MOBILE SECURITY FOR UIQ - Mobile Security F-SECURE - Free user manual and instructions
Find the device manual for free MOBILE SECURITY FOR UIQ F-SECURE in PDF.
User questions about MOBILE SECURITY FOR UIQ F-SECURE
0 question about this device. Answer the ones you know or ask your own.
Ask a new question about this device
Download the instructions for your Mobile Security in PDF format for free! Find your manual MOBILE SECURITY FOR UIQ - F-SECURE and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. MOBILE SECURITY FOR UIQ by F-SECURE.
USER MANUAL MOBILE SECURITY FOR UIQ F-SECURE
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372
GB2366691
GB2366692
GB2366693
GB2367933
GB2368233
GB2374260
Contents
About This Guide 1
How This Guide Is Organized 2
Conventions Used in F-Secure Guides 3
Symbols 3
Chapter 1 Introduction 5
1.1 F-Secure Mobile Security 6
1.2 Key Features 6
Chapter 2 Installation
2.1 System Requirements 8
2.2 Getting the Product Running on Your Device 8
2.2.1 Installation 8
2.2.2 Activating the Update Service 9
2.3 Transferring Subscription to a New Device 10
2.4 Uninstalling 11
Chapter 3 Using F-Secure Mobile Security 12
3.1 Opening and Closing the Application 13
3.2 Scanning for Viruses 14
3.2.1 Selecting the Virus Protection Mode 14
3.2.2 Processing Infected Files 15
3.3 Using Firewall 17
3.3.1 Selecting the Protection Level 17
3.4 Keeping the Application Up-to-Date 18
3.4.1 Selecting the Update Mode 18
3.4.2 Application Updates 19
3.5 Purchasing Subscription Service Time 20
3.6 Troubleshooting 21
Technical Support 25
Overview 26
Virus Descriptions on the Web 26
Electronic Mail Support 26
About F-Secure Corporation
ABOUT THIS GUIDE
How This Guide Is Organized 2
Conventions Used in F-Secure Guides 3
How This Guide Is Organized
F-Secure Mobile Security User's Guide is divided into the following chapters:
Chapter 1. Introduction. Provides general information about F-Secure Mobile Security.
Chapter 2. Installation. Gives instructions on installing and activating F-Secure Mobile Security.
Chapter 3. Using F-Secure Mobile Security. Describes the F-Secure Mobile Security user interface.
Technical Support. Provides the contact information for assistance.
About F-Secure Corporation. Describes the company background and products.
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this manual.
Symbols
WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data.
IMPORTANT: An exclamation mark provides important information that you need to consider.
REFERENCE - A book refers you to related information on the topic available in another document.
NOTE - A note provides additional information that you should consider.
TIP - A tip provides information that can help you perform a task more quickly or easily.
An arrow indicates a one-step procedure.
Fonts
Arial bold (blue) is used to refer to menu names and commands, to buttons and other items in a dialog box.
Ariel Italics (blue) is used to refer to other chapters in the manual, book titles, and titles of other manuals.
Aerial Italics (black) is used for file and folder names, for figure and table captions, and for directory tree names.
Aerial underlined (blue) is used for user interface links.
PDF Document
This manual is provided in PDF (Portable Document Format). The PDF document can be used for online viewing and printing using Adobe® Acrobat® Reader. When printing the manual, please print the entire manual, including the copyright and disclaimer statements.
For More Information
Visit F-Secure at http://www.f-secure.com for documentation, training courses, downloads, and service and support contacts.
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
1 INTRODUCTION
F-Secure Mobile Security 6
Key Features 6
1.1 F-Secure Mobile Security
F-Secure Mobile Security is a software product that protects data stored in your device against malicious code attacks and monitors incoming and outgoing connections and protects the device from network intrusion attempts.
F-Secure Mobile Security scans all files for viruses automatically when they are saved, copied, downloaded, synchronized or otherwise modified. All infected files are immediately quarantined to protect all other data on the device. The automatic scanning happens transparently on the background.
To work effectively, antivirus software requires an always up-to-date virus definition database. F-Secure Mobile Security retrieves the latest virus definition databases automatically.
1.2 Key Features
F-Secure Mobile Security offers the following key features.
Transparent Operation
The application runs in the background while you use your device.
Extensive Scanning
The application automatically scans all files when they are accessed. You can also manually scan your device for viruses whenever you want.
Automatic Updates
The application automatically downloads regular updates to keep the virus definition database up-to-date.
Firewall
The application protects you from potential network harm by blocking information that does not meet the set security criteria.
2
INSTALLATION
System Requirements 8
Getting the Product Running on Your Device 8
Uninstalling 11
2.1 System Requirements
To use F-Secure Mobile Security, your device must meet the following requirements:
Platform: Sony Ericsson UIQ devices.
See http://mobile.f-secure.com/devices/ for a full list of supported devices.
Internet connection: You must have an Internet connection from your device to activate the application.
To test your Internet access point, browse with your device browser to https://msp.f-secure.com/web-test/
If you can access the page, your Internet access point is suitable for activation and updates.
2.2 Getting the Product Running on Your Device
Getting your F-Secure Mobile Security running on your device is a two-step process:
- Install F-Secure Mobile Security. See "Installation", 8.
- Activate your subscription. See "Activating the Update Service", 9.
2.2.1 Installation
Select one of the following ways to install F-Secure Mobile Security on your device:
Install the application directly on the device, or
Download the installation file to your computer and install the product via Sony Ericsson PC Suite.
Installation on the Device
- Download the installation file to your computer and move it to the device or download the installation directly to your device.
- If you downloaded the installation file directly, the installation starts automatically. Otherwise, find and open the installation file that you moved to the device.
- When the installation is ready, restart your device if the installation asks you to do so.
- After the installation, you need to activate the product. The product does not protect your device if you have not activated it.
Installation Using Your Computer
To install F-Secure Mobile Security on your device using a computer, you must have the .sis installation file and Sony Ericsson PC Suite installed on your computer.
- Connect your device to your computer.
- Double-click the installation file to start the installation.
- When the installation is ready, restart your device if the installation asks you to do so.
- After the installation, you need to activate the product. The product does not protect your device if you have not activated it.
2.2.2 Activating the Update Service
How you activate the update service depends on where you bought F-Secure Mobile Security from. There are two main ways to activate the update service:
by using the free-trial period, if it is available.
by using a subscription number.
To start the activation:
- Open the application.
- Select the activation type:
To start the evaluation period, select Free evaluation as the activation type if it is available and press Done, or
To have the fully licensed version, select Subscription number as the activation type, and press Done. Enter your subscription number and press Done.
If you do not have a subscription number, you can for example purchase a subscription number from the F-Secure estore; http://www.f-secure.com/estore.
- Press Yes to connect to the update service and start downloading the updates.
The application connects to the update service and submits your subscription number. During the first update, the application downloads the latest virus definition database. For more information, see “Keeping the Application Up-to-Date”, 18.
- When the download is complete, a message informs you that the registration was successful and that the application is activated. Press Continue.
- After you have finished the activation, scan your device for viruses to make sure your device is clean. For instructions, see "Manual Scanning", 15. The default firewall level after the installation and activation is Normal.

You should scan your device whenever the application asks you to.
2.3 Transferring Subscription to a New Device
You can transfer your subscription to a new device a maximum of four times. The procedure is the same as for normal installation and activation.
For instructions, see "Getting the Product Running on Your Device", 8.
2.4 Uninstalling

IMPORTANT: Scan you device, and remove all quarantined and infected files before you uninstall F-Secure Mobile Security.
To uninstall the application:
- Open the application.
- Select More > Exit shut down the application.
- Open Control panel on your device.
- Select Other > Uninstall.
- Scroll to F-Secure and press Uninstall.
- Press Yes to confirm the uninstallation.
3
USING F-SECURE MOBILE SECURITY
Opening and Closing the Application 13
Scanning for Viruses 14
Using Firewall 17
Keeping the Application Up-to-Date 18
Purchasing Subscription Service Time 20
Troubleshooting 21
3.1 Opening and Closing the Application
After you have activated F-Secure Mobile Security, it starts up automatically every time you turn on your device. If you have selected the manual scanning mode, you need to start the application manually:
- Go to the main menu and scroll to the icon.
- Select Open.

When the real-time scanning mode is enabled, F-Secure Mobile Security runs on the background automatically. For more information, see "Real-time Scanning", 14.
Closing the User Interface
Pressing the Back key hides the user interface, but keeps the application running on the background, scanning your files for viruses automatically when they are accessed (only when the real-time scanning mode is enabled). The firewall protects the system.
To shut down F-Secure Mobile Security completely, select More > Exit.

IMPORTANT: If you shut down the application, infected files are no longer quarantined and the system is not protected against viruses. Shutting down the application disabled the firewall.
3.2 Scanning for Viruses
The application scans all accessed and modified data on your device automatically for malicious content when the real-time scanning is enabled. If you do not want to use the real-time scanning, you can manually scan all the data for viruses whenever you want.
3.2.1 Selecting the Virus Protection Mode
- In any of the main views, press More > Settings.
- Go to Virus protection and press Change to change the virus protection mode.
Real-time - F-Secure Mobile Security runs on the background and scan files when they are accessed or modified. For more information, see "Real-time Scanning", 14.
- Manual Scan - F-Secure Mobile Security scans files only when you run the virus scan yourself. For more information, see "Manual Scanning", 15.
3. Press Back.
Real-time Scanning
The real-time scan scans files for malicious content automatically when they are accessed or modified and when they are copied to the device.
Virus Alerts
When F-Secure Mobile Security detects a virus during a real-time scan, the virus is quarantined and added to the Infections list immediately.
F-Secure Mobile Security alerts you about viruses detected during the real-time scan. You can press Yes to view details about the infected file. For more information, see "Processing Infected Files", 15.
Manual Scanning
To scan all files on your device and the inserted memory card, follow these instructions:
- Select More > Scan all.
- After the virus scan is finished, the application displays the following information:
Infected
The number of infections found. For more information about removing infected files, see "Processing Infected Files", 15
Not Scanned
The number of the files that were not scanned during the scan. A file cannot be scanned if another program has locked it or if the file is corrupted.
Scanned
The number of the files that were scanned.
- Press Back to exit the scan. All infected files are quarantined and cannot be accessed when F-Secure Mobile Security is running in the background.
3.2.2 Processing Infected Files
When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely or lock it up so that the infected file cannot be accessed.
To process infected files, follow these instructions:
- You can process infected files in the Infections view or Infection details view:
a. In the Infections view, select the infected file to be processed and press More > Process marked.
b. In the Infection details view, press More > Process.
You can process the infected files in one of the following ways:
Quarantine - quarantine the infected file. A quarantined file is locked and cannot harm your device when F-Secure Mobile Security is on.
- Delete - delete the infected file. This is the recommended option. The file will be removed completely from your device.
- Release - release the quarantined file. If you release a file, it will not be locked any more. You access it at your own risk.
Press Details to view more details about the selected file. The Infection details view displays the path and file name of the infected file, and the name of the virus that has infected the file.

You can find in-depth virus descriptions in the F-Secure web site: http://www.f-secure.com/virus-info/.
File Details
To view the list of infected files or files that were not scanned, follow these instructions:
- In the Scan results view, select the category you want to view and press Show.
- Scroll to the file that you want to view the details of which you wish to view and press More > Details.
3.3 Using Firewall
The firewall in F-Secure Mobile Security works quietly in the background. It monitors incoming and outgoing Internet and network information, and protects you from intrusion attempts.
By default, the firewall protection level is set to Normal. This level gives you good protection and does not affect using the most common applications.
3.3.1 Selecting the Protection Level
The firewall has five protection levels:
| Level | Description | Protection |
| Allow All | Allows all network traffic. Does not stop any incoming or outgoing connections. | No protection. |
| Normal | Allows all outgoing connections. Recommended level. | Good protection |
| High | Allows most commonly used applications. | High protection |
| Deny All | Stops all network traffic. You cannot use your e-mail, MMS or web services. | Total protection. |
3.4 Keeping the Application Up-to-Date
F-Secure Mobile Security includes an automatic update service, which means that the virus definition database in the application is updated regularly. Only an up-to-date virus definition database protects your device against the latest viruses.
The application requires an active Internet connection for the updates. When a connection to the Internet is available, the application checks when the virus definition database was last updated and downloads new updates if necessary.

You can freely update F-Secure Mobile Security as long as you have an active subscription. To keep your device continuously protected, purchase additional service time well before the expiration date.
3.4.1 Selecting the Update Mode
Automatic updates are in use after you have activated the product. If you disable automatic updates or do not use real-time scanning mode, you need to update the application manually.
To change the update mode, follow these instructions:
- Press More > Settings.
- Go to Automatic Update and press Change.
- Select Enabled.
Manual Updates
To update the application manually, follow these instructions:
- In any of the main views, press More > Update.
- Select the Internet access point to connect to the update server. The application downloads the latest virus definition database and takes it into use immediately.

For more information, see the User Guide of your device.
- When the update is complete, press Yes to scan your device for viruses. For more information on scanning, see "Manual Scanning", 15.
3.4.2 Application Updates
When a new F-Secure Mobile Security version is available, a message asks you to download it. The application restarts automatically when the update is completed.

If the virus definition database update requires a software update to work properly, the upgrade is downloaded automatically.
Upgrading the Application Manually
If you want to upgrade F-Secure Mobile Security, install the new version. For instructions, see "Getting the Product Running on Your Device", 8.
If you have F-Secure Anti-Virus installed on your device and you want to upgrade it to F-Secure Mobile Security, follow these instructions:
- Write down your current key code. You need it to activate the new version.
- Uninstall the installed version.
- Download the new version.
-
Install F-Secure Mobile Security. For more information, see “Getting the Product Running on Your Device”, 8.
-
Activate the new version with your key code. For instructions, see "Activating the Update Service", 9.
3.5 Purchasing Subscription Service Time
To keep your device continuously protected, you should purchase additional service time well before the expiration date. The additional service time purchased is either added to the time remaining in your previous order or to your free evaluation period.
F-Secure Mobile Security supports several purchase methods depending on the distribution channel. Most common purchase methods are:
F-Secure eStore
Your local reseller
If you wish to purchase F-Secure Mobile Security after using the trial version, use the subscription number provided in the About view. If you received a new subscription code when you purchased service time or a new license, use it to activate the software. For more information, follow the instructions in the purchase menu.
Using PC
To purchase more service subscription time through your PC browser, follow these instructions:
- Open http://www.f-secure.com/estore/avmobile.shtml in the web browser with your computer.
- Enter your subscription number in the Subscription Number field to identify your subscription.

F-Secure eStore accepts the most commonly used credit cards and wire/bank transfers.
- Follow the instructions on the screen.
3.6 Troubleshooting
For troubleshooting instructions and answers to frequently asked questions, see http://mobile.f-secure.com/FAQ/.
Technical Support
Overview 26
Virus Descriptions on the Web 26
Electronic Mail Support 26
Overview
F-Secure Technical Support is available by e-mail and from our Web site. You can access our Web site from within F-Secure Mobile Security or from your Web browser.
For Technical Support of all F-Secure products, go to F-Secure Support Center at: http://support.f-secure.com/enu/home/.
Virus Descriptions on the Web
F-Secure Corporation maintains a comprehensive collection of virus-related information on its Web site. To view the Virus Information Database, connect to: http://www.F-Secure.com/virus-info/.
Electronic Mail Support
If you have questions about F-Secure Mobile Security not covered in the manual or online services at http://www.F-Secure.com/, you can contact your local F-Secure distributor or F-Secure Corporation directly.
For technical assistance, please contact your local F-Secure Business Partner. Send your e-mail to: Anti-Virus-
Example: Anti-Virus-Norway@F-Secure.com
If there is no authorized F-Secure Mobile Security Business Partner in your country, you can request basic technical assistance from: Anti-Virus-Support@F-Secure.com
When contacting support, prepare and include the following information in your support request:
Name and version number of your F-Secure software program (including the build number, if available).
Name and version number of your operating system (including the build number).
A detailed description of the problem, including any error messages displayed by the program, and any other details, which could help us duplicate the problem.
When contacting F-Secure support by telephone, please do the following so that we may help you more effectively and save time:
have your device at hand, so you can follow instructions given by the support technician, or be prepared to write down instructions.
Have your device turned on and (if possible) in the state it was in when the problem occurred.
About F-Secure Corporation
F-Secure Corporation protects consumers and businesses against computer viruses and other threats from the Internet and mobile networks. We want to be the most reliable provider of security services in the market. One way to demonstrate this is the speed of our response. According to independent studies in 2004, 2005 and 2006 our response time to new threats is significantly faster than our major competitors. Our award-winning solutions are available for workstations, gateways, servers and mobile phones. They include antivirus and desktop firewall with intrusion prevention, antispam and antispyware solutions. Founded in 1988, F-Secure has been listed on the Helsinki Exchanges since 1999, and has been consistently growing faster than all its publicly listed competitors. F-Secure headquarters are in Helsinki, Finland, and we have regional offices around the world. F-Secure protection is also available as a service through major ISPs, such as Deutsche Telecom, France Telecom, PCCW and Charter Communications. F-Secure is the global market leader in mobile phone protection provided through mobile operators, such as T-Mobile and Swisscom and mobile handset manufacturers such as Nokia. The latest real-time virus threat scenario news are available at the F-Secure Data Security Lab weblog at http://www.f-secure.com/weblog/