F-SECURE MOBILE SECURITY FOR WINDOWS MOBILE User Manual

Hide thumbs Also See for MOBILE SECURITY FOR WINDOWS MOBILE:

Advertisement

Quick Links

F-Secure
Mobile Security
for Windows Mobile
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for F-SECURE MOBILE SECURITY FOR WINDOWS MOBILE

  • Page 1 F-Secure Mobile Security for Windows Mobile User’s Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Contents About This Guide How This Guide Is Organized ....................2 Conventions Used in F-Secure Guides ................3 Chapter 1 Introduction F-Secure Mobile Security..................... 6 Key features ......................... 6 Chapter 2 Installation and Activation System Requirements....................8 Getting the Product Running on Your Windows Mobile ..........8 2.2.1 Installation ......................
  • Page 4 3.4.1 Using the Remote Anti-theft ................19 3.4.2 Using the Security Code................. 20 3.4.3 Using the SMS Alert ..................20 Keeping F-Secure Mobile Security Up-To-Date............21 3.5.1 Selecting the Update Mode ................21 Purchasing Subscription Service Time ..............23 Troubleshooting ......................24...
  • Page 5: About This Guide

    BOUT UIDE How This Guide Is Organized............2 Conventions Used in F-Secure Guides ........3...
  • Page 6: How This Guide Is Organized

    How This Guide Is Organized F-Secure Mobile Security User’s Guide is divided into the following chapters: Chapter 1. Introduction. Provides general information about F-Secure Mobile Security. Chapter 2. Installation and Activation Gives instructions on installing and setting up F-Secure Mobile Security.
  • Page 7: Conventions Used In F-Secure Guides

    About This Guide Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 8 In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 9: Chapter 1 Introduction

    NTRODUCTION F-Secure Mobile Security ............. 6 Key features ................. 6...
  • Page 10: F-Secure Mobile Security

    F-Secure Mobile Security F-Secure Mobile Security is a software product that protects data stored on your Windows Mobile device against malicious code attacks and protects the device from network intrusion attempts. F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified.
  • Page 11: Chapter 2 Installation And Activation

    NSTALLATION AND CTIVATION System Requirements ..............8 Getting the Product Running on Your Windows Mobile....8 Uninstalling F-Secure Mobile Security........11...
  • Page 12: System Requirements

    Service”, 10. 2.2.1 Installation There are two ways to install F-Secure Mobile Security on your Windows Mobile device, depending on the type of installation file you have: Directly on your mobile device (.cab file), By using ActiveSync and your computer (.exe file).
  • Page 13 “Activating The Update Service”, 10. Installation Using Your Computer To install F-Secure Mobile Security on your Windows Mobile device using a computer, you must have the .exe installation file and Microsoft ActiveSync version 3.7.1 or later on your computer. To install F-Secure Mobile Security using a computer: 1.
  • Page 14: Activating The Update Service

    2.2.2 Activating The Update Service How you activate the update service depends on where you bought F-Secure Mobile Security from. There are two main ways to activate the update service: by using the free-trial period, if it is available. by using a subscription code.
  • Page 15: Transferring Subscription To A New Device

    By using ActiveSync and your computer. IMPORTANT: Remove all quarantined and infected files from your device before you uninstall F-Secure Mobile Security. Direct Uninstallation To uninstall F-Secure Mobile Security from your Windows Mobile device, follow these instructions: 1. Close the application by selecting Exit from the menu on the main view.
  • Page 16 Uninstallation with Your Computer To uninstall F-Secure Mobile Security using your computer, follow these instructions: 1. Close the application by selecting Exit from the menu on the main view.
  • Page 17: Using F-Secure Mobile Security

    SING ECURE OBILE ECURITY Opening and Closing the Application ......... 14 Scanning for Viruses ..............15 Using Firewall................18 Protecting Confidential Information ..........19 Keeping F-Secure Mobile Security Up-To-Date......21 Purchasing Subscription Service Time........23 Troubleshooting................24...
  • Page 18: Opening And Closing The Application

    Opening and Closing the Application After you have activated F-Secure Mobile Security, it starts up automatically every time you turn on your device. To open the user interface: 1. Select Start Mobile Security. If you are prompted to run a virus scan, tap Yes.
  • Page 19: Scanning For Viruses

    The real-time scan scans files for malicious content automatically when they are accessed or modified and when they are copied to the device. Virus When F-Secure Mobile Security detects a virus during a real-time scan, the virus is quarantined and added to the Infections list immediately. Alerts F-Secure Mobile Security alerts you about viruses detected during the real-time scan.
  • Page 20: Processing Infected Files

    3.2.2 Processing Infected Files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely or lock it up so that the infected file cannot be accessed. To process infected files, follow these instructions: 1.
  • Page 21: Chapter 3 Using F-Secure Mobile Security

    Security is on. Release - release the quarantined file. If you release a file, it will not be locked any more. You access it at your own risk. You can find in-depth virus descriptions in the F-Secure web site: http://www.f-secure.com/virus-info/.
  • Page 22: Using Firewall

    Using Firewall The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. By default, the firewall protection level is set to Normal. This level gives you good protection and does not affect using the most common applications.
  • Page 23: Protecting Confidential Information

    CHAPTER 3 Using F-Secure Mobile Security Protecting Confidential Information With Anti-theft, you can make sure that your device or data stored on it is not misused if your device is stolen and Anti-theft can alert you if somebody changes the SIM card in your device.
  • Page 24: Using The Security Code

    #LOCK#<security code> (For example: #LOCK#abcd1234) Locked device can be unlocked only with the system lock password. • To wipe the device, send the following SMS message to your device: #WIPE#<security code> (For example: #WIPE#abcd1234) When the device is wiped, all data stored on it is removed. 3.4.2 Using the Security Code You can use the security code to remotely lock or wipe your device.
  • Page 25: Keeping F-Secure Mobile Security Up-To-Date

    You can freely update F-Secure Mobile Security as long as you have an active subscription. To keep your device continuously protected, purchase additional service time well before the expiration date.
  • Page 26 “Getting the Product Running on Your Windows Mobile”, 8. If you have F-Secure Anti-Virus installed on your device and you want to upgrade it to F-Secure Mobile Security, follow these instructions: 1. Write down your current key code. You need it to activate the new version.
  • Page 27: Purchasing Subscription Service Time

    Your local reseller Openbit SMS payment If you wish to purchase F-Secure Mobile Security after using the trial version, use the subscription code provided in the About view. If you received a new subscription code when you purchased service time or a new license, use it to activate the software.
  • Page 28: Troubleshooting

    Enter your subscription code in the Subscription Code field to identify your subscription. F-Secure eStore accepts the most commonly used credit cards and wire/bank transfers. Follow the instructions on the screen. Troubleshooting For troubleshooting instructions and answers to frequently asked...
  • Page 29: Chapter 4 Technical Support

    ECHNICAL UPPORT Overview..................26 Virus Descriptions on the Web ........... 26 Electronic Mail Support............... 26...
  • Page 30: Overview

    CHAPTER 4 Technical Support Overview F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within the product or from your Web browser. For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
  • Page 31 When contacting F-Secure support by telephone, please do the following so that we may help you more effectively and save time: have your device at hand, so you can follow instructions given by the support technician, or be prepared to write down instructions.
  • Page 32 This is substantiated by the company’s independently proven ability to respond faster to new threats than its main competitors. Founded in 1988 and headquartered in Finland, F-Secure has been listed on the OMX Nordic Exchange Helsinki since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry.
  • Page 34 www.f-secure.com...

This manual is also suitable for:

Mobile security windows mobile

Table of Contents