ESET Mobile Security

3y ago
36 Views
2 Downloads
1.22 MB
21 Pages
Last View : 14d ago
Last Download : 3m ago
Upload by : Casen Newsome
Transcription

ESET Mobile Securityfor Windows MobileInstallation Manual and User Guide - Public Beta

Contents.31. Installationof ESET Mobile Security1.1Minimum.3system requirements1.2Installation.31.2.1Installation.3on your device1.2.2Installation.3using your computer1.3Uninstallation.4.52. Productactivation2.1Activation.5using username and password2.2Activation.5using registration key.63. Update3.1Update.6using your computer3.2Settings.6.74. On-Accessscanner4.1Settings.7.85. On-Demandscanner5.1Running.8a whole device scan5.2Scanning.8a 106. Virusfound6.1Quarantine.10.117. AntiTheftESET Mobile SecurityCopyright 2010 by ESET, spol. s.r.o.ESET Mobile Security was developed by ESET, spol. s r.o.For more information visit www.eset.com.All rights reserved. No part of this documentation may bereproduced, stored in a retrieval system or transmitted inany form or by any means, electronic, mechanical,photocopying, recording, scanning, or otherwise withoutpermission in writing from the author.ESET, spol. s r.o. reserves the right to change any of thedescribed application software without prior notice.7.1Settings.11.138. Firewall8.1Settings.13.149. Securityaudit9.1Settings.14.1610. Spamfilter10.1 Settings.1610.2 Whitelist.16/ Blacklist10.3 Locating.16spam messages10.4 Deleting.17spam messagesCustomer Care Worldwide: www.eset.eu/supportCustomer Care North America: www.eset.com/support.1811. Viewinglogs and statisticsREV. 9.4.2010.2012. Troubleshooting12.1 Unsuccessful.20installation12.2 Connection.20to update server failed12.3 Timeout.20downloading file12.4 Update.20file missing.2113. Technicalsupport

1. Installation of ESET MobileSecurity1.1 Minimum system requirementsTo install ESET Mobile Security for Windows Mobile, yourmobile device must meet following system requirements:Minimum system requirementsOperating systemWindows Mobile 5.0 and laterProcessor200 MHzMemory16 MBAvailable free space 2.5 MB1.2 InstallationSave all open documents and exit all running applicationsbefore installing. You can install ESET Mobile Securitydirectly on your device or use your computer to install it.After successful installation, activate ESET Mobile Securityby following the steps in the Product activation 5section.1.2.1Installation on your deviceTo install ESET Mobile Security directly on your device,download the .cab installation file onto your device byWi-Fi, Bluetooth file transfer or email attachment. Go toStart Programs File Explorer to locate the file. Tapthe file to launch the installer and then follow theprompts in the installation wizard.Installation progressAfter installation, you can modify the program settings.However, the default configuration provides themaximum level of protection against malicious programs.1.2.2Installation using your computerTo install ESET Mobile Security using your computer (viaActive Sync in Windows XP or Sync Center in Windows 7and Vista), please connect your mobile device to thecomputer. After the device is recognized, run thedownloaded installation package (.exe file) and follow theinstructions in the installation wizard.Launching the installer on your computerThen follow the prompts on your mobile device.Warning: To successfully install your product usingWindows Vista and Windows 7, you must be logged in asa user with admin privileges.Installing ESET Mobile SecurityNOTE: The Windows Mobile user interface varies bydevice model. The installation file may appear in adifferent menu or folder on your device.3

1.3 UninstallationTo uninstall ESET Mobile Security from your mobiledevice, tap Start Settings, tap the System taband then tap the Remove Programs icon.NOTE: The Windows Mobile user interface varies bydevice model. These options may be slightly different onyour device.Removing ESET Mobile SecuritySelect ESET Mobile Security and tap Remove. Tap Yeswhen prompted to confirm the uninstallation.Removing ESET Mobile Security4

2. Product activationThe main ESET Mobile Security window (Start Programs ESET Mobile Security) is the starting pointfor all instructions in this manual.2.1 Activation using username andpasswordIf you purchased your product from a distributor, youreceived a username and password with your purchase.Select the Login/Password option and enter theinformation you received in the Username and Passwordfields. Enter your current contact address in the e-mailfield. Tap Activate to complete the activation.2.2 Activation using registration keyIf you acquired ESET Mobile Security with a new device(or as a boxed product), you received a Registration keywith your purchase. Select the Registration key option,enter the information you received in the Key field andyour current contact address in the e-mail field. TapActivate to complete the activation. Your newauthentication data (Username and Password) willautomatically replace the Registration key and will besent to the email address you specified.The main ESET Mobile Security windowNOTE: During activation, the device must be connectedto the Internet. A small amount of data will bedownloaded. These transfers are charged according toyour service agreement with your mobile provider.After successful installation, ESET Mobile Security mustbe activated. If you are not prompted to activate yourproduct, tap Menu Activate.Program activationThere are two activation methods; the one that applies toyou will depend on the manner in which you acquiredyour product.5

3. UpdateBy default, ESET Mobile Security is installed with anupdate task to ensure that the program is updatedregularly. You can also perform updates manually.After installation, we recommend you run the first updatemanually. To do so, tap Action Update.3.1 Update using your computerIf your mobile device is not connected to the Internet,you can also update the virus signature database usingyour computer by following the steps below:1. Disable the Internet update option in Menu Settings Update.2. Download the file containing the most recent virussignature database to your PC.3. Connect your device to your PC via Active Sync (inWindows XP) or Windows Mobile Device Center (inWindows Vista and Windows 7).4. Copy the virus signature database update file (EsetAV WM.upd) to the ESET Mobile Securityinstallation directory (Program Files\ESET\ESET MobileSecurity) on your device.5. Tap Action Update in the ESET Mobile Security mainwindow. ESET Mobile Security will check the updatefile. If the file is not corrupted, the latest virus signaturedatabase will be installed.3.2 SettingsTo configure update settings, tap Menu Settings Update.The Internet Update option enables or disablesautomatic updates. You can specify the Internet serverfrom which updates are downloaded (we recommendleaving the default setting of updmobile.eset.com). In theLogin and Password fields, enter the username andpassword you received after purchasing ESET MobileSecurity. To set the time interval for the automaticupdates, use the Auto Update option.6Update settingsNOTE: To prevent unnecessary bandwidth usage, virussignature database updates are issued as needed, when anew threat is added. While virus signature databaseupdates are free with your active license, you may becharged by your mobile service provider for datatransfers.

4. On-Access scannerThe On-Access scanner checks files that you interact within real time. Files that are run, opened or saved arechecked for viruses automatically. Scanning takes placebefore any action is performed on a file, ensuringmaximum protection with default settings. The OnAccess scanner launches automatically at system startup.4.1 SettingsTap Menu Settings On Access to enable or disablefollowing options:Enable On Access Scan – If selected, the On-accessscanner runs in the background.Heuristics – Select this option to apply heuristicscanning techniques. Heuristics proactively identifiesnew malware not yet detected by the virus signaturedatabase by analyzing code and recognizing typicalvirus behavior. Its disadvantage is that additional timeis required to complete the scan.Run After Restart – If selected, the On-Access scannerwill automatically start after restart of the device.Display scan in action status – Select this option toshow scan status in the bottom right corner whilescanning is in progress.Show Shell Icon – Displays the ESET Mobile Securityicon on the main mobile device window.On-Access scanner settings7

5. On-Demand scannerYou can use the On-Demand scanner to check yourmobile device for the presence of infiltrations. Certain,predefined, file types are scanned by default.5.2 Scanning a folderTo scan a particular folder on your device, tap Action Scan Folder.5.1 Running a whole device scanA whole device scan checks memory, running processes,their dependent dynamic link libraries (DLLs) and filesthat are part of internal and removable storage.To run a whole device scan, tap Action Scan Wholedevice.NOTE: A memory scan is not performed by default. Toactivate it, tap Menu Settings General and select theMemory Scan check box.Scanning a folderTap the folder you wish to scan and tap Select.Running a whole device scanThe program scans system memory first (includingrunning processes and their dependent DLLs) and thenscans files and folders. The full path and file name of eachscanned file will be displayed briefly.NOTE: To abort a scan in progress, tap Action Scan Stop Scan.Selecting a folder to scan8

5.3 General settings5.4 Extensions settingsTo modify scanning parameters, tap Menu Settings General.To specify the file types to be scanned on your mobiledevice, tap Menu Settings Extensions.The Extensions window will be displayed, showing themost common file types exposed to infiltration. Select thefile types you wish to scan or deselect the extensions toexclude them from scanning. If you enable the Archivesoption, all supported archive files (zip, rar and jar) will bescanned.To scan all files, deselect the Extension sensitivecheckbox.General settingsThe General settings window allows you to specify whichaction to take if a virus is found. Select the Show alertdialog option to display virus alert notifications.You can specify a default action that will be performedautomatically for infected files. You can choose from thefollowing options:Move to quarantineDelete Infected FileDo Nothing (not recommended)Extensions settingsThe Stored Logs option allows you to define themaximum number of logs to be stored in the Menu Logs Scan section.If the Memory Scan option is selected, the devicememory will be automatically scanned for maliciousprograms prior to the actual file scan.If the Heuristics option is selected, ESET Mobile Securitywill use heuristic scanning techniques. Heuristics is analgorithm-based detection method that analyzes codeand searches for typical virus behavior. Its mainadvantage is the ability to identify malicious software notyet recognized in the current virus signature database. Itsdisadvantage is that additional time is required tocomplete the scan.The Archive Nesting option allows you to specify thedepth of nested archives to be scanned. (The higher thenumber, the deeper the scan.)If the Archive Deletion option is selected, archive files (zip, rar and jar) containing infected objects, will beautomatically deleted.9

6. Virus foundIf a virus is found, ESET Mobile Security will prompt youto take an action.Quarantine ListYou can restore quarantined files by tapping Options Restore (each file will be restored to its original location).If you wish to permanently remove the files, tap Options Delete.Virus alert dialogWe recommend you select Stop and delete. If you selectStop and move to quarantine, the file will be movedfrom its original location to quarantine. If you selectContinue, no action will be performed and the infectedfile will remain on your mobile device.If an infiltration is detected in an archive (e.g., .zip file),the Delete archive option is available in the alertwindow. Select this option along with the Deleteinfected file option to delete all infected archive files.6.1 QuarantineThe main task of the quarantine is to safely store infectedfiles. Files should be quarantined if they cannot becleaned, if it is not safe or advisable to delete them or ifthey are being falsely detected by ESET Mobile Security.Files stored in the quarantine folder can be viewed in alog that displays the date and time of quarantine andoriginal location of the infected file. To open quarantine,tap Menu View Quarantine.10

7. AntiTheftbe automatically filled with IMSI number.AntiTheft protects your mobile phone from unauthorizedaccess.If you are using more than one SIM card, you may wantto distinguish each one by modifying its SIM Alias (e.g.,Office, Home etc.).If someone steals your phone and replaces the SIM cardwith a new (untrusted) one, an Alert SMS will be secretlysent to certain phone number(s), which you can define.This message will include the phone number of thecurrently inserted SIM card, the IMSI (InternationalMobile Subscriber Identity) number and the phone's IMEI(International Mobile Equipment Identity) number. Theunauthorized user will not be aware that this messagehas been sent, since it will be automatically deleted fromthe Sent folder.In Alert SMS, you can modify the text message that willbe sent to the predefined number(s) after an untrustedSIM card is inserted in your device.To erase all data (contacts, messages, applications) storedon your device and all currently inserted removablemedia, you can send a Remote wipe SMS to theunauthorized user's mobile number in the form:#RC# DS passwordwhere password is your own password set in Menu Settings Password.7.1 SettingsFirst, set your password in Menu Settings Password.This password is required for:sending a Remote wipe SMS to your deviceaccessing the Anti Theft settings on your deviceuninstalling ESET Mobile Security from your device.Anti Theft settingsThe Phone Number tab shows the list of predefinednumbers that will receive an Alert SMS after an untrustedSIM card is inserted in your device.To add a new number,tap Options Add. To add a number from the contactlist, tap Options Add contact.Warning: the phone number must include theinternational dialing code followed by the actual number(e.g., 16105552000).Setting a security passwordTo access AntiTheft settings, tap Menu Settings AntiTheft and enter your password.To switch Anti Theft on or off, select or deselect theEnable Anti Theft option.If the SIM card currently inserted in your mobile device isthe one you wish to save as trusted, check the This SIMcard is trusted check box and the SIM will be saved tothe Trusted SIM list (IMSI tab). The SIM Alias text box willPredefined phone numbers list11

The IMSI tab shows the list of trusted SIM cards. Eachentry consists of the SIM Alias (left column) and IMSInumber (right column).To remove a SIM from the list, select the SIM and tapOptions Remove.Trusted SIM list12

8. FirewallThe Firewall controls all inbound and outbound networktraffic by allowing or denying individual connectionsbased on filtering rules.rules. This mode allows all outbound traffic. You can seta default action (Default Allow or Default Block) forinbound traffic .Interactive - allows you to customize your personalfirewall. When a communication without acorresponding rule is detected, a dialog windowreporting an unknown connection is displayed. Thedialog window gives the option to allow or block thecommunication and to create a rule. If you choose tocreate a rule, all such future connections will be allowedor blocked according to the rule. If an application withan existing rule has been modified, a dialog windowgives you the option to accept or deny this change. Theexisting rule will be modified based on your response.In the Rules List tab, you can create, edit or removefiltering rules.Example of firewall alert dialog window8.1 SettingsTo modify the Firewall settings, tap Menu Settings Firewall.Firewall rules listTo create a new rule, tap Menu Add, fill in all therequired fields and tap Done.Firewall settingsYou can choose from the following profiles:Allow All - allows all network trafficBlock All - blocks all network trafficCustom Rules - lets you define your own filtering rulesWhile in the Custom Rules profile, you can choose fromtwo filtering modes:Automatic - suitable for users who prefer easy andconvenient use of the firewall with no need to defineCreating a new rule13

9. Security auditSecurity audit checks phone items such as battery level,bluetooth status, free disk space, etc.To run security audit manually, tap Action SecurityAudit. A detailed report will be displayed.The Running Processes option shows the list of allprocesses running on your device.To see the process details (full path name of the processand its memory usage), select the process and tapDetails.9.1 SettingsTo modify Security Audit parameters, tap Menu Settings Security Audit.Security Audit resultsA green color next to each item indicates that the value isabove the threshold or that the item does not represent asecurity risk. Red color means that the value is below thethreshold or that the item could represent a potentialsecurity risk.If Bluetooth status or Device visibility is highlighted inred, you can turn off its status by selecting the item andtapping Options Fix.To see each item's details, select the item

The main ESET Mobile Security window (Start Programs ESET Mobile Security) is the starting point for all instructions in this manual. The main ESET Mobile Security window After successful installation, ESET Mobile Security must be activated. If you are not prompted to activate your product, tap Menu Activate. Program activation

Related Documents:

ESET Endpoint Security for Android ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris ESET Remote Administrator See the following pages for benefits and features of the products that are color-coded in grey.

ESET MOBILE SECURITY ESET, spol. s r.o. ESET Mobile Security is ontwikkeld door ESET, spol. s r.o. Ga voor meer informatie naar www.eset.com. Alle rechten voorbehouden. Niets uit deze documentatie mag worden verveelvoudigd, opgeslagen in een systeem voor het ophalen van gegevens of overgedragen, in enige vorm of op enige wijze, hetzij elektronisch,

The ESET Shared Local Cache boosts performance in virtualized environments by eliminating the need to scan duplicate files. Each file is scanned once and stored in the share cache. ESET Shared Local Cache (ESLC) records files declared clean by the Anti-virus scanner (represented by ESET Endpoint Security, ESET Endpoint Antivirus or ESET File .

ESET Endpoint Security 6, ESET Endpoint Antivirus 6 Update of Virus Signature Database or Modules ESET introduces Resume failed download functionality. When an update of Virus Signature Database or update of Modules is interrupted, new ESET Endpoint solutions will resume the failed down

ESET Antispam Spam tvoří až 80 procent veškeré e-mailové komunikace. Modul antispam takové zprávy filtruje. ESET Anti-Theft ESET Anti-Theft zvyšuje bezpečnost dat uživatele ve chvíli ztráty nebo zcizení počítače. Po nainstalovaní ESET Smart Security a aktivaci ESET Anti-Theft bude zařízení monitorováno.

ESET Mobile Security Business Edition ESET File Security for Microsoft Windows Server ESET File Security for Microsoft Windows Server Core ESET File Security for Linux / BSD / Solaris See the following page(s) for benefits and features of the products that are color-coded in gray.

ESET guarantees full support for the latest major version of Android’s ESET Mobile Security, ESET Smart TV Security and Parental Control products until a newer major version is released. (In the case of Google Play, upgrade to the latest supported version of the ESET product for the user’s Android version is offered automatically.)

ALBERT WOODFOX . CIVIL ACTION NO. 06-789-JJB-RLB . VERSUS . BURL CAIN, WARDEN OF THE LOUISIANA . STATE PENITENTIARY, ET AL. RULING . Before this Court is the pending Motion (doc. 279) for Rule 23(c) release of Petitioner, Albert Woodfox. Briefs were filed in response to this motion and were considered by this Court. Subsequently, a motion hearing on this matter was held before this Court on .