Kaspersky Lab Mobile Security 8.0 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160

Ir a la página of

Buen manual de instrucciones

Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Kaspersky Lab Mobile Security 8.0. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Kaspersky Lab Mobile Security 8.0 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.

¿Qué es un manual de instrucciones?

El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Kaspersky Lab Mobile Security 8.0 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.

Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Kaspersky Lab Mobile Security 8.0, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.

Entonces, ¿qué debe contener el manual de instrucciones perfecto?

Sobre todo, un manual de instrucciones Kaspersky Lab Mobile Security 8.0 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Kaspersky Lab Mobile Security 8.0
- nombre de fabricante y año de fabricación del dispositivo Kaspersky Lab Mobile Security 8.0
- condiciones de uso, configuración y mantenimiento del dispositivo Kaspersky Lab Mobile Security 8.0
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas

¿Por qué no leemos los manuales de instrucciones?

Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Kaspersky Lab Mobile Security 8.0 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Kaspersky Lab Mobile Security 8.0 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Kaspersky Lab en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Kaspersky Lab Mobile Security 8.0, como se suele hacer teniendo una versión en papel.

¿Por qué vale la pena leer los manuales de instrucciones?

Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Kaspersky Lab Mobile Security 8.0, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.

Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Kaspersky Lab Mobile Security 8.0. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.

Índice de manuales de instrucciones

  • Página 1

    U S E R G U I D E KASPER SKY MOBIL E SECURI TY 8.0[...]

  • Página 2

    2 Dear User! Thank you for choosing our product. W e hope that this documentation will help you in your work and will pro vide answers regarding this software product. Note! T his document i s a pr operty o f Kaspe rsky L ab's and a ll rights to this docum ent are reserved by the co pyright laws of the Russian Federation and i nternational tre[...]

  • Página 3

    3 TABLE OF CONTENTS KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7 Obtaining information about the application ............................................................................................................. 8 Data sources for ind[...]

  • Página 4

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 4 Parental control ...................................................................................................................................................... 48 About Parental control ......................................................................................................[...]

  • Página 5

    T A B L E O F C O N T E N T S 5 Secret code ...................................................................................................................................................... 91 Viewing information about the program ................................................................................................ ............ 92 R[...]

  • Página 6

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 6 Updating the program bases ................................................................................................................................ 141 About updating of program bases ........................................................................................................[...]

  • Página 7

    7 KASPERSKY MOBILE SECURITY 8.0 Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft W indow s Mobile against malware pro grams, unsolicited calls and messages: The p rogram offers the following functionality: Real-Time Protection of the file system of the device - interception and scan o[...]

  • Página 8

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 8 O BTAINING INFORMATION ABOUT THE APPLICATION If you have any q uestions regarding purchasing, ins talling or us ing Kaspersky Mobile Sec urity, answers are readily available. Kaspersky Lab provides various s ources o f information about the program. You ca n select th e source that suits you be [...]

  • Página 9

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 9 Documentation The User Guide contains detailed in formation about the application's functions, how to work with th em, includes advices and recommendations on its configuration. Files containing the documents in PDF format are included into the product package of Kaspersky M obi le Security[...]

  • Página 10

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 10 Customer ID a nd password. En ter the customer ID and password received du ring re gistration at the Technical Support Service web site. E-mail address. The experts from the Technical Support Service will send th eir reply to your inquiry to tha t address. Technical support ov er the phone If y[...]

  • Página 11

    11 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS This section contains description of t he operation of Kaspersky Mobile Security 8.0 for smartphones running Symbian version 9.1, 9.2 and 9.3 Series 60 UI. I N THIS SECT ION Installing Kaspersky Mobile Security ...............................................................................................[...]

  • Página 12

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 12 using program Nokia PC Suite; by starting the distribution pac kage on the device. 3. A prompt (see Figure below) will appear on the screen; select Yes to confirm the installation of the program. Figure 1: Prom pt to confirm the installation 4. Review additional information about the program: n[...]

  • Página 13

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 13 G ETTING STARTED This section co ntains information on s tarting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code. I N THIS SECT ION Activating the program .......................................................[...]

  • Página 14

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 14 Figure 3: The program activat ion window 5. Enter th e code into the fo ur fields. The activation code consists of Latin alphabet c haracters and digits (the code is case-insensitive). After you have entered the activation code, select Activate in th e Op tions menu. 6. W hen you requ est an ac[...]

  • Página 15

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 15 Firewall – level of device protection against unwanted network activities (see section “ Firewall ” on page 66 ). Figure 4: The program comp onent status windo w In order to switch to the program graphic interface, press OK . G RA P H I C I N T E R F A C E The program com[...]

  • Página 16

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 16 To navigate from on e tab to another, use the joystick of the device o r select the Open ta b item in the Options menu (see Figure below). Figure 5: The Opt i ons menu In order to return to the progr am components status window, select the Current status item from the Options menu. S E CR E T C[...]

  • Página 17

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 17 3. Enter the current code in t he Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm code entry field to confirm. If you forgot the secret code, you will not be able to manage Kaspersky M obile Security functions that [...]

  • Página 18

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 18 A BOUT R EAL - T IME P R O T E C T I O N Real-Time Protection is launched at the o peration system startup, is permanently loaded in the device's RAM and monitors all opened, saved or run files. Files are scanned according to the following algorithm: 1. The component intercepts each attemp[...]

  • Página 19

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 19 Figure 7: Enabling Re al-Time Prot ec tion To disable Real-Time Protection, do the following: 1. Select the Settings item in the Anti-Virus tab. 2. Select Real-Time Protection in the Settings window. 3. Select value Off for the Protection setting. 4. Press B ack to save the cha[...]

  • Página 20

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 20 3. Select the type of files to be scanned by Real-Time Protection using the Objects to be scanned settings: A ll files : scan files of a ll types. Executables only : scan only ex ec utable program files (for example *.exe, *.sis, *.mdl, *.app). 4. Select OK to save changes. Fugure 8: Selecting [...]

  • Página 21

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 21 Delete : delete malware objects w i thout notifying the user. Quarantine : quarantine malware objects. 4. Select OK to save changes. Figure 9: Configur ing the program 's respon se when it detec ts a malw are object D I S PL A Y O F T HE P R O T E C T I O N I C O N The ic [...]

  • Página 22

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 22 In m enu only : the program icon in the device menu and Kaspersky Mobile Security menu. Never : the icon will not be displayed. 4. Select OK to save changes. Figure 10 : Configur ing the protecti on st atus icon[...]

  • Página 23

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 23 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch. I N THIS SECT ION About on-demand scan ............................................[...]

  • Página 24

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 24 S can folder : selecting and scanning of a ce rtain folder in th e device's file s ystem or on the connected storage card. W hen Scan folder item is sele c ted, a window displaying the device’s file system will open. In order navigate through the file system us e the joystick buttons. In[...]

  • Página 25

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 25 Figure 13 : Message abo ut a viru s detected Once th e scan is complete the gen eral statistics about detected and deleted malware objects will be displayed on the screen. By defa ult, during the scan the s creen b acklight goes off in order to save th e b attery c harge. You c[...]

  • Página 26

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 26 Figure 14 : Configur ing a scheduled scan S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of malicious code. In order to edit the values of the settings, use the device's joystick or select the Change item [...]

  • Página 27

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 27 Figure 15 : Selecting ob jects to be scanned S E LE C T I N G A C T IO N S T O B E PE R F O R ME D W I T H OB J E C T S You can configure the application's actions to be performed w he n the application detects a m alicious object. In order to edit the values of the settin[...]

  • Página 28

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 28 Figure 16 : Configur ing actions to b e performed with obje cts 3. Using the Action item, select the application's response when it detects a malware object (see Figure below): Delete : delete detected malw are objects without notifying the user. Quarantine : quarantine detected malicious [...]

  • Página 29

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 29 Figure 17 : Selecting a ctions to be perform ed w ith objects 4. If you selected Tr y to disinfect as t he application's response, use If disinfectio n fails (see Figure below) select an action to be performed by the application when it is impossible to disinfect the infec[...]

  • Página 30

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 30 In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values after you modified t[...]

  • Página 31

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 31 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values af[...]

  • Página 32

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 32 2. Select the required value for the Backlight item in the window that will open: If you wish the backlight to stay permanently on w hile an anti -virus scan is in progress, select the Yes value. If you wish the backlight to automatically go off, select the No value. 3. Press Back to save the c[...]

  • Página 33

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 33 V IEWING Q U ARANTINED O BJ E CT S To view the list of quarantined o bjects, select Quarantine on the Anti-Virus tab (see Figure below). Figure 22 : The Anti-V irus tab This will open the Quarantine window which contains a list of objects stored in the quarantine (see Figure be[...]

  • Página 34

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 34 R E S T OR I NG O BJ E C T S F R O M Q U A R A NT I N E Select the Quarantine item in the Anti-Virus tab. 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Quarantine window that will open select an object you wish t o restore. 3. Select Restore from the Options menu. The object se[...]

  • Página 35

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 35 Figure 25 : Deleting an ob ject from quarantine In order to delete all quarantined objects: 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Options menu that will open, select Delete all . All quarantined objects will be deleted.[...]

  • Página 36

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 36 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the descri ption of how to comp ile the Black and White Lists, configure Anti-Spam modes and other Anti-Spam settings. I N THIS SECT ION About Anti-Spam ...................................................[...]

  • Página 37

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 37 To select an Anti-Spam mode, perform the following actions (see Figure below): 1. Open the Anti-Spam tab. 2. Select Settings and then - Anti-Spam from the menu. 3. In the window that will open, select the required mode and press OK to save the changes and close the window . Fig[...]

  • Página 38

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 38 A DDING A NEW E NTRY To add an entry to the Anti-Spam Black List, perform the following actions (see Figure belo w): 1. Select Black List in the Anti-Spam tab. 2. Select Add entry from the Options menu. 3. Set the following settings in the window that will open: Message ty pe - action to be per[...]

  • Página 39

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 39 E DITING AN EXIST IN G ENTRY To edit settings of an existing entry, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select Edit entry from the Options menu. 3. Set the following entry settings in the window that will open: Message[...]

  • Página 40

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 40 D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the Black List, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select an entry in the list which you wish to delete. 3. Select Delete entry from the Options menu. Figure 29 : Dele[...]

  • Página 41

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 41 Figure 30 : Dele ting all entries C R E A T I N G A W HITE L IST The White Lis t contains entries with p hone numbers, SMS an d calls from which will be passed through by Anti -Spam and text upon detection of which in a received SMS message it will be passed through. I N THIS S[...]

  • Página 42

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 42 SMS only : allow incoming SMS messages only . Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone numbe r – phone number for which th e receipt of SMS mess age and/or calls will be allowed. The number s hould only be comprised of a lphanumeri[...]

  • Página 43

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 43 Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone number – p hone number for which the receipt of SMS message and/or calls will be allowed. The number s hould only be comprised of a lphanumeric characters; it may begin with[...]

  • Página 44

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 44 Figure 33 : Dele ting an individual e ntry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Anti-Spam tab. 2. Select Delete all from the Options menu. Figure 34 : Dele ting all entries[...]

  • Página 45

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 45 R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti-Spam resp onse to SMS messages and calls from numbers found in the phone book irrespective of the settings of the Black and W hite Lists. In order to edit the v[...]

  • Página 46

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 46 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values after you modified [...]

  • Página 47

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 47 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G M E S S A G E S Anti-Spam suggests that you configure its response to SMS messages from phone nu mbers not found in either the Black or the W hite List. Such messages will be intercepted by Anti-Spa m[...]

  • Página 48

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 48 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam suggests that you configure its response to calls from phone numbers not found in either the Black or the W hite List. After th e call is complete, a notification will be displayed on the device&apos[...]

  • Página 49

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 49 A BOUT P A R E N T A L C ON T R O L The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the White Lists. If at least one match is detected, the scan will be stopped. SMS m essages and calls matchin g any [...]

  • Página 50

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 50 Figure 39 : Modes of Parental con trol C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control . Information about blocked SMS messages and calls will be saved in the Log sec tion (see section “ Program [...]

  • Página 51

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 51 SMS only : block outgoing SMS messages only . Calls onl y : bloc k outgoing calls only. SMS and calls : block outgoing calls and SMS messages. Phone n umber - phone number SMS m essage and/or outgoing calls to which will be blocke d. This number may begin with a digit or with a[...]

  • Página 52

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 52 Phone number - phone number SMS mes sage and/or outgoing calls to which will be blocked. This number may begin with a digit o r with a " +" and mu st co ntain d igits. Addi tionally when entering a number, you c an use masks "?" and "*" (where “*” represents a [...]

  • Página 53

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 53 Figure 42 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select Black List from the menu in the Parental control tab. 2. Select Delete all from the Options menu.[...]

  • Página 54

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 54 Figure 43 : Deleting all entries C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control. I N THIS SECT ION Adding a new entry ...........................................................................[...]

  • Página 55

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 55 SMS and calls : a llow outgoing calls and SMS messages. Phone number - phone number S MS message and/or outgoing calls to which will be allowed. This number may begin with a digit o r with a " +" and mu st co ntain d igits. Addi tionally when entering a number, you ca[...]

  • Página 56

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 56 Figure 45 : Editing an e xisting entry D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the White List, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab. 2. Select an entry you wish to delete. 3. Select Delete ent[...]

  • Página 57

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 57 Figure 46 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab. 2. Select Detele all from the Options menu. Figure 47 : Deleting all entries[...]

  • Página 58

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 58 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect i nformation stored on the device in case the device is lost. I N THIS SECT ION About Anti-Theft ...............................................................................................[...]

  • Página 59

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 59 To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1. Select Settings on the Anti-Theft tab. 2. Select SMS-Block in the window that will open. 3. Using the Change item in the Options menu, set value On . 4. Press Back to save the changes. Figur[...]

  • Página 60

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 60 Figure 49 : Blocking the device To create an SMS m essage using your phone's standard functions for creating SMS messages: send to the device you need to block an SMS m essage con taining text block:<code> (where <code> is secret code set on the d evice to be blocked). The mess[...]

  • Página 61

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 61 If you wish personal files (from folder C:Data) to be deleted, select Delete data and set value to Yes . To erase data from all installed storage cards, select Delete card files and set the value to Yes . 4. Press OK to save the changes. Figure 50 : Configuring the SMS-Cl ean [...]

  • Página 62

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 62 Figure 51 : Deleting per sonal data To create an SM S message using your phone's standard functions for creating SMS m e ssages: send to the device you need to block an SMS m essage con taining text clean:<code> (where <code> is secret code set on the receiving d evice. The m e[...]

  • Página 63

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 63 Using the E-mail address field enter the e -mail address on which you wish to re ceive an e -mail m essage about the new phone number. In order to bl ock the device once the SIM ca rd is replaced or the device is turned on without it , se t the value for the Block device item t[...]

  • Página 64

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 64 Figure 53 : Configuring the SMS-Find function D ETERMIN ING THE D EV I C E L O C A T I O N You can receive the coordinates of the device w ith the SMS -Find function enabled using the following methods: by using the Stealth SMS function on another device with Kaspersky Mobile Security installed[...]

  • Página 65

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 65 Figure 54 :Determinin g the location of the de vice To create an SM S message the standa rd SM S feature on your phone : send to the device you nee d to block an SMS mess age containing text find:<code> (where < code> is secret code set on the receiving device. The [...]

  • Página 66

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 66 SMS-Clean (see section "The SMS- Clean function” on page 60 ). SMS- Find (see section “The SMS - Find function” on page 63 ). The function being used must be enabled on the receiving device. Press Next . 3. Enter the number of the device to which the message will be sent. Press Next [...]

  • Página 67

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 67 F IREWALL This section contains information about the Firewall c omponent which monitors the network activity of the device a nd protection of the device on the network level. I N THIS SECT ION About Firewall .....................................................................[...]

  • Página 68

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 68 Figure 56 : Configur ing the Fire wall security level C O N FI G UR IN G NO TI F I C A T IONS ABOUT CONNECTIO N A T T E MP TS You can configure the display of user notificat ions about connection attempts blocked at the selected Firewall security level; 1. Select Settin gs on the Firewall tab. [...]

  • Página 69

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 69 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption ...................................................................................................................[...]

  • Página 70

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 70 Figure 58 : Data encr y ption The data in the folder will be encrypted once the comm and is executed and th en data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tra cted from it or accessed. You can encrypt only one folder using t[...]

  • Página 71

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 71 Figure 59 : Data decr y ption After decryption, the Decry pt item will turn into Encry pt and you can use it again to encrypt data (see section “Data encryption” on page 69 ). I N F O R M A T I O N A B O U T E N CR YP T E D D A T A If encryption is enabled, you can check wh[...]

  • Página 72

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 72 B L O C K I N G A C C E S S T O E N CR Y P T E D D A T A You can block access to enc rypted data insta ntly or with a delay. After this you will have to enter your secret co de to access the encrypted data. To ensure data protection when the device i s switched in to the sleep m ode, you can c [...]

  • Página 73

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 73 U PDATING THE PROGRAM BASES This section contains information about the U pda te com ponent. Regular bases update is necessary to ensure reliabl e operation of Kaspersky Mobile Security. I N THIS SECT ION About program bases update ..............................................[...]

  • Página 74

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 74 M A N U A L U PD A T I N G You can start the updating process manually at any time convenient to you. To start a manual update of anti-virus bases , select Update on the Anti-Virus tab (see Figure below). The program will start th e b ases updating from the server using the connection selec ted[...]

  • Página 75

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 75 Figure 64 : Configur ing scheduled u pdates You can als o configure the automatic u pdate s ettings when your phon e is in the roaming mode (see section “ Updating while roaming ” on page 75 ). U P D A T I N G WH I L E R O A M I N G You ca n configure automatic disabling of[...]

  • Página 76

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 76 Figure 65 : Configur ing updates in roam ing C O N FI G UR IN G CO N NE CT I ON S ET T I N G S To configure the connection s ettings, perform the following actions (see Figure below): 1. Select Settings in the Anti-Virus tab. 2. Select Update in the window that will open. 3. Select the access p[...]

  • Página 77

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 77 Figure 66 : Configur ing connection settings After the update is complete, the connection open fo r the update will au tomatically close. If th e connection had been established before the update w as starte d, it will be used for further operation. P ROGRAM LOGS This section c[...]

  • Página 78

    K A S P E R S K Y M OB I L E S E C U R I T Y 8 . 0 78 V IEWING L OG R E C O R D S To view all records stored in the Log, perform the following actions: 1. Select th e c orresponding item i n th e Log m enu on the tab of the component in formation about operation of which you wish to obtain (for ex ample, Log item on the Anti-Virus tab). 2. Use joys[...]

  • Página 79

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 79 Figure 67 : Configur ing the statu s window displa y M ANAGING SOUND NOTIFICATION You can co nfigure th e use of the sound notification i n c ase of cer tain events (detection of an infe cted object , message about an application status, etc.) By default the playback of the sou[...]

  • Página 80

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 80 Figure 68 : Managing s ound notifi cation M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary. I N THIS SECT ION Viewing the license information ..........................................................................[...]

  • Página 81

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 81 Figure 69 : Vie w ing the license in f orm ation R E N EW I NG T H E L I C E N SE To renew your license, perform the following actions (see Figure below): 1. Select About license on the Information tab. 2. Select Renew in the window that will open. The code entry window will op[...]

  • Página 82

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 82 Figure 70 : Rene w ing the licen se If th e ac tivation code you entered appears invalid for any reason, a c orresponding message will be displayed on your smartphone's screen. If th e key installation is successful, information about the license will be displayed o n the screen. To procee[...]

  • Página 83

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 83 c. Select Exit from the Options menu (see Figure below ). Figure 71 : Exiting the program . 3. Uninstall Kaspersky Mobile Security a. Open the device’s main menu. b. Switch t o the Tools menu and select App. mgr. (see Figure below). Figure 72 : Starting the Application m anag[...]

  • Página 84

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 84 c. Select KMS 8 in the list of programs and press the Options button (see Figure below ). Figure 73 : Selecting the applicatio n d. Se lect the Remove menu item(see Figure below). Figure 74 : Uninstallin g the appli cation e. Pre ss the Yes button in the prompt to confirm the program removal. f[...]

  • Página 85

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 85 g. If you wish to save the program settings, quarantined objects or Anti-Sp am lists, check the corresponding fields next to the required settings (see Figure below). Figure 75 : The list of settings to be s aved h. Res tart the phone to complete the program removal process.[...]

  • Página 86

    86 KASPERSKY MOBILE SECURITY FOR MICROSOFT WIN DOWS MOBILE This section contains description of the operation o f Kaspersky Mobile Secu rity for mobile devi ces running one of the following operating systems: Microsoft Windows Mobile 5.0. Microsoft Windows Mobile 6.0, 6.1. I N THIS SECT ION Installing Kaspersky Mobile Security .....................[...]

  • Página 87

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 87 3. Read the License Ag reement (see the Fi gure b elow). If you agree to all th e terms, press OK . Kaspe rsky Mobile Security will the n be installed on the device. If you do not agree with th e terms of the Lic ense Agreement, pre ss Cancel . Figure[...]

  • Página 88

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 88 G ETTING STARTED This s ection contains information on starting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code. I N THIS SECT ION Activating the program .........................................................................[...]

  • Página 89

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 89 The Kaspersky Mobile Security activation window w il l open on the device's screen (see Fig ure below). Figure 78 : Entering the code 4. Enter th e code into the fo ur fields. The activation code consists of Latin alphabet c haracters and digits [...]

  • Página 90

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 90 Anti-Spam – status of the protection against unwanted incoming messages. Figure 79 : The program component statu s window You can start a ful l scan of th e de vice fo r malware objects using the Scan button or switch to se lecting the tab using Menu . G R A PH I C A L US E R I N TE R F A C E[...]

  • Página 91

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 91 To navigate through the tabs, press the M enu button and select the required tab (s ee Figure below). Figure 80 : Prog ram menu To return to the program component status window, select Protection status . To exit the program, select Exit . S E CR E T [...]

  • Página 92

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 92 In order to change the secret code , do the following: 1. Select the Information tab. 2. On the tab select Settings , then select Change code. 3. Enter the current code in t he Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm entry f[...]

  • Página 93

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 93 R EAL -T IME P ROTECTION This section contains information about Real-Time Protection of your device, how to enable it and configure its settings. I N THIS SECT ION About Real-Time Protection ...........................................................[...]

  • Página 94

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 94 3. Check the Enable Protection box next to the Real-Time Protection state box in the screen that will open. Figure 82 : Enablin g Real-Time Pr otection To disable Real-Time Protection, do the following: 1. Select the Settings item in the Anti-Virus tab. 2. Select the Protection Settings in the [...]

  • Página 95

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 95 To configure the program's response to a malware object, perform the following act ions (see Figure below): 1. Select the Settings item in the Anti-Virus tab. 2. Select the Protection Settings in the screen that will open. 3. Select the program&a[...]

  • Página 96

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 96 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch. I N THIS SECT ION About on-demand scan .............................................................[...]

  • Página 97

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 97 W hen Folder scan is s elected, a sc reen displaying the device’s file s ystem will o pen. In or der navigate through the file system us e the joystick buttons. In order to scan a folder, select the folder you wish to scan and select Scan from Menu [...]

  • Página 98

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 98 Once an infected object is de tected (see Figure below) an action will be performed with this object in acco rdance with the scan setting (see section “ Selecting an action to be performed with objects ” on page 100 ). A prompt for an action to be performed with an object (see Figure belo w[...]

  • Página 99

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 99 Figure 87 : Configu ring an automatic scan schedu le S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of m alicious code. To modify the values of the settings, use devi[...]

  • Página 100

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 100 I F YOU CHEC K BOX ... D URING THE SC AN THE PRO GRAM WI LL BE PERFORMING T HE FOLLO WING ACTIO NS ... Ar chives unpacking and scanning o f the entire archive content; scanning all file types Executables only scanning only executable program files (for example *.exe, *.mdl, *.app); archives wi[...]

  • Página 101

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 101 By default the program uses the values of the settings recommended by Kaspersky Lab's s p ecialists. To configure the program's response to a malware object, perform the following act ions (see Figure below): 1. Select the Settings item in [...]

  • Página 102

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 102 Q UARANTINE This section contains information about the Quarantine and managing quarantined infecte d objects. I N THIS SECT ION About Quarantine ....................................................................................................................................................[...]

  • Página 103

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 103 V IEWING QU A R A NT I NE D O B J E CT S To view the list of quarantined o bjects, select the Qu arantine item in the Anti-Virus tab. This will open the Quarantine screen (see Fi gure below) which contains a list of objects stored in the Quarantine ([...]

  • Página 104

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 104 Figure 91 : Re storing objects from Quaran tine D ELETING OBJECTS F ROM Q U A R A N T I NE To delete objects from the Qu arantine, perform the following ac tions (see Figure below): 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Quarantine screen that will open select an object[...]

  • Página 105

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 105 Figure 92 : Dele ting an objec t from Quarantine To delete all objects from Quarantine perform the following: 4. Select the Quarantine item in the Anti-Virus tab. 5. Press Menu and select Delete all in the Quarantine screen. All objects will be delet[...]

  • Página 106

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 106 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the description of how to compile the Black and White Lists, configure Anti-Spam operation modes and other Anti-Spam settings. I N THIS SECT ION About Anti-Spam ..........................................[...]

  • Página 107

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 107 2. In the screen that will open select the mode you require and press Done to save changes. Figure 93 : Sele c ting the operation mode C R E A T I N G A B L A C K L IST This list contains entries with phone numbers, SMS and calls from which will be b[...]

  • Página 108

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 108 2. Press Menu and select Add entry . 3. Set the following settings in the screen that w ill open: Phone number – phone number fo r which the receipt of SM S message and/or calls wil l b e blocked. Th e number s hould only be comprised of a lphanumeric characters; it may begin with a digit, a[...]

  • Página 109

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 109 2. Select an entry you wish to edit from the list. 3. Pre ss Menu and select Edit entry . 4. Edit the following settings in the screen that will open: Phone number – phone number fo r which the receipt of SM S message and/or calls will be bl ocked.[...]

  • Página 110

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 110 Deleting an entry To delete an entry from the An ti-Spa m Black List, perform the following actions (see Figure below) : 1. Select Black List in the Anti-Spam tab. 2. Select an entry you wish to delete from the list. 3. Press Menu and select Delete entry . Figure 96 : Dele ting an entry C R E [...]

  • Página 111

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 111 A dding a new entry To add an entry to the Anti-Spam White List, perform the following actions (see Figure belo w): 1. Select White List in the Anti-Spam tab. 2. Press Me nu and select Add entr y . 3. Set the following settings in the screen that w i[...]

  • Página 112

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 112 4. Press Done to save the changes. Figure 97 : Adding a new entr y Editing an existing entry To edit an entry in the Anti-Spam White List , perform the following actions (see Figure below ): 1. Select White List in the Anti-Spam tab. 2. Select an entry you wish to edit from the list. 3. Press [...]

  • Página 113

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 113 Allow messages : allow only incoming SMS messages. Text - text upon detection of which i n the SMS message received, such message will be passed th rough. The setting is available if value Allow messages is selected for setting Function . 5. Press Do[...]

  • Página 114

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 114 Figure 99 : Dele ting an entry R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti -Spam response to SMS mes sages a nd calls from numbers entered into the phonebook irrespective of the settings of the Black and White Lists. To [...]

  • Página 115

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 115 3. Press Done to save the changes. Figure 100 : Allo wing contacts from the phonebo ok R E S PO N SE TO M E S S A G E S F R O M NON - NUMERIC N UM B ER S You can co nfigure the progr a m's response w h en SMS messages are received fro m non -num[...]

  • Página 116

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 116 3. Press Done to save the changes. Figure 101 : Blo c king non -numer ic number s[...]

  • Página 117

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 117 S E LE C T I N G AN A C T I ON T O B E P E R FO RM E D W I T H IN C O M I N G M E S S A G E S Anti-Spam s uggests that you con figure its response to SMS messages from phone numbers no t found in either Black or W hite List. Such messages will be int[...]

  • Página 118

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 118 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam s uggests that you con figure its response to calls from phone numbers not found in either Black or W hite List. After the call is complete, a notification will be displayed on the device's scr[...]

  • Página 119

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 119 A BOUT P A R E N T A L C O N T R OL The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the W hite Lists. If at least one match is detected, the scan will be stopped. SMS m ess[...]

  • Página 120

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 120 Figure 104 : Selec ting Parental control mode C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control . Information about bl ocked SMS messages and ca lls will be registered in the L og (see section “ P[...]

  • Página 121

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 121 Phone number – phone number the s ending of SMS mes sage and/or calls from which will be bl ocked. Such number may begin w i th a digit, a letter or w ith a "+" and mus t contain digits. Additionally when entering a n umber, you can use m[...]

  • Página 122

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 122 entering a number, you can use masks "*" and " ?" (where «*» any number of characters and «?» a ny one character ). A ction – ac tion to be performed with a message and/or call: Block all : block outgoing calls and SMS messages. Block calls : block only outgoing calls[...]

  • Página 123

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 123 Figure 107 : Dele ting an entry C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control. I N THIS SECT I ON Adding a new entry ..............................[...]

  • Página 124

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 124 en tering a number, you can use m asks "*" and "?" (where «*» any number of ch aracters and «?» any one character ). A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages. Allow calls : allow only outgoing call[...]

  • Página 125

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 125 A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages. Allow calls : allow only outgoing calls. Allow messages : allow only outgoing SMS messages. 5. Press Done to save the changes. Figure 1[...]

  • Página 126

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 126 Figure 110 : Dele ting an entry[...]

  • Página 127

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 127 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect information stored on the device in case the device is lost. I N THIS SECT ION About Anti- Th eft .................................................[...]

  • Página 128

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 128 T HE SM S -B L O C K FU N C T I O N The SM S-Block function allows b locking th e device if i t is required. You can unblock the de v ic e only after you enter the secret code. To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1. Open the Anti-Theft tab 2. Se[...]

  • Página 129

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 129 Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 112 : Blo c king the devi ce To create an SM S message using your phone's standard functions for creating SMS m e ssag[...]

  • Página 130

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 130 Contacts will be deleted from the phonebook stored on the device and on the SIM card. If you wish to delete personal f iles (data from My Documents folder), check the My Documents box. To delete data from all installed storage cards, check the Storage card files box. 4. Press Done to save the [...]

  • Página 131

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 131 Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 114 : Dele ting personal data To create an SM S mess age using your phone's standard functions for creating SMS messag[...]

  • Página 132

    K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 132 Using the E-mail address specify the e -mail a ddress on which you wish to receive an e -m ail message about your new phone number. To block the device once the SIM card was replaced on it or when the device is turned on without the SIM card, check the Block box. You c an unblock the device onl[...]

  • Página 133

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 133 Figure 116 : Enablin g the function D E T ER M I N I NG THE DE V I C E L O C A TI O N You can receive the coordinates of the device w ith the SMS -Find function enabled using the following methods: using Stealth SMS on another device with Kaspersky M[...]

  • Página 134

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 134 Figure 117 : Determ ine the location of the device To create an SM S message using your phone's standard functions for creating SMS messages: send to the device you need to block an SMS message containing text find:<code> (where <c ode> is secret code set on the receiving devi[...]

  • Página 135

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 135 The function being used must be turned enabled on the device receiving the message. Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 118 : Blo c king the devi c e F IREWALL[...]

  • Página 136

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 136 S E LE C T I N G T H E F I R E WA L L SECURITY LEVEL Operation of the Firewall component is based on the security le vels. The securi ty level set will de termine which network protocols will be allowed to be used to transfer information and which of them will be blocked. To modify the values [...]

  • Página 137

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 137 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption .......................................................................................[...]

  • Página 138

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 138 The data in the folder will be encrypted once the command is exe cuted and then data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tracted from it or accessed. Figure 120 : Selec ting data for encr y ption You can encrypt only one[...]

  • Página 139

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 139 D A T A D E C R Y P T I O N You can completely decrypt data which was previously encry p ted (see section “ Data encryption ” on page 137 ). For full decryption of the folder e ncrypted earlier, select Decrypt on the Encryption tab (see Figure be[...]

  • Página 140

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 140 2. In the scree n that will open, se t the required delay for th e Bloc k access setting: 1 minute, 5 minutes, 15 minutes or 1 hour . 3. Press Done to save the changes.. Figure 122 : Blo c king access to encrypted data You can also momentarily block access to encrypted data and enable the prom[...]

  • Página 141

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 141 For immediate prompt for the secret code, press Kaspersky Mobile Security icon in the device notification area and select Lock data (see Figure below). Figure 123 : Icon shortcut men u U PDATING THE PROGRAM BASES This section co ntains information ab[...]

  • Página 142

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 142 V I E WI N G B A S E S IN F OR MA TION In order to view information about the installed base s (see Figure below), select Databases info on the Information ta b. Figure 124 : The Informat ion tab M A N U A L U PD A T I N G You can start the updating process manually at any time convenient to y[...]

  • Página 143

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 143 To start a manual update of anti-virus bases, select Upda te on th e Anti-Virus ta b (see Figure belo w). The prog ram will start th e bases update process from the server. Figure 125 : Manual upda te S C HE D U L E D UD P A T ING Timely updates are [...]

  • Página 144

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 144 Figure 126 : Configur ing the updat e schedule P ROGRAM LOGS This section contains information about the logs and managing of the information they cont ain. I N THIS SECT ION About logs ............................................................................................................[...]

  • Página 145

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 145 V IEWING L OG REC O R DS To view all records stored in th e log, perform the following actions (see Figure below): 1. Select Logs on the Information tab. 2. Select the component the log of which you wish to open. Figure 127 : Viewing re cords in the [...]

  • Página 146

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 146 3. Press Menu and select Delete all . All records from the log for every component will be deleted. Figure 128 : Deleting recor ds M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary. I N THIS SECT ION Viewing the lice[...]

  • Página 147

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 147 V IEWING TH E L I C EN SE I N F O R M A TI O N In order to view information about the license: select About license in the Information tab (see Figure below). Figure 129 : Viewing licen se information R E N EW I NG T H E L I C E N SE To renew your li[...]

  • Página 148

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 148 3. Enter th e activation code into the fo ur fields. The activation code consists of Latin a lphabet characters and digits (the code is case -insensitive). After you have entered the activation code, p ress Continue . The program will send an http query to Kaspersky Lab's activation serve[...]

  • Página 149

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 149 2. Close Kaspersky Mobile Security. To do it, press Menu and select Exit (see Figure below). Figure 131 : Closing the program 3. Uninstall the program. To do this: a. Pre ss Start and select Settings . b. Se lect Remove Programs on the System tab (se[...]

  • Página 150

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 150 c. Select Kaspersky M obile Security in the list of installed programs and press the Remove button (see Figure below). Figure 133 : Selecting the program d. Pre ss Yes to confirm removal of the program. e. En ter the secret code in the prompt displayed. Press OK . f. If you wish to save the ap[...]

  • Página 151

    151 GLOSSARY А A C T I V A T I N G T H E P R O G R A M The acti vation procedure involves e ntering the activate code and then receiving a key to be used by the program to determine your rights and the license period. A R C H I V E File "containing" one or several other objects which also can be archives. B B A S E S Database maintained [...]

  • Página 152

    K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 152 I I N F E C T E D O B J E C T Object containing malicious code: it was detected by the scan that a section of the object's code is fully identical to a section of the code of a kn own th reat. Kaspersky Lab's exp e rts do not recommend using su ch objects since they may cause your dev[...]

  • Página 153

    G L O S S A R Y 153 phone numbers incoming calls and SMS messages from which will be passed through by Anti -Spam a nd outgoing calls and SMS messages to which will be passed through by Parental control. text upon detection of which the incoming SMS message will be passed through.[...]

  • Página 154

    154 KASPERSKY LAB Kaspersky Lab was fo unded in 1997. Today it is the leading developer o f a wide range of high -performance information security software products, including anti-virus, anti-spam and anti -hacking systems. Kaspersky Lab is an inte rnational company. Hea dquartered in the Russian Federation, the company has offices i n the United [...]

  • Página 155

    K A S P E R S K Y L AB 155 Address: Russia, 123060, Moscow, 1-st Volokolamsky Proezd, 10, Building 1 Phone, fax: +7 (495) 797- 87 -00, +7 (495) 645 - 79 -39, +7 (495) 956- 70 - 00 Helpdesk: +7 (495) 797- 87 -07, +7 (495) 645 - 79 -29 or +7 (495) 956 - 87 - 08. Enterprise product user support: +7 (495) 797- 87 -07, +7 (495) 645 - 79 -29 or +7 (495) [...]

  • Página 156

    156 CRYPTO EX LTD. To crea te a nd verify dig ital s ignatures, Kaspersky Anti -Virus uses Crypto E x Ltd 's data sec urity software l ibrary, Crypto C. CryptoEx Ltd is licensed by the Federal Agency for Government Communications and In formation (Fe deral S ecurity Service of Russian Federation) for development of the Crypto C data protection[...]

  • Página 157

    157 INDEX A Actions On -demand scan ........................................................................................................................................... 27, 100 Real-Time Protection ................................................................ ....................................................................... 20, 94 A[...]

  • Página 158

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 158 Anti-Spam White List ..................................................................................................................................... 43, 113 Log records .......................................................................................................................[...]

  • Página 159

    I N D E X 159 Actions to be performed with objects ............................................................................................................. 27, 100 objects to be scanned ...................................................................................................................................... 26, 99 scheduled start .[...]

  • Página 160

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 160 W W hite Li s t Anti-Spam ...................................................................................................................................................... 41, 110 Parental control ............................................................................................[...]