iii
Contents
About This Guide
1
How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3
Chapter 1
Introduction
5
1.1
F-Secure Mobile Security.............................................................................................6
1.2
Key Features................................................................................................................6
Chapter 2
Installation
7
2.1
System Requirements..................................................................................................8
2.2
Installing F-Secure Mobile Security..............................................................................8
2.2.1 Activating The Update Service .........................................................................9
2.3
Uninstalling F-Secure Mobile Security .......................................................................10
Chapter 3
Using F-Secure Mobile Security
11
3.1
Overview ....................................................................................................................12
3.2
Starting F-Secure Mobile Security .............................................................................12
3.3
Main View...................................................................................................................13
3.4
Selecting the Virus Protection ....................................................................................14
3.4.1 Real-time Scanning ........................................................................................15
3.4.2 Manual Scanning............................................................................................15
3.5
Processing Infected Files ...........................................................................................17
3.5.1 Infections List..................................................................................................17
Summary of Contents for MOBILE SECURITY 80 Series
Page 1: ...F Secure Mobile Security for Series 80 User s Guide...
Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...
Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...
Page 30: ...26 4 TROUBLESHOOTING Updates 27 Subscription 29 Firewall 29 Uninstallation 30...
Page 39: ...www f secure com...