Manuale d’uso / di manutenzione del prodotto Mobile Security 8.0 del fabbricante Kaspersky Lab
Vai alla pagina of 160
U S E R G U I D E KASPER SKY MOBIL E SECURI TY 8.0.
2 Dear User! Thank you for choosing our product. W e hope that this documentation will help you in your work and will pro vide answers regarding this software product.
3 TABLE OF CONTENTS KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7 Obtaining information about the application .................................
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 4 Parental control ...................................................................................................................................................... 48 About Parental control ...
T A B L E O F C O N T E N T S 5 Secret code ...................................................................................................................................................... 91 Viewing information about the program ...............
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 6 Updating the program bases ................................................................................................................................ 141 About updating of program bases .....
7 KASPERSKY MOBILE SECURITY 8.0 Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft W indow s Mobile against malware pro grams, unsolicite.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 8 O BTAINING INFORMATION ABOUT THE APPLICATION If you have any q uestions regarding purchasing, ins talling or us ing Kaspersky Mobile Sec urity, answers are readily available. Kaspersky Lab provides various s ources o f information about the program.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 9 Documentation The User Guide contains detailed in formation about the application's functions, how to work with th em, includes advices and recommendations on its configuration.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 10 Customer ID a nd password. En ter the customer ID and password received du ring re gistration at the Technical Support Service web site. E-mail address. The experts from the Technical Support Service will send th eir reply to your inquiry to tha t address.
11 KASPERSKY MOBILE SECURITY FOR SYMBIAN OS This section contains description of t he operation of Kaspersky Mobile Security 8.0 for smartphones running Symbian version 9.1, 9.2 and 9.3 Series 60 UI. I N THIS SECT ION Installing Kaspersky Mobile Security .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 12 using program Nokia PC Suite; by starting the distribution pac kage on the device. 3. A prompt (see Figure below) will appear on the screen; select Yes to confirm the installation of the program. Figure 1: Prom pt to confirm the installation 4.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 13 G ETTING STARTED This section co ntains information on s tarting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 14 Figure 3: The program activat ion window 5. Enter th e code into the fo ur fields. The activation code consists of Latin alphabet c haracters and digits (the code is case-insensitive). After you have entered the activation code, select Activate in th e Op tions menu.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 15 Firewall – level of device protection against unwanted network activities (see section “ Firewall ” on page 66 ). Figure 4: The program comp onent status windo w In order to switch to the program graphic interface, press OK .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 16 To navigate from on e tab to another, use the joystick of the device o r select the Open ta b item in the Options menu (see Figure below). Figure 5: The Opt i ons menu In order to return to the progr am components status window, select the Current status item from the Options menu.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 17 3. Enter the current code in t he Enter code entry field. Then enter new code in the Enter new code field and enter it once again in the Confirm code entry field to confirm.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 18 A BOUT R EAL - T IME P R O T E C T I O N Real-Time Protection is launched at the o peration system startup, is permanently loaded in the device's RAM and monitors all opened, saved or run files.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 19 Figure 7: Enabling Re al-Time Prot ec tion To disable Real-Time Protection, do the following: 1. Select the Settings item in the Anti-Virus tab. 2. Select Real-Time Protection in the Settings window.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 20 3. Select the type of files to be scanned by Real-Time Protection using the Objects to be scanned settings: A ll files : scan files of a ll types. Executables only : scan only ex ec utable program files (for example *.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 21 Delete : delete malware objects w i thout notifying the user. Quarantine : quarantine malware objects.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 22 In m enu only : the program icon in the device menu and Kaspersky Mobile Security menu. Never : the icon will not be displayed.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 23 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 24 S can folder : selecting and scanning of a ce rtain folder in th e device's file s ystem or on the connected storage card. W hen Scan folder item is sele c ted, a window displaying the device’s file system will open.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 25 Figure 13 : Message abo ut a viru s detected Once th e scan is complete the gen eral statistics about detected and deleted malware objects will be displayed on the screen. By defa ult, during the scan the s creen b acklight goes off in order to save th e b attery c harge.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 26 Figure 14 : Configur ing a scheduled scan S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of malicious code.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 27 Figure 15 : Selecting ob jects to be scanned S E LE C T I N G A C T IO N S T O B E PE R F O R ME D W I T H OB J E C T S You can configure the application's actions to be performed w he n the application detects a m alicious object.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 28 Figure 16 : Configur ing actions to b e performed with obje cts 3. Using the Action item, select the application's response when it detects a malware object (see Figure below): Delete : delete detected malw are objects without notifying the user.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 29 Figure 17 : Selecting a ctions to be perform ed w ith objects 4. If you selected Tr y to disinfect as t he application's re.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 30 In order to edit the values of the settings, use the device's joystick or select the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 31 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 32 2. Select the required value for the Backlight item in the window that will open: If you wish the backlight to stay permanently on w hile an anti -virus scan is in progress, select the Yes value. If you wish the backlight to automatically go off, select the No value.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 33 V IEWING Q U ARANTINED O BJ E CT S To view the list of quarantined o bjects, select Quarantine on the Anti-Virus tab (see Figure below).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 34 R E S T OR I NG O BJ E C T S F R O M Q U A R A NT I N E Select the Quarantine item in the Anti-Virus tab. 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Quarantine window that will open select an object you wish t o restore.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 35 Figure 25 : Deleting an ob ject from quarantine In order to delete all quarantined objects: 1. Select the Quarantine item in the Anti-Virus tab. 2. In the Options menu that will open, select Delete all .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 36 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the descri ption of how to comp ile the Black and White Lists, configure Anti-Spam modes and other Anti-Spam settings.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 37 To select an Anti-Spam mode, perform the following actions (see Figure below): 1. Open the Anti-Spam tab. 2. Select Settings and then - Anti-Spam from the menu. 3. In the window that will open, select the required mode and press OK to save the changes and close the window .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 38 A DDING A NEW E NTRY To add an entry to the Anti-Spam Black List, perform the following actions (see Figure belo w): 1. Select Black List in the Anti-Spam tab. 2. Select Add entry from the Options menu.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 39 E DITING AN EXIST IN G ENTRY To edit settings of an existing entry, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select Edit entry from the Options menu.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 40 D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the Black List, perform the following actions (see Figure below): 1. Select Black List in the Anti-Spam tab. 2. Select an entry in the list which you wish to delete.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 41 Figure 30 : Dele ting all entries C R E A T I N G A W HITE L IST The White Lis t contains entries with p hone numbers, SMS an d calls from which will be passed through by Anti -Spam and text upon detection of which in a received SMS message it will be passed through.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 42 SMS only : allow incoming SMS messages only . Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone numbe r – phone number for which th e receipt of SMS mess age and/or calls will be allowed.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 43 Calls onl y : allo w incoming calls only. SMS and calls : allow incoming calls and SMS messages. Phone number – p hone number for which the receipt of SMS message and/or calls will be allowed.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 44 Figure 33 : Dele ting an individual e ntry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Anti-Spam tab.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 45 R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti-Spam resp onse to SMS messages and calls from numbers found in the phone book irrespective of the settings of the Black and W hite Lists.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 46 In order to edit the values of the settings, use the device's joystick or sele ct the Change item in the Options menu. By d efault the program uses the values of the settings recommended by Kaspersky Lab's s pecialists.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 47 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G M E S S A G E S Anti-Spam suggests that you configure its response to SMS messages from phone nu mbers not found in either the Black or the W hite List.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 48 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam suggests that you configure its response to calls from phone numbers not found in either the Black or the W hite List.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 49 A BOUT P A R E N T A L C ON T R O L The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the White Lists. If at least one match is detected, the scan will be stopped.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 50 Figure 39 : Modes of Parental con trol C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 51 SMS only : block outgoing SMS messages only . Calls onl y : bloc k outgoing calls only. SMS and calls : block outgoing calls and SMS messages. Phone n umber - phone number SMS m essage and/or outgoing calls to which will be blocke d.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 52 Phone number - phone number SMS mes sage and/or outgoing calls to which will be blocked. This number may begin with a digit o r with a " +" and mu st co ntain d igits.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 53 Figure 42 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select Black List from the menu in the Parental control tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 54 Figure 43 : Deleting all entries C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control. I N THIS SECT ION Adding a new entry .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 55 SMS and calls : a llow outgoing calls and SMS messages. Phone number - phone number S MS message and/or outgoing calls to which will be allowed. This number may begin with a digit o r with a " +" and mu st co ntain d igits.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 56 Figure 45 : Editing an e xisting entry D ELETING AN I NDIVIDUAL ENT RY To delete an individual entry from the White List, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 57 Figure 46 : Deleting an individual entry D ELETING ALL ENT R IES To delete all entries, perform the following actions (see Figure below): 1. Select White List from the menu in the Parental control tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 58 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect i nformation stored on the device in case the device is lost. I N THIS SECT ION About Anti-Theft .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 59 To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1. Select Settings on the Anti-Theft tab. 2. Select SMS-Block in the window that will open. 3.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 60 Figure 49 : Blocking the device To create an SMS m essage using your phone's standard functions for creating SMS messages: send to the device you need to block an SMS m essage con taining text block:<code> (where <code> is secret code set on the d evice to be blocked).
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 61 If you wish personal files (from folder C:Data) to be deleted, select Delete data and set value to Yes . To erase data from all installed storage cards, select Delete card files and set the value to Yes .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 62 Figure 51 : Deleting per sonal data To create an SM S message using your phone's standard functions for creating SMS m e ssages: send to the device you need to block an SMS m essage con taining text clean:<code> (where <code> is secret code set on the receiving d evice.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 63 Using the E-mail address field enter the e -mail address on which you wish to re ceive an e -mail m essage about the new phone number.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 64 Figure 53 : Configuring the SMS-Find function D ETERMIN ING THE D EV I C E L O C A T I O N You can receive the coordinates of the device w ith th.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 65 Figure 54 :Determinin g the location of the de vice To create an SM S message the standa rd SM S feature on your phone : send to the device you nee d to block an SMS mess age containing text find:<code> (where < code> is secret code set on the receiving device.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 66 SMS-Clean (see section "The SMS- Clean function” on page 60 ). SMS- Find (see section “The SMS - Find function” on page 63 ). The function being used must be enabled on the receiving device.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 67 F IREWALL This section contains information about the Firewall c omponent which monitors the network activity of the device a nd protection of the device on the network level. I N THIS SECT ION About Firewall .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 68 Figure 56 : Configur ing the Fire wall security level C O N FI G UR IN G NO TI F I C A T IONS ABOUT CONNECTIO N A T T E MP TS You can configure the display of user notificat ions about connection attempts blocked at the selected Firewall security level; 1.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 69 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption ................
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 70 Figure 58 : Data encr y ption The data in the folder will be encrypted once the comm and is executed and th en data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tra cted from it or accessed.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 71 Figure 59 : Data decr y ption After decryption, the Decry pt item will turn into Encry pt and you can use it again to encrypt data (see section “Data encryption” on page 69 ).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 72 B L O C K I N G A C C E S S T O E N CR Y P T E D D A T A You can block access to enc rypted data insta ntly or with a delay. After this you will have to enter your secret co de to access the encrypted data.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 73 U PDATING THE PROGRAM BASES This section contains information about the U pda te com ponent. Regular bases update is necessary to ensure reliabl e operation of Kaspersky Mobile Security.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 74 M A N U A L U PD A T I N G You can start the updating process manually at any time convenient to you. To start a manual update of anti-virus bases , select Update on the Anti-Virus tab (see Figure below).
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 75 Figure 64 : Configur ing scheduled u pdates You can als o configure the automatic u pdate s ettings when your phon e is in the roaming mode (see section “ Updating while roaming ” on page 75 ).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 76 Figure 65 : Configur ing updates in roam ing C O N FI G UR IN G CO N NE CT I ON S ET T I N G S To configure the connection s ettings, perform the following actions (see Figure below): 1. Select Settings in the Anti-Virus tab.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 77 Figure 66 : Configur ing connection settings After the update is complete, the connection open fo r the update will au tomatically close. If th e connection had been established before the update w as starte d, it will be used for further operation.
K A S P E R S K Y M OB I L E S E C U R I T Y 8 . 0 78 V IEWING L OG R E C O R D S To view all records stored in the Log, perform the following actions: 1. Select th e c orresponding item i n th e Log m enu on the tab of the component in formation about operation of which you wish to obtain (for ex ample, Log item on the Anti-Virus tab).
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 79 Figure 67 : Configur ing the statu s window displa y M ANAGING SOUND NOTIFICATION You can co nfigure th e use of the sound notification i n c ase of cer tain events (detection of an infe cted object , message about an application status, etc.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 80 Figure 68 : Managing s ound notifi cation M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary. I N THIS SECT ION Viewing the license information .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 81 Figure 69 : Vie w ing the license in f orm ation R E N EW I NG T H E L I C E N SE To renew your license, perform the following actions (see Figure below): 1. Select About license on the Information tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 82 Figure 70 : Rene w ing the licen se If th e ac tivation code you entered appears invalid for any reason, a c orresponding message will be displayed on your smartphone's screen. If th e key installation is successful, information about the license will be displayed o n the screen.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 83 c. Select Exit from the Options menu (see Figure below ). Figure 71 : Exiting the program . 3. Uninstall Kaspersky Mobile Security a. Open the device’s main menu. b. Switch t o the Tools menu and select App.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 84 c. Select KMS 8 in the list of programs and press the Options button (see Figure below ). Figure 73 : Selecting the applicatio n d. Se lect the Remove menu item(see Figure below). Figure 74 : Uninstallin g the appli cation e.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R S Y M B I A N OS 85 g. If you wish to save the program settings, quarantined objects or Anti-Sp am lists, check the corresponding fields next to the required settings (see Figure below). Figure 75 : The list of settings to be s aved h.
86 KASPERSKY MOBILE SECURITY FOR MICROSOFT WIN DOWS MOBILE This section contains description of the operation o f Kaspersky Mobile Secu rity for mobile devi ces running one of the following operating systems: Microsoft Windows Mobile 5.0. Microsoft Windows Mobile 6.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 87 3. Read the License Ag reement (see the Fi gure b elow). If you agree to all th e terms, press OK . Kaspe rsky Mobile Security will the n be installed on the device.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 88 G ETTING STARTED This s ection contains information on starting the program, what is required to activate it, how you s hould use the p rogram interface and set up the secret code. I N THIS SECT ION Activating the program .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 89 The Kaspersky Mobile Security activation window w il l open on the device's screen (see Fig ure below). Figure 78 : Entering the code 4. Enter th e code into the fo ur fields.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 90 Anti-Spam – status of the protection against unwanted incoming messages. Figure 79 : The program component statu s window You can start a ful l scan of th e de vice fo r malware objects using the Scan button or switch to se lecting the tab using Menu .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 91 To navigate through the tabs, press the M enu button and select the required tab (s ee Figure below). Figure 80 : Prog ram menu To return to the program component status window, select Protection status .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 92 In order to change the secret code , do the following: 1. Select the Information tab. 2. On the tab select Settings , then select Change code. 3. Enter the current code in t he Enter code entry field.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 93 R EAL -T IME P ROTECTION This section contains information about Real-Time Protection of your device, how to enable it and configure its settings. I N THIS SECT ION About Real-Time Protection .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 94 3. Check the Enable Protection box next to the Real-Time Protection state box in the screen that will open. Figure 82 : Enablin g Real-Time Pr otection To disable Real-Time Protection, do the following: 1.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 95 To configure the program's response to a malware object, perform the following act ions (see Figure below): 1. Select the Settings item in the Anti-Virus tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 96 O N - DEMAND SCAN This section contains information about th e Sc an component, how to sc an your device for viruses, configure the de vice scan settings and the automatic scheduled scan launch. I N THIS SECT ION About on-demand scan .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 97 W hen Folder scan is s elected, a sc reen displaying the device’s file s ystem will o pen. In or der navigate through the file system us e the joystick buttons.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 98 Once an infected object is de tected (see Figure below) an action will be performed with this object in acco rdance with the scan setting (see section “ Selecting an action to be performed with objects ” on page 100 ).
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 99 Figure 87 : Configu ring an automatic scan schedu le S E LE C T I N G OB JE C T S T O B E SC A NN E D The program allows to determine the type of objects to be scanned for the presence of m alicious code.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 100 I F YOU CHEC K BOX ... D URING THE SC AN THE PRO GRAM WI LL BE PERFORMING T HE FOLLO WING ACTIO NS ... Ar chives unpacking and scanning o f the entire archive content; scanning all file types Executables only scanning only executable program files (for example *.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 101 By default the program uses the values of the settings recommended by Kaspersky Lab's s p ecialists. To configure the program's response to a malware object, perform the following act ions (see Figure below): 1.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 102 Q UARANTINE This section contains information about the Quarantine and managing quarantined infecte d objects. I N THIS SECT ION About Quarantine .................................................
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 103 V IEWING QU A R A NT I NE D O B J E CT S To view the list of quarantined o bjects, select the Qu arantine item in the Anti-Virus tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 104 Figure 91 : Re storing objects from Quaran tine D ELETING OBJECTS F ROM Q U A R A N T I NE To delete objects from the Qu arantine, perform the following ac tions (see Figure below): 1. Select the Quarantine item in the Anti-Virus tab.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 105 Figure 92 : Dele ting an objec t from Quarantine To delete all objects from Quarantine perform the following: 4. Select the Quarantine item in the Anti-Virus tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 106 A NTI -S PAM This section contains information about the Anti -Spam c omponent as well a s the description of how to compile the Black and White Lists, configure Anti-Spam operation modes and other Anti-Spam settings.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 107 2. In the screen that will open select the mode you require and press Done to save changes.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 108 2. Press Menu and select Add entry . 3. Set the following settings in the screen that w ill open: Phone number – phone number fo r which the receipt of SM S message and/or calls wil l b e blocked.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 109 2. Select an entry you wish to edit from the list. 3. Pre ss Menu and select Edit entry . 4. Edit the following settings in the screen that will open: Phone number – phone number fo r which the receipt of SM S message and/or calls will be bl ocked.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 110 Deleting an entry To delete an entry from the An ti-Spa m Black List, perform the following actions (see Figure below) : 1. Select Black List in the Anti-Spam tab. 2. Select an entry you wish to delete from the list.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 111 A dding a new entry To add an entry to the Anti-Spam White List, perform the following actions (see Figure belo w): 1. Select White List in the Anti-Spam tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 112 4. Press Done to save the changes. Figure 97 : Adding a new entr y Editing an existing entry To edit an entry in the Anti-Spam White List , perform the following actions (see Figure below ): 1. Select White List in the Anti-Spam tab.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 113 Allow messages : allow only incoming SMS messages. Text - text upon detection of which i n the SMS message received, such message will be passed th rough.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 114 Figure 99 : Dele ting an entry R E S PO N SE T O M E S SA G E S A N D C A L L S F R O M T HE P H O N E BO O K C O N T A C T S You can configure Anti -Spam response to SMS mes sages a nd calls from numbers entered into the phonebook irrespective of the settings of the Black and White Lists.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 115 3. Press Done to save the changes. Figure 100 : Allo wing contacts from the phonebo ok R E S PO N SE.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 116 3. Press Done to save the changes. Figure 101 : Blo c king non -numer ic number s.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 117 S E LE C T I N G AN A C T I ON T O B E P E R FO RM E D W I T H IN C O M I N G M E S S A G E S Anti-Spam s uggests that you con figure its response to SMS messages from phone numbers no t found in either Black or W hite List.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 118 S E LE C T I N G AN A C T I O N T O B E PE R F OR M E D W I T H IN C O M IN G CA L LS Anti-Spam s uggests that you con figure its response to calls from phone numbers not found in either Black or W hite List.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 119 A BOUT P A R E N T A L C O N T R OL The operation of the Parental control co mponent is based on filtering of outgoing SMS messages and calls using the Black and the W hite Lists.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 120 Figure 104 : Selec ting Parental control mode C R E A T I N G A B L A C K L IST The Black List contains entries with phone numbers, SMS and calls to which will be block ed by Parental control .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 121 Phone number – phone number the s ending of SMS mes sage and/or calls from which will be bl ocked. Such number may begin w i th a digit, a letter or w ith a "+" and mus t contain digits.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 122 entering a number, you can use masks "*" and " ?" (where «*» any number of characters and «?» a ny one character ). A ction – ac tion to be performed with a message and/or call: Block all : block outgoing calls and SMS messages.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 123 Figure 107 : Dele ting an entry C R E A T I N G A W HITE L IST The White List contains entries with phone numbers, SMS and calls to which will be passed through by Parental control.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 124 en tering a number, you can use m asks "*" and "?" (where «*» any number of ch aracters and «?» any one character ). A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 125 A ction – ac tion to be performed with a message and/or call: Allow all : allow outgoing calls and SMS messages. Allow calls : allow only outgoing calls.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 126 Figure 110 : Dele ting an entry.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 127 A NTI -T HEFT This section contains information ab out th e Anti- Theft c omponent designed to protect information stored on the device in case the device is lost.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 128 T HE SM S -B L O C K FU N C T I O N The SM S-Block function allows b locking th e device if i t is required. You can unblock the de v ic e only after you enter the secret code. To enable the SMS-Block function, perform the follow ing actions (see Figure below): 1.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 129 Enter secret code specified on the receiving SM S de vice in the field Remote code .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 130 Contacts will be deleted from the phonebook stored on the device and on the SIM card. If you wish to delete personal f iles (data from My Documents folder), check the My Documents box. To delete data from all installed storage cards, check the Storage card files box.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 131 Enter secret code specified on the receiving SM S de vice in the field Remote code .
K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 132 Using the E-mail address specify the e -mail a ddress on which you wish to receive an e -m ail message about your new phone number. To block the device once the SIM card was replaced on it or when the device is turned on without the SIM card, check the Block box.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 133 Figure 116 : Enablin g the function D E T ER M I N I NG THE DE V I C E L O C A TI O N You can receiv.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 134 Figure 117 : Determ ine the location of the device To create an SM S message using your phone's standard functions for creating SMS message.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 135 The function being used must be turned enabled on the device receiving the message. Enter secret code specified on the receiving SM S de vice in the field Remote code .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 136 S E LE C T I N G T H E F I R E WA L L SECURITY LEVEL Operation of the Firewall component is based on the security le vels. The securi ty level set will de termine which network protocols will be allowed to be used to transfer information and which of them will be blocked.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 137 E NCRYPTION This section contains information about the component that ensu res data protection on the device using encryption. I N THIS SECT ION About Encryption .
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 138 The data in the folder will be encrypted once the command is exe cuted and then data will be encrypted and decrypted "on the fly" at the moment there data is placed into the folder, ex tracted from it or accessed.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 139 D A T A D E C R Y P T I O N You can completely decrypt data which was previously encry p ted (see section “ Data encryption ” on page 137 ).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 140 2. In the scree n that will open, se t the required delay for th e Bloc k access setting: 1 minute, 5 minutes, 15 minutes or 1 hour .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 141 For immediate prompt for the secret code, press Kaspersky Mobile Security icon in the device notification area and select Lock data (see Figure below).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 142 V I E WI N G B A S E S IN F OR MA TION In order to view information about the installed base s (see Figure below), select Databases info on the Information ta b.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 143 To start a manual update of anti-virus bases, select Upda te on th e Anti-Virus ta b (see Figure belo w). The prog ram will start th e bases update process from the server.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 144 Figure 126 : Configur ing the updat e schedule P ROGRAM LOGS This section contains information about the logs and managing of the information they cont ain. I N THIS SECT ION About logs .........
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 145 V IEWING L OG REC O R DS To view all records stored in th e log, perform the following actions (see Figure below): 1. Select Logs on the Information tab.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 146 3. Press Menu and select Delete all . All records from the log for every component will be deleted. Figure 128 : Deleting recor ds M ANAGING THE LICENSE Kaspersky Mobile Security allow s viewing information about the current license and renew it if necessary.
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 147 V IEWING TH E L I C EN SE I N F O R M A TI O N In order to view information about the license: select About license in the Information tab (see Figure below).
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 148 3. Enter th e activation code into the fo ur fields. The activation code consists of Latin a lphabet characters and digits (the code is case -insensitive). After you have entered the activation code, p ress Continue .
K A S P E R S K Y M O B I L E S E C U R I T Y F O R M I C R O S O F T W I N D O W S M O B I L E 149 2. Close Kaspersky Mobile Security. To do it, press Menu and select Exit (see Figure below). Figure 131 : Closing the program 3. Uninstall the program.
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 150 c. Select Kaspersky M obile Security in the list of installed programs and press the Remove button (see Figure below). Figure 133 : Selecting the program d. Pre ss Yes to confirm removal of the program.
151 GLOSSARY А A C T I V A T I N G T H E P R O G R A M The acti vation procedure involves e ntering the activate code and then receiving a key to be used by the program to determine your rights and the license period. A R C H I V E File "containing" one or several other objects which also can be archives.
K AS P E R S K Y M O B I L E S E C U R I T Y 8 . 0 152 I I N F E C T E D O B J E C T Object containing malicious code: it was detected by the scan that a section of the object's code is fully identical to a section of the code of a kn own th reat.
G L O S S A R Y 153 phone numbers incoming calls and SMS messages from which will be passed through by Anti -Spam a nd outgoing calls and SMS messages to which will be passed through by Parental control. text upon detection of which the incoming SMS message will be passed through.
154 KASPERSKY LAB Kaspersky Lab was fo unded in 1997. Today it is the leading developer o f a wide range of high -performance information security software products, including anti-virus, anti-spam and anti -hacking systems. Kaspersky Lab is an inte rnational company.
K A S P E R S K Y L AB 155 Address: Russia, 123060, Moscow, 1-st Volokolamsky Proezd, 10, Building 1 Phone, fax: +7 (495) 797- 87 -00, +7 (495) 645 - 79 -39, +7 (495) 956- 70 - 00 Helpdesk: +7 (495) 797- 87 -07, +7 (495) 645 - 79 -29 or +7 (495) 956 - 87 - 08.
156 CRYPTO EX LTD. To crea te a nd verify dig ital s ignatures, Kaspersky Anti -Virus uses Crypto E x Ltd 's data sec urity software l ibrary, Crypto C.
157 INDEX A Actions On -demand scan ........................................................................................................................................... 27, 100 Real-Time Protection ..............................................
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 158 Anti-Spam White List ..................................................................................................................................... 43, 113 Log records ....................
I N D E X 159 Actions to be performed with objects ............................................................................................................. 27, 100 objects to be scanned ............................................................
K A S P E R S K Y M O B I L E S E C U R I T Y 8 . 0 160 W W hite Li s t Anti-Spam ...................................................................................................................................................... 41, 110 Parental control .
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il Kaspersky Lab Mobile Security 8.0 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del Kaspersky Lab Mobile Security 8.0 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso Kaspersky Lab Mobile Security 8.0 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul Kaspersky Lab Mobile Security 8.0 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il Kaspersky Lab Mobile Security 8.0, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del Kaspersky Lab Mobile Security 8.0.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il Kaspersky Lab Mobile Security 8.0. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo Kaspersky Lab Mobile Security 8.0 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.