background image

iii

Contents

About This Guide

1

How This Guide Is Organized .............................................................................................. 2
Conventions Used in F-Secure Guides................................................................................ 3

Symbols ...................................................................................................................... 3

Chapter 1

Introduction

5

1.1

F-Secure Mobile Security.............................................................................................6

1.2

Key Features................................................................................................................6

Chapter 2

Installation

7

2.1

System Requirements..................................................................................................8

2.2

Getting the Product Running on Your Device ..............................................................8
2.2.1 Installation ........................................................................................................8
2.2.2 Activating the Update Service ..........................................................................9

2.3

Transferring Subscription to a New Device................................................................10

2.4

Uninstalling.................................................................................................................11

Chapter 3

Using F-Secure Mobile Security

12

3.1

Opening and Closing the Application .........................................................................13

3.2

Scanning for Viruses ..................................................................................................14
3.2.1 Selecting the Virus Protection Mode ..............................................................14
3.2.2 Processing Infected Files ...............................................................................15

3.3

Using Firewall.............................................................................................................17

Содержание MOBILE SECURITY 3.0 FOR S60

Страница 1: ...F Secure Mobile Security for S60 User s Guide...

Страница 2: ...poration will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies...

Страница 3: ...ystem Requirements 8 2 2 Getting the Product Running on Your Device 8 2 2 1 Installation 8 2 2 2 Activating the Update Service 9 2 3 Transferring Subscription to a New Device 10 2 4 Uninstalling 11 Ch...

Страница 4: ...eeping the Application Up to Date 19 3 4 1 Selecting the Update Mode 20 3 4 2 Application Updates 21 3 5 Purchasing Subscription Service Time 21 3 6 Troubleshooting 22 Technical Support 25 Overview 26...

Страница 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Страница 6: ...bout F Secure Mobile Security Chapter 2 Installation Gives instructions on installing and activating F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Sec...

Страница 7: ...s black is used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situa...

Страница 8: ...including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our con...

Страница 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Страница 10: ...k effectively antivirus software requires an always up to date virus definition database F Secure Mobile Security retrieves the latest virus definition databases automatically 1 2 Key Features F Secur...

Страница 11: ...7 2 INSTALLATION System Requirements 8 Getting the Product Running on Your Device 8 Uninstalling 11...

Страница 12: ...curity See Installation 8 2 Activate your subscription See Activating the Update Service 9 2 2 1 Installation Select one of the following ways to install F Secure Mobile Security on your device Downlo...

Страница 13: ...llation Using Your Computer To install F Secure Mobile Security on your device using a computer you must have the sis installation file and Nokia PC Suite installed on your computer 1 Connect your dev...

Страница 14: ...ber During the first update the application downloads the latest virus definition database For more information see Keeping the Application Up to Date 19 4 When the download is complete a message info...

Страница 15: ...Options Exit shut down the application 3 Open Application Manager on your device 4 Scroll to F Secure Mobile Security 5 Select Options Remove 6 Press Yes to confirm the uninstallation IMPORTANT Scan...

Страница 16: ...ING F SECURE MOBILE SECURITY Opening and Closing the Application 13 Scanning for Viruses 14 Using Firewall 17 Keeping the Application Up to Date 19 Purchasing Subscription Service Time 21 Troubleshoot...

Страница 17: ...interface but keeps the application running on the background scanning your files for viruses automatically when they are accessed only when the real time scanning mode is enabled The firewall protect...

Страница 18: ...hen they are accessed or modified For more information see Real time Scanning 14 Manual Scan F Secure Mobile Security scans files only when you run the virus scan yourself For more information see Man...

Страница 19: ...ompletely or lock it up so that the infected file cannot be accessed To process infected files follow these instructions 1 You can process infected files in the Infections view or Infection details vi...

Страница 20: ...it will not be locked any more You access it at your own risk Press Details to view more details about the selected file The Infection details view displays the path and file name of the infected file...

Страница 21: ...level press Options Change and choose the level To use your custom rules select Custom level 3 3 2 Editing Custom Firewall Rules To edit your custom rules select Options Edit FW Custom Rules To use y...

Страница 22: ...want to allow other protocol than TCP or UDP traffic Define the protocol by its number in the Protocol number field 4 Select Protocol and choose whether you want to allow TCP or UDP Protocol traffic...

Страница 23: ...ns that the virus definition database in the application is updated regularly Only an up to date virus definition database protects your device against the latest viruses The application requires an a...

Страница 24: ...date Never the virus definitions are not updated automatically It is not recommended to disable automatic updates In home network the application downloads updates from the update server automaticall...

Страница 25: ...d the new version 4 Install F Secure Mobile Security For more information see Getting the Product Running on Your Device 8 5 Activate the new version with your key code For instructions see Activating...

Страница 26: ...ubscription 3 Follow the instructions on the screen Using SMS To purchase more subscription service time by sending an SMS only if enabled by your operator follow these instructions 1 Go to the Subscr...

Страница 27: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...

Страница 28: ...e Virus Information Database connect to http www F Secure com virus info Electronic Mail Support If you have questions about F Secure Mobile Security not covered in the manual or online services at ht...

Страница 29: ...led description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone pleas...

Страница 30: ...all with intrusion prevention antispam and antispyware solutions Founded in 1988 F Secure has been listed on the Helsinki Exchanges since 1999 and has been consistently growing faster than all its pub...

Страница 31: ......

Отзывы: