Summary of Contents for F-SECURE MOBILE SECURITY FOR SERIES 80
Page 1
F-Secure Mobile Security for Series 80 User’s Guide...
Page 2
Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Contents About This Guide How This Guide Is Organized ....................2 Conventions Used in F-Secure Guides ................3 Chapter 1 Introduction F-Secure Mobile Security..................... 6 Key Features........................6 Chapter 2 Installation System Requirements....................8 Installing F-Secure Mobile Security................8 2.2.1 Activating The Update Service ................. 9 Uninstalling F-Secure Mobile Security ...............
How This Guide Is Organized F-Secure Mobile Security User’s Guide is divided into the following chapters: Chapter 1. Introduction. Provides general information about F-Secure Mobile Security. Chapter 2. Installation Gives instructions on installing and setting up F-Secure Mobile Security. Chapter 3.
About This Guide Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
Page 8
For More Information Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and support contacts. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
F-Secure Mobile Security F-Secure Mobile Security is a software product that protects data stored in your device against malicious code attacks. F-Secure Mobile Security scans all files for viruses automatically when they are accessed. All infected files are immediately quarantined to protect all other data on the device.
System Requirements To use F-Secure Mobile Security, your device must meet the following requirements: Device: Nokia Series 80 devices (Nokia 9300 and Nokia 9500) Available memory: 400 KB Installing F-Secure Mobile Security IMPORTANT: F-Secure Mobile Security cannot be installed on a memory card.
If you do not know your subscription number, contact your service provider or retailer. Trial version If you want a trial version of F-Secure Mobile Security, select 30 days evaluation. To continue using it after the 30-day trial period, see “Purchasing Subscription Service...
Uninstalling F-Secure Mobile Security IMPORTANT: Remove all quarantined and infected files from your device before you uninstall F-Secure Mobile Security. To uninstall F-Secure Mobile Security: 1. Open F-Secure Mobile Security. Open Tools menu and select Uninstall Mobile Security. Press Unistall...
If you do not want to use the real-time scanning, you can manually scan all the data for viruses whenever you want. When F-Secure Mobile Security detects an infected file, you can delete or quarantine it. If you delete the file, it is removed completely while the quarantined file is locked up so that it cannot be accessed.
CHAPTER 3 Using F-Secure Mobile Security Main View The F-Secure Mobile Security main view opens when you start the application. Figure 3-1 Main view in F-Secure Mobile Security The main view displays the virus protection and firewall settings, and the product status.
Selecting the Virus Protection You can set F-Secure Mobile Security to scan all files for viruses automatically when they are accessed, or you can scan files for viruses manually.
Infections list. For more information, see “Infections List”, 17. Virus alerts When F-Secure Mobile Security detects a virus during a real-time scan, it displays the following warning: Figure 3-2 Virus alert in F-Secure Mobile Security Press View to view a list of all infected files.
Page 20
Select the file from the list and press Details to view why it could not be scanned. Press Close to exit the scan. All infected files are quarantined and cannot be accessed when F-Secure Mobile Security is running in the background.
CHAPTER 3 Using F-Secure Mobile Security Processing Infected Files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely, or lock it up so that the infected file cannot be accessed. 3.5.1 Infections List The Infections list is opened automatically if F-Secure Mobile Security detects any infections during the scan.
Page 22
The Infection details view displays the path and file name of the infected file, and the name of the virus that has infected the file. You can find in-depth virus descriptions in the F-Secure web site: http://www.f-secure.com/virus-info/. Press Close to close the Infections list and return to the main view.
CHAPTER 3 Using F-Secure Mobile Security Keeping F-Secure Mobile Security Up-To-Date You can keep F-Secure Mobile Security up to date by downloading the latest virus definition database from the update service. The virus definition database contains information about all the viruses that the application can find during the scan.
IMPORTANT: Automatic Updates can be selected only if real-time scanning is on. If you have selected real-time scanning, F-Secure Mobile Security detects open internet connections. F-Secure Mobile Security downloads the virus definition database update automatically if more than 24 hours have passed since the last update.
Using F-Secure Mobile Security Figure 3-5 Upgrading F-Secure Mobile Security Press to get the latest version of F-Secure Mobile Security. If the updated virus definition database requires a software update to work properly, the upgrade is downloaded automatically. The new version is installed automatically.
Firewall The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. The firewall protection level has been set to Normal. This level gives you good protection and does not affect using the most common applications.
Page 27
CHAPTER 3 Using F-Secure Mobile Security High Allows preinstalled applications to connect, High protection but may stop rarely used applications. Deny All Stops all network traffic. You cannot use Total protection. your e-mail, MMS or web services. Custom Allows preinstalled applications to connect, High protection but may stop rarely used applications.
Page 28
Add a Trigger rule You need to specify the following: › Rule name - define the rule name › Rule Type - Trigger › Define the rule under If connection exists: that trigs the rule defined under Then allow connection to: Add a Custom rule You need to specify the following: ›...
Page 29
CHAPTER 3 Using F-Secure Mobile Security TCP, TCP/IP protocol The Transmission Control Protocol (TCP) makes it possible for two devices to make a connection and exchange information. TCP guarantees that the information is delivered in exactly the same form it was sent.
Reasons for the authentication failure can be as follows: › The F-Secure F-Secure Mobile Security installation folder files have been tampered. › There have been more than four attempts to move the F-Secure F-Secure Mobile Security installation and service subscription to another device.
Page 32
Q. How much data traffic automatic updates generate? A. When the Automatic Update feature is enabled and when the connection to the Internet is active, F-Secure Mobile Security checks for updates once a day at most. Depending on the amount of available updates, every checking generates 2-4 KB.
“Purchasing Subscription Service Time”, 21. Firewall Q. How can I use IM++ with F-Secure Mobile Security? A. IM++ works with Allow All and Normal protection levels. If you are using High protection, you have to make a new rule. The new rule...
Uninstallation Q. I can’t uninstall F-Secure Mobile Security, what should I do? A. Check that you don’t have an active or open connection through the firewall; close all connections and try again.
ECHNICAL UPPORT Overview..................32 Web Club..................32 Virus Descriptions on the Web ........... 32 Electronic Mail Support............... 32...
CHAPTER 5 Technical Support Overview F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within F-Secure Mobile Security or from your Web browser. For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
Page 37
Partner. Send your e-mail to: Anti-Virus-<country>@F-Secure.com Example: Anti-Virus-Norway@F-Secure.com If there is no authorized F-Secure Anti-Virus Business Partner in your country, you can request basic technical assistance from: Anti-Virus-Support@F-Secure.com When contacting support, prepare and include the following information in your support request: ›...
F-Secure Corporation is the fastest growing publicly listed company in the antivirus and intrusion prevention industry with more than 50% revenue growth in 2004. Founded in 1988, F-Secure has been listed on the Helsinki Stock Exchange since 1999. We have our headquarters in Helsinki, Finland, and offices in USA, France, Germany, Italy, Sweden, the United Kingdom and Japan.