F-SECURE CLIENT SECURITY 9.00 Administrator's Manual page 5

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

Setting up spyware control for the whole domain........................................................78
Launching spyware scanning in the whole domain.....................................................79
Allowing the use of a spyware or riskware component................................................79
Managing quarantined objects................................................................................................80
Deleting quarantined objects.......................................................................................80
Releasing quarantined objects....................................................................................80
Preventing users from changing settings...............................................................................82
Setting all virus protection settings as final..................................................................82
Configuring alert sending........................................................................................................83
Disabling Client Security alert pop-ups........................................................................83
Monitoring viruses on the network..........................................................................................84
Testing your antivirus protection.............................................................................................85
Chapter 6: Configuring Internet Shield............................................87
Global firewall security levels..................................................................................................88
Design principles for security levels........................................................................................89
Configuring security levels and rules......................................................................................90
Selecting an active security level for a workstation.....................................................90
Configuring a default security level for the managed hosts.........................................90
Adding a new security level for a certain domain only.................................................90
Configuring network quarantine..............................................................................................93
Network quarantine settings........................................................................................93
Turning network quarantine on in the whole domain...................................................93
Fine-tuning network quarantine...................................................................................93
Configuring rule alerts.............................................................................................................94
Adding a new rule with alerting....................................................................................94
Configuring application control...............................................................................................97
Application control settings..........................................................................................97
Setting up application control for the first time.............................................................98
Creating a rule for an unknown application on root level.............................................99
Editing an existing application control rule.................................................................100
Turning off application control pop-ups......................................................................100
Using alerts to check that Internet Shield works...................................................................102
Configuring intrusion prevention...........................................................................................103
Intrusion prevention settings......................................................................................103
Configuring IPS for desktops and laptops.................................................................103
Chapter 7: How to check that the network environment is protected.105
Checking that all the hosts have the latest policy.................................................................106
Checking that the server has the latest virus definitions......................................................107
Checking that the hosts have the latest virus definitions......................................................108
Checking that there are no disconnected hosts...................................................................109
Viewing scanning reports......................................................................................................110
F-Secure Client Security | TOC | 5

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 9.00 and is the answer not in the manual?

This manual is also suitable for:

Client security

Table of Contents