Advertisement

Quick Links

F-Secure
Mobile Security
for Series 80
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for F-SECURE MOBILE SECURITY FOR SERIES 80

  • Page 1 F-Secure Mobile Security for Series 80 User’s Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Contents About This Guide How This Guide Is Organized ....................2 Conventions Used in F-Secure Guides ................3 Chapter 1 Introduction F-Secure Mobile Security..................... 6 Key Features........................6 Chapter 2 Installation System Requirements....................8 Installing F-Secure Mobile Security................8 2.2.1 Activating The Update Service ................. 9 Uninstalling F-Secure Mobile Security ...............
  • Page 4 Keeping F-Secure Mobile Security Up-To-Date............19 3.6.1 Update Settings ....................19 3.6.2 Upgrading the Application ................20 3.6.3 Purchasing Subscription Service Time............21 Firewall........................22 3.7.1 Protection Levels .................... 22 Chapter 4 Troubleshooting Updates........................27 Subscription ....................... 29 Firewall........................29 Uninstallation......................30...
  • Page 5: About This Guide

    BOUT UIDE How This Guide Is Organized............2 Conventions Used in F-Secure Guides ........3...
  • Page 6: How This Guide Is Organized

    How This Guide Is Organized F-Secure Mobile Security User’s Guide is divided into the following chapters: Chapter 1. Introduction. Provides general information about F-Secure Mobile Security. Chapter 2. Installation Gives instructions on installing and setting up F-Secure Mobile Security. Chapter 3.
  • Page 7: Conventions Used In F-Secure Guides

    About This Guide Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 8 For More Information Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and support contacts. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 9: Chapter 1 Introduction

    NTRODUCTION F-Secure Mobile Security ............. 6 Key Features ................6...
  • Page 10: F-Secure Mobile Security

    F-Secure Mobile Security F-Secure Mobile Security is a software product that protects data stored in your device against malicious code attacks. F-Secure Mobile Security scans all files for viruses automatically when they are accessed. All infected files are immediately quarantined to protect all other data on the device.
  • Page 11: Chapter 2 Installation

    NSTALLATION System Requirements ..............8 Installing F-Secure Mobile Security ..........8 Uninstalling F-Secure Mobile Security........10...
  • Page 12: System Requirements

    System Requirements To use F-Secure Mobile Security, your device must meet the following requirements: Device: Nokia Series 80 devices (Nokia 9300 and Nokia 9500) Available memory: 400 KB Installing F-Secure Mobile Security IMPORTANT: F-Secure Mobile Security cannot be installed on a memory card.
  • Page 13: Activating The Update Service

    If you do not know your subscription number, contact your service provider or retailer. Trial version If you want a trial version of F-Secure Mobile Security, select 30 days evaluation. To continue using it after the 30-day trial period, see “Purchasing Subscription Service...
  • Page 14: Uninstalling F-Secure Mobile Security

    Uninstalling F-Secure Mobile Security IMPORTANT: Remove all quarantined and infected files from your device before you uninstall F-Secure Mobile Security. To uninstall F-Secure Mobile Security: 1. Open F-Secure Mobile Security. Open Tools menu and select Uninstall Mobile Security. Press Unistall...
  • Page 15: Chapter 3 Using F-Secure Mobile Security

    SING ECURE OBILE ECURITY Overview..................12 Starting F-Secure Mobile Security..........12 Main View ................... 13 Selecting the Virus Protection ............ 14 Processing Infected Files ............17 Keeping F-Secure Mobile Security Up-To-Date......19 Firewall ..................22...
  • Page 16: Overview

    If you do not want to use the real-time scanning, you can manually scan all the data for viruses whenever you want. When F-Secure Mobile Security detects an infected file, you can delete or quarantine it. If you delete the file, it is removed completely while the quarantined file is locked up so that it cannot be accessed.
  • Page 17: Main View

    CHAPTER 3 Using F-Secure Mobile Security Main View The F-Secure Mobile Security main view opens when you start the application. Figure 3-1 Main view in F-Secure Mobile Security The main view displays the virus protection and firewall settings, and the product status.
  • Page 18: Selecting The Virus Protection

    Selecting the Virus Protection You can set F-Secure Mobile Security to scan all files for viruses automatically when they are accessed, or you can scan files for viruses manually.
  • Page 19: Real-Time Scanning

    Infections list. For more information, see “Infections List”, 17. Virus alerts When F-Secure Mobile Security detects a virus during a real-time scan, it displays the following warning: Figure 3-2 Virus alert in F-Secure Mobile Security Press View to view a list of all infected files.
  • Page 20 Select the file from the list and press Details to view why it could not be scanned. Press Close to exit the scan. All infected files are quarantined and cannot be accessed when F-Secure Mobile Security is running in the background.
  • Page 21: Processing Infected Files

    CHAPTER 3 Using F-Secure Mobile Security Processing Infected Files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely, or lock it up so that the infected file cannot be accessed. 3.5.1 Infections List The Infections list is opened automatically if F-Secure Mobile Security detects any infections during the scan.
  • Page 22 The Infection details view displays the path and file name of the infected file, and the name of the virus that has infected the file. You can find in-depth virus descriptions in the F-Secure web site: http://www.f-secure.com/virus-info/. Press Close to close the Infections list and return to the main view.
  • Page 23: Keeping F-Secure Mobile Security Up-To-Date

    CHAPTER 3 Using F-Secure Mobile Security Keeping F-Secure Mobile Security Up-To-Date You can keep F-Secure Mobile Security up to date by downloading the latest virus definition database from the update service. The virus definition database contains information about all the viruses that the application can find during the scan.
  • Page 24: Upgrading The Application

    IMPORTANT: Automatic Updates can be selected only if real-time scanning is on. If you have selected real-time scanning, F-Secure Mobile Security detects open internet connections. F-Secure Mobile Security downloads the virus definition database update automatically if more than 24 hours have passed since the last update.
  • Page 25: Purchasing Subscription Service Time

    Using F-Secure Mobile Security Figure 3-5 Upgrading F-Secure Mobile Security Press to get the latest version of F-Secure Mobile Security. If the updated virus definition database requires a software update to work properly, the upgrade is downloaded automatically. The new version is installed automatically.
  • Page 26: Firewall

    Firewall The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. The firewall protection level has been set to Normal. This level gives you good protection and does not affect using the most common applications.
  • Page 27 CHAPTER 3 Using F-Secure Mobile Security High Allows preinstalled applications to connect, High protection but may stop rarely used applications. Deny All Stops all network traffic. You cannot use Total protection. your e-mail, MMS or web services. Custom Allows preinstalled applications to connect, High protection but may stop rarely used applications.
  • Page 28 Add a Trigger rule You need to specify the following: › Rule name - define the rule name › Rule Type - Trigger › Define the rule under If connection exists: that trigs the rule defined under Then allow connection to: Add a Custom rule You need to specify the following: ›...
  • Page 29 CHAPTER 3 Using F-Secure Mobile Security TCP, TCP/IP protocol The Transmission Control Protocol (TCP) makes it possible for two devices to make a connection and exchange information. TCP guarantees that the information is delivered in exactly the same form it was sent.
  • Page 30: Troubleshooting

    ROUBLESHOOTING Updates ..................27 Subscription................29 Firewall ..................29 Uninstallation................30...
  • Page 31: Updates

    Reasons for the authentication failure can be as follows: › The F-Secure F-Secure Mobile Security installation folder files have been tampered. › There have been more than four attempts to move the F-Secure F-Secure Mobile Security installation and service subscription to another device.
  • Page 32 Q. How much data traffic automatic updates generate? A. When the Automatic Update feature is enabled and when the connection to the Internet is active, F-Secure Mobile Security checks for updates once a day at most. Depending on the amount of available updates, every checking generates 2-4 KB.
  • Page 33: Chapter 4 Troubleshooting

    “Purchasing Subscription Service Time”, 21. Firewall Q. How can I use IM++ with F-Secure Mobile Security? A. IM++ works with Allow All and Normal protection levels. If you are using High protection, you have to make a new rule. The new rule...
  • Page 34: Uninstallation

    Uninstallation Q. I can’t uninstall F-Secure Mobile Security, what should I do? A. Check that you don’t have an active or open connection through the firewall; close all connections and try again.
  • Page 35: Technical Support

    ECHNICAL UPPORT Overview..................32 Web Club..................32 Virus Descriptions on the Web ........... 32 Electronic Mail Support............... 32...
  • Page 36: Chapter 5 Technical Support

    CHAPTER 5 Technical Support Overview F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within F-Secure Mobile Security or from your Web browser. For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
  • Page 37 Partner. Send your e-mail to: Anti-Virus-<country>@F-Secure.com Example: Anti-Virus-Norway@F-Secure.com If there is no authorized F-Secure Anti-Virus Business Partner in your country, you can request basic technical assistance from: Anti-Virus-Support@F-Secure.com When contacting support, prepare and include the following information in your support request: ›...
  • Page 38: About F-Secure Corporation

    F-Secure Corporation is the fastest growing publicly listed company in the antivirus and intrusion prevention industry with more than 50% revenue growth in 2004. Founded in 1988, F-Secure has been listed on the Helsinki Stock Exchange since 1999. We have our headquarters in Helsinki, Finland, and offices in USA, France, Germany, Italy, Sweden, the United Kingdom and Japan.
  • Page 39 www.f-secure.com...

This manual is also suitable for:

Mobile security 80 series

Table of Contents