General Settings; Extensions Settings - ESET MOBILE SECURITY - SYMBIAN Installation Manual

Symbian
Hide thumbs Also See for MOBILE SECURITY - SYMBIAN:
Table of Contents

Advertisement

5.3 General settings

To modify scanning parameters, tap Menu > Settings >
General.
General settings
Switch the Show Alert Dialog option to On to display
threat alert notifications.
The Default action option allows you to select an action
to be performed automatically when infected files are
detected. You can choose from the following options:
Quarantine
Delete Infected File
Do Nothing
The Stored Logs option allows you to define the
maximum number of logs to be stored in the Menu >
Logs > Scan section.
If the Memory Scan is enabled, the device memory will
be automatically scanned for malicious programs prior to
the actual file scan.
If the Heuristics option is enabled, ESET Mobile Security
will use heuristic scanning techniques. Heuristics is an
algorithm-based detection method that analyzes code
and searches for typical virus behavior. Its main
advantage is the ability to identify malicious software not
yet recognized in the current virus signature database. Its
disadvantage is that additional time is required to
complete the scan.
The Archive Nesting option allows you to specify the
depth of nested archives to be scanned. (The higher the
number, the deeper the scan.)
If the Archive Deletion option is enabled, archive files (
zip, rar and jar) containing infected objects will be
automatically deleted.

5.4 Extensions settings

To specify the file types to be scanned on your mobile
device, tap Menu > Settings > Extensions.
The Extensions window will be displayed, showing the
most common file types exposed to infiltration. Select On
for the file types you wish to scan or Off to exclude
extensions from scanning. If you enable the Archives
option, all supported archive files (zip, rar and jar) will be
scanned.
To scan all files, switch the Extension Sensitive option to
Off.
Extensions settings
9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Gateway security

Table of Contents