User manual F-SECURE MOBILE SECURITY FOR SERIES 80

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE MOBILE SECURITY FOR SERIES 80. We hope that this F-SECURE MOBILE SECURITY FOR SERIES 80 user guide will be useful to you.


F-SECURE MOBILE SECURITY FOR SERIES 80 : Download the complete user guide (426 Ko)

You may also download the following manuals related to this product:

   F-SECURE MOBILE SECURITY FOR SERIES 80 (1545 ko)

Manual abstract: user guide F-SECURE MOBILE SECURITY FOR SERIES 80

Detailed instructions for use are in the User's Guide.

[. . . ] F-Secure Mobile Security for Series 80 User's Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. [. . . ] All infected files are quarantined and cannot be accessed when F-Secure Mobile Security is running in the background. CHAPTER 3 Using F-Secure Mobile Security 17 3. 5 Processing Infected Files When F-Secure Mobile Security finds a virus in a file, you can remove the infected file completely, or lock it up so that the infected file cannot be accessed. 3. 5. 1 Infections List The Infections list is opened automatically if F-Secure Mobile Security detects any infections during the scan. The Infections list displays all detected infected files in the device. Figure 3-4 Infections list in F-Secure Mobile Security The list displays the name of the infected file and the current infection status. > > A Quarantined file is locked and cannot be accessed. A Released file is infected but is not quarantined. Select the infected files, and press Process to choose one of the following actions: > > > Quarantine - Quarantine the infected file. Quarantined files cannot be accessed when F-Secure Mobile Security is running in the background. To restore the deleted file, reinstall it or restore it from the backup copy. If you release the file, you can access it and use it, but at your own risk. 18 Press Details to view more details about the selected file. The Infection details view displays the path and file name of the infected file, and the name of the virus that has infected the file. You can find in-depth virus descriptions in the F-Secure web site: http://www. f-secure. com/virus-info/. Press Close to close the Infections list and return to the main view. CHAPTER 3 Using F-Secure Mobile Security 19 3. 6 Keeping F-Secure Mobile Security Up-To-Date You can keep F-Secure Mobile Security up to date by downloading the latest virus definition database from the update service. The virus definition database contains information about all the viruses that the application can find during the scan. An up-to-date virus definition database gives you the best possible protection. You must have an active connection to the Internet for F-Secure Mobile Security to check for updates. During this time, you can freely update your F-Secure Mobile Security. When your license expires, you can update your copy only after renewing your license. 3. 6. 1 Update Settings You can get F-Secure Mobile Security updates automatically every time you open a connection to the Internet or manually whenever you want. If the update service has not been activated, you cannot receive any updates. For more information, see "Activating The Update Service", 9. Automatic Updates You can set F-Secure Mobile Security to download updates automatically once a day when the device has an active connection to the Internet. F-Secure Mobile Security does not open a connection, but it recognizes a connection being opened by, for example, a Web browser. Press Done to exit the settings. IMPORTANT: Automatic Updates can be selected only if real-time scanning is on. If you have selected real-time scanning, F-Secure Mobile Security detects open internet connections. F-Secure Mobile Security downloads the virus definition database update automatically if more than 24 hours have passed since the last update. It is recommended that you scan your device for viruses after you receive a new virus definition database update Manual Updates To update F-Secure Mobile Security manually: 1. Select the Internet access point to connect to the update server. F-Secure Mobile Security connects to the update server and downloads the latest virus definition database. [. . . ] Remember to change the protection level back to Normal after the test. 30 4. 4 Uninstallation Q. Check that you don't have an active or open connection through the firewall; close all connections and try again. 5 TECHNICAL SUPPORT Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Web Club. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Virus Descriptions on the Web . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE MOBILE SECURITY FOR SERIES 80




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE MOBILE SECURITY FOR SERIES 80 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.