Launching Spyware Scanning In The Whole Domain; Allowing The Use Of A Spyware Or Riskware Component - F-SECURE CLIENT SECURITY 9.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

4. Check that the manual scanning settings are valid for the managed domain.
5. Click
to save and distribute the policy.

Launching spyware scanning in the whole domain

In this example, a manual scan is launched in the whole domain.
This will partially clean out the
1. Select
Root
on the
2. As the manual scanning task also includes manual virus scanning, check the settings on the
scanning
page, and modify them if necessary.
3. Go to the
Operations
Note: You have to distribute the policy for the operation to start.
4. Click
to save and distribute the policy.

Allowing the use of a spyware or riskware component

In this example, the use of a spyware or riskware component that was found during the spyware scanning is
allowed for one host.
1. On the
Policy domains
2. Go to the
Settings
3. Select the spyware component you want to allow on the
and click
Exclude
A dialog asking you to confirm the action opens.
4. Check the information displayed in the dialog, and if you are sure you want to allow the application to run
on the host or domain, click OK.
The selected application will be moved to the
5. Click
to save and distribute the policy.
F-Secure Client Security | Configuring virus and spyware protection | 79
Spyware and riskware reported by hosts
Policy domains
tab.
tab, and click the
Scan for viruses and spyware
tab, select the host for which you want to allow the use of spyware or riskware.
tab and select the
Spyware control
application.
page.
Spyware and riskware reported by hosts
Applications excluded from spyware scanning
table.
Manual
button.
table.
table,

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 9.00 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Client security

Table of Contents