F-SECURE MOBILE SECURITY 3.1 FOR S60 User Manual

For s60

Advertisement

Quick Links

F-Secure
Mobile Security
for S60
User's Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the F-SECURE MOBILE SECURITY 3.1 FOR S60 and is the answer not in the manual?

Questions and answers

Summary of Contents for F-SECURE F-SECURE MOBILE SECURITY 3.1 FOR S60

  • Page 1 F-Secure Mobile Security for S60 User’s Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Contents About This Guide How This Guide Is Organized ....................2 Conventions Used in F-Secure Guides ................3 Symbols ........................3 Chapter 1 Introduction F-Secure Mobile Security..................... 6 Key Features........................ 6 Chapter 2 Installation System Requirements....................8 Getting the Product Running on Your Device .............. 8 2.2.1 Installation ......................
  • Page 4 3.4.1 Selecting the Update Mode ................20 3.4.2 Application Updates..................21 Purchasing Subscription Service Time ..............21 Troubleshooting ......................22 Technical Support Overview ..........................26 Virus Descriptions on the Web ................... 26 Electronic Mail Support ...................... 26 About F-Secure Corporation...
  • Page 5: About This Guide

    BOUT UIDE How This Guide Is Organized............2 Conventions Used in F-Secure Guides ........3...
  • Page 6: How This Guide Is Organized

    How This Guide Is Organized F-Secure Mobile Security User’s Guide is divided into the following chapters: Chapter 1. Introduction. Provides general information about F-Secure Mobile Security. Chapter 2. Installation Gives instructions on installing and activating F-Secure Mobile Security. Chapter 3.
  • Page 7: Conventions Used In F-Secure Guides

    Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 8 In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 9: Chapter 1 Introduction

    NTRODUCTION F-Secure Mobile Security ............. 6 Key Features ................6...
  • Page 10: F-Secure Mobile Security

    F-Secure Mobile Security F-Secure Mobile Security is a software product that protects data stored in your S60 device against malicious code attacks and monitors incoming and outgoing connections and protects the device from network intrusion attempts. F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified.
  • Page 11: Chapter 2 Installation

    NSTALLATION System Requirements ..............8 Getting the Product Running on Your Device....... 8 Uninstalling................. 11...
  • Page 12: System Requirements

    “Activating the Update Service”, 9. 2.2.1 Installation Select one of the following ways to install F-Secure Mobile Security on your device: Download the installation file to your computer and move it to the device, Download the installation file to your computer and install the product via Nokia PC Suite, or Download the installation directly to your device.
  • Page 13: Activating The Update Service

    Installation Using Your Computer To install F-Secure Mobile Security on your device using a computer, you must have the .sis installation file and Nokia PC Suite installed on your computer.
  • Page 14: Transferring Subscription To A New Device

    Done. Enter your subscription number and press OK. If you do not have a subscription number, you can for example purchase a subscription number from the F-Secure estore; http://www.f-secure.com/estore. Press to connect to the update service and start downloading the updates.
  • Page 15: Uninstalling

    CHAPTER 2 Installation Uninstalling IMPORTANT: Scan you device, and remove all quarantined and infected files before you uninstall F-Secure Mobile Security. To uninstall the application: 1. Open the application. Select Options > Exit shut down the application. Open Application Manager on your device.
  • Page 16: Using F-Secure Mobile Security

    SING ECURE OBILE ECURITY Opening and Closing the Application ......... 13 Scanning for Viruses ..............14 Using Firewall................17 Keeping the Application Up-to-Date ........... 19 Purchasing Subscription Service Time........21 Troubleshooting................22...
  • Page 17: Opening And Closing The Application

    Using F-Secure Mobile Security Opening and Closing the Application After you have activated F-Secure Mobile Security, it starts up automatically every time you turn on your device. If you have selected the manual scanning mode, you need to start the application manually: 1.
  • Page 18: Scanning For Viruses

    The real-time scan scans files for malicious content automatically when they are accessed or modified and when they are copied to the device. Virus When F-Secure Mobile Security detects a virus during a real-time scan, Alerts the virus is quarantined and added to the Infections list immediately.
  • Page 19: Processing Infected Files

    3.2.2 Processing Infected Files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely or lock it up so that the infected file cannot be accessed. To process infected files, follow these instructions: 1.
  • Page 20 The Infection details view displays the path and file name of the infected file, and the name of the virus that has infected the file. You can find in-depth virus descriptions in the F-Secure web site: http://www.f-secure.com/virus-info/. File Details...
  • Page 21: Using Firewall

    CHAPTER 3 Using F-Secure Mobile Security Using Firewall The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. By default, the firewall protection level is set to Normal. This level gives you good protection and does not affect using the most common applications.
  • Page 22 TCP/UDP On the TCP/UDP view, you can add your own custom firewall rules. To create a new rule: 1. Select Options > Add rule. 2. Select Rule name and enter a name for the new rule. 3. Select Type and choose the rule type. Select Normal if you want to keep defined ports open all the time.
  • Page 23: Keeping The Application Up-To-Date

    You can freely update F-Secure Mobile Security as long as you have an active subscription. To keep your device continuously protected, purchase additional service time well before the...
  • Page 24: Selecting The Update Mode

    3.4.1 Selecting the Update Mode Automatic updates are in use after you have activated the product. If you disable automatic updates or do not use real-time scanning mode, you need to update the application manually. To change the update mode, follow these instructions: 1.
  • Page 25: Application Updates

    “Getting the Product Running on Your Device”, 8. If you have F-Secure Anti-Virus installed on your device and you want to upgrade it to F-Secure Mobile Security, follow these instructions: 1. Write down your current key code. You need it to activate the new version.
  • Page 26: Troubleshooting

    Enter your subscription number in the Subscription Number field to identify your subscription. F-Secure eStore accepts the most commonly used credit cards and wire/bank transfers. Follow the instructions on the screen. Using SMS...
  • Page 27 Technical Support Overview..................26 Virus Descriptions on the Web ........... 26 Electronic Mail Support............... 26...
  • Page 28: Overview

    Overview F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within F-Secure Mobile Security or from your Web browser. For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
  • Page 29: Technical Support

    When contacting F-Secure support by telephone, please do the following so that we may help you more effectively and save time: have your device at hand, so you can follow instructions given by the support technician, or be prepared to write down instructions.
  • Page 30: About F-Secure Corporation

    They include antivirus and desktop firewall with intrusion prevention, antispam and antispyware solutions. Founded in 1988, F-Secure has been listed on the Helsinki Exchanges since 1999, and has been consistently growing faster than all its publicly listed competitors.

This manual is also suitable for:

Mobile security 3.0 for s60Mobile security

Table of Contents