background image

18

 

3.4

Protecting Confidential Information

With Anti-theft, you can make sure that your device or data stored on it is 
not misused if your device is stolen. 

Anti-theft can automatically alert you and lock your device when the SIM 
card in the device is changed, and you can lock or wipe the device 
remotely with an SMS text message.

3.4.1

Using the Device Lock

Anti-theft can automatically lock your device when the SIM card in the 
device is changed. The locked device can be unlocked only with your lock 
code.

To set up the device lock:

1.

Browse to 

Settings

 and press the selection key.

2.

Select 

Anti-theft

 in the settings selection list. 

3.

Enter a 

Lock code

. The lock code needs to be at least 5 characters 

long. Store it in a safe place. 

4.

If you want to lock your device when a SIM card changes, select 

Yes

 

on 

Lock when SIM changed

.

When someone inserts a new SIM card into the device and the SIM 
change lock is turned on, the device asks for the lock code before it 
can be used.

Unlocking the Locked Device

To unlock the locked device, enter your lock code.

Your lock code protects the Anti-theft settings. You have to 
enter your current lock code before you can change any 
Anti-theft settings.

Содержание MOBILE SECURITY FOR S60 -

Страница 1: ...F Secure Mobile Security for S60 User s Guide...

Страница 2: ...poration will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies...

Страница 3: ...ystem Requirements 8 2 2 Getting the Product Running on Your Device 8 2 2 1 Installation 8 2 2 2 Activating the Update Service 10 2 3 Transferring Subscription to a New Device 11 2 4 Uninstalling 11 C...

Страница 4: ...e Anti theft 19 3 4 3 Using the SMS Alert 20 3 5 Keeping the Application Up to Date 20 3 5 1 Selecting the Update Mode 21 3 5 2 Application Updates 22 3 6 Purchasing Subscription Service Time 23 3 7 T...

Страница 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Страница 6: ...bout F Secure Mobile Security Chapter 2 Installation Gives instructions on installing and activating F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile Sec...

Страница 7: ...s black is used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situa...

Страница 8: ...including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our con...

Страница 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key Features 6...

Страница 10: ...ecurity retrieves the latest virus definition databases automatically 1 2 Key Features F Secure Mobile Security offers the following key features Transparent Operation The application runs in the back...

Страница 11: ...7 2 INSTALLATION System Requirements 8 Getting the Product Running on Your Device 8 Uninstalling 11...

Страница 12: ...vice is a two step process 1 Install F Secure Mobile Security See Installation 8 2 Activate your subscription See Activating the Update Service 10 2 2 1 Installation Select one of the following ways t...

Страница 13: ...4 After the installation you need to activate the product The product does not protect your device if you have not activated it Installation Using Your Computer To install F Secure Mobile Security on...

Страница 14: ...licensed version select Subscription code as the activation type and press Continue Enter your subscription code and press OK If you do not have a subscription code you can for example purchase a subs...

Страница 15: ...cedure is the same as for normal installation and activation For instructions see Getting the Product Running on Your Device 8 2 4 Uninstalling To uninstall the application 1 Open the application 2 Se...

Страница 16: ...SECURITY Opening and Closing the Application 13 Scanning for Viruses 14 Using Firewall 17 Protecting Confidential Information 18 Keeping the Application Up to Date 20 Purchasing Subscription Service...

Страница 17: ...the user interface is hidden the application keeps running on the background scanning your files for viruses automatically when they are accessed if the real time scanning mode is enabled and the fir...

Страница 18: ...ound and scan files when they are accessed or modified For more information see Real time Scanning 14 Manual F Secure Mobile Security scans files only when you run the virus scan yourself For more inf...

Страница 19: ...le Security finds a virus in a file you can remove the infected file completely or lock it up so that the infected file cannot be accessed To process infected files follow these instructions 1 Browse...

Страница 20: ...ce when F Secure Mobile Security is on Release release the quarantined file If you release a file it will not be locked any more You access it at your own risk Press Details to view more details about...

Страница 21: ...selection key 2 Select Firewall from the settings selection list 3 Select the desired firewall level The firewall has the following protection levels Level Description Protection Deny All Stops all ne...

Страница 22: ...your lock code To set up the device lock 1 Browse to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 Enter a Lock code The lock code needs to be at least 5 ch...

Страница 23: ...Anti theft 1 Browse to Settings and press the selection key 2 Select Anti theft in the settings selection list 3 If you want to be able to lock your device remotely follow these instructions a Enter...

Страница 24: ...ber where the SMS text message should be sent when the SIM card in the device is changed 3 5 Keeping the Application Up to Date F Secure Mobile Security includes an automatic update service which mean...

Страница 25: ...tion key 2 Select Virus protection from the settings selection list 3 Select Enabled and press Ok 4 Select one of the following Automatic updates mode Always the application downloads regular updates...

Страница 26: ...ion Updates When a new F Secure Mobile Security version is available a message asks you to download it The application restarts automatically when the update is completed Upgrading the Application Man...

Страница 27: ...purchased is either added to the time remaining in your previous order or to your free evaluation period F Secure Mobile Security supports several purchase methods depending on the distribution channe...

Страница 28: ...bled by your operator follow these instructions 1 Browse to Buy and press the selection key 2 Press Purchase The Select method screen is displayed 3 Select the Phone bill payment method 4 When prompte...

Страница 29: ...25 Technical Support Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...

Страница 30: ...e Virus Information Database connect to http www F Secure com virus info Electronic Mail Support If you have questions about F Secure Mobile Security not covered in the manual or online services at ht...

Страница 31: ...led description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone pleas...

Страница 32: ...er in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and com...

Страница 33: ......

Отзывы: