ESET MOBILE SECURITY FOR ANDROID
|
|
|
- Moses Clarke
- 9 years ago
- Views:
Transcription
1 ESET MOBILE SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document
2 Contents 1. Installation...3 of ESET Mobile Security 1.1 Installation Uninstallation Product...4 activation 3. Antivirus Antispam Anti-Theft Security...8 Audit 7. Update Password Troubleshooting...10 and support ESET MOBILE SECURITY Copyright 2012 by ESET, spol. s r.o. ESET Mobile Security was developed by ESET, spol. s r.o. For more information visit All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without permission in writing from the author. ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. Customer Care: REV Troubleshooting Technical support...10
3 1. Installation of ESET Mobile Security To install ESET Mobile Security for Android, your mobile device must meet following system requirements: Minimum system requirements Operating system Android 2.0/2.1 (Éclair) and later CPU 600 MHz RAM 256 MB Internal storage free space 5 MB NOTE: Some features (e.g. Antispam and Anti-Theft) are not available on Android 3.0 / tablets which do not support calling and messaging. More details you can find in this knowledgebase article (may not be available in your language). 1.1 Installation To install ESET Mobile Security, do one of the following: search for ESET Mobile Security (or just Eset) in the Google Play Store application on your Android device. ESET Mobile Security is listed under Applications > Tools. Alternatively, you can install the program by scanning the QR code below using your mobile device and an application such as QR Droid or Barcode Scanner: download the ems.apk file on your computer from the ESET website. Copy the file to your device via Bluetooth or USB. Tap the Launcher icon on the Android home screen (or go to Home > Menu) and tap Settings > Applications and make sure the Unknown sources option is selected. Locate the ems. apk file using an application such as ASTRO File Manager or ES File Explorer. Open the file and tap Install. Once the application is installed, tap Open. Warning: ESET Mobile Security must be installed on internal device storage. Some mobile phones mistakenly allow users to install applications on SD card. If you install ESET Mobile Security on SD card, Real-time protection, Antispam and Anti-Theft will not work. After successful installation, activate ESET Mobile Security by following the steps described in the Product activation 4 section. 1.2 Uninstallation If you wish to uninstall ESET Mobile Security from your device, use the Uninstall wizard accessible from the ESET Mobile Security main screen or follow the steps below: 1. Tap the Launcher icon on the Android home screen (or go to Home > Menu) and tap Settings > Location and security > Select device administrators, deselect ESET Security and tap Deactivate. Enter your ESET Mobile Security password when requested. (If you have not set ESET Mobile Security as the Device administrator, skip this step.) 2. Go back to the Settings and tap Applications > Manage applications > ESET Security > Uninstall. ESET Mobile Security and the quarantine folder will be permanently removed from your mobile device. download the ESET Mobile Security installation file ( ems.apk) from the ESET website by scanning the QR code below: 3
4 2. Product activation After a successful installation, ESET Mobile Security must be activated. Tap Activate now in the ESET Mobile Security main screen. Activation methods vary depending on whether you downloaded ESET Mobile Security from ESET website or Google Play. Activate trial - select this option if you do not have a license and would like to evaluate ESET Mobile Security before making a purchase. Fill in your address to activate ESET Mobile Security for a limited time. You will receive a confirmation after successfully activating the product. Trial license can only be activated once per mobile device. Activate using an Activation key - (this option is not available if you installed ESET Mobile Security from Google Play) if you acquired program with a new device (or as a boxed product), you received an Activation key with your purchase. Enter the information you received in the Activation key field and your current contact address in the field. Your new authentication data (Username and Password) will automatically replace the Activation key and will be sent to the address you specified. Activate using username and password - (this option is not available if you installed ESET Mobile Security from Google Play) if you purchased your product from a distributor, you received a username and password with your purchase. Enter the information you received in the Username and Password fields. Enter your current contact address in the field. Renew license - select this option if your current license is soon to expire. Enter your Username and Password (data provided at the time of purchasing current license) in the appropriate fields. Load license data - (this option is not available if you downloaded ESET Mobile Security from ESET website) use this option if you already purchased the program with this account. ESET Mobile Security will be activated by loading your license data from ESET server. Buy now - select this option if you do not have a license and would like to buy one. Each activation is valid for a fixed period of time. After the activation expires, you will be asked to renew the program license (the program will notify you about this in advance). NOTE: During activation, the device must be connected to the Internet. A small amount of data will be downloaded. 4 By default, ESET Mobile Security is installed in the language which is set on your phone as a system locale (in Language and keyboard settings). If you wish to change the language of whole application user interface, tap Language from the ESET Mobile Security main screen and select the language of your choice. 3. Antivirus Scan Device The Scan Device option can be used to check your mobile device for infiltrations. Certain predefined file types are scanned by default. A complete device scan checks the memory, running processes, their dependent dynamic link libraries and files that are part of internal and removable storage. A brief summary of the scan will display after the scan is completed (i.e. number of infected files, number of scanned files, duration of the scan etc.). If you wish to abort a scan in progress, tap Cancel. Scan Folder To scan particular folders on your device, tap Scan Folder. Find the folders you wish to scan, tap their check boxes in the right column and tap Scan. Threat detected by ESET Mobile Security
5 Scan Logs Settings The Scan Logs section contains logs providing comprehensive data about completed scan tasks. Logs are created after each manually triggered (On-demand) scan or when an infiltration is detected by the Realtime scan. The On-demand settings allow you to modify scanning parameters of a manually triggered (On-demand) scan. The Show alert dialog option displays threat alert notifications every time a new threat is detected by the On-demand scanner. Each log contains: date and time of the event, number of scanned files, number of infected files, full path name of infected files, duration of the scan, actions performed or errors encountered during the scan. Quarantine The main task of the quarantine is to safely store infected files. Files should be quarantined if they cannot be cleaned, if it is not safe or advisable to delete them or if they are being falsely detected by ESET Mobile Security. Files stored in the quarantine can be viewed in a log that displays the name and original location of the infected file, date and time of quarantine. If you wish to restore a quarantined file to its original location, tap the file and select Restore. This option is not recommended. To permanently remove a quarantined file from your device, tap the file and select Delete. To remove all files stored in the quarantine, press the MENU button and tap Delete All. If you wish to scan all applications (.apk files) installed on your device, select the Scan applications option. Proactive protection is an algorithm-based detection method that analyzes code and searches for typical virus behavior. Its main advantage is the ability to identify malicious software not yet recognized in the current virus signature database. Additional time will be required to complete the scan if Proactive protection is enabled. The Archive scanning depth option allows you to specify the depth of nested archives (.zip files) to be scanned. The higher the number, the deeper the scan. The Stored logs option allows you to define the maximum number of logs to be stored in the Scan Logs 5 section. You can specify a Default action that will be performed automatically when infected files are detected. You can choose from the following options: Ignore - no action will be performed on the infected file (this option is not recommended), Delete - the infected file will be removed, Quarantine - (default) the infected file will be moved to the Quarantine 5. The Extensions settings show the most common file types exposed to infiltrations on the Android platform. Select the file types you wish to scan or deselect the extensions to exclude them from scanning. These settings apply to both On-demand and Real-time scan: Extension sensitive - if you deselect this option, all file types will be scanned. Files will also be checked if they were not masqueraded as another file type. This results in longer scan time. DEX (applications code file) - executable file format that contains compiled code written for the Android OS, SO (libraries) - shared libraries saved to designated places in the file system and linked by programs that require their functions, Archives (zipped files) - files compressed using the Zip compression, Others - other known file types. 5
6 In the Real-time settings, you can configure the scanning parameters of the On-access scanner. The On-access scanner checks files that you interact with in real time. It automatically scans Download folder on the SD card, files from the.apk installation files and files on the SD card after it is mounted (if the Scan mounted SD card option is enabled). The On-access scanner launches automatically at system startup. Real-time protection - if enabled (default), the Onaccess scanner runs in the background. Show alert dialog - displays threat alert notifications every time a new threat is detected by the On-access scanner. Scan mounted SD card - scans the files prior to opening or saving them to the SD card. Proactive protection - select this option to apply heuristic scanning techniques. Heuristics proactively identify new malware not yet detected by the virus signature database by analyzing code and recognizing typical virus behavior. Additional time is required to complete the scan if Proactive protection is enabled. Archive scanning depth - this option allows you to specify the depth of nested archives (.zip files) to be scanned. The higher the number, the deeper the scan. Default action - you can specify a default action that will be performed automatically when infected files are detected by the On-access scanner. If you select Ignore, no action will be performed upon the infected file (this option is not recommended). If you select Delete, the infected file will be removed. If you select Quarantine, the infected file will be moved to the Quarantine Antispam The Antispam module blocks incoming SMS/MMS messages and incoming/outgoing calls based on your rules. Unsolicited messages usually include advertisements from mobile phone service providers or messages from unknown or unspecified users. The term block contacts refers to moving an incoming message to the Spam Logs 7 section automatically. No notification is displayed when an incoming message is blocked. The advantage of this is that you will not be bothered by unsolicited information, but can always check the logs for messages that may have been blocked by mistake. To add new Antispam rule, tap Call and SMS Rule List > Add New. Enter the phone number you wish to block or tap the + button to choose the number from your contact list. Customize the rule by allowing or blocking the messages and calls and tap Done. To edit or remove an existing rule entry, touch and hold the entry and choose the desired action. If you wish to remove all antispam rules, press the MENU button and tap Remove All. NOTE: The phone number must include the international dialing code followed by the actual number (e.g., ). ESET Mobile Security displays its notification icon in the top left corner of the screen (Android status bar). If you do not wish this icon to be displayed, go to the ESET Mobile Security main screen, press the MENU button, tap Notifications and deselect the Show notification icon option. Please note, this will not turn off a red warning icon with an exclamation mark notifying you about a security risk (e.g. Real-time virus scanning disabled, SIM matching disabled etc.). Antispam Rule List 6
7 Settings Trusted Friends Block anonymous calls enable this option if you wish to block callers that have their phone number intentionally hidden via the Calling Line Identification Restriction (CLIR). In the Trusted Friends list, Add the phone numbers that will receive an Alert SMS after an untrusted SIM card is inserted into your device. Enter a name in the Friend's name field and his/her phone number in the Telephone number field or tap the + button to choose the contact from your contact list. If the contact contains more than one phone number, Alert SMS will be sent to all these numbers. Block known contacts use this option to block messages and calls for contacts included in your contact list. Block unknown contacts blocks messages and calls for contacts not included in your contact list. You can use this option to block unwelcome phone calls (e.g. "cold calls") or to prevent kids from dialing unknown numbers. (To prevent this, it is recommended to password 9 protect your Antispam settings.) In the Spam Logs section, you can see the calls and messages blocked by the Antispam module. Each log contains the name of the event, corresponding phone number, date and time of the event. Blocked SMS messages also contain the message body. To Edit or Remove an existing entry, touch and hold the entry and choose the desired action. If you wish to remove all entries from the list, press the MENU button and tap Remove All. NOTE: The phone number must include the international dialing code followed by the actual number (e.g., ). 5. Anti-Theft The Anti-Theft feature protects your mobile phone from unauthorized access. If you lose your phone or someone steals it and replaces your SIM card with a new (untrusted) one, the phone will be locked automatically by ESET Mobile Security. An Alert SMS will be secretly sent to user-defined phone number(s). This message will include the phone number of the currently inserted SIM card, the IMSI (International Mobile Subscriber Identity) number and the phone's IMEI (International Mobile Equipment Identity) number. The unauthorized user will not be aware that this message has been sent, since it will be automatically deleted from the Messaging threads. In addition, you can also request GPS coordinates of your lost mobile phone or erase remotely all data stored on the device. Trusted Friends list Trusted SIM cards If the SIM card currently inserted in your mobile phone is the one you wish to save as trusted, tap the Add. If you are using more than one SIM card, you may want to distinguish each one by modifying its Alias for the SIM card (e.g., Office, Home etc.). To Edit or Remove an existing SIM entry, touch and hold the entry and choose the desired action. If you wish to remove all entries from the list, press the MENU button and tap Remove All. 7
8 Settings If you have a device without a SIM card (e.g. tablet or CDMA phone), select the Ignore SIM matching option. This will turn off red Security Risk! warnings (SIM matching is disabled and No trusted SIM defined) from the ESET Mobile Security main screen. (Please note that Ignore SIM matching option will be greyed out on CDMA-based devices.) To enable automatic checking of the inserted SIM card (and Alert SMS sending), select the Enable SIM matching option. In the Alert SMS Text field, you can modify the text message that will be sent to the predefined phone number(s) after an untrusted SIM card is inserted in your device. If you purchased ESET Mobile Security from Google Play, an address from your Google account is inserted automatically. You can also enter another or alternative contact number. contacts, messages and the SD card content will be erased. NOTE: The password is case sensitive. Please make sure to enter the password exactly as you defined it in the Password section. 6. Security Audit The Security audit checks the phone's status regarding battery level, bluetooth status, free disk space, etc. To run a Security audit manually, tap Audit. A detailed report will be displayed. SMS Commands Remote SMS commands (wipe, lock and find) will only work if the Enable SMS commands option is selected. The Enable SMS reset password option allows you to reset your security password by sending an SMS from the mobile saved in your Trusted Friends to your mobile number. This SMS must be in the following form: eset remote reset If you lose your phone and would like to lock it, send a Remote lock SMS from any mobile device to your phone number in the following form: eset lock password Replace password with your own password set in the Password 9 section. An unauthorized user will not be able to use your phone as entering your password will be required. If you wish to request the GPS coordinates of your mobile device, send a Remote find SMS to your mobile number or the unauthorized user's mobile number (depends on if the SIM card was already replaced): eset find password You will recieve an SMS with GPS coordinates and a link to the Google maps showing the exact location of your mobile device. Please note that in order to receive the GPS coordinates, the GPS module on your phone has to be activated in advance. If you wish to erase all data stored on your device and all currently inserted removable media, send a Remote wipe SMS: eset wipe password All contacts, messages, s, installed applications, your Google account and the SD card content will be permanently erased from your device. If ESET Mobile Security is not set as the Device administrator, only the 8 Security Audit Results A green check next to each item indicates that the value is above the threshold or that the item does not represent a security risk. A yellow icon means that at least one of the items is below the threshold or that the item could represent a potential security risk. Tap the item to see detailed results. A red exclamation mark indicates that the item is below the threshold or that the item represents a security risk and should be fixed. If you wish to fix the status of the item highlighted in red, tap the item and confirm by tapping Yes.
9 Settings Security audit is scheduled to run periodically every 24 hours by default. If you wish to turn off periodic audit, deselect the Audit periodically option. If the Fix automatically option is enabled, ESET Mobile Security will automatically attempt to fix the items at risk (e.g. bluetooth status) without user interaction. This option only applies to a periodic (scheduled) audit. The Stored logs option allows you to define the maximum number of logs to be stored in the Audit Logs section. The Audit period option allows you to define how often the periodic (scheduled) audit will be performed. To adjust the threshold value at which the Free disk space and Battery level will be considered as low, use the Free disk space threshold and Battery level threshold options. In the Items to audit tab, select the items to be checked during the periodic (scheduled) audit. The Audit Logs section contains logs providing comprehensive data about performed periodic and manually-triggered audits. Each log contains the date and time of the event and detailed results of each item. The Task Manager provides you with an overview of all processes, services and tasks running on your device. ESET Mobile Security allows you to stop the processes, services and tasks not run by the system. These are indicated by a red icon (x). 8. Password Your security password protects your settings from unauthorized changes. Password is required when: accessing password protected features of ESET Mobile Security (Antivirus, Antispam, Anti-Theft and Security audit), accessing your phone in case it was locked, sending SMS commands to your device, uninstalling ESET Mobile Security. NOTE: Uninstall protection is available only on Android 2.2 and later. To set a new security password, type it in the Password and Re-type Password fields. The Reminder Phrase option (if set) displays a hint in case you do not remember your password. IMPORTANT: Please choose your password carefully as this will be required when unlocking your device or uninstalling ESET Mobile Security. In the Apply To tab, you can specify which modules will be protected by the password. If you forget your password, you can send an SMS from the mobile number saved in your Trusted Friends list to your mobile number. This SMS must be in the following form: eset remote reset Your password will be reset. 7. Update By default, ESET Mobile Security is installed with an update task to ensure that the program is updated regularly. To run the update manually, tap Update Now. Settings The Auto update option allows you to set the time interval for the automatic download of the virus database updates. NOTE: To prevent unnecessary bandwidth usage, updates are issued as needed, when a new threat is added. While the updates are free with your active license, you may be charged by your mobile service provider for data transfers. 9
10 9. Troubleshooting and support 9.1 Troubleshooting ESET Mobile Security provides advanced logging functionality which helps diagnose potential technical issues. Before contacting ESET Customer Care, we strongly recommend searching for a possible solution on ESET Knowledgebase. If you still need to contact ESET Customer Care, follow the steps below: 1. Go to the ESET Mobile Security main screen, press the MENU button and tap Logging Settings. 2. Select an appropriate program component the problem is related to. 3. Replicate the issue. Information will be written into an application log file. 4. Go to the ESET Mobile Security main screen, press the MENU button and tap Customer Care. 5. If you did not find a solution on our Knowledgebase, tap Continue. 6. Fill in all the details and tap Submit at the bottom of the screen. Make sure the Application log option is selected (default). 9.2 Technical support For administrative assistance or technical support related to ESET Mobile Security or any other ESET security product, our Customer Care specialists are available to help. To find answers to the most frequently asked questions, access the ESET Knowledgebase at: The Knowledgebase contains an abundance of useful information for resolving the most common issues, easily accessed by categories or an advanced search tool. To contact ESET Customer Care, use the support request form available at: To send a support request directly from your mobile phone, go to the ESET Mobile Security main screen, press the MENU button and tap Customer Care. Fill in all the required fields. To include a complete Application log, follow the steps described in the Troubleshooting 10 section. 10
ESET ENDPOINT SECURITY FOR ANDROID
ESET ENDPOINT SECURITY FOR ANDROID Installation Manual and User Guide Click here to download the most recent version of this document Contents 1...3 Installation of ESET Endpoint Security 1.1 Installation...3
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
ESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
ESET Mobile Security Windows Mobile. Installation Manual and User Guide
ESET Mobile Security Windows Mobile Installation Manual and User Guide Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3 system requirements 1.2 Installation...3 1.2.1 Installation...3
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
ESET SMART SECURITY 6
ESET SMART SECURITY 6 Microsoft Windows 8 / 7 / Vista / XP / Home Server Quick Start Guide Click here to download the most recent version of this document ESET Smart Security provides state-of-the-art
ESET NOD32 ANTIVIRUS 8
ESET NOD32 ANTIVIRUS 8 Microsoft Windows 8.1 / 8 / 7 / Vista / XP / Home Server 2003 / Home Server 2011 Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
ESET SMART SECURITY 9
ESET SMART SECURITY 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET Smart Security is all-in-one Internet security
ESET NOD32 ANTIVIRUS 9
ESET NOD32 ANTIVIRUS 9 Microsoft Windows 10 / 8.1 / 8 / 7 / Vista / XP Quick Start Guide Click here to download the most recent version of this document ESET NOD32 Antivirus provides state-of-the-art protection
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
Kaspersky Endpoint Security 8 for Smartphone for Android OS
Kaspersky Endpoint Security 8 for Smartphone for Android OS User Guide PROGRAM VERSION: 8.0 Dear User! Thank you for choosing our product. We hope that this documentation will help you in your work and
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
ESET NOD32 Antivirus. Table of contents
ESET NOD32 Antivirus ESET NOD32 Antivirus provides state-of-theart protection for your computer against malicious code. Based on the ThreatSense scanning engine first introduced in the awardwinning NOD32
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
F-Secure Mobile Security for Business. Getting Started Guide
F-Secure Mobile Security for Business Getting Started Guide F-Secure Mobile Security for Business TOC 3 Contents Chapter 1: F-Secure Mobile Security Portal...5 Overview...6 Administrator access levels...6
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
U.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
Installation Instructions
Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other
ESET PARENTAL CONTROL for ANDROID
ESET PARENTAL CONTROL for ANDROID User Guide Click here to download the most recent version of this document ESET PARENTAL CONTROL ESET, spol. s r.o. ESET Pa renta l Control wa s devel oped by ESET, s
ESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 User Guide (intended for product version 4.2 and higher) Microsoft Windows 7 / Vista / XP / NT4 / 2000 / 2003 / 2008 Content 1. ESET NOD32 Antivirus 4...4 1.1 What s new... 4 1.2
Administrator's Guide
Administrator's Guide Copyright SecureAnywhere Mobile Protection Administrator's Guide November, 2012 2012 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere
ESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 for Mac Installation Manual and User Guide - Public Beta ESET NOD32 Antivirus Copyright 2010 by ESET, spol. s.r.o. ESET NOD32 Antivirus 4 was developed by ESET, spol. s r.o. For
TREND MICRO Mobile Security 5.0 for Android Product Guide
H TREND MICRO Mobile Security 5.0 for Android Product Guide V1.1 Trend Micro, Inc. 10101 N. De Anza Blvd. Cupertino, CA 95014 T 800.228.5651 / 408.257.1500 F 408.257.2003 www.trendmicro.com Trend Micro
ESET NOD32 Antivirus 4
ESET NOD32 Antivirus 4 for Linux Desktop Installation Manual and User Guide - Public Beta ESET NOD32 Antivirus Copyright 2010 by ESET, spol. s.r.o. ESET NOD32 Antivirus 4 was developed by ESET, spol. s
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
ESET Endpoint Protection Advanced
ESET Endpoint Protection Advanced Whether your business is just starting or established, there are a few things you expect from software you use daily. At ESET, we feel that running software in the business
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
Kaspersky Password Manager
Kaspersky Password Manager User Guide Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most questions that may arise.
Fusion Voicemail Plus User Guide For Android Devices
Welcome to Fusion Voicemail Plus! Fusion Voicemail Plus User Guide For Android Devices Fusion Voicemail Plus (FVM+) is a replacement for the ordinary voicemail that you use with your cellular phone company.
NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds
NOD32 Antivirus 3.0 Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware User Guide we protect your digital worlds contents 1. ESET NOD32 Antivirus 3.0...4 1.1 What s new... 4 1.2 System
Compliance Rule Sets in MaaS360
Compliance Rule Sets in MaaS360 MaaS360 allows you to apply sets of compliance rules on mobile devices. These rules are conditions that are checked on devices on real-time basis. If a device is not in
Total Protection Service
User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Comodo Mobile Security for Android Software Version 3.0
Comodo Mobile Security for Android Software Version 3.0 User Guide Guide Version 3.0.042115 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo Mobile
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
TrustPort Mobile Security
TrustPort Mobile Security User Guide Some steps an especially setting of mobile phones itself may vary for differe nt vendors like HTC, Samsung, Sony etc. Revision date: 2014/10/06 Copyright 2014, TrustPort,
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
ESET NOD32 Antivirus. for Kerio. Installation manual
ESET NOD32 Antivirus for Kerio Installation manual Content 1. Introduction...3 2. Supported versions...3 ESET NOD32 Antivirus for Kerio Copyright 2012 by ESET, spol. s r. o. ESET NOD32 Antivirus was developed
Sophos Anti-Virus standalone startup guide. For Windows and Mac OS X
Sophos Anti-Virus standalone startup guide For Windows and Mac OS X Document date: June 2007 Contents 1 What you need for installation...4 2 Installing Sophos Anti-Virus for Windows...5 3 Installing Sophos
ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008
ESET Mail Security 4 for Microsoft Exchange Server User Guide Microsoft Windows 2000 / 2003 / 2008 Content 1. Introduction...4 1.1 System requirements... 4 1.2 Methods Used... 4 1.2.1 Mailbox scanning
contents 1. ESET Smart Security...4 2. Installation...5 3. Beginner s guide...9 4. Work with ESET Smart Security...12
Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware ESET Personal Firewall ESET Antispam New generation of NOD32 technology User Guide we protect your digital worlds contents 1. ESET Smart
Comodo Mobile Security for Android Software Version 2.5
Comodo Mobile Security for Android Software Version 2.5 User Guide Guide Version 2.5.111014 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Mobile
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
FAQ for Eee Pad TF201
FAQ for Eee Pad TF201 E6915 Managing files... 2 How do I access my data stored in microsd, SD card and USB device?... 2 How do I move the selected file to another folder?... 2 How do I copy and paste the
Bitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
User Guide. SysMan Utilities. By Sysgem AG
SysMan Utilities User Guide By Sysgem AG Sysgem is a trademark of Sysgem AG. Other brands and products are registered trademarks of their respective holders. 2013 Sysgem AG, Lavaterstr. 45, CH-8002 Zürich,
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
User's Guide. Copyright 2012 Bitdefender
User's Guide Copyright 2012 Bitdefender Bitdefender Parental Control User's Guide Publication date 2012.06.05 Copyright 2012 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
WNMS Mobile Application
WNMS Mobile Application User s Guide Revision 1.0 18 October 2013 Copyright 2013 Deliberant www.deliberant.com Copyright 2013 Deliberant This user s guide and the software described in it are copyrighted
Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum
Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets
Avira System Speedup. HowTo
Avira System Speedup HowTo Table of Contents 1. Introduction... 4 1.1 What is Avira System Speedup?...4 2. Installation... 5 2.1 System Requirements...5 2.2 Installation...5 3. Using the program... 8 3.1
For Businesses with more than 25 seats. www.eset.com
For Businesses with more than 25 seats www.eset.com ESET Secure Enterprise Whether your business is just starting or Simple and Straightforward established, there are a few things you expect With ESET
TrustPort USB Antivirus
TrustPort USB Antivirus User Guide Revision date: 10/1/2014 Copyright 2014, TrustPort, a.s., All rights reserved. About In cases where for example we use portable applications on USB keys, we do not have
avast! Free Antivirus 7.0 Quick Start Guide avast! Free Antivirus 7.0 Quick Start Guide
avast! Free Antivirus 7.0 Quick Start Guide 1 Welcome to avast! Free Antivirus 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even less resource-hungry
Password Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
Sierra Wireless AirCard Watcher Help for Mac OS X
Sierra Wireless AirCard Watcher Help for Mac OS X Sierra Wireless AirCard Watcher allows you to manage and monitor the connection between your modem and the network. With Watcher, you can: Determine signal
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
MALWAREBYTES PLUGIN DOCUMENTATION
Contents Requirements... 2 Installation Scenarios... 2 Malwarebytes 2.xx or 1.75 is already deployed.... 2 Install / Update Malwarebytes Plugin... 3 Configuring Malwarebytes Plugin... 5 About the Screens...
Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing
NOD32 Typical Installation Guide Version 2.7 Includes Windows Vista and 64-bit protection Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing Best Detection Fastest
Avira Free Android Security (version 1.2) HowTo
Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5
Bitdefender Antivirus Plus 2016 User's Guide
USER'S GUIDE Bitdefender Antivirus Plus 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
Sophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
F-Secure Mobile Security for Nokia E51, E71 and E75. 1 Installing and Activating F-Secure Client 5.1
F-Secure Mobile Security for Nokia E51, E71 and E75 1 Installing and Activating F-Secure Client 5.1 N.B.: The previous version of F-Secure Mobile Security does not have to be uninstalled. The new version
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
Sophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Novell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
avast! Mobile Security User Guide avast! Mobile Security User Guide
avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...
How To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
Norman Security Portal
User Guide Norman Security Portal SECURITY PORTAL Features Cloud-based endpoint management Managed & unmanaged customers Generate client software Statistics & reports Security Module Antivirus & Antispyware
User Guide. Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved.
Copyright 2003 Networks Associates Technology, Inc. All Rights Reserved. Table of Contents Getting Started... 4 New Features... 4 System Requirements... 4 Configuring Microsoft Internet Explorer... 4 Configuring
avast! Mobile Security User Guide avast! Mobile Security User Guide
avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...
Samsung KNOX User Guide KNOX for Consumers Edition
Samsung KNOX User Guide KNOX for Consumers Edition Version 1.3 Jan 07, 2015 Copyright Notice Copyright 2013 Samsung Electronics Co. Ltd. All rights reserved. Samsung is a registered trademark of Samsung
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
ES Exchange Server - How to Remove XMON
w e p r o t e c t d i g i t a l w o r l d s NOD32 Server Edition for MS Exchange Server Installation Copyright Eset, spol. s r. o. All rights reserved. No part of this document may be reproduced or transmitted
Notices. Copyright 2016 Malwarebytes. All rights reserved.
Malwarebytes Anti-Malware Mobile User Guide Version 2.0.5 3 May 2016 Notices Malwarebytes products and related documentation are provided under a license agreement containing restrictions on use and disclosure
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
ESET Cybersecurity. Installation Manual and User Guide. Click here to download the most recent version of this document
ESET Cybersecurity Installation Manual and User Guide Click here to download the most recent version of this document ESET Cybersecurity Copyright 2012 by ESET, spol. s.r.o. ESET Cybersecurity was developed
Using Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
KPN SMS mail. Send SMS as fast as e-mail!
KPN SMS mail Send SMS as fast as e-mail! Quick start Start using KPN SMS mail in 5 steps If you want to install and use KPN SMS mail quickly, without reading the user guide, follow the next five steps.
Field Manager Mobile Worker User Guide for RIM BlackBerry 1
Vodafone Field Manager Mobile Worker User Guide for RIM BlackBerry APPLICATION REQUIREMENTS Supported devices listed here o http://support.vodafonefieldmanager.com Application requires 600 KB of application
Bitdefender Total Security 2016 User's Guide
USER'S GUIDE Bitdefender Total Security 2016 User's Guide Publication date 01/28/2016 Copyright 2016 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)
AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition
Basic Setup Guide Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard
