background image

2.  Scanning for viruses

F-Secure Mobile Security works in the background and scans your files 
automatically. 

1.

F-Secure Mobile Security notifies you if it finds a virus during the real-time 
scan. Press 

Yes

 to view infected files immediately or 

No

 to view them later.

2.

The infections view contains a list of infected files on the device and whether 
the file is currently quarantined or released.

To view more details about an infected file: 

1.

Scroll to the infected file and press the selection key.

2.

Select 

View

.

3.

The infection details view displays the path and file name of the infected file, 
and the name of the virus that has infected the file. 

Processing 

infected files

To process infected files:

1.

In the infections view, scroll to the infected file you want to process.

2.

Press the selection key.

3.

Choose one of the following actions:

Delete

 - delete the infected file. This is the recommended option. The file 

will be removed completely from your device.

Quarantine

 - quarantine the infected file if it is not quarantined already. A 

quarantined file is locked and cannot harm your device when F-Secure 
Mobile Security is on.

Release

 - release the quarantined file. If you release a file, it will not be 

locked any more. You access it at your own risk.

3.  Preventing unauthorized network traffic

The firewall in F-Secure Mobile Security works quietly in the background. It 
monitors incoming and outgoing Internet and network traffic, and protects you 
from intrusion attempts. The predefined firewall levels allow you to change the 
level of protection according to your needs.

Selecting 

security 

level

To select the security level:

1.

Browse to 

Settings

 and press the selection key.

2.

Select 

Firewall

 from the settings selection list. 

3.

Select the desired firewall level:

Deny All

 - stops all network traffic.

High

 - allows most commonly used applications and blocks all incoming 

traffic.

Normal

 - allows all outgoing connections and blocks all incoming traffic.

Allow All

 - allows all network traffic.

Custom

 - allows network traffic based on your custom rules. To edit the 

custom rule set, select 

Options > Edit custom rules

 when the 

Custom

 

security level is selected.

Reviews: