Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ESET MOBILE SECURITY. We hope that this ESET MOBILE SECURITY user guide will be useful to you.
Lastmanuals help download the user guide ESET MOBILE SECURITY.
You may also download the following manuals related to this product:
ESET MOBILE SECURITY SYMBIAN (2213 ko)
ESET MOBILE SECURITY FOR SYMBIAN (1981 ko)
ESET MOBILE SECURITY FOR WINDOWS MOBILE (1288 ko)
ESET MOBILE SECURITY ANNEXE 706 SYMBIAN (2231 ko)
ESET MOBILE SECURITY FOR WINDOWS MOBILE AND SYMBIAN DATASHEET (773 ko)
Manual abstract: user guide ESET MOBILE SECURITY
Detailed instructions for use are in the User's Guide.
[. . . ] ESET Mobile Security
Windows Mobile Installation Manual and User Guide
Contents
1. Installation of ESET Mobile Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1. 1 1. 2 Minimum system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 2. 1 Installation on your device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 2. 2 Installation using your computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1. 3
2. Product activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2. 1 2. 2 Activation using login and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Activation using registration key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3. 1 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4. [. . . ] The Extensions window will be displayed, showing the most common file types exposed to infiltration. Select the file types you wish to scan or deselect the extensions to exclude them from scanning. If you enable the Archives option, all supported archive files (zip, rar and jar) will be scanned. To scan all files, deselect the Extension sensitive checkbox.
General settings
Select the Show alert dialog option to display threat alert notifications. You can specify a default action that will be performed automatically when infected files are detected. You can choose from the following options: Quarantine Delete Do Nothing (not recommended) The Stored Logs option allows you to define the maximum number of logs to be stored in the Menu > Logs > Scan section. If the Memory Scan is enabled, the device memory will be automatically scanned for malicious programs prior to the actual file scan. Anti-Theft
The Anti-Theft feature protects your mobile phone from unauthorized access. If you lose your phone or someone steals it and replaces your SIM card with a new (untrusted) one, an Alert SMS will be secretly sent to certain user-defined phone number(s). This message will include the phone number of the currently inserted SIM card, the IMSI (International Mobile Subscriber Identity) number and the phone's IMEI (International Mobile Equipment Identity) number. The unauthorized user will not be aware that this message has been sent, since it will be automatically deleted from the Sent folder. To erase all data (contacts, messages, applications) stored on your device and all currently inserted removable media, you can send a Remote wipe SMS to the unauthorized user's mobile number in the following form: #RC# DS password where password is your own password set in Menu > Settings > Password.
Setting a security password
To access Anti-Theft settings, tap Menu > Settings > Anti-Theft and enter your password. To disable automatic checking of inserted SIM card (and possible sending of Alert SMS), deselect the Enable SIM matching option. If the SIM card currently inserted in your mobile device is the one you wish to save as trusted, check the Current SIM is trusted check box and the SIM will be saved to the Trusted SIM list (Trusted SIM tab). The SIM Alias text box will be automatically filled with IMSI number. If you are using more than one SIM card, you may want to distinguish each one by modifying its SIM Alias (e. g. , Office, Home etc. ). In Alert SMS, you can modify the text message that will be sent to the predefined number(s) after an untrusted SIM card is inserted in your device.
7. 1 Settings
First, set your password in Menu > Settings > Password. This password is required when: sending a Remote wipe SMS to your device accessing the Anti-Theft settings on your device uninstalling ESET Mobile Security from your device. To set a new password, type your password in New password and Retype password fields. The Reminder option (if set) displays a hint in case you do not remember your password. To change existing password, Enter current password first and then fill in new password. IMPORTANT: Please choose your password carefully as this will be required when uninstalling ESET Mobile Security from your device.
11
The Trusted SIM tab shows the list of trusted SIM cards. [. . . ] Tap Yes to confirm the deletion of all spam messages.
Deleting Spam messages
Spam folder
18
11. Viewing logs and statistics
The Scan log section (Menu > Logs > Scan) contains logs providing comprehensive data about completed scan tasks. Logs are created after each successful On-demand scan or when an infiltration is detected by the On-access scan. All infected files are highlighted in red. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ESET MOBILE SECURITY
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service.
Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ESET MOBILE SECURITY will begin.