Configuring Spyware Scanning; Spyware Control Settings - F-SECURE CLIENT SECURITY 9.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

Configuring spyware scanning

Spyware scanning protects the hosts against different types of spyware, such as data miners, monitoring
tools and dialers.
In centrally managed mode, spyware scanning can be set, for example, to report the spyware items found
on hosts to the administrator or to quarantine all found spyware items automatically. It is also possible to
allow the use of certain spyware applications by specifying them as allowed spyware on the Spyware Control
page.
A note about cleaning spyware and riskware
Spyware is a gray area between a fully legitimate application and a virus/trojan. Some spyware may be
necessary to run ordinary applications, while most spyware is just malware and should not be allowed to run
even once. By default, spyware scanning is configured to allow all spyware to run. You can check whether
you need to allow some spyware to run on your network before you tighten the security and prevent all new
spyware from executing.
Spyware scanning also detects and reports riskware. Riskware is any program that does not intentionally
cause harm but can be dangerous if misused, especially if set up incorrectly. Examples of such programs
are chat programs (IRC), or file transfer programs.

Spyware control settings

The settings for spyware scanning are described here.
Spyware scanning is included as part of real-time scanning and manual scanning. When
enabled
is selected on the
a manual scan is run, spyware is automatically included in the scan. The action taken when spyware is
detected is determined by the action selected on the
The
Applications excluded from spyware scanning
have been allowed by the administrator.
The
Spyware and riskware reported by hosts
Spyware and riskware reported by hosts
Spyware or Riskware Name
Type
Severity
Host
Spyware Status
F-Secure Client Security | Configuring virus and spyware protection | 77
Real-time scanning
page, spyware scanning is also turned on. Similarly, whenever
table contains the following information:
Real-time scanning
and
table displays the spyware and riskware items that
Displays the name of the spyware object or riskware.
Displays the spyware type. The type can be adware,
data miner, dialer, malware, monitoring tool, porn
dialer, riskware, vulnerability, worm, cookie (tracking
cookie) or misc (miscellaneous).
Displays the severity of the spyware item. This is a
value from 3 to 10.
Displays the name of the host on which the spyware
item was found.
Displays the current status of the spyware item. The
statuses are:
Potentially active
- The spyware item is still potentially
active on the host. No action has been taken on the
host against the spyware item.
Real-time scanning
Manual scanning
pages.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents