ks9.0 mobile en

Upload: dhilip67

Post on 29-May-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Ks9.0 Mobile En

    1/200

    Kaspersky Mobile Security 9.0

    USER GUIDE

    P R O G R A M V E R S I O N : 9 . 0

  • 8/9/2019 Ks9.0 Mobile En

    2/200

  • 8/9/2019 Ks9.0 Mobile En

    3/200

    3

    KASPERSKY LAB END USER LICENSE

    AGREEMENT

    IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFOREYOU START USING THE SOFTWARE.

    BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY ENTERINGCORRESPONDING SYMBOL(-S) YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THISAGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUNDBY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT ISENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TOALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWAREAND DO NOT INSTALL THE SOFTWARE.

    THE SOFTWARE CAN BE ACCOMPANIED WITH ADDITIONAL AGREEMENT OR SIMILAR DOCUMENT(ADDITIONAL AGREEMENT) WHICH CAN DEFINE NUMBER OF COMPUTERS, WHERE THE SOFTWARE CAN BEUSED, PERIOD OF USE OF THE SOFTWARE, TYPES OF OBJECTS WHICH THE SOFTWARE IS INTENDED FORAND OTHER ADDITIONAL TERMS OF PURCHASE, ACQUISITION AND USE. THIS ADDITIONAL AGREEMENT ISTHE INTEGRAL PART OF THE LICENSE AGREEMENT.

    AFTER CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR AFTER ENTERINGCORRESPONDING SYMBOL(-S) YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THETERMS AND CONDITIONS OF THIS AGREEMENT.

    1. Definitions

    1.1. Software means software including any Updates and related materials.1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means Kaspersky Lab ZAO, a

    company incorporated according to the laws of the Russian Federation.1.3. Computer(s) means hardware(s), including personal computers, laptops, workstations, personal digital

    assistants, smartphones, hand-held devices, or other electronic devices for which the Software was designed

    where the Software will be installed and/or used.1.4. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is

    legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of anorganization, such as an employer, Youfurther means the organization for which the Software is downloadedor installed and it is represented hereby that such organization has authorized the person accepting thisagreement to do so on its behalf. For purposes hereof the term organization, without limitation, includes anypartnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labororganization, unincorporated organization, or governmental authority.

    1.5. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement andlicense with the Rightholder.

    1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions ormaintenance packs etc.

    1.7. User Manual means user manual, administrator guide, reference book and related explanatory or othermaterials.

    1.8. Software Acquisition means purchase of the Software or acquisition of the Software on terms defined inadditional agreement including acquisition at no charge.

    2. Grant of License

    2.1. The Rightholder hereby grants You a non-exclusive license to store, load, install, execute, and display (to use)the Software on a specified number of Computers in order to assist in protecting Your Computer on which theSoftware is installed, from threats described in the User Manual, according to the all technical requirementsdescribed in the User Manual and according to the terms and conditions of this Agreement (the License) andyou accept this License:Trial Version. If you have received, downloaded and/or installed a trial version of the Software and are herebygranted an evaluation license for the Software, you may use the Software only for evaluation purposes and onlyduring the single applicable evaluation period, unless otherwise indicated, from the date of the initial installation.Any use of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited.

    Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles. Ifyou use different versions of the Software or different language editions of the Software, if you receive theSoftware on multiple media, if you otherwise receive multiple copies of the Software, or if you received the

  • 8/9/2019 Ks9.0 Mobile En

    4/200

    U S E R G U I D E

    4

    Software bundled with other software, the total permitted number of your Computers on which all versions of theSoftware are installed shall correspond to the number of computers specified in licenses you have obtained fromthe Rightholderprovidedthat unless the licensing terms provide otherwise, each acquired license entitles you toinstall and use the Software on such a number of Computer(s) as is specified in Clauses 2.2 and 2.3.

    2.2. If the Software was acquired on a physical medium You have the right to use the Software for protection of sucha number of Computer(s) as is specified on the Software package or as specified in additional agreement.

    2.3. If the Software was acquired via the Internet You have the right to use the Software for protection of such anumber of Computers that was specified when You acquired the License to the Software or as specified inadditional agreement.

    2.4. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legallyowned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for otherpurposes and must be destroyed when you lose the right to use the Software or when Your license expires or isterminated for any other reason according to the legislation in force in the country of your principal residence orin the country where You are using the Software.

    2.5. From the time of the Software activation or after license key file installation (with the exception of a trial versionof the Software) You have the right to receive the following services for the defined period specified on theSoftware package (if the Software was acquired on a physical medium) or specified during acquisition (if theSoftware was acquired via the Internet):- Updates of the Software via the Internet when and as the Rightholder publishes them on its website or

    through other online services. ny Updates that you may receive become part of the Software and theterms and conditions of this Agreement apply to them;

    -Technical Support via the Internet and Technical Support telephone hotline.

    3. Activation and Term

    3.1. If You modify Your Computer or make changes to other vendors software installed on it, You may be requiredby the Rightholder to repeat activation of the Software or license key file installation. The Rightholder reservesthe right to use any means and verification procedures to verify the validity of the License and/or legality of acopy of the Software installed and/or used on Your Computer.

    3.2. If the Software was acquired on a physical medium, the Software can be used, upon your acceptance of thisAgreement, for the period that is specified on the package commencing upon acceptance of this Agreement oras specified in additional agreement.

    3.3. If the Software was acquired via the Internet, the Software can be used, upon your acceptance of thisAgreement, for the period that was specified during acquisition or as specified in additional agreement.

    3.4. You have the right to use a trial version of the Software as provided in Clause 2.1 without any charge for the

    single applicable evaluation period (30 days) from the time of the Software activation according to thisAgreement provided that the trial version does not entitle You Updates and Technical support via the Internetand Technical support telephone hotline.

    3.5. Your License to Use the Software is limited to the period of time as specified in Clauses 3.2 or 3.3 (asapplicable) and the remaining period can be viewed via means described in User Manual.

    3.6. If You have acquired the Software that is intended to be used on more than one Computer then Your License toUse the Software is limited to the period of time starting from the date of activation of the Software or license keyfile installation on the first Computer.

    3.7. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of anybreach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time withoutnotice to You be entitled to terminate this License to use the Software without refunding the purchase price orany part thereof.

    3.8. You agree that in using the Software and in using any report or information derived as a result of using thisSoftware, you will comply with all applicable international, national, state, regional and local laws andregulations, including, without limitation, privacy, copyright, export control and obscenity law.

    3.9. Except as otherwise specifically provided herein, you may not transfer or assign any of the rights granted to youunder this Agreement or any of your obligations pursuant hereto.

    4. Technical Support

    The Technical Support described in Clause 2.5 of this Agreement is provided to You when the latest Update of theSoftware is installed (except for a trial version of the Software).Technical support service:http://support.kaspersky.com

    5. Limitations

    5.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software ordisassemble or create derivative works based on the Software or any portion thereof with the sole exception of anon-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the

    Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, norpermit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicablelaw. Neither Softwares binary code nor source may be used or reverse engineered to re -create the program

    http://support.kaspersky.com/http://support.kaspersky.com/http://support.kaspersky.com/http://support.kaspersky.com/
  • 8/9/2019 Ks9.0 Mobile En

    5/200

    K A S P E R S K Y L A B E N D U S E R L I C E N S E A G R E E M E N T

    5

    algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or itssuppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatictermination of this Agreement and the License granted hereunder and may result in criminal and/or civilprosecution against You.

    5.2. You shall not transfer the rights to use the Software to any third party except as set forth in additionalagreement.

    5.3. You shall not provide the activation code and/or license key file to third parties or allow third parties access to

    the activation code and/or license key which are deemed confidential data of Rightholder and you shall exercisereasonable care in protecting the activation code and/or license key in confidence provided that you can transferthe activation code and/or license key to third parties as set forth in additional agreement.

    5.4. You shall not rent, lease or lend the Software to any third party.5.5. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats

    described in the User Manual.5.6. The Rightholder has the right to block the key file or to terminate Your License to use the Software in the event

    You breach any of the terms and conditions of this Agreement and without any refund to You.5.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support

    specified in Clause 4 of this Agreement and You dont have the right to transfer the license or the rights to usethe Software to any third party.

    6. Limited Warranty and Disclaimer

    6.1. The Rightholder guarantees that the Software will substantially perform according to the specifications anddescriptions set forth in the User Manual provided however that such limited warranty shall not apply to thefollowing: (w) Your Computers deficiencies and related infringement for which Rightholders expressly disclaimsany warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect;improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failuresor surges; casualty; alteration, non-permitted modification, or repairs by any party other than Rightholder; or anyother third parties or Your actions or causes beyond Rightholders reasonable control; (y) any defect not madeknown by You to Rightholder as soon as practical after the defect first appears; and (z) incompatibility caused byhardware and/or software components installed on Your Computer.

    6.2. You acknowledge, accept and agree that no software is error free and You are advised to back-up theComputer, with frequency and reliability suitable for You.

    6.3. You acknowledge, accept and agree that Rightholder is not responsible or liable for data deletion authorized byYou. The mentioned data may include any personal or confidential information.

    6.4. The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of theterms described in the User Manual or in this Agreement.

    6.5. The Rightholder does not guarantee that the Software will work correctly if You do not regularly downloadUpdates specified in Clause 2.5 of this Agreement.

    6.6. The Rightholder does not guarantee protection from the threats described in the User Manual after theexpiration of the period specified in Clauses 3.2 or 3.3 of this Agreement or after the License to use the Softwareis terminated for any reason.

    6.7. THE SOFTWARE IS PROVIDED "AS IS" AND THE RIGHTHOLDER MAKES NO REPRESENTATION ANDGIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY,CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED ORLIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY,CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE,COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUTLIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORYQUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALLFAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE

    SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, ANDRESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THERIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILLBE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWAREWILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THERIGHTHOLDER .

    7. Exclusion and Limitation of Liability

    TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITSPARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGESWHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OROTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGEAND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY,DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FORANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THEUSE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR

  • 8/9/2019 Ks9.0 Mobile En

    6/200

    U S E R G U I D E

    6

    OTHER SERVICES, INFORMATON, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OROTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTIONWITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT(INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANYBREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITSPARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OFSUCH DAMAGES.

    YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABILE, THELIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THESOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED THEFEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE).

    NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY.FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BEEXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION ORLIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAININGDISCLAIMERS, EXCLUSIONS AND LIMITATIONS.

    8. GNU and Other Third Party Licenses

    The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU GeneralPublic License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modifyand redistribute certain programs, or portions thereof, and have access to the source code (Open Source Software). Ifsuch licenses require that for any software, which is distributed to someone in an executable binary format, that thesource code also be made available to those users, then the source code should be made available by sending therequest to [email protected] or the source code is supplied with the Software. If any Open Source Softwarelicenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that arebroader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictionsherein.

    9. Intellectual Property Ownership

    9.1 You agree that the Software and the authorship, systems, ideas, methods of operation, documentation andother information contained in the Software, are proprietary intellectual property and/or the valuable trade

    secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protectedby civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the RussianFederation, European Union and the United States, as well as other countries and international treaties. ThisAgreement does not grant to You any rights to the intellectual property including any the Trademarks or ServiceMarks of the Rightholder and/or its partners (Trademarks). You may use the Trademarks only insofar as toidentify printed output produced by the Software in accordance with accepted trademark practice, includingidentification of the Trademark owners name. Such use of any Trademark does not give you any rights ofownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest inand to the Software, including without limitation any error corrections, enhancements, Updates or othermodifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents,trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or useof the Software does not transfer to you any title to the intellectual property in the Software, and you will notacquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Softwaremade hereunder must contain the same proprietary notices that appear on and in the Software. Except asstated herein, this Agreement does not grant you any intellectual property rights in the Software and youacknowledge that the License, as further defined herein, granted under this Agreement only provides you with aright of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights notexpressly granted to you in this Agreement.

    9.2 You acknowledge that the source code, activation code and/or license key file for the Software are proprietary tothe Rightholder and constitutes trade secrets of the Rightholder. You agree not to modify, adapt, translate,reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software inany way.

    9.3 You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices orother proprietary notices on any copies of the Software.

    10. Governing Law; Arbitration

    This Agreement will be governed by and construed in accordance with the laws of the Russian Federation withoutreference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention

    on Contracts for the International Sale of Goods, the application of which is expressly excluded. Any dispute arising out ofthe interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by directnegotiation, be settled by in the Tribunal of International Commercial Arbitration at the Russian Federation Chamber of

    mailto:[email protected]:[email protected]:[email protected]
  • 8/9/2019 Ks9.0 Mobile En

    7/200

    K A S P E R S K Y L A B E N D U S E R L I C E N S E A G R E E M E N T

    7

    Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final andbinding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Section 10 shall prevent a Party from seeking or obtaining equitable relief from a court ofcompetent jurisdiction, whether before, during or after arbitration proceedings.

    11. Period for Bringing Actions

    No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party heretomore than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an actionfor infringement of intellectual property rights may be brought within the maximum applicable statutory period.

    12. Entire Agreement; Severability; No Waiver

    This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements,proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of thisAgreement. You acknowledge that you have read this Agreement, understand it and agree to be bound by its terms. Ifany provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for anyreason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, andthe entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effectto the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. Nowaiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized

    representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute awaiver of any prior, concurrent or subsequent breach. Rightholders failure to insist upon or enforce strict performance ofany provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.

    13. Rightholder Contact Information

    Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason,please contact our Customer Service Department at:

    Kaspersky Lab ZAO, 10 build. 1, 1st

    Volokolamsky ProezdMoscow, 123060Russian FederationTel: +7-495-797-8700Fax: +7-495-645-7939

    E-mail:[email protected] site:www.kaspersky.com

    1997-2010 Kaspersky Lab ZAO. All Rights Reserved. The Software and any accompanying documentation arecopyrighted and protected by copyright laws and international copyright treaties, as well as other intellectual propertylaws and treaties.

    mailto:[email protected]:[email protected]:[email protected]://www.kaspersky.com/http://www.kaspersky.com/http://www.kaspersky.com/http://www.kaspersky.com/mailto:[email protected]
  • 8/9/2019 Ks9.0 Mobile En

    8/200

    8

    TABLE OF CONTENTS

    KASPERSKY LAB END USER LICENSE AGREEMENT .............................................................................................. 3KASPERSKY MOBILE SECURITY 9.0 ....................................................................................................................... 13

    Obtaining information about the application ........................................................................................................... 14Information sources for further research .......................................................................................................... 14Contacting the Sales Department .................................................................................................................... 15Discussion of Kaspersky Lab applications on the Web forum .......................................................................... 15

    What's new in Kaspersky Mobile Security 9.0........................................................................................................ 15Hardware and software requirements .................................................................................................................... 16Distribution kit ........................................................................................................................................................ 16

    KASPERSKY MOBILE SECURITY 9.0 FOR SYMBIAN OS ....................................................................................... 17Installing Kaspersky Mobile Security 9.0 ................................................................................................................ 17Uninstalling the application .................................................................................................................................... 18Updating the application version 8.0 to version 9.0 ............................................................................................... 21Getting started ....................................................................................................................................................... 22

    Activating the application.................................................................................................................................. 22Entering the secret code .................................................................................................................................. 26Starting the application ..................................................................................................................................... 27Updating the application's databases ............................................................................................................... 27Scanning the device for viruses ....................................................................................................................... 27Viewing information about the application ........................................................................................................ 28

    Managing the license ............................................................................................................................................. 28About the License Agreement .......................................................................................................................... 28About Kaspersky Mobile Security l icenses ....................................................................................................... 29About Kaspersky Mobile Security key files ....................................................................................................... 29Viewing license information .............................................................................................................................. 30Renewing the license ....................................................................................................................................... 30

    Application interface............................................................................................................................................... 33Protection icon ................................................................................................................................................. 33Protection status window.................................................................................................................................. 33Application tabs ................................................................................................................................................ 34Application menu .............................................................................................................................................. 35

    File system protection ............................................................................................................................................ 36About Protection ............................................................................................................................................... 36Enabling and disabling the Protection .............................................................................................................. 36Configuring the protection area ........................................................................................................................ 37Selecting the action to be performed on detected objects ................................................................................ 38Restoring default protection settings ................................................................................................................ 39

    Scanning the device .............................................................................................................................................. 39About scanning the device ............................................................................................................................... 40Starting a scan manually .................................................................................................................................. 40Starting a scheduled scan ................................................................................................................................ 42Selection of object type to be scanned ............................................................................................................. 43Selecting the action to be performed on detected objects ................................................................................ 44Configuring archive scans ................................................................................................................................ 46Restoring default device scan settings ............................................................................................................. 47

  • 8/9/2019 Ks9.0 Mobile En

    9/200

    T A B L E O F C O N T E N T S

    9

    Quarantine of possibly infected objects ................................................................................................................. 47About Quarantine ............................................................................................................................................. 48Viewing quarantined objects ............................................................................................................................ 48Restoring objects from Quarantine ................................................................................................................... 49Deleting objects from Quarantine ..................................................................................................................... 49

    Filtering of incoming calls and SMS messages ...................................................................................................... 49About Anti-Spam .............................................................................................................................................. 50Anti-Spam modes ............................................................................................................................................. 51Changing the Anti-Spam mode ........................................................................................................................ 51Creating a Black List ........................................................................................................................................ 52Creating a White List ........................................................................................................................................ 55Responding to SMS messages and calls from contacts not in the phone book ............................................... 58Responding to SMS messages from non-numeric numbers ............................................................................ 59Selecting a response to incoming SMS messages .......................................................................................... 60Selecting a response to incoming calls ............................................................................................................ 61

    Restricting outgoing calls and SMS messages. Parental Control .......................................................................... 62About Parental Control ..................................................................................................................................... 62Parental Control modes.................................................................................................................................... 63Changing the Parental Control mode ............................................................................................................... 63Creating a Black List ........................................................................................................................................ 64Creating a White List ........................................................................................................................................ 67

    Data protection in the event of loss or theft of the device ...................................................................................... 70About Anti-Theft ............................................................................................................................................... 70Blocking the device .......................................................................................................................................... 71Deleting personal data ..................................................................................................................................... 73Creating a list of objects to be deleted ............................................................................................................. 75 Monitoring the replacement of a SIM card on the device ................................................................................. 76Determining the device's geographical coordinates ......................................................................................... 77Remote start of the Anti-Theft functions ........................................................................................................... 79

    Hiding personal data .............................................................................................................................................. 80Privacy Protection ............................................................................................................................................ 81Privacy Protection modes ................................................................................................................................. 81Changing Privacy Protection modes ................................................................................................................ 81Automatic start of Privacy Protection ............................................................................................................... 82Remote start of Privacy Protection ................................................................................................................... 83Creation of a list of protected contacts ............................................................................................................. 85Selection of protection objects: Privacy Protection ........................................................................................... 87Filtering network activity Firewall ........................................................................................................................... 88About Firewall .................................................................................................................................................. 88Firewall security levels ..................................................................................................................................... 89Selecting the Firewall's security level ............................................................................................................... 89Notification of connection attempt .................................................................................................................... 90

    Encrypting personal data ....................................................................................................................................... 91About Encryption .............................................................................................................................................. 91Data encryption ................................................................................................................................................ 92Data decryption ................................................................................................................................................ 93Blocking access to encrypted data ................................................................................................................... 94

    Updating the application's databases .................................................................................................................... 95About updating the application's databases ..................................................................................................... 95

  • 8/9/2019 Ks9.0 Mobile En

    10/200

    U S E R G U I D E

    10

    Viewing database information .......................................................................................................................... 96Starting updates manually ................................................................................................................................ 97Starting scheduled updates .............................................................................................................................. 97Updating while roaming .................................................................................................................................... 98Configuration of Internet connection settings ................................................................................................... 99

    Application logs .................................................................................................................................................... 100About logs ...................................................................................................................................................... 100Viewing Log records ....................................................................................................................................... 101Deleting Log records ...................................................................................................................................... 101

    Configuring additional settings ............................................................................................................................. 102Changing the secret code .............................................................................................................................. 102Displaying hints .............................................................................................................................................. 102Configuring sound notifications ...................................................................................................................... 103Managing the backlight .................................................................................................................................. 103Displaying the status window ......................................................................................................................... 104Displaying the protection icon ........................................................................................................................ 105

    KASPERSKY MOBILE SECURITY 9.0 FOR MICROSOFT WINDOWS MOBILE ..................................................... 107Installing Kaspersky Mobile Security 9.0 .............................................................................................................. 107Uninstalling the application .................................................................................................................................. 108Updating version 8.0 to version 9.0 ..................................................................................................................... 110Getting started ..................................................................................................................................................... 111

    Activating the application................................................................................................................................ 111Entering the secret code ................................................................................................................................ 114Starting the application ................................................................................................................................... 115Updating the application's databases ............................................................................................................. 115Scanning the device for viruses ..................................................................................................................... 115Viewing information about the application ...................................................................................................... 116Managing the license ..................................................................................................................................... 116

    Application interface............................................................................................................................................. 121Protection status window................................................................................................................................ 121Application menu ............................................................................................................................................ 123

    File system protection .......................................................................................................................................... 124About Protection ............................................................................................................................................. 124Enabling and disabling the Protection ............................................................................................................ 125Selecting the action to be performed on detected objects .............................................................................. 126

    Scanning the device ............................................................................................................................................ 127About on-demand scans ................................................................................................................................ 128Starting a scan manually ................................................................................................................................ 128Starting a scheduled scan .............................................................................................................................. 130Selection of object type to be scanned ........................................................................................................... 131Configuring archive scans .............................................................................................................................. 132Selecting the action to be performed on detected objects .............................................................................. 132

    Quarantining malware objects ............................................................................................................................. 134About Quarantine ........................................................................................................................................... 134Viewing quarantined objects .......................................................................................................................... 134Restoring objects from Quarantine ................................................................................................................. 135Deleting objects from Quarantine ................................................................................................................... 135Filtering of incoming calls and SMS messages .................................................................................................... 136

  • 8/9/2019 Ks9.0 Mobile En

    11/200

    T A B L E O F C O N T E N T S

    11

    About Anti-Spam ............................................................................................................................................ 136Anti-Spam modes ........................................................................................................................................... 137Changing the Anti-Spam mode ...................................................................................................................... 138Creating a Black List ...................................................................................................................................... 138Creating a White List ...................................................................................................................................... 141Responding to SMS messages and calls from contacts not in the phone book ............................................. 145Responding to SMS messages from non-numeric numbers .......................................................................... 146Selecting a response to incoming SMS messages ........................................................................................ 146Selecting a response to incoming calls .......................................................................................................... 147

    Restricting outgoing calls and SMS messages. Parental Control ........................................................................ 148About Parental Control ................................................................................................................................... 149Parental Control modes.................................................................................................................................. 149Enabling / disabling Parental Control ............................................................................................................. 149Creating a Black List ...................................................................................................................................... 150Creating a White List ...................................................................................................................................... 153

    Data protection in the event of loss or theft of the device .................................................................................... 156About Anti-Theft ............................................................................................................................................. 157Blocking the device ........................................................................................................................................ 157Deleting personal data ................................................................................................................................... 159Creating the list of deleted data ...................................................................................................................... 161Monitoring the replacement of a SIM card on the device ............................................................................... 163Determining the device's geographical coordinates ....................................................................................... 164Remote start of the Anti-Theft functions ......................................................................................................... 166

    Hiding personal data ............................................................................................................................................ 167Privacy Protection .......................................................................................................................................... 167Privacy Protection modes ............................................................................................................................... 167Enabling / disabling Privacy Protection .......................................................................................................... 168Automatic start of Privacy Protection ............................................................................................................. 169Remote start of Privacy Protection ................................................................................................................. 170Creation of a list of protected contacts ........................................................................................................... 172Selection of protection objects: Privacy Protection ......................................................................................... 174

    Filtering network activity Firewall ......................................................................................................................... 175About Firewall ................................................................................................................................................ 176Enabling / disabling the Firewall ..................................................................................................................... 176Selecting the Firewall's security level ............................................................................................................. 176

    Encrypting personal data ..................................................................................................................................... 177About Encryption ............................................................................................................................................ 177Data encryption .............................................................................................................................................. 178Data decryption .............................................................................................................................................. 179Blocking access to encrypted data ................................................................................................................. 180

    Updating the application's databases .................................................................................................................. 182About updating the application's databases ................................................................................................... 182Viewing database information ........................................................................................................................ 183Manual updating ............................................................................................................................................. 184Scheduled updating ....................................................................................................................................... 185Updating while roaming .................................................................................................................................. 186

    Application logs .................................................................................................................................................... 187About logs ...................................................................................................................................................... 187Viewing Log records ....................................................................................................................................... 187

  • 8/9/2019 Ks9.0 Mobile En

    12/200

    U S E R G U I D E

    12

    Deleting Log records ...................................................................................................................................... 188Configuring additional settings ............................................................................................................................. 189

    Changing the secret code .............................................................................................................................. 189Displaying hints .............................................................................................................................................. 190Configuring sound notifications ...................................................................................................................... 191

    CONTACTING THE TECHNICAL SUPPORT SERVICE .......................................................................................... 192GLOSSARY ............................................................................................................................................................... 193KASPERSKY LAB ..................................................................................................................................................... 195CRYPTOEX OOO ..................................................................................................................................................... 196INDEX ....................................................................................................................................................................... 197

  • 8/9/2019 Ks9.0 Mobile En

    13/200

    13

    KASPERSKY MOBILE SECURITY 9.0

    Kaspersky Mobile Security 9.0 ensures protection of mobile devices running Symbian OS and Microsoft Windows Mobile

    operating systems against known and new threats, unsolicited calls and SMS messages. The application allows tomanage outgoing SMS messages, network activity, and protect confidential information from unauthorized access. Everytype of threat is processed in separate components of the program. This allows to fine-tune the application settingsdepending on user needs.

    Kaspersky Mobile Security 9.0 includes the following protection components:

    Protection. Protects the mobile device's file system against infections. The Protection component is initiatedwhen starting the operating system, it is always in the device's operating memory and verifies all open, savedand started files on the device, including on memory cards. Furthermore, the Protection verifies all incoming filesfor the existence of known viruses. You can continue working with file if the object is not infected or has beensuccessfully disinfected.

    Scanning the device. Helps to find and neutralize malicious objects on your device. You should scan the

    device regularly to prevent the spread of malicious objects that were not discovered by the Protection.

    Anti-Spam. Verifies all incoming SMS messages and calls for spam. The component allows blocking all SMSmessages and calls which are regarded as unwanted.

    Parental Control. Checks outgoing messages and prevents the sending of SMS messages and / or calls topreviously specified subscriber numbers.

    Anti-Theft. Protects the information on the device from unauthorized access, when it is lost or stolen. Thiscomponent allows the blocking of the device in the event of theft or loss, deletes confidential information andcontrols SIM card usage and determines the geographical coordinates of the device (if a mobile device isequipped with a GPS receiver).

    Privacy Protection. Hides confidential user information when the device is used by other persons. The

    component allows the displaying or hiding of all information related to specified subscriber numbers, for instancedetails in the Contact list, SMS correspondence or entries in the calls log. The component allows the hiding ofthe delivery of incoming calls and SMS messages from favorite numbers.

    Firewall. Checks the network connections on your mobile device. The component allows setting of connectionswhich are allowed or blocked.

    Encryption. Protects information from being viewed by third parties even if access to the device is achieved.The component encrypts any amount of non-system folders which are in the device memory or on a storagecard. The data in the folder become available only after the secret code is entered.

    Furthermore, the application contains a set of service features. They are designed to keep the application up-to-date,enhance its performance and help users.

    Updating the application's databases. This function keeps Kaspersky Mobile Security 9.0 databases up to date.

    Protection status. The status of the program's components is displayed on screen. On the basis of theinformation presented, you can assess the current status of protection of your device.

    Event log. Each of the application components has its own event log that includes the information on thecomponent operation (for instance, completed operation, data on a blocked object, scan report, updates etc.).

    License. When you purchase Kaspersky Mobile Security 9.0, a license agreement is made between you andKaspersky Lab, according to which you can use the application and access to the application databases updateand Technical Support Service within a certain time. The terms of use and other information required for full-feature application operation are indicated in the license.

    Using the License option, you can get a detailed report on the current license as well as renew it.

  • 8/9/2019 Ks9.0 Mobile En

    14/200

    U S E R G U I D E

    14

    Kaspersky Mobile Security 9.0 is not intended for backup and restore.

    IN THIS SECTION

    Obtaining information about the application ................................................................................................................... .14

    What's new in Kaspersky Mobile Security 9.0 ................................................................................................................ .15

    Hardware and software requirements............................................................................................................................. .16

    Distribution kit ................................................................................................................................................................. .16

    OBTAINING INFORMATION ABOUT THE APPLICATION

    If you have any questions regarding purchasing, installing or using Kaspersky Mobile Security, answers are readilyavailable.

    Kaspersky Lab provides several sources of information about the application, from which you can choose the mostsuitable with regard to the question's importance and urgency.

    IN THIS SECTION

    Information sources for further research......................................................................................................................... .14

    Contacting the Sales Department ................................................................................................................................... .15

    Discussion of Kaspersky Lab applications on the Web forum ........................................................................................ .15

    INFORMATION SOURCES FOR FURTHER RESEARCH

    You can view the following sources of information about the application:

    the Kaspersky Lab application website;

    the application's Knowledge Base page at the Technical Support Service website;

    the installed Help system and hints;

    the installed application documentation.

    Page on Kaspersky Lab website

    http://www.kaspersky.com/kaspersky_mobile_security

    Use this page to obtain general information about Kaspersky Mobile Security's features and options. You canpurchase Kaspersky Mobile Security at our E-Store.

    The application's page at the Technical Support Service website (Knowledge Base).

    http://support.kaspersky.com

    This page contains articles written by experts from the Technical Support Service.

    http://www.kaspersky.com/kaspersky_mobile_securityhttp://support.kaspersky.com/http://support.kaspersky.com/http://www.kaspersky.com/kaspersky_mobile_security
  • 8/9/2019 Ks9.0 Mobile En

    15/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0

    15

    These articles contain useful information, recommendations, and the Frequently Asked Questions (FAQ) page, andcover purchasing, installing and using Kaspersky Mobile Security. They are arranged in topics, such as Work withkey files, Database updates and Troubleshooting. The articles aim to answer questions about this KasperskyMobile Security, as well as other Kaspersky Lab products. They may also contain news from the Technical SupportService.

    The installed Help system

    The application installation package includes both full and context-sensitive help files.

    To open the context help, open the corresponding tab and select Help.

    The installed Documentation

    The User Guide contains detailed information about the application's functions and how to use them, together withadvice and recommendations about configuring the application.

    The documents are included in PDF format in the Kaspersky Mobile Security distribution package.

    You can also download these documents in electronic format from Kaspersky Lab's website.

    CONTACTING THE SALES DEPARTMENT

    If you have questions about selecting or purchasing Kaspersky Mobile Security, or extending your license, please phonethe Sales Department specialists in our Central Office in Moscow, at:

    +7 (495) 797-87-00, +7 (495) 645-79-39, +7 (495) 956-70-00

    The service is provided in Russian or English.

    You can also send your questions to the Sales Department by email, [email protected].

    DISCUSSION OF KASPERSKY LAB APPLICATIONS ON THEWEB

    FORUM

    If your question does not require an urgent answer, you can discuss it with Kaspersky Lab's specialists and other users ofKaspersky Lab's anti-virus applications in our forum athttp://forum.kaspersky.com.

    In the forum you can view existing discussions, leave your comments, and create new topics, or use the search enginefor specific enquiries.

    WHAT'S NEW IN KASPERSKY MOBILE SECURITY 9.0

    Below is a detailed view of the novelties with Kaspersky Mobile Security 9.0.

    New protection:

    Access to the application is protected by a secret code.

    The Kaspersky Mobile Security 9.0 package includes the Privacy Protection component, which preventsunauthorized access to the user's personal data during temporary use by unauthorized persons. The componenthides the data events for a set list of numbers. Privacy Protection in no way reveals its activity, meaning thatthere is no indication of the existence of the hidden data on the device.

    mailto:[email protected]:[email protected]:[email protected]://forum.kaspersky.com/http://forum.kaspersky.com/http://forum.kaspersky.com/http://forum.kaspersky.com/mailto:[email protected]
  • 8/9/2019 Ks9.0 Mobile En

    16/200

    U S E R G U I D E

    16

    In the updated Encryption module, the blocking of access to any amount of files stored in the device's memoryor on a storage card is implemented. The component protects confidential data in encrypted mode andautomatically blocks access on the expiry of a set period of time.

    A new approach to managing the protection of the device is implemented: the user can enable and disable anycomponents depending on the required functionality.

    It is now possible to purchase an activation code and renew the license online directly from the mobile device.

    HARDWARE AND SOFTWARE REQUIREMENTS

    Kaspersky Mobile Security 9.0 is designed for installation on mobile devices running one of the following operatingsystems:

    Symbian OS 9.1, 9.2, 9.3 and 9.4 Series 60 UI.

    Microsoft Windows Mobile 5.0, 6.0, 6.1 or 6.5.

    DISTRIBUTION KIT

    You can purchase Kaspersky Mobile Security online, in which case the application's distribution kit and documentationare provided in electronic form. Kaspersky Mobile Security can be also purchased from all good phone and technologyretail stores. For detailed information about purchasing the application and receiving the distribution kit, please contactour sales department [email protected].

    mailto:[email protected]:[email protected]:[email protected]:[email protected]
  • 8/9/2019 Ks9.0 Mobile En

    17/200

    17

    KASPERSKY MOBILE SECURITY 9.0 FOR

    SYMBIAN OS

    This section contains a description of the operation of Kaspersky Mobile Security 9.0 for mobile devices running Symbianversion 9.1, 9.2, 9.3 and 9.4 Series 60 UI.

    IN THIS SECTION

    Installing Kaspersky Mobile Security 9.0 ........................................................................................................................ .17

    Uninstalling the application ............................................................................................................................................. .18

    Updating the application version 8.0 to version 9.0 ........................................................................................................ .21

    Getting started ................................................................................................................................................................ .22

    Managing the license...................................................................................................................................................... .28

    Application interface ....................................................................................................................................................... .33

    File system protection .................................................................................................................................................... .36

    Scanning the device ....................................................................................................................................................... .39

    Quarantine of possibly infected objects .......................................................................................................................... .47

    Filtering of incoming calls and SMS messages .............................................................................................................. .49

    Restricting outgoing calls and SMS messages. Parental Control ................................................................................... .62

    Data protection in the event of loss or theft of the device ............................................................................................... .70

    Hiding personal data....................................................................................................................................................... .80

    Filtering network activity. Firewall ................................................................................................................................... .88

    Encrypting personal data ................................................................................................................................................ .91

    Updating the application's databases ............................................................................................................................. .95

    Application logs ............................................................................................................................................................ .100

    Configuring additional settings ..................................................................................................................................... .102

    INSTALLING KASPERSKY MOBILE SECURITY 9.0

    The application is installed on a mobile device in several steps.

  • 8/9/2019 Ks9.0 Mobile En

    18/200

    U S E R G U I D E

    18

    To install Kaspersky Mobile Security 9.0:

    1. Connect the mobile device to the computer.

    For Nokia mobile devices, it is recommended to use the Nokia PC Suite application.

    2. Perform one of the following actions:

    If you have purchased the program on a CD, run the automatic Kaspersky Mobile Security 9.0 installationon the CD purchased.

    If you have purchased the distribution package on the Internet, copy it to the mobile device, using one ofthese methods:

    using the Nokia PC Suite application (for Nokia mobile devices);

    using a memory card.

    Start the installation using one of the following methods:

    from the Nokia PC Suite application (for Nokia mobile devices);

    open the sis archive containing the distribution package on your mobile device.

    A window confirming the installation opens.

    3. Confirm the installing of the application by pressing the Yes button.

    4. Review the additional information about the application, which includes name, version, and certificates. Thenpress Continue.

    If the language of the operating system does not match the language of Kaspersky Mobile Security 9.0, amessage is displayed on the screen. To proceed with the installation in the current language, p ress OK.

    5. Read the License Agreement text, which is concluded between you and Kaspersky Lab. If you agree to all termsof the agreement, press OK. Kaspersky Mobile Security 9.0 will then be installed on the device. If you do notagree to the terms of the License Agreement, press Cancel. Installation will be terminated.

    6. Confirm that there are no other anti-virus applications on the device by pressing OK.

    7. In order to complete the installation, restart the device.

    The application is installed with the parameters recommended by the experts of Kaspersky Lab.

    UNINSTALLING THE APPLICATION

    To uninstall Kaspersky Mobile Security 9.0:

    1. Decrypt the data on your device if it was encrypted with Kaspersky Mobile Security 9.0 (see the Datadecryption section on page93).

    2. Disable Privacy Protection (see the Privacy Protection modes section on page81).

  • 8/9/2019 Ks9.0 Mobile En

    19/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0 F O R S Y M B I A N OS

    19

    3. Close Kaspersky Mobile Security 9.0. To do this, select OptionsExit (see Figure below).

    Figure 1. Exiting the application

    4. Uninstall Kaspersky Mobile Security 9.0. To do this, perform the following actions:

    a. Open the devices main menu.

    b. Select the folderSettings Data mgr. App. mgr. (see Figure below).

    The application installation folder may vary depending on the mobile device model.

    Figure 2. Starting the Application manager

  • 8/9/2019 Ks9.0 Mobile En

    20/200

    U S E R G U I D E

    20

    c. Select from KMS 9.0 the list of applications and then select Options Remove (see Figure below).

    Figure 3. Removal of the application

    d. Confirm the uninstalling of the application by pressing the Yes button.

    e. Enter the secret code and press OK.

    f. Specify whether or not to keep the program settings and objects in quarantine:

    If you wish to save the application's parameters and objects to the quarantine, check the boxesopposite the parameters required and then press OK (see Figure below).

  • 8/9/2019 Ks9.0 Mobile En

    21/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0 F O R S Y M B I A N OS

    21

    In order to uninstall the application completely, press Cancel.

    Figure 4. The list of settings to be saved

    5. Restart the device in order to complete the uninstalling of the application.

    UPDATING THE APPLICATION VERSION 8.0 TO VERSION

    9.0

    If Kaspersky Mobile Security 8.0 is already installed on your mobile device, you can update it to Kaspersky MobileSecurity 9.0.

    Before updating the application version, disable Encryption decrypt all data (see Data decryption section on page93).

    To update the program version:

    1. Close the current version of Kaspersky Mobile Security. To do this, press Options Exit.

    2. Copy the application's distribution package to your device, using one of these methods:

    from the Kaspersky Lab website;

    using the Nokia PC Suite application (for Nokia mobile devices);

    using a memory card.

    3. Start the Kaspersky Mobile Security 9.0 distribution package on the device.

    4. Confirm the installation of the application by pressing the Yes button.

    5. Review the additional information about the application, which includes name, version, and certificates. Thenpress Continue.

    6. Confirm the update of the application version by pressing OK.

  • 8/9/2019 Ks9.0 Mobile En

    22/200

    U S E R G U I D E

    22

    7. Enter the secret code set in the previous version of the application.

    8. Read the license agreement carefully. If you agree to its terms, press OK. If you do not agree to the terms of theLicense Agreement, press Cancel. Installation will be terminated.

    9. Confirm that there are no other anti-virus applications on the device. To do this, press OK.

    10. Delete the configured settings of the previous application version. To do this, press Delete.

    The settings can only be kept when moving from one version to another within the same product generation.The parameters of 8.0 application version are incompatible with the 9.0 version.

    The installation of Kaspersky Mobile Security 9.0 starts.

    If the validity period of the Kaspersky Mobile Security 8.0 license has not expired, enable program version 9.0using the activation code of version 8.0 (see the Activating the application section on page22).

    11. In order to complete the installation, restart the device.

    GETTING STARTED

    This section contains information about how to prepare Kaspersky Mobile Security 9.0 for operation (activating it andcreating a secret code), run the application, update its databases and scan the device for viruses.

    IN THIS SECTION

    Activating the application ................................................................................................................................................ .22

    Entering the secret code ................................................................................................................................................. .26

    Starting the application ................................................................................................................................................... .27

    Updating the application's databases ............................................................................................................................. .27

    Scanning the device for viruses ...................................................................................................................................... .27

    Viewing information about the application ...................................................................................................................... .28

    ACTIVATING THE APPLICATION

    In order to use Kaspersky Mobile Security 9.0, it must be enabled. During the process of its activation, an activation codemust be entered which is verified and registered on the servers of Kaspersky Lab. Subsequently, the application obtainsand installs the key file.

    You can obtain an activation code as follows:

    online (see Purchasing an activation code online section on page25), by exiting the Kaspersky Mobile Security9.0 application and going to the website;

    at the websitehttp://www.kaspersky.com/store;

    from Kaspersky Lab distributors.

    To activate Kaspersky Mobile Security 9.0 on your device, you must have an Internet connection configured.

    http://www.kaspersky.com/storehttp://www.kaspersky.com/storehttp://www.kaspersky.com/storehttp://www.kaspersky.com/store
  • 8/9/2019 Ks9.0 Mobile En

    23/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0 F O R S Y M B I A N OS

    23

    Before activating the application, make sure that the device's system date settings are correct.

    You can activate the application as follows:

    Activate trial license. Select this activation method if you wish to get familiar with the application functions and

    purchase its commercial version later. A free key file will be installed during activation. The validity period of thetrial license will be displayed on screen after completing the activation. Once the validity period of the triallicense expires, the application's functions will be limited. Only the following features will be available:

    Activating the application;

    managing the application license;

    Kaspersky Mobile Security 9.0 Help system;

    disabling Encryption;

    disabling Privacy Protection.

    It is impossible to reactivate a trial version.

    Activate commercial license. Select this method if you have purchased the commercial version of theapplication and obtained an activation code. After entering the activation code, the key file is obtained andinstalled which provides access to the application's full range of functions. The validity period will be displayedon the device's screen. After expiry of the validity period, the application's functions will be limited; theapplication will no longer be updated.

    IN THIS SECTION

    Activating the commercial version .................................................................................................................................. .23

    Activating the trial version ............................................................................................................................................... .24

    Purchasing an activation code online ............................................................................................................................. .25

    ACTIVATING THE COMMERCIAL VERSION

    To activate the commercial version of the application with the activation code:

    1. Open the devices main menu.

    2. Select the folderApplicationsInstallations KMS 9.0.

    The application installation folder may vary depending on the mobile device model.

    3. Start the application. To do this, press Options Open.

    This will open the KMS 9.0 window.

    4. Select OptionsEnter code.

    The Kaspersky Mobile Security 9.0 activation window opens.

  • 8/9/2019 Ks9.0 Mobile En

    24/200

    U S E R G U I D E

    24

    5. Enter the code into the four fields. The activation code consists of Latin alphabet characters and digits. The code

    is case-insensitive. After entering the activation code, select Options Activate (see Figure below).

    Figure 5. Activating a commercial version of the application

    6. Confirm the connection to the Internet by pressing Yes.

    7. Select the access point via which the Kaspersky Lab activation server will be connected to.

    The application will send a query to Kaspersky Lab's activation server. Once the activation code is verified, theapplication downloads and installs the key file.

    If the activation code you entered is invalid for any reason, an information message is displayed on the screen.In such a case, we recommend checking that the entered activation code is correct and contact the softwarevendor you have purchased Kaspersky Mobile Security 9.0 from.

    If errors occurred when connecting to the server and it was not possible to obtain a license key, the activation iscanceled. In this event, it is recommended to verify the parameters for connecting to the Internet. If it was notpossible to rectify the errors, contact Technical Support.

    8. Go to entering the secret code (see Entering the secret code section on page26).

    ACTIVATING THE TRIAL VERSION

    To activate the trial license of Kaspersky Mobile Security 9.0:

    1. Open the devices main menu.

    2. Select the folderApplicationsInstallations KMS 9.0.

    The application installation folder may vary depending on the mobile device model.

    3. Start the application. To do this, press Options Open.

    This will open the KMS 9.0 window.

  • 8/9/2019 Ks9.0 Mobile En

    25/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0 F O R S Y M B I A N OS

    25

    4. Select OptionsTrial version (see Figure below).

    Figure 6. Activating a commercial version of the application

    5. Confirm the connection to the Internet by pressing Yes.

    6. Select the access point via which the server will be connected to and then press OK.

    The application will send a query to Kaspersky Lab's activation server, and will then download and install the keyfile.

    If errors arose when connecting to the server and it was not possible to obtain a license key, contact TechnicalSupport.

    7. Go to entering the secret code (see Entering the secret code section on page26).

    PURCHASING AN ACTIVATION CODE ONLINE

    In order to purchase an activation code for the application online, perform the following steps:

    1. Open the devices main menu.

    2. Select the folderApplicationsInstallations KMS 9.0.

    The application installation folder may vary depending on the mobile device model.

    3. Start the application. To do this, press Options Open.

    This will open the KMS 9.0 window.

    4. Select OptionsBuy online.

    This will open the Buy online window.

  • 8/9/2019 Ks9.0 Mobile En

    26/200

    U S E R G U I D E

    26

    5. Press Open (see Figure below).

    Figure 7. Purchasing the activation code online

    The website opens where you are prompted to place an order to purchase the activation code online.

    6. Follow the step-by-step instructions.

    7. Once the purchase of the activation code is completed, go to the activation of the commercial version of theapplication (see the Activating the commercial version section on page23).

    ENTERING THE SECRET CODE

    After activating the program, you will be asked to enter your secret code. The secret codeprevents unauthorized accessto the application settings. You can later change the secret code installed.

    The secret code is requested in the following instances:

    for access to the application;

    for access to encrypted data;

    to enable / disable Privacy Protection;

    when sending a command with a special SMS message to start the following functions remotely: Block, DataWipe, SIM Watch function, GPS Find, Privacy Protection;

    when uninstalling the application.

    Please remember the secret code. If you forget it, it will be impossible to use the functions of Kaspersky MobileSecurity 9.0 or to obtain access to encrypted data and uninstall the application.

    You are advised to use a secret code consisting of at least 7 digits.

  • 8/9/2019 Ks9.0 Mobile En

    27/200

    K A S P E R S K Y M O B I L E SE C U R I T Y 9. 0 F O R S Y M B I A N OS

    27

    To enter the secret code:

    1. After activating the application enter in the Enter new code field the figures which will be your code.

    2. Re-enter the same code in the Confirm field.

    The code entered is automatically verified.

    3. If the code is deemed invalid according to the results of the verification, a warning message is displayed and theapplication requests confirmation. In order to use the code, press Yes. In order to create a new code, press No.

    4. To start using the application, press OK.

    STARTING THE APPLICATION

    To start Kaspersky Mobile Security 9.0:

    1. Open the devices main menu.

    2. Select the folderApplicationsApp. mgr. KMS 9.0.

    The application installation folder may vary depending on the mobile device model.

    3. Start the application. To do this, press Options Open.

    This will open the KMS 9.0 window.

    4. Enter the secret code and press OK.

    The application displays a window showing the current status of Kaspersky Mobile Security 9.0 (see the Protectionstatus window section on page33). To go to the application's functions, press OK.

    UPDATING THE APPLICATION'S DATABASES

    Kaspersky Mobile Security 9.0 scans for threats based on the application databases, which contain descriptions of all themalicious programs known to date and methods for neutralizing them and descriptions of other unwanted objects. By themoment of the application installation, databases included in the Kaspersky Mobile Security 9.0 installation package maybecome obsolete.

    We recommend you to update the applications databases immediately after the application installation.

    To update the application's databases, you must have an Internet connection configured on your mobile device.

    To start the database update process manually:

    1. Select the Update item in the Anti-Virus tab.

    This will open the Update window.

    2. Select the Update item.

    The application starts the process of updating the databases from the Kaspersky Lab server. Information on the updateprocess is displayed on the screen.

    SCANNING THE DEVICE FOR VIRUSES

    After installing the application, it is recommended to immediately run a scan of your mobile device for malware objects.

  • 8/9/2019 Ks9.0 Mobile En

    28/200

    U S E R G U I D E

    28

    The first scan is performed with the settings previously set by the Kaspersky Lab experts.

    To run a full scan of the device:

    1. Select the Scan item in the Anti-Virus tab.

    This will open the Scan window.

    2. Select Full s