Kaspersky Lab Mobile Security 8.0 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Kaspersky Lab Mobile Security 8.0. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Kaspersky Lab Mobile Security 8.0 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Kaspersky Lab Mobile Security 8.0 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Kaspersky Lab Mobile Security 8.0, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Kaspersky Lab Mobile Security 8.0 должна находится:
- информация относительно технических данных устройства Kaspersky Lab Mobile Security 8.0
- название производителя и год производства оборудования Kaspersky Lab Mobile Security 8.0
- правила обслуживания, настройки и ухода за оборудованием Kaspersky Lab Mobile Security 8.0
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Kaspersky Lab Mobile Security 8.0 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Kaspersky Lab Mobile Security 8.0 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Kaspersky Lab, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Kaspersky Lab Mobile Security 8.0, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Kaspersky Lab Mobile Security 8.0, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Kaspersky Lab Mobile Security 8.0. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    U S E R G U I D E KASPER SKY MOBIL E SECURI TY 8.0[...]

  • Страница 2

    2 Dear User! Thank you for choosing our product. W e hope that this documentation will help you in your work and will pro vide answers regarding this software product. Note! T his document i s a pr operty o f Kaspe rsky L ab's and a ll rights to this docum ent are reserved by the co pyright laws of the Russian Federation and i nternational tre[...]

  • Страница 3

    3 TABLE OF CONTENTS KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7 Obtaining information about the application ............................................................................................................. 8 Data sources for ind[...]

  • Страница 4

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 4 Parental control ...................................................................................................................................................... 48 About Parental control ......................................................................................................[...]

  • Страница 5

    T A B L E O F C O N T E N T S 5 Secret code ...................................................................................................................................................... 91 Viewing information about the program ................................................................................................ ............ 92 R[...]

  • Страница 6

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 6 Updating the program bases ................................................................................................................................ 141 About updating of program bases ........................................................................................................[...]

  • Страница 7

    7 KASPERSKY MOBILE SECURITY 8.0 Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft W indow s Mobile against malware pro grams, unsolicited calls and messages: The p rogram offers the following functionality: Real-Time Protection of the file system of the device - interception and scan o[...]

  • Страница 8

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 8 O BTAINING INFORMATION ABOUT THE APPLICATION If you have any q uestions regarding purchasing, ins talling or us ing Kaspersky Mobile Sec urity, answers are readily available. Kaspersky Lab provides various s ources o f information about the program. You ca n select th e source that suits you be [...]

  • Страница 9

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 9 Documentation The User Guide contains detailed in formation about the application's functions, how to work with th em, includes advices and recommendations on its configuration. Files containing the documents in PDF format are included into the product package of Kaspersky M obi le Security[...]

  • Страница 10

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 10 Customer ID a nd password. En ter the customer ID and password received du ring re gistration at the Technical Support Service web site. E-mail address. The experts from the Technical Support Service will send th eir reply to your inquiry to tha t address. Technical support ov er the phone If y[...]

  • Страница 11

    11 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS This section contains description of t he operation of Kaspersky Mobile Security 8.0 for smartphones running Symbian version 9.1, 9.2 and 9.3 Series 60 UI. I N THIS SECT ION Installing Kaspersky Mobile Security ...............................................................................................[...]

  • Страница 12

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 12 using program Nokia PC Suite; by starting the distribution pac kage on the device. 3. A prompt (see Figure below) will appear on the screen; select Yes to confirm the installation of the program. Figure 1: Prom pt to confirm the installation 4. Review additional information about the program: n[...]

  • Страница 13

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 13 G ETTING STARTED This section co ntains information on s tarting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code. I N THIS SECT ION Activating the program .......................................................[...]

  • Страница 14

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 14 Figure 3: The program activat ion window 5. Enter th e code into the fo ur fields. The activation code consists of Latin alphabet c haracters and digits (the code is case-insensitive). After you have entered the activation code, select Activate in th e Op tions menu. 6. W hen you requ est an ac[...]

  • Страница 15

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 15 Firewall – level of device protection against unwanted network activities (see section “ Firewall ” on page 66 ). Figure 4: The program comp onent status windo w In order to switch to the program graphic interface, press OK . G RA P H I C I N T E R F A C E The program com[...]

  • Страница 16

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 16 To navigate from on e tab to another, use the joystick of the device o r select the Open ta b item in the Options menu (see Figure below). Figure 5: The Opt i ons menu In order to return to the progr am components status window, select the Current status item from the Options menu. S E CR E T C[...]

  • Страница 17

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 17 3. Enter the current code in t he Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm code entry field to confirm. If you forgot the secret code, you will not be able to manage Kaspersky M obile Security functions that [...]

  • Страница 18

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 18 A BOUT R EAL - T IME P R O T E C T I O N Real-Time Protection is launched at the o peration system startup, is permanently loaded in the device's RAM and monitors all opened, saved or run files. Files are scanned according to the following algorithm: 1. The component intercepts each attemp[...]

  • Страница 19

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 19 Figure 7: Enabling Re al-Time Prot ec tion To disable Real-Time Protection, do the following: 1. Select the Settings item in the Anti-Virus tab. 2. Select Real-Time Protection in the Settings window. 3. Select value Off for the Protection setting. 4. Press B ack to save the cha[...]

  • Страница 20

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 20 3. Select the type of files to be scanned by Real-Time Protection using the Objects to be scanned settings: A ll files : scan files of a ll types. Executables only : scan only ex ec utable program files (for example *.exe, *.sis, *.mdl, *.app). 4. Select OK to save changes. Fugure 8: Selecting [...]

  • Страница 21

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 21 Delete : delete malware objects w i thout notifying the user. Quarantine : quarantine malware objects. 4. Select OK to save changes. Figure 9: Configur ing the program 's respon se when it detec ts a malw are object D I S PL A Y O F T HE P R O T E C T I O N I C O N The ic [...]

  • Страница 22

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 22 In m enu only : the program icon in the device menu and Kaspersky Mobile Security menu. Never : the icon will not be displayed. 4. Select OK to save changes. Figure 10 : Configur ing the protecti on st atus icon[...]

  • Страница 23

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 23 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch. I N THIS SECT ION About on-demand scan ............................................[...]

  • Страница 24

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 24 S can folder : selecting and scanning of a ce rtain folder in th e device's file s ystem or on the connected storage card. W hen Scan folder item is sele c ted, a window displaying the device’s file system will open. In order navigate through the file system us e the joystick buttons. In[...]

  • Страница 25

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 25 Figure 13 : Message abo ut a viru s detected Once th e scan is complete the gen eral statistics about detected and deleted malware objects will be displayed on the screen. By defa ult, during the scan the s creen b acklight goes off in order to save th e b attery c harge. You c[...]

  • Страница 26

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 26 Figure 14 : Configur ing a scheduled scan S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of malicious code. In order to edit the values of the settings, use the device's joystick or select the Change item [...]

  • Страница 27

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 27 Figure 15 : Selecting ob jects to be scanned S E LE C T I N G A C T IO N S T O B E PE R F O R ME D W I T H OB J E C T S You can configure the application's actions to be performed w he n the application detects a m alicious object. In order to edit the values of the settin[...]

  • Страница 28

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 28 Figure 16 : Configur ing actions to b e performed with obje cts 3. Using the Action item, select the application's response when it detects a malware object (see Figure below): Delete : delete detected malw are objects without notifying the user. Quarantine : quarantine detected malicious [...]

  • Страница 29

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 29 Figure 17 : Selecting a ctions to be perform ed w ith objects 4. If you selected Tr y to disinfect as t he application's response, use If disinfectio n fails (see Figure below) select an action to be performed by the application when it is impossible to disinfect the infec[...]

  • Страница 30

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 30 In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values after you modified t[...]

  • Страница 31

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 31 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values af[...]

  • Страница 32

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 32 2. Select the required value for the Backlight item in the window that will open: If you wish the backlight to stay permanently on w hile an anti -virus scan is in progress, select the Yes value. If you wish the backlight to automatically go off, select the No value. 3. Press Back to save the c[...]

  • Страница 33

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 33 V IEWING Q U ARANTINED O BJ E CT S To view the list of quarantined o bjects, select Quarantine on the Anti-Virus tab (see Figure below). Figure 22 : The Anti-V irus tab This will open the Quarantine window which contains a list of objects stored in the quarantine (see Figure be[...]

  • Страница 34

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 34 R E S T OR I NG O BJ E C T S F R O M Q U A R A NT I N E Select the Quarantine item in the Anti-Virus tab. 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Quarantine window that will open select an object you wish t o restore. 3. Select Restore from the Options menu. The object se[...]

  • Страница 35

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 35 Figure 25 : Deleting an ob ject from quarantine In order to delete all quarantined objects: 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Options menu that will open, select Delete all . All quarantined objects will be deleted.[...]

  • Страница 36

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 36 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the descri ption of how to comp ile the Black and White Lists, configure Anti-Spam modes and other Anti-Spam settings. I N THIS SECT ION About Anti-Spam ...................................................[...]

  • Страница 37

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 37 To select an Anti-Spam mode, perform the following actions (see Figure below): 1. Open the Anti-Spam tab. 2. Select Settings and then - Anti-Spam from the menu. 3. In the window that will open, select the required mode and press OK to save the changes and close the window . Fig[...]

  • Страница 38

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 38 A DDING A NEW E NTRY To add an entry to the Anti-Spam Black List, perform the following actions (see Figure belo w): 1. Select Black List in the Anti-Spam tab. 2. Select Add entry from the Options menu. 3. Set the following settings in the window that will open: Message ty pe - action to be per[...]

  • Страница 39

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 39 E DITING AN EXIST IN G ENTRY To edit settings of an existing entry, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select Edit entry from the Options menu. 3. Set the following entry settings in the window that will open: Message[...]

  • Страница 40

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 40 D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the Black List, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select an entry in the list which you wish to delete. 3. Select Delete entry from the Options menu. Figure 29 : Dele[...]

  • Страница 41

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 41 Figure 30 : Dele ting all entries C R E A T I N G A W HITE L IST The White Lis t contains entries with p hone numbers, SMS an d calls from which will be passed through by Anti -Spam and text upon detection of which in a received SMS message it will be passed through. I N THIS S[...]

  • Страница 42

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 42 SMS only : allow incoming SMS messages only . Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone numbe r – phone number for which th e receipt of SMS mess age and/or calls will be allowed. The number s hould only be comprised of a lphanumeri[...]

  • Страница 43

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 43 Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone number – p hone number for which the receipt of SMS message and/or calls will be allowed. The number s hould only be comprised of a lphanumeric characters; it may begin with[...]

  • Страница 44

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 44 Figure 33 : Dele ting an individual e ntry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Anti-Spam tab. 2. Select Delete all from the Options menu. Figure 34 : Dele ting all entries[...]

  • Страница 45

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 45 R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti-Spam resp onse to SMS messages and calls from numbers found in the phone book irrespective of the settings of the Black and W hite Lists. In order to edit the v[...]

  • Страница 46

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 46 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists. If you wish to restore the recommended values after you modified [...]

  • Страница 47

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 47 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G M E S S A G E S Anti-Spam suggests that you configure its response to SMS messages from phone nu mbers not found in either the Black or the W hite List. Such messages will be intercepted by Anti-Spa m[...]

  • Страница 48

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 48 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam suggests that you configure its response to calls from phone numbers not found in either the Black or the W hite List. After th e call is complete, a notification will be displayed on the device&apos[...]

  • Страница 49

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 49 A BOUT P A R E N T A L C ON T R O L The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the White Lists. If at least one match is detected, the scan will be stopped. SMS m essages and calls matchin g any [...]

  • Страница 50

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 50 Figure 39 : Modes of Parental con trol C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control . Information about blocked SMS messages and calls will be saved in the Log sec tion (see section “ Program [...]

  • Страница 51

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 51 SMS only : block outgoing SMS messages only . Calls onl y : bloc k outgoing calls only. SMS and calls : block outgoing calls and SMS messages. Phone n umber - phone number SMS m essage and/or outgoing calls to which will be blocke d. This number may begin with a digit or with a[...]

  • Страница 52

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 52 Phone number - phone number SMS mes sage and/or outgoing calls to which will be blocked. This number may begin with a digit o r with a " +" and mu st co ntain d igits. Addi tionally when entering a number, you c an use masks "?" and "*" (where “*” represents a [...]

  • Страница 53

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 53 Figure 42 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select Black List from the menu in the Parental control tab. 2. Select Delete all from the Options menu.[...]

  • Страница 54

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 54 Figure 43 : Deleting all entries C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control. I N THIS SECT ION Adding a new entry ...........................................................................[...]

  • Страница 55

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 55 SMS and calls : a llow outgoing calls and SMS messages. Phone number - phone number S MS message and/or outgoing calls to which will be allowed. This number may begin with a digit o r with a " +" and mu st co ntain d igits. Addi tionally when entering a number, you ca[...]

  • Страница 56

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 56 Figure 45 : Editing an e xisting entry D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the White List, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab. 2. Select an entry you wish to delete. 3. Select Delete ent[...]

  • Страница 57

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 57 Figure 46 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab. 2. Select Detele all from the Options menu. Figure 47 : Deleting all entries[...]

  • Страница 58

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 58 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect i nformation stored on the device in case the device is lost. I N THIS SECT ION About Anti-Theft ...............................................................................................[...]

  • Страница 59

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 59 To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1. Select Settings on the Anti-Theft tab. 2. Select SMS-Block in the window that will open. 3. Using the Change item in the Options menu, set value On . 4. Press Back to save the changes. Figur[...]

  • Страница 60

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 60 Figure 49 : Blocking the device To create an SMS m essage using your phone's standard functions for creating SMS messages: send to the device you need to block an SMS m essage con taining text block:<code> (where <code> is secret code set on the d evice to be blocked). The mess[...]

  • Страница 61

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 61 If you wish personal files (from folder C:Data) to be deleted, select Delete data and set value to Yes . To erase data from all installed storage cards, select Delete card files and set the value to Yes . 4. Press OK to save the changes. Figure 50 : Configuring the SMS-Cl ean [...]

  • Страница 62

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 62 Figure 51 : Deleting per sonal data To create an SM S message using your phone's standard functions for creating SMS m e ssages: send to the device you need to block an SMS m essage con taining text clean:<code> (where <code> is secret code set on the receiving d evice. The m e[...]

  • Страница 63

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 63 Using the E-mail address field enter the e -mail address on which you wish to re ceive an e -mail m essage about the new phone number. In order to bl ock the device once the SIM ca rd is replaced or the device is turned on without it , se t the value for the Block device item t[...]

  • Страница 64

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 64 Figure 53 : Configuring the SMS-Find function D ETERMIN ING THE D EV I C E L O C A T I O N You can receive the coordinates of the device w ith the SMS -Find function enabled using the following methods: by using the Stealth SMS function on another device with Kaspersky Mobile Security installed[...]

  • Страница 65

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 65 Figure 54 :Determinin g the location of the de vice To create an SM S message the standa rd SM S feature on your phone : send to the device you nee d to block an SMS mess age containing text find:<code> (where < code> is secret code set on the receiving device. The [...]

  • Страница 66

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 66 SMS-Clean (see section "The SMS- Clean function” on page 60 ). SMS- Find (see section “The SMS - Find function” on page 63 ). The function being used must be enabled on the receiving device. Press Next . 3. Enter the number of the device to which the message will be sent. Press Next [...]

  • Страница 67

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 67 F IREWALL This section contains information about the Firewall c omponent which monitors the network activity of the device a nd protection of the device on the network level. I N THIS SECT ION About Firewall .....................................................................[...]

  • Страница 68

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 68 Figure 56 : Configur ing the Fire wall security level C O N FI G UR IN G NO TI F I C A T IONS ABOUT CONNECTIO N A T T E MP TS You can configure the display of user notificat ions about connection attempts blocked at the selected Firewall security level; 1. Select Settin gs on the Firewall tab. [...]

  • Страница 69

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 69 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption ...................................................................................................................[...]

  • Страница 70

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 70 Figure 58 : Data encr y ption The data in the folder will be encrypted once the comm and is executed and th en data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tra cted from it or accessed. You can encrypt only one folder using t[...]

  • Страница 71

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 71 Figure 59 : Data decr y ption After decryption, the Decry pt item will turn into Encry pt and you can use it again to encrypt data (see section “Data encryption” on page 69 ). I N F O R M A T I O N A B O U T E N CR YP T E D D A T A If encryption is enabled, you can check wh[...]

  • Страница 72

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 72 B L O C K I N G A C C E S S T O E N CR Y P T E D D A T A You can block access to enc rypted data insta ntly or with a delay. After this you will have to enter your secret co de to access the encrypted data. To ensure data protection when the device i s switched in to the sleep m ode, you can c [...]

  • Страница 73

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 73 U PDATING THE PROGRAM BASES This section contains information about the U pda te com ponent. Regular bases update is necessary to ensure reliabl e operation of Kaspersky Mobile Security. I N THIS SECT ION About program bases update ..............................................[...]

  • Страница 74

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 74 M A N U A L U PD A T I N G You can start the updating process manually at any time convenient to you. To start a manual update of anti-virus bases , select Update on the Anti-Virus tab (see Figure below). The program will start th e b ases updating from the server using the connection selec ted[...]

  • Страница 75

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 75 Figure 64 : Configur ing scheduled u pdates You can als o configure the automatic u pdate s ettings when your phon e is in the roaming mode (see section “ Updating while roaming ” on page 75 ). U P D A T I N G WH I L E R O A M I N G You ca n configure automatic disabling of[...]

  • Страница 76

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 76 Figure 65 : Configur ing updates in roam ing C O N FI G UR IN G CO N NE CT I ON S ET T I N G S To configure the connection s ettings, perform the following actions (see Figure below): 1. Select Settings in the Anti-Virus tab. 2. Select Update in the window that will open. 3. Select the access p[...]

  • Страница 77

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 77 Figure 66 : Configur ing connection settings After the update is complete, the connection open fo r the update will au tomatically close. If th e connection had been established before the update w as starte d, it will be used for further operation. P ROGRAM LOGS This section c[...]

  • Страница 78

    K A S P E R S K Y M OB I L E S E C U R I T Y 8 . 0 78 V IEWING L OG R E C O R D S To view all records stored in the Log, perform the following actions: 1. Select th e c orresponding item i n th e Log m enu on the tab of the component in formation about operation of which you wish to obtain (for ex ample, Log item on the Anti-Virus tab). 2. Use joys[...]

  • Страница 79

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 79 Figure 67 : Configur ing the statu s window displa y M ANAGING SOUND NOTIFICATION You can co nfigure th e use of the sound notification i n c ase of cer tain events (detection of an infe cted object , message about an application status, etc.) By default the playback of the sou[...]

  • Страница 80

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 80 Figure 68 : Managing s ound notifi cation M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary. I N THIS SECT ION Viewing the license information ..........................................................................[...]

  • Страница 81

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 81 Figure 69 : Vie w ing the license in f orm ation R E N EW I NG T H E L I C E N SE To renew your license, perform the following actions (see Figure below): 1. Select About license on the Information tab. 2. Select Renew in the window that will open. The code entry window will op[...]

  • Страница 82

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 82 Figure 70 : Rene w ing the licen se If th e ac tivation code you entered appears invalid for any reason, a c orresponding message will be displayed on your smartphone's screen. If th e key installation is successful, information about the license will be displayed o n the screen. To procee[...]

  • Страница 83

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 83 c. Select Exit from the Options menu (see Figure below ). Figure 71 : Exiting the program . 3. Uninstall Kaspersky Mobile Security a. Open the device’s main menu. b. Switch t o the Tools menu and select App. mgr. (see Figure below). Figure 72 : Starting the Application m anag[...]

  • Страница 84

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 84 c. Select KMS 8 in the list of programs and press the Options button (see Figure below ). Figure 73 : Selecting the applicatio n d. Se lect the Remove menu item(see Figure below). Figure 74 : Uninstallin g the appli cation e. Pre ss the Yes button in the prompt to confirm the program removal. f[...]

  • Страница 85

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 85 g. If you wish to save the program settings, quarantined objects or Anti-Sp am lists, check the corresponding fields next to the required settings (see Figure below). Figure 75 : The list of settings to be s aved h. Res tart the phone to complete the program removal process.[...]

  • Страница 86

    86 KASPERSKY MOBILE SECURITY FOR MICROSOFT WIN DOWS MOBILE This section contains description of the operation o f Kaspersky Mobile Secu rity for mobile devi ces running one of the following operating systems: Microsoft Windows Mobile 5.0. Microsoft Windows Mobile 6.0, 6.1. I N THIS SECT ION Installing Kaspersky Mobile Security .....................[...]

  • Страница 87

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 87 3. Read the License Ag reement (see the Fi gure b elow). If you agree to all th e terms, press OK . Kaspe rsky Mobile Security will the n be installed on the device. If you do not agree with th e terms of the Lic ense Agreement, pre ss Cancel . Figure[...]

  • Страница 88

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 88 G ETTING STARTED This s ection contains information on starting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code. I N THIS SECT ION Activating the program .........................................................................[...]

  • Страница 89

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 89 The Kaspersky Mobile Security activation window w il l open on the device's screen (see Fig ure below). Figure 78 : Entering the code 4. Enter th e code into the fo ur fields. The activation code consists of Latin alphabet c haracters and digits [...]

  • Страница 90

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 90 Anti-Spam – status of the protection against unwanted incoming messages. Figure 79 : The program component statu s window You can start a ful l scan of th e de vice fo r malware objects using the Scan button or switch to se lecting the tab using Menu . G R A PH I C A L US E R I N TE R F A C E[...]

  • Страница 91

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 91 To navigate through the tabs, press the M enu button and select the required tab (s ee Figure below). Figure 80 : Prog ram menu To return to the program component status window, select Protection status . To exit the program, select Exit . S E CR E T [...]

  • Страница 92

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 92 In order to change the secret code , do the following: 1. Select the Information tab. 2. On the tab select Settings , then select Change code. 3. Enter the current code in t he Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm entry f[...]

  • Страница 93

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 93 R EAL -T IME P ROTECTION This section contains information about Real-Time Protection of your device, how to enable it and configure its settings. I N THIS SECT ION About Real-Time Protection ...........................................................[...]

  • Страница 94

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 94 3. Check the Enable Protection box next to the Real-Time Protection state box in the screen that will open. Figure 82 : Enablin g Real-Time Pr otection To disable Real-Time Protection, do the following: 1. Select the Settings item in the Anti-Virus tab. 2. Select the Protection Settings in the [...]

  • Страница 95

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 95 To configure the program's response to a malware object, perform the following act ions (see Figure below): 1. Select the Settings item in the Anti-Virus tab. 2. Select the Protection Settings in the screen that will open. 3. Select the program&a[...]

  • Страница 96

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 96 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch. I N THIS SECT ION About on-demand scan .............................................................[...]

  • Страница 97

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 97 W hen Folder scan is s elected, a sc reen displaying the device’s file s ystem will o pen. In or der navigate through the file system us e the joystick buttons. In order to scan a folder, select the folder you wish to scan and select Scan from Menu [...]

  • Страница 98

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 98 Once an infected object is de tected (see Figure below) an action will be performed with this object in acco rdance with the scan setting (see section “ Selecting an action to be performed with objects ” on page 100 ). A prompt for an action to be performed with an object (see Figure belo w[...]

  • Страница 99

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 99 Figure 87 : Configu ring an automatic scan schedu le S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of m alicious code. To modify the values of the settings, use devi[...]

  • Страница 100

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 100 I F YOU CHEC K BOX ... D URING THE SC AN THE PRO GRAM WI LL BE PERFORMING T HE FOLLO WING ACTIO NS ... Ar chives unpacking and scanning o f the entire archive content; scanning all file types Executables only scanning only executable program files (for example *.exe, *.mdl, *.app); archives wi[...]

  • Страница 101

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 101 By default the program uses the values of the settings recommended by Kaspersky Lab's s p ecialists. To configure the program's response to a malware object, perform the following act ions (see Figure below): 1. Select the Settings item in [...]

  • Страница 102

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 102 Q UARANTINE This section contains information about the Quarantine and managing quarantined infecte d objects. I N THIS SECT ION About Quarantine ....................................................................................................................................................[...]

  • Страница 103

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 103 V IEWING QU A R A NT I NE D O B J E CT S To view the list of quarantined o bjects, select the Qu arantine item in the Anti-Virus tab. This will open the Quarantine screen (see Fi gure below) which contains a list of objects stored in the Quarantine ([...]

  • Страница 104

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 104 Figure 91 : Re storing objects from Quaran tine D ELETING OBJECTS F ROM Q U A R A N T I NE To delete objects from the Qu arantine, perform the following ac tions (see Figure below): 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Quarantine screen that will open select an object[...]

  • Страница 105

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 105 Figure 92 : Dele ting an objec t from Quarantine To delete all objects from Quarantine perform the following: 4. Select the Quarantine item in the Anti-Virus tab. 5. Press Menu and select Delete all in the Quarantine screen. All objects will be delet[...]

  • Страница 106

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 106 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the description of how to compile the Black and White Lists, configure Anti-Spam operation modes and other Anti-Spam settings. I N THIS SECT ION About Anti-Spam ..........................................[...]

  • Страница 107

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 107 2. In the screen that will open select the mode you require and press Done to save changes. Figure 93 : Sele c ting the operation mode C R E A T I N G A B L A C K L IST This list contains entries with phone numbers, SMS and calls from which will be b[...]

  • Страница 108

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 108 2. Press Menu and select Add entry . 3. Set the following settings in the screen that w ill open: Phone number – phone number fo r which the receipt of SM S message and/or calls wil l b e blocked. Th e number s hould only be comprised of a lphanumeric characters; it may begin with a digit, a[...]

  • Страница 109

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 109 2. Select an entry you wish to edit from the list. 3. Pre ss Menu and select Edit entry . 4. Edit the following settings in the screen that will open: Phone number – phone number fo r which the receipt of SM S message and/or calls will be bl ocked.[...]

  • Страница 110

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 110 Deleting an entry To delete an entry from the An ti-Spa m Black List, perform the following actions (see Figure below) : 1. Select Black List in the Anti-Spam tab. 2. Select an entry you wish to delete from the list. 3. Press Menu and select Delete entry . Figure 96 : Dele ting an entry C R E [...]

  • Страница 111

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 111 A dding a new entry To add an entry to the Anti-Spam White List, perform the following actions (see Figure belo w): 1. Select White List in the Anti-Spam tab. 2. Press Me nu and select Add entr y . 3. Set the following settings in the screen that w i[...]

  • Страница 112

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 112 4. Press Done to save the changes. Figure 97 : Adding a new entr y Editing an existing entry To edit an entry in the Anti-Spam White List , perform the following actions (see Figure below ): 1. Select White List in the Anti-Spam tab. 2. Select an entry you wish to edit from the list. 3. Press [...]

  • Страница 113

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 113 Allow messages : allow only incoming SMS messages. Text - text upon detection of which i n the SMS message received, such message will be passed th rough. The setting is available if value Allow messages is selected for setting Function . 5. Press Do[...]

  • Страница 114

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 114 Figure 99 : Dele ting an entry R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti -Spam response to SMS mes sages a nd calls from numbers entered into the phonebook irrespective of the settings of the Black and White Lists. To [...]

  • Страница 115

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 115 3. Press Done to save the changes. Figure 100 : Allo wing contacts from the phonebo ok R E S PO N SE TO M E S S A G E S F R O M NON - NUMERIC N UM B ER S You can co nfigure the progr a m's response w h en SMS messages are received fro m non -num[...]

  • Страница 116

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 116 3. Press Done to save the changes. Figure 101 : Blo c king non -numer ic number s[...]

  • Страница 117

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 117 S E LE C T I N G AN A C T I ON T O B E P E R FO RM E D W I T H IN C O M I N G M E S S A G E S Anti-Spam s uggests that you con figure its response to SMS messages from phone numbers no t found in either Black or W hite List. Such messages will be int[...]

  • Страница 118

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 118 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam s uggests that you con figure its response to calls from phone numbers not found in either Black or W hite List. After the call is complete, a notification will be displayed on the device's scr[...]

  • Страница 119

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 119 A BOUT P A R E N T A L C O N T R OL The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the W hite Lists. If at least one match is detected, the scan will be stopped. SMS m ess[...]

  • Страница 120

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 120 Figure 104 : Selec ting Parental control mode C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control . Information about bl ocked SMS messages and ca lls will be registered in the L og (see section “ P[...]

  • Страница 121

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 121 Phone number – phone number the s ending of SMS mes sage and/or calls from which will be bl ocked. Such number may begin w i th a digit, a letter or w ith a "+" and mus t contain digits. Additionally when entering a n umber, you can use m[...]

  • Страница 122

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 122 entering a number, you can use masks "*" and " ?" (where «*» any number of characters and «?» a ny one character ). A ction – ac tion to be performed with a message and/or call: Block all : block outgoing calls and SMS messages. Block calls : block only outgoing calls[...]

  • Страница 123

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 123 Figure 107 : Dele ting an entry C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control. I N THIS SECT I ON Adding a new entry ..............................[...]

  • Страница 124

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 124 en tering a number, you can use m asks "*" and "?" (where «*» any number of ch aracters and «?» any one character ). A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages. Allow calls : allow only outgoing call[...]

  • Страница 125

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 125 A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages. Allow calls : allow only outgoing calls. Allow messages : allow only outgoing SMS messages. 5. Press Done to save the changes. Figure 1[...]

  • Страница 126

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 126 Figure 110 : Dele ting an entry[...]

  • Страница 127

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 127 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect information stored on the device in case the device is lost. I N THIS SECT ION About Anti- Th eft .................................................[...]

  • Страница 128

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 128 T HE SM S -B L O C K FU N C T I O N The SM S-Block function allows b locking th e device if i t is required. You can unblock the de v ic e only after you enter the secret code. To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1. Open the Anti-Theft tab 2. Se[...]

  • Страница 129

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 129 Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 112 : Blo c king the devi ce To create an SM S message using your phone's standard functions for creating SMS m e ssag[...]

  • Страница 130

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 130 Contacts will be deleted from the phonebook stored on the device and on the SIM card. If you wish to delete personal f iles (data from My Documents folder), check the My Documents box. To delete data from all installed storage cards, check the Storage card files box. 4. Press Done to save the [...]

  • Страница 131

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 131 Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 114 : Dele ting personal data To create an SM S mess age using your phone's standard functions for creating SMS messag[...]

  • Страница 132

    K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 132 Using the E-mail address specify the e -mail a ddress on which you wish to receive an e -m ail message about your new phone number. To block the device once the SIM card was replaced on it or when the device is turned on without the SIM card, check the Block box. You c an unblock the device onl[...]

  • Страница 133

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 133 Figure 116 : Enablin g the function D E T ER M I N I NG THE DE V I C E L O C A TI O N You can receive the coordinates of the device w ith the SMS -Find function enabled using the following methods: using Stealth SMS on another device with Kaspersky M[...]

  • Страница 134

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 134 Figure 117 : Determ ine the location of the device To create an SM S message using your phone's standard functions for creating SMS messages: send to the device you need to block an SMS message containing text find:<code> (where <c ode> is secret code set on the receiving devi[...]

  • Страница 135

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 135 The function being used must be turned enabled on the device receiving the message. Enter secret code specified on the receiving SM S de vice in the field Remote code . 3. Press Done to send the message. Figure 118 : Blo c king the devi c e F IREWALL[...]

  • Страница 136

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 136 S E LE C T I N G T H E F I R E WA L L SECURITY LEVEL Operation of the Firewall component is based on the security le vels. The securi ty level set will de termine which network protocols will be allowed to be used to transfer information and which of them will be blocked. To modify the values [...]

  • Страница 137

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 137 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption .......................................................................................[...]

  • Страница 138

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 138 The data in the folder will be encrypted once the command is exe cuted and then data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tracted from it or accessed. Figure 120 : Selec ting data for encr y ption You can encrypt only one[...]

  • Страница 139

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 139 D A T A D E C R Y P T I O N You can completely decrypt data which was previously encry p ted (see section “ Data encryption ” on page 137 ). For full decryption of the folder e ncrypted earlier, select Decrypt on the Encryption tab (see Figure be[...]

  • Страница 140

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 140 2. In the scree n that will open, se t the required delay for th e Bloc k access setting: 1 minute, 5 minutes, 15 minutes or 1 hour . 3. Press Done to save the changes.. Figure 122 : Blo c king access to encrypted data You can also momentarily block access to encrypted data and enable the prom[...]

  • Страница 141

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 141 For immediate prompt for the secret code, press Kaspersky Mobile Security icon in the device notification area and select Lock data (see Figure below). Figure 123 : Icon shortcut men u U PDATING THE PROGRAM BASES This section co ntains information ab[...]

  • Страница 142

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 142 V I E WI N G B A S E S IN F OR MA TION In order to view information about the installed base s (see Figure below), select Databases info on the Information ta b. Figure 124 : The Informat ion tab M A N U A L U PD A T I N G You can start the updating process manually at any time convenient to y[...]

  • Страница 143

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 143 To start a manual update of anti-virus bases, select Upda te on th e Anti-Virus ta b (see Figure belo w). The prog ram will start th e bases update process from the server. Figure 125 : Manual upda te S C HE D U L E D UD P A T ING Timely updates are [...]

  • Страница 144

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 144 Figure 126 : Configur ing the updat e schedule P ROGRAM LOGS This section contains information about the logs and managing of the information they cont ain. I N THIS SECT ION About logs ............................................................................................................[...]

  • Страница 145

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 145 V IEWING L OG REC O R DS To view all records stored in th e log, perform the following actions (see Figure below): 1. Select Logs on the Information tab. 2. Select the component the log of which you wish to open. Figure 127 : Viewing re cords in the [...]

  • Страница 146

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 146 3. Press Menu and select Delete all . All records from the log for every component will be deleted. Figure 128 : Deleting recor ds M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary. I N THIS SECT ION Viewing the lice[...]

  • Страница 147

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 147 V IEWING TH E L I C EN SE I N F O R M A TI O N In order to view information about the license: select About license in the Information tab (see Figure below). Figure 129 : Viewing licen se information R E N EW I NG T H E L I C E N SE To renew your li[...]

  • Страница 148

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 148 3. Enter th e activation code into the fo ur fields. The activation code consists of Latin a lphabet characters and digits (the code is case -insensitive). After you have entered the activation code, p ress Continue . The program will send an http query to Kaspersky Lab's activation serve[...]

  • Страница 149

    K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 149 2. Close Kaspersky Mobile Security. To do it, press Menu and select Exit (see Figure below). Figure 131 : Closing the program 3. Uninstall the program. To do this: a. Pre ss Start and select Settings . b. Se lect Remove Programs on the System tab (se[...]

  • Страница 150

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 150 c. Select Kaspersky M obile Security in the list of installed programs and press the Remove button (see Figure below). Figure 133 : Selecting the program d. Pre ss Yes to confirm removal of the program. e. En ter the secret code in the prompt displayed. Press OK . f. If you wish to save the ap[...]

  • Страница 151

    151 GLOSSARY А A C T I V A T I N G T H E P R O G R A M The acti vation procedure involves e ntering the activate code and then receiving a key to be used by the program to determine your rights and the license period. A R C H I V E File "containing" one or several other objects which also can be archives. B B A S E S Database maintained [...]

  • Страница 152

    K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 152 I I N F E C T E D O B J E C T Object containing malicious code: it was detected by the scan that a section of the object's code is fully identical to a section of the code of a kn own th reat. Kaspersky Lab's exp e rts do not recommend using su ch objects since they may cause your dev[...]

  • Страница 153

    G L O S S A R Y 153 phone numbers incoming calls and SMS messages from which will be passed through by Anti -Spam a nd outgoing calls and SMS messages to which will be passed through by Parental control. text upon detection of which the incoming SMS message will be passed through.[...]

  • Страница 154

    154 KASPERSKY LAB Kaspersky Lab was fo unded in 1997. Today it is the leading developer o f a wide range of high -performance information security software products, including anti-virus, anti-spam and anti -hacking systems. Kaspersky Lab is an inte rnational company. Hea dquartered in the Russian Federation, the company has offices i n the United [...]

  • Страница 155

    K A S P E R S K Y L AB 155 Address: Russia, 123060, Moscow, 1-st Volokolamsky Proezd, 10, Building 1 Phone, fax: +7 (495) 797- 87 -00, +7 (495) 645 - 79 -39, +7 (495) 956- 70 - 00 Helpdesk: +7 (495) 797- 87 -07, +7 (495) 645 - 79 -29 or +7 (495) 956 - 87 - 08. Enterprise product user support: +7 (495) 797- 87 -07, +7 (495) 645 - 79 -29 or +7 (495) [...]

  • Страница 156

    156 CRYPTO EX LTD. To crea te a nd verify dig ital s ignatures, Kaspersky Anti -Virus uses Crypto E x Ltd 's data sec urity software l ibrary, Crypto C. CryptoEx Ltd is licensed by the Federal Agency for Government Communications and In formation (Fe deral S ecurity Service of Russian Federation) for development of the Crypto C data protection[...]

  • Страница 157

    157 INDEX A Actions On -demand scan ........................................................................................................................................... 27, 100 Real-Time Protection ................................................................ ....................................................................... 20, 94 A[...]

  • Страница 158

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 158 Anti-Spam White List ..................................................................................................................................... 43, 113 Log records .......................................................................................................................[...]

  • Страница 159

    I N D E X 159 Actions to be performed with objects ............................................................................................................. 27, 100 objects to be scanned ...................................................................................................................................... 26, 99 scheduled start .[...]

  • Страница 160

    K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 160 W W hite Li s t Anti-Spam ...................................................................................................................................................... 41, 110 Parental control ............................................................................................[...]