background image

About This Guide

3

Conventions Used in F-Secure Guides

This section describes the symbols, fonts, and terminology used in this 
manual.

Symbols

Fonts

Arial bold (blue)

 is used to refer to menu names and commands, to 

buttons and other items in a dialog box.

Arial Italics (blue)

 is used to refer to other chapters in the manual, book 

titles, and titles of other manuals.

Arial Italics (black)

 is used for file and folder names, for figure and table 

captions, and for directory tree names.

Arial underlined (blue)

 is used for user interface links.

WARNING:  The warning symbol indicates a situation with a 
risk of irreversible destruction to data.

IMPORTANT:  An exclamation mark provides important information 
that you need to consider.

REFERENCE - A book refers you to related information on the 
topic available in another document.

l

NOTE - A note provides additional information that you should 
consider.

TIP - A tip provides information that can help you perform a task 
more quickly or easily.

Содержание MOBILE SECURITY FOR WINDOWS MOBILE -

Страница 1: ...F Secure Mobile Security for Windows Mobile User s Guide...

Страница 2: ...poration will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Companies...

Страница 3: ...he Product Running on Your Windows Mobile 8 2 2 1 Installation 8 2 2 2 Activating The Update Service 10 2 3 Transferring Subscription to a New Device 11 2 4 Uninstalling F Secure Mobile Security 11 Ch...

Страница 4: ...nti theft 19 3 4 2 Using the Security Code 20 3 4 3 Using the SMS Alert 20 3 5 Keeping F Secure Mobile Security Up To Date 21 3 5 1 Selecting the Update Mode 21 3 6 Purchasing Subscription Service Tim...

Страница 5: ...1 ABOUT THIS GUIDE How This Guide Is Organized 2 Conventions Used in F Secure Guides 3...

Страница 6: ...e Mobile Security Chapter 2 Installation and Activation Gives instructions on installing and setting up F Secure Mobile Security Chapter 3 Using F Secure Mobile Security Describes the F Secure Mobile...

Страница 7: ...used for file and folder names for figure and table captions and for directory tree names Arial underlined blue is used for user interface links WARNING The warning symbol indicates a situation with a...

Страница 8: ...including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our con...

Страница 9: ...5 1 INTRODUCTION F Secure Mobile Security 6 Key features 6...

Страница 10: ...virus definition database F Secure Mobile Security retrieves the latest virus definition databases automatically 1 2 Key features F Secure Mobile Security offers the following key features Transparent...

Страница 11: ...7 2 INSTALLATION AND ACTIVATION System Requirements 8 Getting the Product Running on Your Windows Mobile 8 Uninstalling F Secure Mobile Security 11...

Страница 12: ...nstallation There are two ways to install F Secure Mobile Security on your Windows Mobile device depending on the type of installation file you have Directly on your mobile device cab file By using Ac...

Страница 13: ...uter 1 Run the installation program by double clicking the F Secure Mobile Security exe file on your computer If your Windows Mobile device is connected to your computer ActiveSync will install F Secu...

Страница 14: ...Windows Mobile device on for the first time after installing F Secure Mobile Security 2 Tap Free Evaluation 3 Tap Next 4 Tap Yes to confirm the connection to the update server 5 After the update has f...

Страница 15: ...ecure Mobile Security You can uninstall F Secure Mobile Security in two ways On your Windows Mobile device By using ActiveSync and your computer Direct Uninstallation To uninstall F Secure Mobile Secu...

Страница 16: ...g your computer follow these instructions 1 Close the application by selecting Exit from the menu on the main view 2 Connect your Windows Mobile device to your computer 3 Start ActiveSync on your comp...

Страница 17: ...RITY Opening and Closing the Application 14 Scanning for Viruses 15 Using Firewall 18 Protecting Confidential Information 19 Keeping F Secure Mobile Security Up To Date 21 Purchasing Subscription Serv...

Страница 18: ...ng on the background scanning your files for viruses automatically when they are accessed if the real time scanning mode is enabled and the firewall protects the system To shut down F Secure Mobile Se...

Страница 19: ...ccessed or modified All infected files are quarantined automatically For more information see Real time Scanning 15 Leave the check box unchecked to disable the real time scan Files are not scanned au...

Страница 20: ...urity finds a virus in a file you can remove the infected file completely or lock it up so that the infected file cannot be accessed To process infected files follow these instructions 1 Tap Virus pro...

Страница 21: ...tely from your device Quarantine quarantine the infected file A quarantined file is locked and cannot harm your device when F Secure Mobile Security is on Release release the quarantined file If you r...

Страница 22: ...ings in the main view 2 Tap Firewall in the settings selection list 3 Select the firewall level you want to use The firewall has the following protection levels Level Description Protection Deny All S...

Страница 23: ...ely by sending it an SMS message you have created When the device is wiped the application deletes all the information stored in the device memory To set up remote lock and wipe 1 Tap Settings in the...

Страница 24: ...rity code in a safe place To set up the security code 1 Tap Settings in the main view 2 Tap Anti theft in the settings selection list 3 Enter your Security code and type it again to confirm it Unlocki...

Страница 25: ...tes or do not use real time scanning mode you need to update the application manually To change the update mode follow these instructions 1 Tap Settings in the main view 2 Tap Virus protection in the...

Страница 26: ...starts automatically when the update is completed Upgrading the Application Manually If you want to upgrade F Secure Mobile Security install the new version For instructions see Getting the Product Ru...

Страница 27: ...rator specific continuous service subscription F Secure eStore Your local reseller Openbit SMS payment If you wish to purchase F Secure Mobile Security after using the trial version use the subscripti...

Страница 28: ...iption Code field to identify your subscription 3 Follow the instructions on the screen 3 7 Troubleshooting For troubleshooting instructions and answers to frequently asked questions see http mobile f...

Страница 29: ...25 4 TECHNICAL SUPPORT Overview 26 Virus Descriptions on the Web 26 Electronic Mail Support 26...

Страница 30: ...eb site To view the Virus Information Database connect to http www f secure com en_EMEA security Electronic Mail Support If you have questions about the product not covered in the manual or online ser...

Страница 31: ...detailed description of the problem including any error messages displayed by the program and any other details which could help us duplicate the problem When contacting F Secure support by telephone...

Страница 32: ...er in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and com...

Страница 33: ......

Страница 34: ...www f secure com...

Страница 35: ......

Отзывы: