User guide
3
TABLE OF CONTENTS
KASPERSKY MOBILE SECURITY 8.0 ......................................................................................................................... 7
Obtaining information about the application ............................................................................................................. 8
Data sources for independent research ............................................................................................................. 8
Contacting the Sales Department ...................................................................................................................... 9
Contacting the Technical Support Service ......................................................................................................... 9
Discussion of Kaspersky Lab applications in web forum .................................................................................. 10
Hardware and software requirements .................................................................................................................... 10
Distribution kit ........................................................................................................................................................ 10
KASPERSKY MOBILE SECURITY FOR SYMBIAN OS ............................................................................................. 11
Installing Kaspersky Mobile Security...................................................................................................................... 11
Getting started ....................................................................................................................................................... 13
Activating the program ..................................................................................................................................... 13
Starting the program ........................................................................................................................................ 14
Graphic interface .............................................................................................................................................. 15
Secret code ...................................................................................................................................................... 16
Viewing information about the program ............................................................................................................ 17
Real-Time Protection ............................................................................................................................................. 17
About Real-Time Protection ............................................................................................................................. 18
Enabling and disabling the Real-Time Protection ............................................................................................. 18
Selecting objects to be scanned ....................................................................................................................... 19
Selecting actions for objects ............................................................................................................................. 20
Display of the protection icon ........................................................................................................................... 21
On-demand scan ................................................................................................................................................... 23
About on-demand scan .................................................................................................................................... 23
Starting a scan manually .................................................................................................................................. 23
Configuring a scheduled scan .......................................................................................................................... 25
Selecting objects to be scanned ....................................................................................................................... 26
Selecting actions to be performed with objects ................................................................................................ 27
Configuring ROM scan ..................................................................................................................................... 29
Configuring the scan of archives ...................................................................................................................... 30
Managing the backlight .................................................................................................................................... 31
Quarantine ............................................................................................................................................................. 32
About Quarantine ............................................................................................................................................. 32
Viewing quarantined objects ............................................................................................................................ 33
Restoring objects from Quarantine ................................................................................................................... 34
Deleting objects from Quarantine ..................................................................................................................... 34
Anti-Spam .............................................................................................................................................................. 36
About Anti-Spam .............................................................................................................................................. 36
Anti-Spam modes ............................................................................................................................................. 36
Creating a Black list ......................................................................................................................................... 37
Creating a White List ........................................................................................................................................ 41
Response to messages and calls from the phonebook contacts ...................................................................... 45
Response to messages from non-numeric numbers ........................................................................................ 45
Selecting an action to be performed with incoming messages ......................................................................... 47
Selecting an action to be performed with incoming calls .................................................................................. 48