User guide

7
KASPERSKY MOBILE SECURITY 8.0
Kaspersky Mobile Security 8.0 is designed to ensure protection of mobile devices running Symbian OS and Microsoft
Windows Mobile against malware programs, unsolicited calls and messages: The program offers the following
functionality:
Real-Time Protection of the file system of the device - interception and scan of:
all incoming objects transmitted using wireless connections (IR port, Bluetooth), EMS and MMS messages,
during synchronization with the personal computer and downloading files using a browser;
files opened on the mobile device;
programs installed from the device's interface.
Scanning of the file system's objects on the mobile device or on the connected expansion cards by user's
demand or according to the schedule.
Reliable isolation of infected objects in the quarantine storage.
Updating of Kaspersky Mobile Security bases used to scan for malware programs and delete dangerous
objects.
Blocking unwanted incoming and outgoing SMS messages and calls.
Blocking access to or erasing user's data in case of unauthorized actions with the device, as, for instance,
theft.
Protection of the mobile device at the network level.
Protection with encryption of a folder (except system folders) in the device's memory or on the memory
expansion card (through the encrypting functions embedded in the system).
Receiving geographical coordinates of the device.
You can use the capabilities providing flexible control of the Kaspersky Mobile Security operation settings, viewing the
current protection status and the event log in which the program's actions are recorded.
The program includes a menu system and supports an easy-to-use user's interface.
Once a malware program is detected, Kaspersky Mobile Security can disinfect the infected object detected (if disinfection
is possible), delete it or place it into the Quarantine. In this case no copies of the object being deleted will be saved.
IN THIS SECTION
Obtaining information about the program .......................................................................................................................... 8
Hardware and software requirements.............................................................................................................................. 10
Distribution kit .................................................................................................................................................................. 10