User manual ESET MOBILE SECURITY

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ESET MOBILE SECURITY. We hope that this ESET MOBILE SECURITY user guide will be useful to you.


ESET MOBILE SECURITY : Download the complete user guide (1501 Ko)

You may also download the following manuals related to this product:

   ESET MOBILE SECURITY SYMBIAN (1717 ko)
   ESET MOBILE SECURITY SYMBIAN (1960 ko)
   ESET MOBILE SECURITY FEATURES (235 ko)
   ESET MOBILE SECURITY 10-28-2010 (1550 ko)
   ESET MOBILE SECURITY WINDOWS MOBILE (1341 ko)
   ESET MOBILE SECURITY WINDOWS MOBILE (1127 ko)
   ESET MOBILE SECURITY WINDOWS MOBILE (1506 ko)
   ESET MOBILE SECURITY SYMBIAN (2213 ko)
   ESET MOBILE SECURITY FOR SYMBIAN (1981 ko)
   ESET MOBILE SECURITY FOR WINDOWS MOBILE (1288 ko)
   ESET MOBILE SECURITY ANNEXE 706 SYMBIAN (2231 ko)
   ESET MOBILE SECURITY FOR WINDOWS MOBILE AND SYMBIAN DATASHEET (773 ko)

Manual abstract: user guide ESET MOBILE SECURITY

Detailed instructions for use are in the User's Guide.

[. . . ] ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation of ESET Mobile Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 1 1. 2 Minimum system requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 2. 1 Installation on your device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 2. 2 Installation using your computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Uninstallation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1. 3 2. Product activation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2. 1 2. 2 Activation using login and password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Activation using registration key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. 1 Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4. [. . . ] The Extensions window will be displayed, showing the most common file types exposed to infiltration. Select the file types you wish to scan or deselect the extensions to exclude them from scanning. If you enable the Archives option, all supported archive files (zip, rar and jar) will be scanned. To scan all files, deselect the Extension sensitive checkbox. General settings Select the Show alert dialog option to display threat alert notifications. You can specify a default action that will be performed automatically when infected files are detected. You can choose from the following options: Quarantine Delete Do Nothing (not recommended) The Stored Logs option allows you to define the maximum number of logs to be stored in the Menu > Logs > Scan section. If the Memory Scan is enabled, the device memory will be automatically scanned for malicious programs prior to the actual file scan. Anti-Theft The Anti-Theft feature protects your mobile phone from unauthorized access. If you lose your phone or someone steals it and replaces your SIM card with a new (untrusted) one, an Alert SMS will be secretly sent to certain user-defined phone number(s). This message will include the phone number of the currently inserted SIM card, the IMSI (International Mobile Subscriber Identity) number and the phone's IMEI (International Mobile Equipment Identity) number. The unauthorized user will not be aware that this message has been sent, since it will be automatically deleted from the Sent folder. To erase all data (contacts, messages, applications) stored on your device and all currently inserted removable media, you can send a Remote wipe SMS to the unauthorized user's mobile number in the following form: #RC# DS password where password is your own password set in Menu > Settings > Password. Setting a security password To access Anti-Theft settings, tap Menu > Settings > Anti-Theft and enter your password. To disable automatic checking of inserted SIM card (and possible sending of Alert SMS), deselect the Enable SIM matching option. If the SIM card currently inserted in your mobile device is the one you wish to save as trusted, check the Current SIM is trusted check box and the SIM will be saved to the Trusted SIM list (Trusted SIM tab). If you are using more than one SIM card, you may want to distinguish each one by modifying its SIM Alias (e. g. , Office, Home etc. ). In Alert SMS, you can modify the text message that will be sent to the predefined number(s) after an untrusted SIM card is inserted in your device. 7. 1 Settings First, set your password in Menu > Settings > Password. This password is required when: sending a Remote wipe SMS to your device accessing the Anti-Theft settings on your device uninstalling ESET Mobile Security from your device. To set a new password, type your password in New password and Retype password fields. The Reminder option (if set) displays a hint in case you do not remember your password. To change existing password, Enter current password first and then fill in new password. IMPORTANT: Please choose your password carefully as this will be required when uninstalling ESET Mobile Security from your device. 11 The Trusted SIM tab shows the list of trusted SIM cards. Each entry consists of the SIM Alias (left column) and IMSI number (right column). [. . . ] Tap Text Messages (or MMS if you wish to locate the MMS Spam folder) 3. Select the Spam folder. 10. 4 Deleting spam messages To delete spam messages from your mobile device, follow the steps below: 1. Tap Menu >Settings > Antispam from the ESET Mobile Security main window 2. Tap Yes to confirm the deletion of all spam messages. Deleting Spam messages Spam folder 18 11. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ESET MOBILE SECURITY




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ESET MOBILE SECURITY will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.