background image

CHAPTER 2

 

11

Installation

6.

After you have finished the activation, scan your device for viruses to 
make sure your device is clean. For instructions, see “

Manual 

Scanning

, 15

. The default firewall level after the installation and 

activation is 

Normal

.

2.3

Transferring Subscription to a New Device

You can transfer your subscription to a new device a maximum of four 
times. The procedure is the same as for normal installation and activation. 
For instructions, see “

Getting the Product Running on Your Device

, 8

.

2.4

Uninstalling

To uninstall the application:

1.

Open the application.

2.

Select 

Options > Exit

 shut down the application.

3.

Open 

Application Manager

 on your device.

4.

Scroll to F-Secure Mobile Security.

5.

Select 

Options > Remove

.

6.

Press 

Yes

 to confirm the uninstallation.

You should scan your device whenever the application asks 
you to.

IMPORTANT: Scan you device, and remove all quarantined and 
infected files before you uninstall F-Secure Mobile Security.

Summary of Contents for MOBILE SECURITY FOR S60 -

Page 1: ...F Secure Mobile Security for S60 User s Guide...

Page 2: ...poration will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies...

Page 3: ...ystem Requirements 8 2 2 Getting the Product Running on Your Device 8 2 2 1 Installation 8 2 2 2 Activating the Update Service 10 2 3 Transferring Subscription to a New Device 11 2 4 Uninstalling 11 C...

Page 4: ...e Anti theft 19 3 4 3 Using the SMS Alert 20 3 5 Keeping the Application Up to Date 20 3 5 1 Selecting the Update Mode 21 3 5 2 Application Updates 22 3 6 Purchasing Subscription Service Time 23 3 7 T...

Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Page 6: ...bout F Secure Mobile Security Chapter 2 Installation Gives instructions on installing and activating F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Sec...

Page 7: ...s black is used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situa...

Page 8: ...including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our con...

Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Page 10: ...ecurity retrieves the latest virus definition databases automatically 1 2 Key Features F Secure Mobile Security offers the following key features Transparent Operation The application runs in the back...

Page 11: ...7 2 INSTALLATION System Requirements 8 Getting the Product Running on Your Device 8 Uninstalling 11...

Page 12: ...vice is a two step process 1 Install F Secure Mobile Security See Installation 8 2 Activate your subscription See Activating the Update Service 10 2 2 1 Installation Select one of the following ways t...

Page 13: ...4 After the installation you need to activate the product The product does not protect your device if you have not activated it Installation Using Your Computer To install F Secure Mobile Security on...

Page 14: ...licensed version select Subscription code as the activation type and press Continue Enter your subscription code and press OK If you do not have a subscription code you can for example purchase a subs...

Page 15: ...cedure is the same as for normal installation and activation For instructions see Getting the Product Running on Your Device 8 2 4 Uninstalling To uninstall the application 1 Open the application 2 Se...

Page 16: ...SECURITY Opening and Closing the Application 13 Scanning for Viruses 14 Using Firewall 17 Protecting Confidential Information 18 Keeping the Application Up to Date 20 Purchasing Subscription Service...

Page 17: ...the user interface is hidden the application keeps running on the background scanning your files for viruses automatically when they are accessed if the real time scanning mode is enabled and the fir...

Page 18: ...ound and scan files when they are accessed or modified For more information see Real time Scanning 14 Manual F Secure Mobile Security scans files only when you run the virus scan yourself For more inf...

Page 19: ...le Security finds a virus in a file you can remove the infected file completely or lock it up so that the infected file cannot be accessed To process infected files follow these instructions 1 Browse...

Page 20: ...ce when F Secure Mobile Security is on Release release the quarantined file If you release a file it will not be locked any more You access it at your own risk Press Details to view more details about...

Page 21: ...selection key 2 Select Firewall from the settings selection list 3 Select the desired firewall level The firewall has the following protection levels Level Description Protection Deny All Stops all ne...

Page 22: ...your lock code To set up the device lock 1 Browse to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 Enter a Lock code The lock code needs to be at least 5 ch...

Page 23: ...Anti theft 1 Browse to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 If you want to be able to lock your device remotely follow these instructions a Enter...

Page 24: ...ber where the SMS text message should be sent when the SIM card in the device is changed 3 5 Keeping the Application Up to Date F Secure Mobile Security includes an automatic update service which mean...

Page 25: ...tion key 2 Select Virus protection from the settings selection list 3 Select Enabled and press Ok 4 Select one of the following Automatic updates mode Always the application downloads regular updates...

Page 26: ...ion Updates When a new F Secure Mobile Security version is available a message asks you to download it The application restarts automatically when the update is completed Upgrading the Application Man...

Page 27: ...purchased is either added to the time remaining in your previous order or to your free evaluation period F Secure Mobile Security supports several purchase methods depending on the distribution channe...

Page 28: ...bled by your operator follow these instructions 1 Browse to Buy and press the selection key 2 Press Purchase The Select method screen is displayed 3 Select the Phone bill payment method 4 When prompte...

Page 29: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...

Page 30: ...e Virus Information Database connect to http www F Secure com virus info Electronic Mail Support If you have questions about F Secure Mobile Security not covered in the manual or online services at ht...

Page 31: ...led description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone pleas...

Page 32: ...er in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and com...

Page 33: ......

Reviews: