background image

CHAPTER 3

 

15

Using F-Secure Mobile Security

Manual Scanning

To scan all files on your device and the inserted memory card, follow 
these instructions:

1.

Select 

More > Scan all

.

2.

After the virus scan is finished, the application displays the following 
information:

3.

Press 

Back

 to exit the scan. All infected files are quarantined and 

cannot be accessed when F-Secure Mobile Security is running in the 
background.

3.2.2

Processing Infected Files

When F-Secure Mobile Security finds a virus in a file, you can remove the 
infected file completely or lock it up so that the infected file cannot be 
accessed.

To process infected files, follow these instructions:

1.

You can process infected files in the 

Infections

 view or 

Infection 

details

 view:

a.

In the 

Infections

 view, select the infected file to be processed 

and press 

More > Process marked

.

b.

In the 

Infection details

 view, press 

More > Process

.

Infected

The number of infections found. For more 
information about removing infected files, see 

Processing Infected Files”, 15

Not Scanned

The number of the files that were not scanned 
during the scan. A file cannot be scanned if 
another program has locked it or if the file is 
corrupted.

Scanned

The number of the files that were scanned.

Summary of Contents for MOBILE SECURITY FOR UIQ -

Page 1: ...F Secure Mobile Security for UIQ User s Guide...

Page 2: ...poration will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies...

Page 3: ...ystem Requirements 8 2 2 Getting the Product Running on Your Device 8 2 2 1 Installation 8 2 2 2 Activating the Update Service 9 2 3 Transferring Subscription to a New Device 10 2 4 Uninstalling 11 Ch...

Page 4: ...on Up to Date 18 3 4 1 Selecting the Update Mode 18 3 4 2 Application Updates 19 3 5 Purchasing Subscription Service Time 20 3 6 Troubleshooting 21 Technical Support 25 Overview 26 Virus Descriptions...

Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Page 6: ...bout F Secure Mobile Security Chapter 2 Installation Gives instructions on installing and activating F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Sec...

Page 7: ...s black is used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situa...

Page 8: ...including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our con...

Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Page 10: ...effectively antivirus software requires an always up to date virus definition database F Secure Mobile Security retrieves the latest virus definition databases automatically 1 2 Key Features F Secure...

Page 11: ...7 2 INSTALLATION System Requirements 8 Getting the Product Running on Your Device 8 Uninstalling 11...

Page 12: ...ce is a two step process 1 Install F Secure Mobile Security See Installation 8 2 Activate your subscription See Activating the Update Service 9 2 2 1 Installation Select one of the following ways to i...

Page 13: ...ion Using Your Computer To install F Secure Mobile Security on your device using a computer you must have the sis installation file and Sony Ericsson PC Suite installed on your computer 1 Connect your...

Page 14: ...number During the first update the application downloads the latest virus definition database For more information see Keeping the Application Up to Date 18 4 When the download is complete a message...

Page 15: ...ct More Exit shut down the application 3 Open Control panel on your device 4 Select Other Uninstall 5 Scroll to F Secure and press Uninstall 6 Press Yes to confirm the uninstallation IMPORTANT Scan yo...

Page 16: ...ING F SECURE MOBILE SECURITY Opening and Closing the Application 13 Scanning for Viruses 14 Using Firewall 17 Keeping the Application Up to Date 18 Purchasing Subscription Service Time 20 Troubleshoot...

Page 17: ...rface but keeps the application running on the background scanning your files for viruses automatically when they are accessed only when the real time scanning mode is enabled The firewall protects th...

Page 18: ...ey are accessed or modified For more information see Real time Scanning 14 Manual Scan F Secure Mobile Security scans files only when you run the virus scan yourself For more information see Manual Sc...

Page 19: ...the infected file completely or lock it up so that the infected file cannot be accessed To process infected files follow these instructions 1 You can process infected files in the Infections view or...

Page 20: ...u access it at your own risk Press Details to view more details about the selected file The Infection details view displays the path and file name of the infected file and the name of the virus that h...

Page 21: ...s you good protection and does not affect using the most common applications 3 3 1 Selecting the Protection Level The firewall has five protection levels Level Description Protection Allow All Allows...

Page 22: ...the virus definition database was last updated and downloads new updates if necessary 3 4 1 Selecting the Update Mode Automatic updates are in use after you have activated the product If you disable a...

Page 23: ...on restarts automatically when the update is completed Upgrading the Application Manually If you want to upgrade F Secure Mobile Security install the new version For instructions see Getting the Produ...

Page 24: ...local reseller If you wish to purchase F Secure Mobile Security after using the trial version use the subscription number provided in the About view If you received a new subscription code when you pu...

Page 25: ...CHAPTER3 21 Using F Secure Mobile Security 3 6 Troubleshooting For troubleshooting instructions and answers to frequently asked questions see http mobile f secure com FAQ...

Page 26: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...

Page 27: ...o view the Virus Information Database connect to http www F Secure com virus info Electronic Mail Support If you have questions about F Secure Mobile Security not covered in the manual or online servi...

Page 28: ...iption of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone please do the...

Page 29: ...all with intrusion prevention antispam and antispyware solutions Founded in 1988 F Secure has been listed on the Helsinki Exchanges since 1999 and has been consistently growing faster than all its pub...

Page 30: ......

Reviews: