ESET Mobile Security
Copyright ©2011 by ESET, spol. s r.o.
ESET Mobile Security was developed by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in
writing from the author.
ESET, spol. s r.o. reserves the right to change any of the
described application software without prior notice.
Customer Care: www.eset.com/support
REV. 2.5.2011
Contents
.....................................................3
1. Installation of ESET Mobile Security
.........................................................................3Minimum system requirements1.1
.........................................................................3Installation1.2
.......................................................................3Installation on your device1.2.1
.......................................................................3Installation using your computer1.2.2
.........................................................................4Uninstallation1.3
.....................................................52. Product activation
.........................................................................5Activation using login and password2.1
.........................................................................5Activation using registration key2.2
.....................................................63. Update
.........................................................................6Settings3.1
.....................................................74. On-access scanner
.........................................................................7Settings4.1
.....................................................85. On-demand scanner
.........................................................................8Running a whole device scan5.1
.........................................................................8Scanning a folder5.2
.........................................................................8General settings5.3
.........................................................................9Extensions settings5.4
.....................................................106. Threat found
.........................................................................10Quarantine6.1
.....................................................117. Anti-Theft
.........................................................................11Settings7.1
.....................................................138. Firewall
.........................................................................13Settings8.1
.....................................................159. Security audit
.........................................................................15Settings9.1
.....................................................1710. Antispam
.........................................................................17Settings10.1
.........................................................................17Whitelist / Blacklist10.2
.........................................................................18Locating spam messages10.3
.........................................................................18Deleting spam messages10.4
.....................................................1911. Remote administration
.........................................................................19Settings11.1
.....................................................2012. Viewing logs and statistics
.....................................................22
13. Troubleshooting and support
.........................................................................22Troubleshooting13.1
.......................................................................22Unsuccessful installation13.1.1
.......................................................................22Update failed13.1.2
.......................................................................22Downloading file timed out13.1.3
.......................................................................22Update file missing13.1.4
.......................................................................22Database file corrupted13.1.5
.........................................................................22Technical support13.2