background image

F-Secure

Mobile Security

for Windows Mobile

User’s Guide

Summary of Contents for MOBILE SECURITY 6 FOR WINDOWS MOBILE -

Page 1: ...F Secure Mobile Security for Windows Mobile User s Guide ...

Page 2: ...rporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies names and data used in examples herein are fictitious unless otherwise noted No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical for any pur...

Page 3: ...the product running on your Windows Mobile 9 2 2 1 Installation 9 2 2 2 Activating the update service 11 2 3 Transferring subscription to a new device 12 2 4 Uninstalling F Secure Mobile Security 12 Chapter 3 Using F Secure Mobile Security 14 3 1 Opening and closing the application 15 3 2 Scanning for viruses 16 3 2 1 Selecting the virus protection mode 16 3 2 2 Processing infected files 18 3 3 Us...

Page 4: ...urity code 21 3 4 3 Using the SMS alert 22 3 5 Protecting web browsing 22 3 5 1 Using Browsing Protection 22 3 6 Keeping F Secure Mobile Security up to date 23 3 6 1 Selecting the update mode 24 3 7 Purchasing subscription service time 26 3 8 Troubleshooting 27 Chapter 4 Technical support 28 Overview 29 ...

Page 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3 ...

Page 6: ...re Mobile Security Chapter 2 Installation and activation Gives instructions on installing and setting up F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Security user interface Chapter 4 Technical support Provides the contact information for assistance About F Secure Corporation Describes the company background and products ...

Page 7: ... used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situation with a risk of irreversible destruction to data IMPORTANT An exclamation mark provides important information that you need to consider REFERENCE A book refers you to related information on the topic availa...

Page 8: ...l including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our constant attempts to improve our documentation we would welcome your feedback If you have any questions comments or suggestions about this or any other F Secure document please contact us at documentati...

Page 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key features 7 ...

Page 10: ...ay steal your personal information F Secure Mobile Security scans all files for viruses automatically when they are saved copied downloaded synchronized or otherwise modified All infected files are immediately quarantined to protect all other data on the device The automatic scanning happens transparently on the background To work effectively antivirus software requires an always up to date virus ...

Page 11: ...tomatic updates The application downloads regular updates to keep the virus definition database up to date automatically Firewall The application protects you from potential network harm by blocking connections that do not meet the set security criteria Anti theft You can remotely lock your mobile device or wipe the data stored on the device if it is stolen Browsing protection The application prot...

Page 12: ...8 2 INSTALLATION AND ACTIVATION System requirements 9 Getting the product running on your Windows Mobile 9 Uninstalling F Secure Mobile Security 12 ...

Page 13: ... service 11 2 2 1 Installation There are two ways to install F Secure Mobile Security on your Windows Mobile device depending on the type of installation file you have Directly on your mobile device cab file By using ActiveSync and your computer exe file Direct installation 1 Transfer the cab installation file to your Windows Mobile device or download the file with the mobile device browser at htt...

Page 14: ...stallation program by double clicking the F Secure Mobile Security exe file on your computer If your Windows Mobile device is connected to your computer ActiveSync will install F Secure Mobile Security immediately If your Windows Mobile device is not connected to the computer during the installation process ActiveSync installs F Secure Mobile Security during the next ActiveSync session 2 After ins...

Page 15: ...en you switch your Windows Mobile device on for the first time after installing F Secure Mobile Security 2 Tap Free Evaluation 3 Tap Next 4 Tap Yes to confirm the connection to the update server 5 After the update has finished select Ok Using a subscription code If the free trial period is unavailable you have to use a subscription code to activate the application If you do not have a subscription...

Page 16: ...rity You can uninstall F Secure Mobile Security in two ways On your Windows Mobile device By using ActiveSync and your computer Direct uninstallation To uninstall F Secure Mobile Security from your Windows Mobile device follow these instructions 1 Close the application by selecting Exit from the menu on the main view 2 Tap Yes to confirm that you want to disable F Secure Mobile Security 3 On the S...

Page 17: ...obile Security using your computer follow these instructions 1 Close the application by selecting Exit from the menu on the main view 2 Connect your Windows Mobile device to your computer 3 Start ActiveSync on your computer 4 Click Add Remove Programs on the ActiveSync Tools menu 5 From the list of installed applications select F Secure Mobile Security and click Remove ...

Page 18: ... and closing the application 15 Scanning for viruses 16 Using firewall 19 Protecting confidential information 20 Protecting web browsing 22 Keeping F Secure Mobile Security up to date 23 Purchasing subscription service time 26 Troubleshooting 27 ...

Page 19: ...g on the background scanning your files for viruses automatically when they are accessed if the real time scanning mode is enabled and the firewall protects the system To shut down F Secure Mobile Security completely select Exit from the menu on the main view When the real time scanning mode is turned on F Secure Mobile Security runs on the background automatically For more information see Real ti...

Page 20: ... All infected files are quarantined automatically For more information see Real time scanning 16 Leave the check box unchecked to disable the real time scan Files are not scanned automatically You should manually scan your device each time you transfer any new data to it For more information see Manual scanning 17 4 Tap ok Real time scanning The real time scan scans files for malicious content aut...

Page 21: ...mation 4 Tap ok to exit the scan All infected files are quarantined and cannot be accessed when F Secure Mobile Security is running in the background Infected The number of infections found For more information about removing infected files see Processing infected files 18 Not Scanned The number of the files that were not scanned during the scan A file cannot be scanned if another program has lock...

Page 22: ...infected file you want to process 4 Choose one of the following actions Delete delete the infected file This is the recommended option The file will be removed completely from your device Quarantine quarantine the infected file A quarantined file is locked and cannot harm your device when F Secure Mobile Security is on Release release the quarantined file If you release a file it will not be locke...

Page 23: ...rity level 1 Tap Settings in the main view 2 Tap Firewall in the settings selection list 3 Select the firewall level you want to use The firewall has the following protection levels Level Description Protection Deny All Stops all network traffic You cannot use your e mail MMS or web services Total protection High Allows most commonly used applications High protection Normal Allows all outgoing con...

Page 24: ...pe you can wipe the device remotely by sending it an SMS message you have created When the device is wiped the application deletes all the information stored in the device memory To set up remote lock and wipe 1 Tap Settings in the main view 2 Tap Anti theft in the settings selection list 3 Select which features you want to turn on If you want to be able to wipe your device remotely select Enable ...

Page 25: ...emoved 3 4 2 Using the security code You can use the security code to remotely lock or wipe your device The security code needs to be at least 8 characters long Use a code that is easy to remember but hard to guess Store the security code in a safe place To set up the security code 1 Tap Settings in the main view 2 Tap Anti theft in the settings selection list 3 Enter your Security code and type i...

Page 26: ...nd passwords Browsing Protection checks web sites that you browse with Internet Explorer Browsing Protection is turned on automatically after you have activated F Secure Mobile Security if Internet Explorer is set as your default browser If you use any third party browser Browsing Protection does not protect your web browsing 3 5 1 Using Browsing Protection To turn on Browsing Protection 1 In the ...

Page 27: ...er the site even though Browsing protection blocked it follow the I want to enter this web site anyway link in the block page 3 6 Keeping F Secure Mobile Security up to date F Secure Mobile Security includes an automatic update service which means that the virus definition database in the application is updated regularly Only an up to date virus definition database protects your device against the...

Page 28: ...definition database up to date In home network the application downloads updates from the update server automatically when your device is connected to the network of your service provider recommended Never the virus definitions are not updated automatically We do not recommend that you disable automatic updates Manual updates 1 Tap Virus protection in the main view 2 Tap Update now 3 The applicati...

Page 29: ... If you have F Secure Anti Virus installed on your device and you want to upgrade it to F Secure Mobile Security follow these instructions 1 Write down your current key code You need it to activate the new version To find your key code select Menu About in the main view 2 Uninstall the installed version 3 Download the new version 4 Install F Secure Mobile Security For more information see Getting ...

Page 30: ...tinuous service subscription F Secure eStore Your local reseller Openbit SMS payment If you wish to purchase F Secure Mobile Security after using the trial version use the subscription code provided in the About view If you received a new subscription code when you purchased service time or a new license use it to activate the software For more information follow the instructions in the purchase m...

Page 31: ... browser with your computer 2 Enter your subscription code in the Subscription Code field to identify your subscription 3 Follow the instructions on the screen 3 8 Troubleshooting For troubleshooting instructions and answers to frequently asked questions see http mobile f secure com FAQ faqwindowsmobile html F Secure eStore accepts the most commonly used credit cards and wire bank transfers ...

Page 32: ...28 4 TECHNICAL SUPPORT Overview 29 Virus descriptions on the web 29 E mail support 29 ...

Page 33: ... its Web site To view the Virus Information Database connect to http www f secure com en_EMEA security E mail support If you have questions about the product not covered in the manual or online services at http www F Secure com you can contact your local F Secure distributor or F Secure Corporation directly For technical assistance please contact your local F Secure Business Partner Send your e ma...

Page 34: ... detailed description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone please do the following so that we may help you more effectively and save time have your device at hand so you can follow instructions given by the support technician or be prepared to write down ins...

Page 35: ...der in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and computer security provider helping make computer and smartphone users networked lives safe and easy This is substantiated by the company s independently proven ability to respond faster to new threats t...

Page 36: ......

Reviews: