background image

CHAPTER 3

 

23

Using F-Secure Mobile Security

Custom Level Rules

The 

Custom

 protection level has three types of rules you can add: 

Add a Normal rule

You need to specify the following:

Rule name

 - define the rule name

Rule Type

 - Normal

Protocol

 - TCP or UDP

Direction

 - incoming or outgoing

Ports - 

set the destination port range (from 1 to 65535)

High

Allows preinstalled applications to connect, 
but may stop rarely used applications. 

High protection

Deny All

Stops all network traffic. You cannot use 
your e-mail, MMS or web services.

Total protection.

Custom

Allows preinstalled applications to connect, 
but may stop rarely used applications. You 
can add three types of rules: 

Normal

Trigger

Custom

 (see “

Custom Level 

Rules

, 23

).

High protection

Rule

Description

Normal

To allow TCP or UDP ports in or out.

Trigger

For more complex connections. You need to set an “if - 
then” structure to define a protocol and ports that trig a 
rule on for another protocol and port.

Custom

To define a protocol number that is allowed in and out.

Summary of Contents for MOBILE SECURITY FOR SERIES 80

Page 1: ...F Secure Mobile Security for Series 80 User s Guide...

Page 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Page 3: ...m Requirements 8 2 2 Installing F Secure Mobile Security 8 2 2 1 Activating The Update Service 9 2 3 Uninstalling F Secure Mobile Security 10 Chapter 3 Using F Secure Mobile Security 11 3 1 Overview 1...

Page 4: ...Subscription Service Time 21 3 7 Firewall 22 3 7 1 Protection Levels 22 Chapter 4 Troubleshooting 26 4 1 Updates 27 4 2 Subscription 29 4 3 Firewall 29 4 4 Uninstallation 30 Chapter 5 Technical Suppor...

Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Page 6: ...pter 2 Installation Gives instructions on installing and setting up F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes how to use F Secure Mobile Security Chapter 4 Troublesho...

Page 7: ...l Italics black is used for file and folder names for figure and table captions and for directory tree names Courier New is used for messages on your computer screen WARNING The warning symbol indicat...

Page 8: ...ortable Document Format The PDF document can be used for online viewing and printing using Adobe Acrobat Reader When printing the manual please print the entire manual including the copyright and disc...

Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Page 10: ...ion database F Secure Mobile Security gets the latest virus definition databases automatically 1 2 Key Features F Secure Mobile Security offers the following key features Transparent Operation The app...

Page 11: ...7 2 INSTALLATION System Requirements 8 Installing F Secure Mobile Security 8 Uninstalling F Secure Mobile Security 10...

Page 12: ...ement and press Ok 4 Wait until the installation is complete 5 Enter your subscription number when prompted 6 Press Yes to update the virus definition database Device Nokia Series 80 devices Nokia 930...

Page 13: ...age as an SMS message If you do not receive it enter your subscription number when you start the F Secure Mobile Security for the first time To activate the update service later press Activate in the...

Page 14: ...Mobile Security 1 Open F Secure Mobile Security 2 Open Tools menu and select Uninstall Mobile Security 3 Press Unistall to confirm the uninstallation IMPORTANT Remove all quarantined and infected fil...

Page 15: ...F SECURE MOBILE SECURITY Overview 12 Starting F Secure Mobile Security 12 Main View 13 Selecting the Virus Protection 14 Processing Infected Files 17 Keeping F Secure Mobile Security Up To Date 19 Fi...

Page 16: ...t When F Secure Mobile Security detects an infected file you can delete or quarantine it If you delete the file it is removed completely while the quarantined file is locked up so that it cannot be ac...

Page 17: ...anual Scan 15 Press Update to get the latest virus definition database update For more information see Keeping F Secure Mobile Security Up To Date 19 Virus protection Displays the type of virus scan i...

Page 18: ...anning type 1 Press Settings in the main view 2 Select Virus Protection then select one of the following Real time F Secure Mobile Security runs in the background and scans files when they are accesse...

Page 19: ...Security detects a virus during a real time scan it displays the following warning Figure 3 2 Virus alert in F Secure Mobile Security Press View to view a list of all infected files For more informat...

Page 20: ...cted The number of infections found Press Infections to to view a list of infected files For more information about removing infected files see Processing Infected Files 17 Not Scanned The number of f...

Page 21: ...obile Security The list displays the name of the infected file and the current infection status A Quarantined file is locked and cannot be accessed A Released file is infected but is not quarantined S...

Page 22: ...ls view displays the path and file name of the infected file and the name of the virus that has infected the file Press Close to close the Infections list and return to the main view You can find in d...

Page 23: ...n a connection to the Internet or manually whenever you want Automatic Updates You can set F Secure Mobile Security to download updates automatically once a day when the device has an active connectio...

Page 24: ...ect the Internet access point to connect to the update server F Secure Mobile Security connects to the update server and downloads the latest virus definition database The application takes the virus...

Page 25: ...nuously protected you should purchase additional service time well before the expiration date The additional service time purchased is either added to the time remaining in your previous order or to y...

Page 26: ...evel gives you good protection and does not affect using the most common applications Figure 3 6 Firewall Settings with Normal protection level 3 7 1 Protection Levels The firewall has five protection...

Page 27: ...y used applications High protection Deny All Stops all network traffic You cannot use your e mail MMS or web services Total protection Custom Allows preinstalled applications to connect but may stop r...

Page 28: ...l The Internet uses Internet Protocol IP packets to deliver information from one device to another IP packets include other protocols which are designed for different kinds of tasks Port A port is an...

Page 29: ...akes it possible for two devices to make a connection and exchange information TCP guarantees that the information is delivered in exactly the same form it was sent TCP is often referred to as TCP IP...

Page 30: ...26 4 TROUBLESHOOTING Updates 27 Subscription 29 Firewall 29 Uninstallation 30...

Page 31: ...ernet access point settings with your operator You should also check that the date and time settings in your device are correct If you have problems connecting through WAP access points you should con...

Page 32: ...1MB the automatic updates add approximately 10 cents to your phone bill If an updated application is also available because of the large amount of data F Secure Mobile Security displays the amount of...

Page 33: ...g Subscription Service Time 21 4 3 Firewall Q How can I use IM with F Secure Mobile Security A IM works with Allow All and Normal protection levels If you are using High protection you have to make a...

Page 34: ...30 4 4 Uninstallation Q I can t uninstall F Secure Mobile Security what should I do A Check that you don t have an active or open connection through the firewall close all connections and try again...

Page 35: ...31 5 TECHNICAL SUPPORT Overview 32 Web Club 32 Virus Descriptions on the Web 32 Electronic Mail Support 32...

Page 36: ...ite open the Web Club page and click Web Club on the Web Club tab of the General property page To connect to the Web Club directly from within your Web browser go to http www f secure com webclub 5 3...

Page 37: ...your F Secure software program including the build number if available Name and version number of your operating system including the build number A detailed description of the problem including any...

Page 38: ...er Communications The latest real time virus threat scenario news are available at the F Secure Antivirus Research Team weblog at http www f secure com weblog Services for Individuals and Businesses F...

Page 39: ...www f secure com...

Reviews: