F-SECURE MOBILE SECURITY 6 FOR S60 User Manual

Hide thumbs Also See for MOBILE SECURITY 6 FOR S60:

Advertisement

Quick Links

F-Secure
Mobile Security
for S60
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for F-SECURE MOBILE SECURITY 6 FOR S60

  • Page 1 F-Secure Mobile Security for S60 User’s Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Contents About This Guide How This Guide Is Organized ....................2 Conventions Used in F-Secure Guides ................3 Symbols ........................3 Chapter 1 Introduction F-Secure Mobile Security..................... 6 Key features ......................... 7 Chapter 2 Installation System requirements ....................9 Getting the product running on your device ..............9 2.2.1 Installation ......................
  • Page 4 Keeping the application up-to-date ................24 3.6.1 Selecting the update mode................24 3.6.2 Application updates ..................25 Purchasing subscription service time................. 26 Troubleshooting ......................28 Technical Support Overview ..........................26 Virus descriptions on the web .................... 26 Electronic mail support .......................26 About F-Secure Corporation...
  • Page 5: About This Guide

    BOUT UIDE How This Guide Is Organized............2 Conventions Used in F-Secure Guides ........3...
  • Page 6: How This Guide Is Organized

    How This Guide Is Organized F-Secure Mobile Security User’s Guide is divided into the following chapters: Chapter 1. Introduction. Provides general information about F-Secure Mobile Security. Chapter 2. Installation Gives instructions on installing and activating F-Secure Mobile Security. Chapter 3.
  • Page 7: Conventions Used In F-Secure Guides

    Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 8 In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 9: Chapter 1 Introduction

    NTRODUCTION F-Secure Mobile Security ............. 6 Key features ................. 7...
  • Page 10: F-Secure Mobile Security

    F-Secure Mobile Security F-Secure Mobile Security is a software product that protects data stored in your S60 device against malicious code attacks and monitors incoming and outgoing connections and protects the device from network intrusion attempts. F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified.
  • Page 11: Key Features

    CHAPTER 1 Introduction Key features F-Secure Mobile Security offers the following key features. Transparent The application runs in the background while you use your device. operation Extensive The application automatically scans all files when they are accessed. You can also manually scan your device for viruses whenever you want.
  • Page 12: Chapter 2 Installation

    NSTALLATION System requirements..............9 Getting the product running on your device........9 Uninstalling................. 12...
  • Page 13: System Requirements

    “Activating the product after the installation”, 11. 2.2.1 Installation Select one of the following ways to install F-Secure Mobile Security on your device: Install the application directly on the device, or  Download the installation file to your computer and install the ...
  • Page 14 Installation using your computer To install F-Secure Mobile Security on your device using a computer, you must have the .sis installation file and Nokia PC Suite installed on your computer.
  • Page 15: Activating The Product After The Installation

    Continue. Then enter your subscription code and press OK. You can purchase a subscription code from the F-Secure estore; http://www.f-secure.com/estore. The activation requires a connection to the update service. Press to connect to the update service.The application connects to the update service and activates the product.
  • Page 16: Transferring The Subscription To A New Device

    For instructions, see “Getting the product running on your device”, 9. Uninstalling IMPORTANT: Scan you device, and remove all quarantined and infected files before you uninstall F-Secure Mobile Security. To uninstall the application: 1. Open the application. Select Options > Exit shut down the application.
  • Page 17: Using F-Secure Mobile Security

    SING ECURE OBILE ECURITY Opening and closing the application........... 14 Scanning for viruses..............15 Using firewall ................18 Protecting confidential information ..........19 Protecting web browsing ............22 Keeping the application up-to-date..........24 Purchasing subscription service time ......... 26 Troubleshooting................28...
  • Page 18: Opening And Closing The Application

    Opening and closing the application After you have activated F-Secure Mobile Security, it starts up automatically every time you turn on your device. If you have selected the manual scanning mode, you need to start the application manually: 1. Press the...
  • Page 19: Scanning For Viruses

     and scan files when they are accessed or modified. For more information, see “Real-time scanning”, 15. Manual - F-Secure Mobile Security scans files only when you run  the virus scan yourself. For more information, see “Manual scanning”, 16.
  • Page 20 Scanned The number of the files that were scanned. 4. Press Back to exit the scan. All infected files are quarantined and cannot be accessed when F-Secure Mobile Security is running in the background.
  • Page 21: Processing Infected Files

    Using F-Secure Mobile Security 3.2.2 Processing infected files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely or lock it up so that the infected file cannot be accessed. To process infected files, follow these instructions: 1.
  • Page 22: Using Firewall

    Using firewall The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. By default, the firewall protection level is set to Normal. This level gives you good protection and does not affect using the most common applications.
  • Page 23: Protecting Confidential Information

    CHAPTER 3 Using F-Secure Mobile Security Protecting confidential information With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen. Anti-theft can automatically alert you and lock your device when the SIM card in the device is changed, and you can lock or wipe the device remotely with an SMS text message.
  • Page 24: Using The Remote Anti-Theft

    3.4.2 Using the remote Anti-theft When the remote Anti-theft is turned on, you can send an SMS that contains your lock or wipe code to your device to lock it or to wipe all information in it. The locked device can be unlocked only with your lock code. If you wipe the device, the application deletes all the information stored in the device memory.
  • Page 25: Using The Sms Alert

    CHAPTER 3 Using F-Secure Mobile Security To lock or wipe your device remotely: • To lock the device, send the following SMS message to your device: #LOCK#<lock code> (For example: #LOCK#abcd1234) Locked device can be unlocked only with the system lock password.
  • Page 26: Protecting Web Browsing

    Protecting web browsing Browsing protection protects you from web sites that may steal your personal information, including credit card numbers, user account information, and passwords. Browsing protection checks web sites that you browse with the default browser of your device. If you use any third-party browser, Browsing protection does not protect your web browsing.
  • Page 27 CHAPTER 3 Using F-Secure Mobile Security Privacy mode Browsing protection can send information of web sites that contain harmful content to the analysis automatically to maintain the quality of service. You can choose which information you want to submit to the analysis.
  • Page 28: Keeping The Application Up-To-Date

    You can freely update F-Secure Mobile Security as long as you have an active subscription. To keep your device continuously protected, purchase additional service time well before the expiration date.
  • Page 29: Application Updates

    “Getting the product running on your device”, 9. If you have F-Secure Anti-Virus installed on your device and you want to upgrade it to F-Secure Mobile Security, follow these instructions: 1. Write down your current key code. You need it to activate the new version.
  • Page 30: Purchasing Subscription Service Time

    Openbit SMS payment  If you wish to purchase F-Secure Mobile Security after using the trial version, use the subscription code provided in the About view. If you received a new subscription code when you purchased service time or a new license, use it to activate the software.
  • Page 31 If you have a license already, you can activate the service with your license code. The application open the link to the F-Secure eStore. Follow the on-screen instructions to finish the purchase.
  • Page 32: Troubleshooting

    1. Browse to Security overview and press the selection key. Select the item with either red or yellow status icon and press the selection key to solve the issue. For more troubleshooting instructions and answers to frequently asked questions, see http://mobile.f-secure.com/FAQ/faqs60.html.
  • Page 33: Technical Support

    Technical Support Overview..................26 Virus descriptions on the web............. 26 Electronic mail support ............... 26...
  • Page 34: Overview

    Overview F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within F-Secure Mobile Security or from your Web browser. For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
  • Page 35 When contacting F-Secure support by telephone, please do the following so that we may help you more effectively and save time: have your device at hand, so you can follow instructions given by ...
  • Page 36: About F-Secure Corporation

    This is substantiated by the company’s independently proven ability to respond faster to new threats than its main competitors. Founded in 1988 and headquartered in Finland, F-Secure has been listed on the OMX Nordic Exchange Helsinki since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry.

This manual is also suitable for:

Mobile security s60

Table of Contents