background image

F-Secure 

Mobile Security

for S60

User’s Guide

Summary of Contents for MOBILE SECURITY 6 FOR S60 -

Page 1: ...F Secure Mobile Security for S60 User s Guide ...

Page 2: ...rporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies names and data used in examples herein are fictitious unless otherwise noted No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any pur...

Page 3: ...uirements 9 2 2 Getting the product running on your device 9 2 2 1 Installation 9 2 2 2 Activating the product after the installation 11 2 3 Transferring the subscription to a new device 12 2 4 Uninstalling 12 Chapter 3 Using F Secure Mobile Security 13 3 1 Opening and closing the application 14 3 2 Scanning for viruses 15 3 2 1 Selecting the virus protection mode 15 3 2 2 Processing infected file...

Page 4: ...4 Locating the lost device 21 3 5 Protecting web browsing 22 3 5 1 Using Browsing protection 22 3 6 Keeping the application up to date 24 3 6 1 Selecting the update mode 24 3 6 2 Application updates 25 3 7 Purchasing subscription service time 26 3 8 Troubleshooting 28 Technical Support 25 Overview 26 Virus descriptions on the web 26 Electronic mail support 26 About F Secure Corporation ...

Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3 ...

Page 6: ...about F Secure Mobile Security Chapter 2 Installation Gives instructions on installing and activating F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Security user interface Technical Support Provides the contact information for assistance About F Secure Corporation Describes the company background and products ...

Page 7: ...cs black is used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situation with a risk of irreversible destruction to data IMPORTANT An exclamation mark provides important information that you need to consider REFERENCE A book refers you to related information on the t...

Page 8: ...l including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our constant attempts to improve our documentation we would welcome your feedback If you have any questions comments or suggestions about this or any other F Secure document please contact us at documentati...

Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key features 7 ...

Page 10: ...re Mobile Security scans all files for viruses automatically when they are saved copied downloaded synchronized or otherwise modified All infected files are immediately quarantined to protect all other data on the device The automatic scanning happens transparently on the background To work effectively antivirus software requires an always up to date virus definition database F Secure Mobile Secur...

Page 11: ...pdates to keep the virus definition database up to date Firewall The application protects you from potential network harm by blocking information that does not meet the set security criteria Anti theft The application protects your confidential infromation by locking the device automatically when the SIM card is changed You can also send a message to your mobile device to locate it or remotely wip...

Page 12: ...8 2 INSTALLATION System requirements 9 Getting the product running on your device 9 Uninstalling 12 ...

Page 13: ...vice is a two step process 1 Install F Secure Mobile Security See Installation 9 2 Activate your subscription See Activating the product after the installation 11 2 2 1 Installation Select one of the following ways to install F Secure Mobile Security on your device Install the application directly on the device or Download the installation file to your computer and install the product via Nokia PC...

Page 14: ...e installation you need to activate the product The product does not protect your device if you have not activated it Installation using your computer To install F Secure Mobile Security on your device using a computer you must have the sis installation file and Nokia PC Suite installed on your computer 1 Connect your device to your computer 2 Double click the installation file to start the instal...

Page 15: ...t with only the Anti theft feature active select Anti theft only as the activation type and press Continue If you already have a subscription code select Subscription code as the activation type and press Continue Then enter your subscription code and press OK 4 The activation requires a connection to the update service Press Yes to connect to the update service The application connects to the upd...

Page 16: ...e same as for normal installation and activation For instructions see Getting the product running on your device 9 2 4 Uninstalling To uninstall the application 1 Open the application 2 Select Options Exit shut down the application 3 Open Application Manager on your device 4 Scroll to F Secure Mobile Security 5 Select Options Remove 6 Press Yes to confirm the uninstallation You should scan your de...

Page 17: ...ning and closing the application 14 Scanning for viruses 15 Using firewall 18 Protecting confidential information 19 Protecting web browsing 22 Keeping the application up to date 24 Purchasing subscription service time 26 Troubleshooting 28 ...

Page 18: ... is hidden the application keeps running on the background scanning your files for viruses automatically when they are accessed if the real time scanning mode is enabled and the firewall protects the system To shut down F Secure Mobile Security completely select Options Exit When the real time scanning mode is enabled F Secure Mobile Security runs on the background automatically For more informati...

Page 19: ...ty runs on the background and scan files when they are accessed or modified For more information see Real time scanning 15 Manual F Secure Mobile Security scans files only when you run the virus scan yourself For more information see Manual scanning 16 4 Press Back Real time scanning The real time scan scans files for malicious content automatically when they are accessed or modified and when they...

Page 20: ...ss Back to exit the scan All infected files are quarantined and cannot be accessed when F Secure Mobile Security is running in the background Infected The number of infections found For more information about removing infected files see Processing infected files 17 Not Scanned The number of the files that were not scanned during the scan A file cannot be scanned if another program has locked it or...

Page 21: ...the following actions Delete delete the infected file This is the recommended option The file will be removed completely from your device Quarantine quarantine the infected file A quarantined file is locked and cannot harm your device when F Secure Mobile Security is on Release release the quarantined file If you release a file it will not be locked any more You access it at your own risk Press De...

Page 22: ...ect Firewall from the settings selection list 3 Select the desired firewall level The firewall has the following protection levels Level Description Protection Deny All Stops all network traffic You cannot use your e mail MMS or web services Total protection High Allows most commonly used applications High protection Normal Allows all outgoing connections Recommended level Good protection Allow Al...

Page 23: ...e unlocked only with your lock code To set up the device lock 1 Browse to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 Enter a Lock code The lock code needs to be at least 5 characters long Store it in a safe place 4 If you want to lock your device when a SIM card changes select Yes on Lock when SIM changed When someone inserts a new SIM card into the d...

Page 24: ...e to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 If you want to be able to lock your device remotely follow these instructions a Enter a Lock code if you have not created it yet b Turn on Remote lock 4 If you want to be able to wipe your device remotely follow these instructions a Enter a Wipe code The wipe code needs to be at least 8 characters long S...

Page 25: ...i theft to send you an SMS text message when somebody changes the SIM card in your device To use the SMS alert turn on the SMS alert when SIM changed setting and specify the phone number where the SMS text message should be sent when the SIM card in the device is changed 3 4 4 Locating the lost device You can send an SMS text message to your lost device to locate it the Remote lock setting has to ...

Page 26: ...elect whether you want to use Browsing protection all the time or only when you are browsing the web on your own operator s network Select My operator only to use Browsing protection only when you are using your own operator s network Select the All operators setting to keep the protection turned on when you are travelling and outside of your own operator s network When you try to enter to a web s...

Page 27: ...e information cannot be connected to you in any way No user account information no IP address information or no license information is included in the information you submit We protect your privacy further by using encryption when transferring the information The submitted information is used for improving the protection capabilities of our services and products To change the privacy mode 1 Browse...

Page 28: ...ode you need to update the application manually To change the update mode follow these instructions 1 Browse to Settings and press the selection key 2 Select Virus protection from the settings selection list 3 Select Enabled and press Ok 4 Select one of the following Automatic updates mode Always the application downloads regular updates from the update server automatically to keep the virus defin...

Page 29: ...ing 16 3 6 2 Application updates When a new F Secure Mobile Security version is available a message asks you to download it The application restarts automatically when the update is completed Upgrading the application manually If you want to upgrade F Secure Mobile Security install the new version For instructions see Getting the product running on your device 9 If you have F Secure Anti Virus ins...

Page 30: ...hannel Most common purchase methods are The operator specific continuous service subscription F Secure eStore Your local reseller Openbit SMS payment If you wish to purchase F Secure Mobile Security after using the trial version use the subscription code provided in the About view If you received a new subscription code when you purchased service time or a new license use it to activate the softwa...

Page 31: ...n service time purchase 4 In the response SMS you receive a confirmation of your purchase and a code for activating the service Buying with credit card To purchase more subscription service time using the application follow these instructions 1 Browse to Buy and press the selection key The Select method screen is displayed 2 Select Buy with credit card the length of your new subscription and the b...

Page 32: ... your device is not protected follow these instructions 1 Browse to Security overview and press the selection key 2 Select the item with either red or yellow status icon and press the selection key to solve the issue For more troubleshooting instructions and answers to frequently asked questions see http mobile f secure com FAQ faqs60 html ...

Page 33: ...25 Technical Support Overview 26 Virus descriptions on the web 26 Electronic mail support 26 ...

Page 34: ...he Virus Information Database connect to http www F Secure com virus info Electronic mail support If you have questions about F Secure Mobile Security not covered in the manual or online services at http www F Secure com you can contact your local F Secure distributor or F Secure Corporation directly For technical assistance please contact your local F Secure Business Partner Send your e mail to A...

Page 35: ...iled description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone please do the following so that we may help you more effectively and save time have your device at hand so you can follow instructions given by the support technician or be prepared to write down instruct...

Page 36: ...der in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and computer security provider helping make computer and smartphone users networked lives safe and easy This is substantiated by the company s independently proven ability to respond faster to new threats t...

Page 37: ......

Reviews: