Installation Of Eset Mobile Security; Minimum System Requirements; Installation; Installation On Your Device - ESET MOBILE SECURITY Installation Manual

Windows mobile
Table of Contents

Advertisement

1. Installation of ESET Mobile
Security

1.1 Minimum system requirements

To install ESET Mobile Security for Windows Mobile, your
mobile device must meet following system requirements:
Minimum system requirements
Operating system
Windows Mobile 5.0 and later
Processor
200 MHz
Memory
16 MB
Available free space 2.5 MB

1.2 Installation

Save all open documents and exit all running applications
before installing. You can install ESET Mobile Security
directly on your device or use your computer to install it.
After successful installation, activate ESET Mobile Security
by following the steps in the
section.
1.2.1

Installation on your device

To install ESET Mobile Security directly on your device,
download the .cab installation file onto your device by
Wi-Fi, Bluetooth, USB file transfer or email attachment.
Go to Start > Programs > File Explorer to locate the file.
Tap the file to launch the installer and then follow the
prompts in the installation wizard.
Installing ESET Mobile Security
NOTE: The Windows Mobile user interface varies by
device model. The installation file may appear in a
different menu or folder on your device.
Product activation
5
Installation progress
After installation, you can modify the program settings.
However, the default configuration provides the
maximum level of protection against malicious programs.
1.2.2

Installation using your computer

To install ESET Mobile Security using your computer,
connect your mobile device to the computer via
ActiveSync (in Windows XP) or Windows Mobile Device
Center (in Windows 7 and Vista). After the device is
recognized, run the downloaded installation package (exe
file) and follow the instructions in the installation wizard.
Launching the installer on your computer
Then follow the prompts on your mobile device.
3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gateway security

Table of Contents