MOBILE SECURITY 3.1 FOR SYMBIAN - Mobile Security F-SECURE - Free user manual and instructions

Find the device manual for free MOBILE SECURITY 3.1 FOR SYMBIAN F-SECURE in PDF.

📄 4 pages PDF ⬇️ English EN 💬 AI Question 🖨️ Print
Notice F-SECURE MOBILE SECURITY 3.1 FOR SYMBIAN - page 1
View the manual : Français FR English EN
Table of contents Click a title to go to the page
Manual assistant
Powered by ChatGPT
Waiting for your message
Product information

Brand : F-SECURE

Model : MOBILE SECURITY 3.1 FOR SYMBIAN

Category : Mobile Security

Download the instructions for your Mobile Security in PDF format for free! Find your manual MOBILE SECURITY 3.1 FOR SYMBIAN - F-SECURE and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. MOBILE SECURITY 3.1 FOR SYMBIAN by F-SECURE.

USER MANUAL MOBILE SECURITY 3.1 FOR SYMBIAN F-SECURE

Mobile Security for Symbian

1. Installation and Activation

Previous If you have previously installed an antivirus product in your mobile device, you Version must uninstall it before you install the application. Installation To install: + Download the installation file to your computer and move it to the device, + Download the installation file to your computer and install the product using the synchronization software on your computer, or + Download the installation directly to your device. Installation starts automatically. You can download the installation file from http://mobile.f-secure.com. After the installation, restart the device if the installation asks you to do so. When the installation is ready, you need to activate the product. The product does not protect your device if you have not activated it. Activation To startthe activation:

1. Open the application. The Welcome screen is displayed.

2. Press OK to continue.

3. Press Yes on the activation dialog and start downloading the updates.

The application connects to the update service, activates the trial period, and downloads the latest virus definition database. © The product may use SMS during the activation. In these cases, the SMS activation message registers your phone number and you will be charged your standard text message rate. After you have finished the activation, scan your device for viruses to make sure your device is clean. See the Scanning for Viruses section below. © You should scan your device whenever the application asks you to.

Subscription In order to stay fully protected after the trial period, you must subscribe to the product service. Therefore, it is recommended that you purchase additional service time before the expiration date. The expired application displays the scanning and firewall statistics but it does not scan any files or block any network traffic. The application supports several purchase methods depending on the distribution channel. Press Buy to view all available purchase methods. Most common purchase methods are:

1. The operator-specific service subscription

Scanning for Viruses Processing Infected Files The application works in the background and scans your files automatically.

1. fa virus is found during the real-time scan, a message is displayed. Press

Yes to view the infected file(s), or No to close the dialog.

2. The Infections view contains a list of infected files on the device and the

state of the file (either quarantined or released).

3. To view more details about an infected file, selectthe file and press Options

> Details. You can also manually scan the whole device for viruses whenever you want. To startthe manual scan, select Scan all from application menu. To process infected files:

1. Inthe Infections view, select the infected file to be processed.

2. Press Options > Process selected.

3. From the Select action menu, select the desired action, and press OK.

You can process the infected files in one of the following ways:

  • Quarantine - quarantine the infected file. A quarantined file is locked and cannot harm your device when Mobile Security is on. + Delete - delete the infected file. This is the recommended option. The file will be removed completely from your device. + Release - release the quarantined file. If you release a file, it will not be locked any more. You access it at your own risk. Preventing Unauthorized Network Traffic The firewall in the application works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts. The predefined firewall levels allow you to instantly change the level of protection according to your needs. © The firewall component may be missing from your application, depending on the device you are using.
  • Normal - allows all outgoing connections and blocks all incoming traffic.
  • High - allows most commonly used applications and blocks all incoming traffic.
  • Deny All - stops all network traffic. + Custom - allows network traffic based on your custom rules.

Automatic Updates Manual Updates Version Updates The application includes an automatic update service, which means that the virus definition database in the application is updated regularly. Only an up-to-date virus definition database protects your device against the latest viruses. Automatic updates are in use after you have activated the product. The application requires an active Internet connection for the updates. The application checks periodically when the virus definition database was last updated and downloads new updates if necessary. To update the application manually:

1. In any ofthe main views, press Options > Update.

The application downloads the latest virus definition database and takes it into use immediately.

2. When the update is finished, press Yes to scan your device for viruses if you

are prompted to do so. See the Scanning for Viruses section above. When à new version of the application is available, the update asks you to download the latest version. The application restarts automatically when the update is completed.

Technical Support If you have questions about the application not covered in the guides or in the online services, you can contact your local F-Secure distributor or F-Secure Corporation directly. If you have questions about the application not covered in the guide, see the frequently asked questions at http://mobile.f-secure.com. DISCLAIMER F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation wil not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify speciications cited in this document without prior notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation. This product may be covered by one or more F-Secure patents, including the following 68235372, G82366691, 82366692, 682366693, GB2367933, 68236823, GB2374260 Copyright © 2008 F-Secure Corporation. Al rights reserved