ESET Mobile Security
Copyright ©2010 by ESET, spol. s.r.o.
ESET Mobile Security was developed by ESET,spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be
reproduced,stored in aretrieval systemor transmitted in
any formor by any means,electronic,mechanical,
photocopying,recording, scanning, or otherwise without
permission in writing fromthe author.
ESET, spol. s r.o.reserves the right to change any of the
described application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV.10/28/2010
Contents
..............................................31. Installation of ESET Mobile Security
....................................................................3Minimum system requirements1.1
....................................................................3Installation1.2
.......................................................................3Installation on your device1.2.1
.......................................................................3Installation using your computer1.2.2
....................................................................4Uninstallation1.3
..............................................52. Product activation
....................................................................5Activation using login and password2.1
....................................................................5Activation using registration key2.2
..............................................63. Update
....................................................................6Settings3.1
..............................................74. On-access scanner
....................................................................7Settings4.1
..............................................85. On-demand scanner
....................................................................8Running a whole device scan5.1
....................................................................8Scanning a folder5.2
....................................................................9General settings5.3
....................................................................9Extensions settings5.4
..............................................106. Threat found
....................................................................10Quarantine6.1
..............................................117. Anti-Theft
....................................................................11Settings7.1
..............................................138. Firewall
....................................................................13Settings8.1
..............................................149. Security audit
....................................................................14Settings9.1
..............................................1610. Antispam
....................................................................16Settings10.1
....................................................................16Whitelist / Blacklist10.2
....................................................................17Locating spam messages10.3
....................................................................17Deleting spam messages10.4
..............................................1811. Viewing logs and statistics
..............................................2012. Troubleshooting and support
....................................................................20Troubleshooting12.1
.......................................................................20Unsuccessful installation12.1.1
.......................................................................20Connection to update server failed12.1.2
.......................................................................20Timeout downloadingfile12.1.3
....................................................................20Technical support12.2