background image

2.  Scanning for Viruses

F-Secure Mobile Security works in the background and scans your files 
automatically. 

1. If a virus is found during the real-time scan, a message is displayed. Press 

Yes

 to view the infected file(s), or 

No

 to close the dialog.

2.

The Infections view contains a list of infected files on the device and the 
state of the file (either quarantined or released).

To view more details about an infected file: 

1. Scroll to the infected file and press the selection key.

2.

Select 

View

.

3.

The infection details view displays the path and file name of the infected file, 
and the name of the virus that has infected the file. 

Processing 

Infected Files

To process infected files:

1. In the Infections view, scroll to the infected file you want to process.

2.

Press the selection key.

3.

Choose one of the following actions:

Delete

 - delete the infected file. This is the recommended option. The file 

will be removed completely from your device.

Quarantine

 - quarantine the infected file if it is not quarantined already. A 

quarantined file is locked and cannot harm your device when F-Secure 
Mobile Security is on.

Release

 - release the quarantined file. If you release a file, it will not be 

locked any more. You access it at your own risk.

3.  Preventing Unauthorized Network Traffic

The firewall in F-Secure Mobile Security works quietly in the background. It 
monitors incoming and outgoing Internet and network traffic, and protects you 
from intrusion attempts. The predefined firewall levels allow you to instantly 
change the level of protection according to your needs.

Selecting 

Security 

Level

To select the security level:

1. Browse to 

Settings

 and press the selection key.

2.

Select 

Firewall

 from the settings selection list. 

3.

Select the desired firewall level:

Deny All

 - stops all network traffic.

High

 - allows most commonly used applications and blocks all incoming 

traffic.

Normal

 - allows all outgoing connections and blocks all incoming traffic.

Allow All

 - allows all network traffic.

Custom

 - allows network traffic based on your custom rules. To edit the 

custom rule set, select 

Options > Edit custom rules

 when the 

Custom

 

security level is selected.

Reviews: