[. . . ] Kaspersky Mobile Security 9. 0 USER GUIDE PROGRAM VERSION: 9. 0 Dear User!We hope that this documentation will help you in your work and will provide answers regarding this software product. This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability pursuant to the laws of the Russian Federation. [. . . ] Information about the operation of the Firewall is entered in the application's log (see "Application logs" section on page 104). FIREWALL SECURITY LEVELS The operation of the Firewall is based on the security levels. The current security level determines which network protocols can be used to transfer information, and which of them are blocked. The following security levels are available: Off: any network activity is permitted. Only incoming connections are blocked: block incoming connections only. Outgoing connections using SSH, HTTP, HTTPS, IMAP, SMTP and POP3 protocols are allowed: block all incoming connections. Checking e-mails, viewing websites and downloading files is accessible Outgoing connections can only be established using SSH, HTTP, HTTPS, IMAP, SMTP, POP3 ports. Block all: block all network activity, except for updating the application anti-virus databases and renewing the license. You can change the Firewall's security level (see "Firewall security level selection" section on page 93). The current mode is displayed on the Firewall tab next to the Mode menu item. SELECTING FIREWALL SECURITY LEVEL To edit the settings, use the device's joystick or stylus, or select Options Change. This will open the Mode window. 93 USER GUIDE 2. Select one of the security levels suggested (see Figure below). Figure 55: Firewall security level selection 3. Press Back to save the changes. NOTIFYING OF A CONNECTION ATTEMPT The Firewall blocks all banned connections on the basis of the security mode selected (see Firewall security level selection section on page 93). For the Firewall to inform you of blocked connections on the mobile device, use the Firewall notification. To receive information on connection attempts, which are banned at the selected Firewall security level, perform the following actions: 1. Select the Firewall tab, select the Notifications item. 94 KASPERSKY MOBILE SECURITY 9. 0 FOR SYMBIAN OS 2. Select the Notify value for the On blocking setting (see Figure below). Figure 56: Configuring Firewall notifications 3. Press OK to save the changes. ENCRYPTING PERSONAL DATA This section presents information on the Encryption component which protects confidential data on your device. Furthermore, the section also describes how to enable/disable the operation of the component and encrypt/decrypt the folders selected. IN THIS SECTION About Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Encrypting data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96 Data decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Blocking access to encrypted data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 ABOUT ENCRYPTION The Encryption component protects data on the device from being viewed by persons even if they gain access to the mobile device. When the set time expires after the device switches to the powersaving mode (see section "Protecting access to encrypted data" on page 98), access to data is automatically blocked. Data in the folder are encrypted when the Encrypt command is executed. Subsequently, they are encrypted and decrypted automatically immediately after they are moved to the folder, retrieved from it, or requested. After installation, Kaspersky Mobile Security 9. 0 the Encryption component is disabled. 95 USER GUIDE Information about the component's operation is entered in the application's log (see the "Application Logs" section on page 104). ENCRYPTING DATA The Encryption component allows encrypting any amount of non-system folders which are in the device memory or on a storage card. The list of all previously encrypted and decrypted files is accessible in the Encryption tab from the Folders list. [. . . ] 91, 180 Protection icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37, 108, 129 Q Quarantine deleting an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53, 142 restoring an object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ]