Setting Up Spyware Control For The Whole Domain - F-SECURE CLIENT SECURITY 9.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

78 | F-Secure Client Security | Configuring virus and spyware protection
Spyware and riskware reported by hosts
Timestamp
The spyware reported by hosts will be cleaned if you run a manual spyware scan on the hosts, as well as
when quarantined spyware is removed periodically on the hosts.

Setting up spyware control for the whole domain

This example explains how to set up spyware control in such a way that it is transparent to the end-users
and that it protects them against spyware and tracking cookies.
When you are setting up spyware control for the first time, you should first use a small test environment that
consists of hosts that have the applications normally used in your company installed on them. At this phase
you can also allow certain applications, if that is necessary. After the testing phase you can distribute the
policy to the whole managed domain.
Spyware control also detects riskware. Riskware is any program that does not intentionally cause harm but
can be dangerous if misused, especially if set up incorrectly. Examples of such programs are chat programs
(IRC), or file transfer programs. If you want to allow the use of these programs in the managed domain, you
should include them in the test environment and allow their use when you are checking and configuring rules
for the applications in
1. Create a test domain and enable spyware scanning:
a) Create a test environment with a few computers that have the programs normally used in your company
installed.
b) Import these hosts to the centrally managed domain.
c) Go to the
d) Make sure that
Alternatively, you can launch a manual spyware scan on the hosts.
e) Click
2. Check the reported spyware and riskware:
A list of the spyware and riskware found during the scanning is displayed in the
reported by hosts
a) Check the list of reported spyware and riskware.
b) If there are applications that are needed in your organization, select the application in the table and
click
A dialog asking you to confirm the action is opened.
c) Check the information displayed in the dialog, and if you are sure you want to allow the spyware or
riskware to run on the host or domain, click OK.
The selected application will be moved into the
3. If you want to make sure that users cannot allow any spyware or riskware to run on their computers, set
Allow users to define the allowed spyware items
Spyware and riskware reported by hosts
Settings
tab and select the
Real-time scanning enabled
to save and distribute the policy.
table. This table is shown on the
Exclude
application.
Removed
- The spyware item has been removed from
the host.
Quarantined
- The spyware item was quarantined on
the host.
Currently In quarantine
currently in quarantine on the host.
Displays the date and time when the spyware item
was found on the host.
table.
Real-time scanning
page.
is selected.
Spyware control
Applications excluded from spyware scanning
is set to
Not
allowed.
- The spyware item is
Spyware and riskware
page.
table.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 9.00 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Client security

Table of Contents