McAfee® VirusScan® Mobile 2.0.0 User Guide Getting Started
Installing VirusScan Mobile
Uninterrupted service
Until it detects a threat, VirusScan Mobile runs silently on your device during mobile
activities such as phone calls, data access, or web surfing.
Installing VirusScan Mobile
The VirusScan Mobile installation file is named in the following format:
VSM-SPTP-mmnn.CAB
where the “mmnn” part of the filename is numeric and indicates a version number.
The installation file can be obtained from McAfee by download or on removable storage
media. The installation file can be run from either your device’s internal memory or
removable storage media. If you downloaded the installation file, copy it to your device
or a memory card. If you received the installation file on removable storage media,
insert it into your device.
Copy the installation file from your computer to your SmartPhone (SP), then run it. You
can use ActiveSync to transfer the .cab file from your computer to the SP. For
instructions on doing this, see the ActiveSync documentation. Once you have
transferred the .CAB file to your SP, follow the installation procedure below.
1
To install VirusScan Mobile:
1 Click
2 Go to the location (by default, the root directory) where you saved the .cab file.
3 Select the installation file to run it.
4 You must agree to the End User License Agreement (EULA) before the installation
McAfee VirusScan appears in your Programs list. Also, a system tray icon indicates that
the program is running.
Start | File Manager.
will proceed. Select View EULA to read the license agreement. Check I Agree. To start
the installation, select
Done. When the installation starts, a progress screen appears.
Uninstalling VirusScan Mobile
To uninstall VirusScan Mobile:
1 From the Main menu, select
2 Select
3 From the displayed list, select McAfee VirusScan Mobile, then click
4 You are prompted to verify that you want the program permanently removed. Click
Remove Programs.
Yes to continue or No to cancel.
Start | Settings.
Menu | Remove.
If VirusScan Mobile uninstalls normally, no further action is required. However, under
certain circumstances, the program may not uninstall normally. If this occurs, a screen
displays informing you that you must restart the device. Click
Yes to restart your device.
7