F-SECURE CLIENT SECURITY 7.00 Administrator's Manual page 5

Hide thumbs Also See for CLIENT SECURITY 7.00:
Table of Contents

Advertisement

4.5
Local Installation ......................................................................................................156
4.5.1 Local Installation System Requirements ......................................................157
4.5.2 Installation Instructions .................................................................................157
4.6
Installing on an Infected Host...................................................................................158
4.7
How to Check That the Management Connections Work ........................................159
5.1
5.2
Configuring Automatic Updates ...............................................................................162
5.2.1 How do Automatic Updates Work?...............................................................163
5.2.2 Automatic Updates Configuration Settings...................................................163
5.2.4 Configuring Policy Manager Proxy ...............................................................165
5.3
Configuring Real-Time Scanning .............................................................................166
5.3.1 Real-Time Scanning Configuration Settings.................................................166
5.3.2 Enabling Real-Time Scanning for the Whole Domain ..................................169
5.3.3 Forcing all Hosts to Use Real-Time Scanning..............................................169
5.4
Configuring System Control .....................................................................................171
5.4.1 System Control Configuration Settings.........................................................171
5.5
Configuring Rootkit Scanning...................................................................................172
5.5.1 Rootkit Scanning Configuration Settings ......................................................172
5.5.2 Launching a Rootkit Scan for the Whole Domain.........................................172
5.6
Configuring E-mail Scanning....................................................................................173
5.6.1 E-mail Scanning Configuration Settings .......................................................173
5.7
Configuring Web Traffic (HTTP) Scanning...............................................................178
5.7.1 HTTP Scanning Configuration Settings........................................................178
5.7.3 Excluding a Web Site from HTTP Scanning.................................................179
5.8
Configuring Spyware Scanning................................................................................181
5.8.1 Spyware Control Settings .............................................................................181
5.8.2 Setting up Spyware Control for the Whole Domain ......................................185
5.8.3 Launching Spyware Scanning in the Whole Domain....................................187
v
160

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 7.00 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Client security

Table of Contents