2. Scanning for viruses
F-Secure Mobile Security works in the background and scans your files
automatically.
1.
F-Secure Mobile Security notifies you if it finds a virus during the real-time
scan. Press
Yes
to view infected files immediately or
No
to view them later.
2.
The infections view contains a list of infected files on the device and whether
the file is currently quarantined or released.
To view more details about an infected file:
1.
Scroll to the infected file and press the selection key.
2.
Select
View
.
3.
The infection details view displays the path and file name of the infected file,
and the name of the virus that has infected the file.
Processing
infected files
To process infected files:
1.
In the infections view, scroll to the infected file you want to process.
2.
Press the selection key.
3.
Choose one of the following actions:
•
Delete
- delete the infected file. This is the recommended option. The file
will be removed completely from your device.
•
Quarantine
- quarantine the infected file if it is not quarantined already. A
quarantined file is locked and cannot harm your device when F-Secure
Mobile Security is on.
•
Release
- release the quarantined file. If you release a file, it will not be
locked any more. You access it at your own risk.
3. Preventing unauthorized network traffic
The firewall in F-Secure Mobile Security works quietly in the background. It
monitors incoming and outgoing Internet and network traffic, and protects you
from intrusion attempts. The predefined firewall levels allow you to change the
level of protection according to your needs.
Selecting
security
level
To select the security level:
1.
Browse to
Settings
and press the selection key.
2.
Select
Firewall
from the settings selection list.
3.
Select the desired firewall level:
•
Deny All
- stops all network traffic.
•
High
- allows most commonly used applications and blocks all incoming
traffic.
•
Normal
- allows all outgoing connections and blocks all incoming traffic.
•
Allow All
- allows all network traffic.
•
Custom
- allows network traffic based on your custom rules. To edit the
custom rule set, select
Options > Edit custom rules
when the
Custom
security level is selected.