User manual KASPERSKY LAB MOBILE SECURITY 8.0

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual KASPERSKY LAB MOBILE SECURITY 8.0. We hope that this KASPERSKY LAB MOBILE SECURITY 8.0 user guide will be useful to you.

Lastmanuals help download the user guide KASPERSKY LAB MOBILE SECURITY 8.0.


Mode d'emploi KASPERSKY LAB MOBILE SECURITY 8.0
Download
Manual abstract: user guide KASPERSKY LAB MOBILE SECURITY 8.0

Detailed instructions for use are in the User's Guide.

[. . . ] USER GUIDE KASPERSKY MOBILE SECURITY 8. 0 Dear User!We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is a property of Kaspersky Lab's and all rights to this document are reserved by the copyright laws of the Russian Federation and international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] The path to the encrypted folder will be displayed. Figure 60: Information about encrypted data 71 KASPERSKY MOBILE SECURITY 8. 0 BLOCKING ACCESS TO ENCRYPTED DATA You can block access to encrypted data instantly or with a delay. After this you will have to enter your secret code to access the encrypted data. To ensure data protection when the device is switched into the sleep mode, you can configure automatic blocking of data access. The Block access setting determines the device's idle time after the backlight is turned off and the device is switched to the sleep mode, after which you will need to enter the secret code to access the encrypted data. By default the access is blocked immediately after the backlight is turned off (value No delay is selected). To enable delayed blocking, perform the following actions (see Figure below): 1. Select Block access in the window that will open. Set up the time you wish: 1 minute, 5 minutes, 15 minutes or 1 hour. Press OK to save changes. Figure 61: Blocking access to encrypted data You can also instantly block access to the encrypted data and enable the prompt for the secret code. For instant access blocking, press buttons 0 and 1 at the same time. 72 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS UPDATING THE PROGRAM BASES This section contains information about the Update component. Regular bases update is necessary to ensure reliable operation of Kaspersky Mobile Security. IN THIS SECTION About program bases update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Viewing bases information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Manual updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Scheduled updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Updating while roaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Configuring connection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76 ABOUT PROGRAM BASES UPDATE The search for malware programs is performed based on the program bases records which contain description of all currently known malware programs and methods for their treatment as well as description of other unwanted objects. It is extremely important to keep your bases up-to-date. You can update bases manually or according to a schedule. Updates are performed from Kaspersky Lab's update servers via Internet, this requires an Internet connection. To view detailed information about bases currently used select Databases info on the Information tab. Information about the bases updates will be saved to the program log (see section "Program logs" on page 77). VIEWING BASES INFORMATION In order to view information about the installed bases (see Figure below), select Databases info on the Information tab. Figure 62: The Information tab 73 KASPERSKY MOBILE SECURITY 8. 0 MANUAL UPDATING You can start the updating process manually at any time convenient to you. [. . . ] 18, 93 Objects to be scanned . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 RECORD ANTI-SPAM BLACK LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 ANTI-SPAM WHITE LIST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 Renewing the license . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE KASPERSKY LAB MOBILE SECURITY 8.0

Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets...
In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.

Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual KASPERSKY LAB MOBILE SECURITY 8.0 will begin.

Search for a user manual

 

Copyright © 2015 - LastManuals - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.

flag