Page 2
Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Page 5
4.5.2 Installation Instructions .................154 Installing on an Infected Host...................155 How to Check That the Management Connections Work ........156 Chapter 5 Configuring Virus and Spyware Protection Overview: What can Virus and Spyware Protection be Used for? ......158 Configuring Automatic Updates ................159 5.2.1 How do Automatic Updates Work?...............160 5.2.2 Automatic Updates Configuration Settings...........160 5.2.3 Configuring Automatic Updates from Policy Manager Server ......161...
Page 6
5.9.1 Setting all Virus Protection Settings Final.............187 5.10 Configuring F-Secure Client Security Alert Sending ..........188 5.10.1 Setting F-Secure Client Security to Send Virus Alerts to an E-mail Address188 5.10.2 Disabling F-Secure Client Security Alert Pop-ups ........190 5.11 Monitoring Viruses on the Network ................190 5.12 Testing your Antivirus Protection ................190...
Page 7
9.5.2 Packet Logging.....................236 9.5.3 The Action.log file ..................237 9.5.4 Other Log Files .....................239 Connecting to F-Secure Policy Manager and Importing a Policy File Manually..239 Suspending Downloads and Updates ..............240 Allowing Users to Unload F-Secure Products ............240 Chapter 10 Virus Information 10.1 Malware Information and Tools on the F-Secure Web Pages .........243...
Page 8
10.2.3 How to Send the Virus Sample..............247 10.2.4 In What Language ..................247 10.2.5 Response Times...................247 10.3 What to Do in Case of a Virus Outbreak? ..............248 Chapter 11 Setting Up the Cisco NAC Plugin 11.1 Introduction ......................251 11.2 Installing the Cisco NAC Plugin ................251 11.2.1 Importing Posture Validation Attribute Definitions ........252 11.3 Attributes to be Used for Application Posture Token ..........252 Chapter 12 Advanced Features: Virus and Spyware Protection...
Page 9
Appendix B E-mail Scanning Alert and Error Messages B.1 Overview ......................... 295 Appendix C Products Detected or Removed During Client Installation 299 C.1 Overview ......................... 300 Glossary Technical Support Overview .......................... 321 Web Club .........................321 Advanced Technical Support ...................321 F-Secure Technical Product Training ................322...
This manual covers the configuration and operations that you can do with the F-Secure Policy Manager Anti-Virus Mode user interface and provides the information you need to get started with managing F-Secure Client Security applications centrally. The F-Secure Client Security Administrator’s Guide is divided into the following chapters.
E-mail Scanning can generate. Appendix C. Products Detected or Removed During Client Installation. Lists all the products that the user is prompted to uninstall or are uninstalled automatically during F-Secure Client Security installation. Glossary — Explanation of terms Technical Support —...
F1. The online help always opens to a page that holds information about your current location in the F-Secure Client Security user interface. In the left pane of the online help, you can browse through the help using the...
Page 14
F-Secure Policy Manager Proxy Administrator’s Guide For more information on installing and maintaining F-Secure Policy Manager Proxies, see the F-Secure Policy Manager Proxy Administrator’s guide. It contains detailed instructions on how you can use F-Secure Policy Manager Proxies to more efficiently deliver product updates.
Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
Page 16
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
Overview This section describes the main components of F-Secure Client Security and F-Secure Policy Manager and provides an introduction to policy based management. F-Secure Client Security Components and Features F-Secure Client Security is used for protecting the computer against viruses, worms, spyware, rootkits and other malware, and against unauthorized access from the network.
Page 19
Manual Scanning You can use Manual Scanning, for example, after you have installed F-Secure Client Security, if you suspect that there might be a virus or spyware on the computer, or if a virus has been found in the local area network.
Page 20
The integrity of the delivered executable code is very important, and F-Secure scanning engines check that all update code is signed by F-Secure Anti-Virus Research. If the integrity is compromised, the code will not be executed. For more information, see “Configuring Automatic...
“Configuring Automatic Updates”, 159. Virus News F-Secure Virus News delivers instant notifications of serious security events around the world. The F-Secure Virus News service is delivered through F-Secure Automatic Update Agent. See theF-Secure Client Security online help for more information. 1.2.2...
1.2.3 Application Management SNMP Agent The F-Secure SNMP Agent is a Windows NT SNMP extension agent, which is loaded and unloaded with the master agent. The F-Secure SNMP Agent offers a subset of Policy Manager functionality, and it is meant primarily for alert and statistics monitoring.
“Setting Up the Cisco NAC Plugin”, 250. Introduction to F-Secure Policy Manager This section contains a brief introduction to F-Secure Policy Manager. For more information, see F-Secure Policy Manager Administrator’s Guide. F-Secure Policy Manager provides a scalable way to manage the security of numerous applications on multiple operating systems from one central location.
These policies are defined in F-Secure Policy Manager Console and then distributed to the workstations through the F-Secure Policy Manager Server. It can be used to remotely install F-Secure products on other workstations without the need for any intervention by the end user.
F-Secure Policy Manager Update Server & Agent are used for updating virus and spyware definitions on the managed hosts. F-Secure Automatic Update Agent allows users to receive virus definition database updates and informational content without interrupting their work to wait for files to download from the Web.
Policy domains are groups of hosts or subdomains that have a similar security policy. Policy inheritance Policy inheritance simplifies the defining of a common policy. In F-Secure Policy Manager Console, each policy domain automatically inherits the settings of its parent domain, allowing for easy and efficient management of large networks.
Page 27
CHAPTER 1 The policy can be further refined for subdomains or even individual hosts. The granularity of policy definitions can vary considerably among installations. Some administrators might want to define only a few different policies for large domains. Other administrators might attach policies directly to each host, achieving the finest granularity.
F-Secure Policy Manager Console. Instructions on how to install F-Secure Policy Manager Console and Server on the same computer. The F-Secure Policy Manager Console and Server setup is run from the F-Secure CD. For information on alternative installation scenarios as well as the...
System Requirements 2.2.1 F-Secure Policy Manager Server In order to install F-Secure Policy Manager Server, your system must meet the following minimum requirements: Operating system: Microsoft Windows: Microsoft Windows 2000 Server (SP 4 or higher) Windows 2003 Server (32- and 64-bit)
Page 31
CHAPTER 2 Memory: 256 MB RAM When Web Reporting is enabled, 512 MB RAM. Disk space: Disk space: 200 MB of free hard disk space; 500 MB or more is recommended. The disk space requirements depend on the size of the installation.
2.2.2 F-Secure Policy Manager Console In order to install F-Secure Policy Manager Console, your system must meet the following minimum requirements: Operating system: Microsoft Windows: Microsoft Windows 2000 Professional (SP4 or higher) Windows XP Professional (SP2 or higher) Windows Vista (32- and 64-bit) Windows 2000 Server SP4 Windows 2003 Server (32- and 64-bit).
1. Insert the F-Secure CD in your CD-ROM drive. 2. Select Corporate Use. Click Next to continue. 3. Select F-Secure Policy Manager from the Install or Update Management Software menu. Step 2. View the Welcome screen, and follow the setup instructions. Then select the installation language from the drop-down menu.
Page 35
CHAPTER 2 Step 3. Read the license agreement information. If you agree, select I accept this agreement. Click Next to continue.
Page 36
Step 4. Select the following components to be installed: F-Secure Policy Manager Console F-Secure Policy Manager Server F-Secure Policy Manager Update Server & Agent F-Secure Installation Packages Click Next to continue.
Page 37
CHAPTER 2 Step 5. Choose the destination folder. It is recommended to use the default installation directory. Use the Browse feature to install F-Secure Policy Manager in a different directory. Click Next to continue.
Page 38
F-Secure Policy Manager Server will use as a repository. You can use the previous commdir as a backup, or you can delete it once you have verified that F-Secure Policy Manager Server is correctly installed.
Page 39
Step 7. Select whether you want to keep the existing settings or change them. This dialog is displayed only if a previous installation of F-Secure Policy Manager Server was detected on the computer. By default the setup keeps the existing settings. Select this option if you have manually updated the F-Secure Policy Manager Server configuration file (HTTPD.conf).
Page 40
Step 8. Select the F-Secure Policy Manager Server modules to enable: Host module is used for communication with the hosts. The default port is 80. Administration module is used for communication with F-Secure Policy Manager Console. The default HTTP port is 8080.
Page 42
Step 9. Specify F-Secure Policy Manager Server address, and Administration port number. Click Next to continue. Depending on the installation method, this window is not always displayed...
Page 43
CHAPTER 2 Step 10. Select to add product installation package(s) from the list of available packages (if you selected F-Secure Installation Packages in Step 4. , 36). Click Next.
Page 44
Step 11. Review the changes that setup is about to make. Click Start to start the installation.
Page 45
CHAPTER 2 Step 12. When the setup is completed, the setup shows whether all components were installed successfully.
Page 46
Step 13. Click Finish to complete the F-Secure Policy Manager Server installation. After this you should run the F-Secure Policy Manager Console for the fist time.
Page 47
CHAPTER 2 Step 14. It is important to run F-Secure Policy Manager Console after the setup, because some connection properties will be collected during the initial console startup. You can find the shortcut from Start Programs F-Secure Policy Manager Console F-Secure Policy Manager Console. When F-Secure...
Page 48
Step 15. Select your user mode according to your needs: Administrator mode - enables all administrator features. Read-Only mode - allows you to view administrator data, but no changes can be made. If you select Read-only mode, you will not be able to administer hosts.
Page 49
CHAPTER 2 Step 16. Enter the address of the F-Secure Policy Manager Server that is used for communicating with the managed hosts.
Page 50
Step 17. Enter the path where the administrator’s public key and private key files will be stored. By default, key files are stored in the F-Secure Policy Manager Console installation directory: Program Files\F-Secure\Administrator. Click Next to continue. If the key-pair does not exist already, it will be created later in the...
Page 51
CHAPTER 2 Step 18. Move your mouse cursor around in the window to initialize the random seed used by the management key-pair generator. Using the path of the mouse movement ensures that the seed number for the key-pair generation algorithm has enough randomness. When the progress indicator has reached 100%, the Passphrase dialog box will open automatically.
Page 52
Step 19. Enter a passphrase, which will secure your private management key. Re-enter your passphrase in the Confirm Passphrase field. Click Next. Step 20. Click Finish to complete the setup process.
Page 53
The setup wizard creates the user group FSPM users. The user who was logged in and ran the installer is automatically added to this group. To allow another user to run F-Secure Policy Manager you must manually add this user to the user group FSPM users.
Page 54
“Creating the Domain Structure”, 128 and “Adding Hosts”, 130. If you decide to exit from F-Secure Policy Manager Console, and want to login again later, see “Logging in for the First Time”, 124. If you want to familiarize yourself with the F-Secure Policy Manager Console user interface, see “Introduction to F-Secure Policy Manager...
Start to begin uninstallation. 4. When the uninstallation is complete, click Close. 5. Repeat steps 2-4, if you want to uninstall other F-Secure Policy Manager components. 6. When you have uninstalled the components, exit Add/Remove Programs. 7. It is recommended to reboot your computer after the uninstallation.
Mode in the View menu. For more information on the Advanced Mode user interface, see F-Secure Policy Manager Administrator’s Guide. The main components of the F-Secure Policy Manager Anti-Virus Mode user interface are: Policy Domains tab that displays the structure of the managed...
Policy Domains Tab In the Policy Domains tab, you can do the following: Add a new policy domain by clicking the icon, which is located on the toolbar. A new policy domain can be created only when a parent domain is selected. Add a new host by clicking the icon.
CHAPTER 3 3.3.1 Summary Tab Figure 3-1 Summary Tab The Summary tab is designed to display the most important information concerning the selected domain(s) or host(s) at a glance. When a domain is selected, the Summary tab displays information about the whole domain.
Page 60
If some of the settings displayed on the Summary tab require your immediate attention or action, an icon is displayed beside the setting. The icons can be interpreted as follows: Warns of an error situation that requires your action. The error cannot be fixed automatically. The icon is displayed, for example, when the latest policies have not been distributed, or when virus definitions on hosts are outdated...
Page 61
CHAPTER 3 Policy Manager Figure 3-2 Policy Manager related information on Summary Tab In the Policy Manager section you can: See the current Policy distribution status (saved/unsaved, distributed/undistributed), and when necessary, save the policy data and distribute the new policies to hosts. See the status of the virus definitions on the server.
Page 62
Domain Figure 3-3 Domain related information on Summary Tab In the Domain section you can: See the number hosts that have the latest policy and access a summary of their latest policy update by clicking View hosts’s latest policy update..This takes you to the Status tab and Centralized Management page.
Page 63
Recent means that the virus definitions are not the latest ones. Outdated means that the virus definitions are older than the configured time limit. If you have F-Secure Anti-Virus 5.40 installed on some hosts, the virus definitions version on these hosts is displayed as ‘unknown’.
Page 64
If you need to update the virus definitions on some hosts, click Update virus definitions... that takes you to the Operations tab. Internet Shield Figure 3-5 Internet Shield related information on Summary tab In the Internet Shield section you can: See how many hosts in the domain have Internet Shield installed.
Page 65
CHAPTER 3 In the Host section you can: See the name of the selected host displayed beside Computer identity. You can also access more detailed information on the host by clicking View host properties..This takes you to the Status tab and Host Properties page. See what is the active protocol (HTTP or File Sharing), the address of the Policy Manager Server the host is connected to and the date and time of the last connection.
Outbreak Tab Figure 3-7 Outbreak Tab The Security News section shows security news from F-Secure. Security news are usually news about new virus outbreaks, and they state the virus definitions version required on the hosts to protect against this new virus outbreak.
Page 67
Policy Manager Server. If protection is not currently available, the Policy Manager Server will automatically download it from F-Secure when it is available. The security news show the alert level of the security threat:...
Update delta tells you how well the host's automatic updates were functioning when the host sent statistics to the F-Secure Policy Manager Server last time. If you have a host that is displayed as unprotected, but has a small value in the update delta column, the host is most likely ok and can be ignored.
Page 69
CHAPTER 3 For more information on the lock symbols and other items displayed on all Settings pages, see “Settings Inheritance”, 118. Context Menu on Settings Pages By right-clicking any setting on a Settings tab page you can access a context menu that contains the following options: Clear This option clears a setting that has been redefined on the current level.
Page 70
Show Domain The Show Domain Values menu item is Values available only when a Policy Domain is selected. You can view a list of all policy domains and hosts below the selected policy domain, together with the value of the selected field.
Page 71
Automatic Updates In the Automatic Updates section you can: Enable or disable automatic updates. Note that deselecting this setting disables all ways for the host to get automatic updates. Specify the time interval for polling updates from F-Secure Policy Manager Server.
Page 72
See a list of Policy Manager Proxy Servers. You can also add new servers on the list, delete servers from the list and edit their addresses and priorities. Select whether an HTTP Proxy can be used and specify the HTTP Proxy address. Select whether clients should download updates from each other in addition to any servers or proxies.
Page 74
General In the General section you can Enable or disable real-time scanning. File Scanning In the Files to Scan section you can: Select which files will be scanned and define the included extensions. Select whether real-time scanning is executed also inside compressed files.
Page 75
Select what is the action to take when an infection is found. From the Action on infection drop-down list, you can select the action F-Secure Client Security will take when an infected boot sector is detected. Choose one of the following actions:...
Page 77
When Enable excluded objects is selected, the users can specify individual files or folders that will not be scanned. From the Action on infection drop-down list, you can select the action F-Secure Client Security will take when an infected file is detected.
Page 78
Choose one of the following actions: Action Definition Ask after scan Starts the F-Secure Disinfection Wizard when an infected file is detected. Disinfect Disinfects the file automatically when a virus is automatically detected. Rename Renames the file automatically when a virus is...
Page 79
(Blacklight)”, 170. Scheduled Scanning Configure scheduled scanning in advanced mode link takes you to the F-Secure Policy Manager Console Advanced Mode user interface, where scheduled scanning can be configured. For more information, see “Configuring Scheduled Scanning”, 255. Manual Boot Sector Scanning...
Page 80
Spyware Control Figure 3-11 Settings > Spyware Control...
Page 81
CHAPTER 3 Spyware Scanning on File Access This section contains the same spyware scanning settings as the Spyware Scanning on File Access section on the Settings > Real-Time Scanning page. For more information, see “Spyware Scanning on File Access”, 74. Manual Spyware Scanning This section contains the same spyware scanning settings as the Manual Spyware Scanning section on the Settings >...
Page 82
E-mail Scanning Figure 3-12 Settings > E-mail Scanning page This page includes separate settings for incoming and outgoing E-mail Scanning. The settings in the General section are common for both.
Page 83
CHAPTER 3 Incoming E-mail Scanning In the Incoming E-mail Scanning section you can: Enable incoming e-mail scanning. Select the action to take on incoming infected attachment. Select the action to take on scanning failure. Select the action to take on malformed message parts. Outgoing E-mail Scanning In the Outgoing E-mail Scanning section you can: Enable outgoing e-mail scanning.
Page 84
Web Traffic Scanning Figure 3-13 Settings > Web Traffic Scanning General In the General section you can enable or disable HTTP scanning. HTTP Scanning Select the action to take on infection. Select the action to take on scanning failure. Select whether compressed files are included in scanning.
Page 85
CHAPTER 3 Trusted HTTP Sites The Trusted HTTP Sites table displays a list of HTTP sites from which are defined as trusted. Downloads from these sited are not scanned for viruses. For more information on Web Traffic Scanning and for practical configuration examples, see “Configuring Web Traffic (HTTP) Scanning”,...
Page 87
CHAPTER 3 General In the General section you can: Select the Internet Shield security level at host. For more information, see “Global Firewall Security Levels”, 193 Configure security level autoselection by clicking Configure security level autoselection in advanced mode..This takes you to the Advanced Mode user interface.
Page 88
Intrusion Prevention In the Intrusion Prevention section you can: Enable and disable intrusion prevention. Select the action on malicious packet. The options available are: Log and drop and Log without dropping. Define the centralized alert severity. Define the alert and performance level. For configuration examples and more information, see “Configuring the Intrusion...
Page 90
When the selected security level is changed, the rules associated with the new security level are displayed in the table. When the F-Secure Internet Shield Firewall is in use, the firewall rules are checked in the order in which they are displayed in the table, from top to bottom.
Page 91
CHAPTER 3 reply packets from the server applications. Outgoing packets from ordinary applications need to be allowed by the rules in the firewall rules table. For more information on how to create and modify firewall rules, see “Configuring Internet Shield Security Levels and Rules”, 196 and “Configuring Internet Shield Rule Alerts”, 203.
Page 92
Firewall Services Figure 3-16 Settings > Firewall Services Service, short for Network Service, means a service that is available on the network, e.g. file sharing, remote console access, or web browsing. It is most often described by what protocol and port it uses.
Page 93
CHAPTER 3 Firewall Services Table (Global) The Firewall Services Table displays a list of services that have been defined for the firewall. It is also possible to create or allow the end users to create new services for the firewall. For more information on how to add or modify firewall services, see “Adding New Services”, 269.
Page 94
Application Control Figure 3-17 Settings > Application Control Application Rules for Known Applications The Application Control page displays a list of known applications and the rules defined for them for inbound and outbound connection attempts. Unknown Applications Reported by Hosts The Unknown Applications Reported by Hosts list displays applications that the hosts have reported and for which no rules exist yet.
Page 95
CHAPTER 3 On this page you can also: Select the default action for client applications. Select the default action for server applications. Select whether new applications are reported to you by selecting the Report new unknown applications check box. Select whether if Application Control should prompt the user when System Control has already identified the application as trusted or not.
Page 96
Alert Sending Figure 3-18 Settings > Alert Sending General In the General section you can: Select the alerting language. E-mail Alert Sending Define the E-mail server address (SMTP). Define the E-mail sender address and E-mail subject to be used when forwarding alerts by e-mail.
Page 97
The Alert Forwarding table can be used to configure where the alerts that are of certain severity are to be forwarded. For examples on how to configure Anti-Virus alert forwarding, see “Configuring F-Secure Client Security Alert Sending”, 188. For examples on how to configure Internet Shield alert forwarding see “Configuring Internet Shield Rule...
Page 98
The General section contains the following options: Allow users to change all settings... This option makes all the settings throughout the F-Secure Policy Manager Anti-Virus and Advanced Mode user interface non-final, which means that users are allowed to change any setting.
Page 99
CHAPTER 3 This option makes all the settings throughout the F-Secure Policy Manager Anti-Virus and Advanced Mode user interface final, which means that users are not allowed to change any setting. For more information on final settings, see “Settings Inheritance”, 118.
Status Tab The different pages in Status tab display detailed information on the status of certain components of centrally managed F-Secure Client Security applications. If you select a domain in the Policy Domains tab, the Status tab displays the status of all hosts in that domain. If a single host is selected, the Status tab displays the status of that host.
Page 101
CHAPTER 3 Context Menu on Status Tab Figure 3-20 The context menu that you can open by right-clicking a row By right-clicking any row on Status tab page you can access a context menu that contains the following options: Copy as Text copies the currently selected row(s) and column headings from the table as text.
Page 102
The date and time when virus definitions were last updated Virus definitions version The date and time when virus definitions on F-Secure Gateway (GW) products were last updated Virus definitions version on F-Secure Gateway products The date and time when spyware definitions were last updated...
Page 103
F-Secure Policy Manager. The virus definitions date and version information is also displayed for hosts that have F-Secure Anti-Virus for Citrix Servers, F-Secure Anti-Virus for Windows Servers, F-Secure Internet Gatekeeper or F-Secure Anti-Virus for Microsoft Exchange installed.
Page 104
Internet Shield Figure 3-23 Status > Internet Shield page The Internet Shield page displays the following information Latest attack date and time in the Latest Attack Timestamp column Latest attack service Latest attack source Recent attacks (this column can be sorted by clicking on the column header) Recent attacks reset time.
Page 105
Figure 3-24 Status > Installed Software The Installed Software page displays a summary of the software installed on the host(s): F-Secure Client Security software version (including the build number and possible hotfixes) List of Anti-Spyware hotfixes Whether Internet Shield is installed...
Page 106
Policy file counter; this is the number of the policy file currently in use at the host. The date when the last statistics update has been sent to the F-Secure Policy Manager Whether the host is disconnected (this column can be sorted by clicking on the column header) The number of new security alerts The number of new fatal errors.
Page 107
CHAPTER 3 Host Properties Figure 3-26 Status > Host Properties The Host Properties page displays the following information for each host: The WINS name of the host The IP address of the host The DNS name of the host The operating system of the host.
3.3.5 Alerts Tab Figure 3-27 Alerts tab The Alerts tab displays alerts from the selected host(s) and domain(s). It can also be used to manage the alert reports. The Alerts tab displays the following information for each alert: severity (see “Viewing Alerts”, 224 for more information) date and time...
Page 109
When an alert is selected in the alert list, the lower half of the page displays more specific information about the alert: product, severity, originating host, and so on. F-Secure Client Security scanning alerts may also have an attached report. This report will be displayed in the lower half of the page.
3.3.6 Reports Tab Figure 3-28 Reports tab The Reports tab displays virus scanning reports from the selected host(s) and domain(s). It can also be used to manage the scanning reports. The Reports tab displays the following information about each report: severity date and time description...
CHAPTER 3 For more information on how alerts can be used for monitoring, see “Viewing Scanning Reports”, 223. 3.3.7 Installation Tab Figure 3-29 Installation tab The Installation tab is the first one that opens when the Policy Manager Console is installed.
Page 112
NT domain browse list of the Autodiscover view. Import Hosts will send autoregistration messages to autoregistered F-Secure Policy Manager whenever the first hosts... product is installed to the hosts. These new hosts are taken under policy management by importing them to the policy domain tree.
CHAPTER 3 3.3.8 Operations Tab Figure 3-30 Operations tab The Operations tab contains two operations: Update Virus With this operation you can order the selected Definitions hosts or all hosts in the selected domain to get Operation new virus definitions at once. Scan for Viruses With this operation you can order the selected and Spyware...
Toolbar The toolbar contains buttons for the most common F-Secure Policy Manager Console tasks. Saves the policy data. Distributes the policy. Go to the previous domain or host in the domain tree selection history. Go to the next domain or host in the domain tree selection history.
Green signifies that the host has sent an autoregistration request. Displays available installation packages. Displays all alerts. The icon is highlighted if there are new alerts. When you start F-Secure Policy Manager Console, the icon is always highlighted. Menu Commands...
Page 116
Distribute Policies Distributes the policy files. Export Host Policy File Exports the policy files. Exit Exits F-Secure Policy Manager Console. Edit Cuts selected items. Paste Pastes items to selected location. Delete Deletes selected items. New Policy Domain Adds a new domain.
Page 117
CHAPTER 3 Embedded Restriction Editors Toggles between the embedded restriction editor and the restrictions dialog box. Messages Pane Shows/hides the Messages pane at bottom of screen. Open on New Messages Shows/hides the Messages pane at bottom of screen. Back Takes you to the previous domain or host in the domain tree selection history.
The settings in F-Secure Policy Manager Console can either be inherited from a higher level in the policy domain structure, or they may have been changed on the current level.
Page 119
CHAPTER 3 When necessary, settings can be defined as final, which means that the users are not allowed to change them. Final always forces the policy: the policy variable overrides any local host value, and the end user cannot change the value as long as the Final restriction is set. If the settings have not been defined as final, the users are allowed to change them.
3.6.1 How Settings Inheritance is Displayed on the User Interface There inherited settings and settings that have been redefined on the current level are displayed in a different way on the Policy Manager user interface: Inherited inherited A closed lock means that the user cannot change the setting, because it has been defined as final.
Clears all the settings that have been redefined on the current page and restores the default or inherited values. For more information on locking and unlocking all settings throughout the F-Secure Policy Manager user interface, see also “Centralized Management”, 98 and “Preventing Users from Changing Settings”, 187.
3.6.3 Settings Inheritance in Tables The Firewall Security Levels Table and the Firewall Services Table are so-called global tables, which means that all computers in the domain have the same values. However, different subdomains and different hosts may have different security levels enabled. In tables the default values derived from MIBs are displayed as grey.
ETTING UP THE ANAGED ETWORK Overview................... 124 Logging in for the First Time............. 124 Creating the Domain Structure..........128 Adding Hosts ................130 Local Installation............... 152 Installing on an Infected Host ........... 155 How to Check That the Management Connections Work..156...
Overview This chapter describes how to plan the managed network and what are the best ways to deploy F-Secure Client Security in different types of environments. F-Secure Policy Manager offers you several ways to deploy F-Secure Client Security in your company:...
CHAPTER 4 4.2.1 Logging In When you start F-Secure Policy Manager Console, the following dialog box will open. Click Options to expand the dialog box to include more options. Figure 4-1 F-Secure Policy Manager Console Login dialog The dialog box can be used to select defined connections. Each connection has individual preferences, which makes it easier to manage many servers with a single F-Secure Policy Manager Console instance.
Page 126
2. Host connection status controls when hosts are considered disconnected from F-Secure Policy Manager. All hosts that have not contacted F-Secure Policy Manager Server within the defined interval are considered disconnected. The disconnected hosts will have a notification icon in the domain tree and they will appear beside the Disconnected Hosts in the Summary tab.
Page 127
CHAPTER 4 3. Note that it is possible to define an interval that is shorter than one day by simply typing in a floating point number in the setting field. For example, with a value of "0.5" all hosts that have not contacted the server within 12 hours are considered disconnected.
Creating the Domain Structure If you want to use different security policies for different types of hosts (laptops, desktops, servers), for users in different parts of the organization or users with different levels of computer knowledge, it is a good idea to plan the domain structure based on these criteria.
Page 129
Figure 4-4 An example of a policy domain: country offices as sub-domains A third possibility is to group the hosts into subdomains based on the installed F-Secure Client Security version. You could, for example, group hosts that have F-Secure Client Security 6.x installed into one sub-domain, and hosts that have F-Secure Client Security 7.x installed...
The main methods of adding hosts to your policy domain, depending on your operating system are as follows: Import hosts directly from your Windows domain and install F-Secure Client Security on them remotely. Import hosts through autoregistration after F-Secure Client Security has been installed on them locally.
‘Autodiscover Windows hosts’ from the Installation tab in F-Secure Policy Manager Console. Note that this also installs F-Secure Client Security on the imported hosts. In order to import hosts from a Windows domain, select the target domain, and choose ‘Autodiscover Windows hosts’...
Page 132
Figure 4-5 Import Autoregistered Hosts dialog > Autoregistered Hosts tab The Autoregistration view offers a tabular view to the data which the host sends in the autoregistration message. This includes the possible custom autoregistration properties that were included in the remote installation package during installation (see step 6 in Using the Customized Remote Installation JAR Package...
Page 134
You can define the import rules for the autoregistered hosts on the Import Rules tab in the Import Autoregistered Hosts window. You can use the following as import criteria in the rules: WINS name, DNS name, Dynamic DNS name, Custom Properties These support * (asterisk) as a wildcard.
Page 135
). This operation is useful in the following cases: NSERT Learning and testing – You can try out a subset of F-Secure Policy Manager Console features without actually installing any software in addition to F-Secure Policy Manager Console. For example, you can create test domains and hosts, and try out policy inheritance features.
You need to have administrative rights to push install applications on hosts. Before Installing the Hosts Before you start to install F-Secure Client Security on hosts, you should make sure that there are not conflicting antivirus or firewall applications installed on them.
Page 137
CHAPTER 4 Autodiscover Windows Hosts To install: 1. Select the policy domain for the hosts to which you will install F-Secure Client Security. 2. Open the Edit menu and select Autodiscover Windows Hosts (alternatively, click the button). 3. From the NT Domains list, select one of the domains and click Refresh.
Page 138
F-Secure applications installed. Resolve hosts with all details (slower) With this selection, all details about the hosts are shown, such as the versions of the operating system and F-Secure Management Agent. Resolve host names and comments only (quicker) If all hosts are not shown in the detailed view or it takes too much time to retrieve the list, this selection can be used.
Page 139
Next to continue. You can click Browse to check the F-Secure Management Agent version(s) on the host(s). 4. After you have selected your target hosts, continue to “Push Installation After Target Host Selection”, 139 for instructions on push-installing the applications to hosts.
Page 140
1. Select the installation package, and click Next to continue. 2. Select the products to install. You can choose to force reinstallation if applications with the same version number already exist. Click Next to continue. 3. Choose to accept the default policy, or specify which host or domain policy should be used as an anonymous policy.
Page 141
CHAPTER 4 4. Choose the user account and password for the push installation. Push Installation requires administrator rights for the target machine during the installation. If the account you entered does not have administrator rights on one of the remote hosts, an “Access denied”...
Page 142
In the final dialog box, click Finish, and go to the next step. 6. F-Secure Policy Manager installs F-Secure Management Agent and the selected products on the hosts. During this process, the Status line will display the procedure in process. You can click...
F-Secure Management Agent installed. F-Secure Policy Manager Console creates an operation-specific installation package, which it stores on the F-Secure Policy Manager Server, and writes an installation task to the base policy files (thus, policy distribution is required to start installations). Both base policy files and the installation package are signed by the management key-pair so that only genuine information is accepted by the hosts.
Page 144
The Installation Editor contains the following information about the products that are installed on your target policy domain or host: Product Name Name of the product, which is either installed on a host or domain, or which can be installed with an available installation package.
Page 145
Installation Editor launches the Installation Wizard, which queries the user for the installation parameters. The Installation Editor then prepares a distribution installation package that is customized for the specific installation operation. The new package is saved on F-Secure Policy Manager Server. Start button is used to start the installation operations selected in the Version to Install field.
Page 146
Because the installation operation uses policy-based triggering, you must distribute new policy files. The policy file will contain an entry that tells the host to fetch the installation package and perform the installation. Note that it may take a considerable length of time to carry out an installation operation.
For example, if uninstalling F-Secure Anti-Virus and F-Secure Management Agent: 1. Uninstall F-Secure Anti-Virus 2. Wait for F-Secure Policy Manager Console to report the success or failure of the uninstallation. 3. If F-Secure Anti-Virus was uninstalled successfully, uninstall F-Secure Management Agent.
Page 148
4. Specify the file format, JAR or MSI, and the location where you want to save the customized installation package. Click Export. 5. Select the products you want to install (F-Secure Management Agent will be installed by default). Click Next to continue.
Page 149
7. A summary page shows your choices for the installation. Review the summary and click Start to continue to the installation wizard. 8. F-Secure Policy Manager Console displays the Remote Installation Wizard that collects all necessary setup information for the selected products. a. Read the Remote Installation Wizard Welcome Screen.
Page 150
standard host identification properties in the Autoregistration view. The custom property name will be the column name, and the value will be presented as a cell value. One example of how to utilize custom properties is to create a separate installation package for different organizational units, which should be grouped under unit-specific policy domains.
Page 151
ILAUNCHR has the following command line parameters: /U — Unattended. No messages are displayed, even when a fatal error occurs. /F — Forced installation. Completes the installation even if F-Secure Management Agent is already installed. Enter ILAUNCHR /? at the command line to display complete help.
Admin.pub key file to workstations. 4.5.1 Local Installation System Requirements In order to install F-Secure Client Security, your system must meet the following minimum requirements. For Microsoft Vista: Processor: A processor capable of running Micorsoft...
Page 153
CHAPTER 4 Processor: A processor capable of running Micorsoft Vista 32-bit or 64-bit (2GHz or faster processor recommended) Free hard disk space: 200MB of free hard drive space (300MB recommended) Internet connection: An Internet connection is required to validate your subscription and to receive updates Internet Browser: Internet Explorer 7 or newer...
Providing a Copy of the Admin.pub Key File to Workstations When setting up workstations, you must provide them with a copy of the Admin.pub key file (or access to it). If you install the F-Secure products on the workstations remotely with F-Secure Policy Manager, a copy of the...
Administrator’s Guide. Installing on an Infected Host If the host on which you are going to install F-Secure Client Security is infected with some variant of the Klez virus, you should run the Klez removal tool on the host before starting the installation. This is because the Ilaunchr.exe installation tool cannot be run on a computer that is...
How to Check That the Management Connections Work 1. Check the Policy Distribution Status on the Summary tab. Save and distribute the polices if necessary. 2. Go to the Status tab and select Centralized Management page. Check the timestamp and counter of the policy file currently in use.
Overview: What can Virus and Spyware Protection be Used for? The Virus and Spyware Protection in F-Secure Client Security consists of Automatic Updates, Manual Scanning, Scheduled Scanning, Real-Time Scanning, Spyware Scanning, System Control, Rootkit Scanning, E-Mail Scanning, Web Traffic Scanning, Outbreak Management and the Virus News service.
Configuring Automatic Updates This section explains the different configuration settings available for Automatic Updates in F-Secure Policy Manager, and gives some practical configuration examples for hosts with different protection needs. By following these instructions you can always keep the virus and spyware definitions on hosts up-to-date, and choose the best update source based on user needs.
5.2.1 How do Automatic Updates Work? The Automatic Update Agent installed with F-Secure Client Security tries to download the automatic updates from the configured update sources in the following order: a. If there are Policy Manager Proxies in use in the company network, the client tries to connect to F-Secure Policy Manager Server through each Policy Manager Proxy in turn.
CHAPTER 5 Policy Manager Proxy is a list of F-Secure Policy Manager Proxy servers available to you. The Automatic Update Agent installed with F-Secure Client Security connects to them in the priority order specified in this table. If you want to use HTTP Proxy, select From Browser settings or User-defined from the use HTTP Proxy drop-down menu.
Policy Manager Proxy in the office where the host is normally located, and 20, 30 and so on for the other Proxies. 6. Enter the URL of the F-Secure Policy Manager Proxy in the Server address text box. Then click OK.
Configuring Clients to Download Updates from Each Other You can configure F-Secure Automatic Update Agent so that updates are downloaded from each other in addition to any existing servers or proxies. This feature is known as neighborcast. In this way updates may be...
Configuring Real-Time Scanning Real-Time Scanning keeps the computer protected all the time, as it is scanning the files when they are accessed, opened or closed. It is running on the background, which means that once it has been set up, it is basically transparent to the user.
Page 165
From the Action on infection drop-down list, you can select the action F-Secure Client Security will take when an infected file is detected. Choose one of the following actions: Action...
Quarantine repository. File Extension Handling F-Secure Client Security has a list of included extensions defined in the policy (this can be ‘all files’). ‘Included extensions’ can also be part of a virus definitions update. These included extensions are first combined by F-Secure Client Security, and then any ‘excluded extensions’...
CHAPTER 5 1. Select Root in the Policy Domains tab. 2. Go to the Settings tab and select the Real-Time Scanning page. 3. Select the Real-time scanning enabled check box. 4. Select Files with These Extensions from the Files to scan: drop-down list.
8. Click to save the policy data. 9. Click to distribute the policy. 5.3.4 Excluding Microsoft Outlooks's .pst File from Real-Time Scanning If you have set real-time scanning to scan all files, you might want to exclude Microsoft Outlook’s .PST file from the scanning in order not to slow down the system unnecessarily, as PST files are typically very large and take a long time to scan.
CHAPTER 5 Configuring System Control F-Secure System Control is a new, host-based intrusion prevention system that analyzes the behavior of files and programs. It can be used to block intrusive ad pop-ups and to protect important system settings, as well as Internet Explorer settings against unwanted changes.
System Control Server Queries (DeepGuard 2.0) Select Use server queries to improve detection accuracy to check with F-Secure servers when System Control detects an unknown application. We recommend that you enable server queries for two reasons: a computer with server queries enabled has a higher level of protection.
CHAPTER 5 5.5.1 Rootkit Scanning Configuration Settings Select Enable rootkit scanning to enable scanning for files and drives hidden by rootkits. This option also enables users to run local quick scans for rootkits and other hidden items. Select Include rootkit scanning in full computer check to scan for items hidden by rootkits when a full computer check is started from the local host, or when a manual scanning operation is launched from Policy Manager Console.
9. After the scanning operation on the local hosts has finished, you can view from the Scan Reports on Reports tab whether any rootkits were detected. Configuring E-mail Scanning E-mail Scanning can be used to keep both inbound and outbound e-mails protected against viruses.
Page 173
CHAPTER 5 2. Action if scanning fails: Remove Attachment deletes the attachment. Report Only ignores the attachment but reports it to the administrator. 3. Action on malformed message parts: Drop Message Part deletes the message. Report Only ignores the malformed message part but reports it to the administrator.
All attachments will be scanned, regardless of their file extension. Attachments with These Extensions: Attachments with specified extensions will be scanned. To specify files that have no extension, type ‘.’ You can use the wildcard ‘?’ to represent any letter. Enter each file extension separated by a space.
Page 175
CHAPTER 5 Step 2. Configure Incoming E-mail Scanning 1. Select Enable Incoming E-mail Scanning. 2. Select the action to take from the Action on incoming infected attachment drop-down list. For explanations on the different actions, “E-mail Scanning Configuration Settings”, 172. 3.
Configuring Web Traffic (HTTP) Scanning Web Traffic Scanning can be used to protect the computer against viruses in HTTP traffic. When enabled, it scans HTML files, image files, downloaded applications or executable files and other types of downloaded files. It removes viruses automatically from the downloads. You can also enable a notification flyer that is shown to the end-user every time Web Traffic Scanning has blocked viruses in web traffic and downloads.
CHAPTER 5 5.7.2 Enabling Web Traffic Scanning for the Whole Domain In this example HTTP scanning is enabled for the whole domain. 1. Select Root in the Policy Domains tab. 2. Go to the Settings tab and select the HTTP Scanning page. 3.
Page 178
1. Click the button under the Trusted Sites table. This creates a new line in the table. 2. Click on the line you just created so that it becomes active, and type http://*.example.com/* This excludes all the sub-domains. 3. Click the button under the Trusted Sites table.
Some spyware may be necessary to run ordinary applications, while most spyware is just malware and should not be allowed to run even once. By default, F-Secure Spyware Scanning is configured to allow all spyware to run. You can check whether you need to allow some spyware to run on your network before you tighten the security and prevent all new spyware from executing.
Page 180
From the Action on spyware drop-down list, you can select the action to take when spyware is detected. Choose one of the following actions Action Definition Report only The spyware is reported only, but no action is taken. Ask after scan The user is prompted to select what to do with the spyware.
Page 181
CHAPTER 5 Configure other spyware scanning options in advanced mode link takes you to the F-Secure Policy Manager Console Advanced Mode user interface, where other spyware scanning options can be configured. Manual Spyware Scanning To enable manual spyware scanning select the Scan for spyware during manual virus scanning check box.
Page 182
Spyware and Riskware Reported by Hosts The Spyware and Riskware Reported by Hosts table contains the following information: Spyware and Riskware Reported by Hosts Spyware or Riskware Displays the name of the spyware object or Name riskware. Type Displays the spyware type. The type can be adware, data miner, dialer, malware, monitoring tool, porn dialer, riskware, vulnerability, worm, cookie (tracking cookie) or misc...
CHAPTER 5 The Spyware Reported by Hosts will be cleaned if you run a manual spyware scan on the hosts, as well as when quarantined spyware is removed periodically on the hosts. Default Spyware Handling If the Change spyware control to automatically quarantine all new spyware setting is selected, all new spyware that is not explicitly allowed by the administrator is quarantined automatically.
Page 184
Spyware Control also detects riskware. Riskware is any program that does not intentionally cause harm but can be dangerous if misused, especially if set up incorrectly. Examples of such programs are chat programs (IRC), or file transfer programs. If you want to allow the use of these programs in the managed domain, you should include them in the test environment and allow their use when you are checking and configuring rules for the applications in Spyware and Riskware Reported...
CHAPTER 5 Step 3. Changing Spyware Scanning to Quarantine Automatically Configuration Configure the Default Spyware Handling settings: 1. If you want to make sure that users cannot allow any spyware or riskware to run on their computers, make sure that Permit users to allow spyware is set to Not allowed.
4. As the manual scanning task also includes manual virus scanning, check the settings in the Manual Virus Scanning section, and modify them if necessary. 5. Go to the Operations tab, and click the Scan for Viruses and Spyware button. Note, that you have to distribute the policy for the operation to start.
CHAPTER 5 Preventing Users from Changing Settings If you want to make sure that the users cannot change some or any of the Virus Protection Settings, you can set these settings final. There are different possibilities for doing this: If you want to prevent users from changing a certain setting, click on the lock symbol beside it.
5.10.1 Setting F-Secure Client Security to Send Virus Alerts to an E-mail Address In this example all the security alerts that the managed F-Secure Client Security clients generate are forwarded to e-mail. Step 1.
Page 189
CHAPTER 5 <host>[:<port>] where "host" is the DNS-name or IP-address of the SMTP server, and "port" is the SMTP server port number. 2. Enter the sender’s address for e-mail alert messages in the E-mail sender address (From): field. 3. Enter the e-mail alert message subject in the E-mail subject: field. See the MIB help text for a list of possible parameters to use in the message subject.
Testing your Antivirus Protection To test whether F-Secure Client Security operates correctly, you can use a special test file that is detected by F-Secure Client Security as though it were a virus. This file, known as the EICAR Standard Anti-Virus Test File, is also detected by several other anti-virus programs.
Page 191
MS-DOS ASCII format. Note also that the third character of the extension is an upper-case O, not numeral 0. 3. Now you can use this file to see what it looks like when F-Secure Client Security detects a virus. Naturally, the file is not a virus. When executed without any virus protection, EICAR.COM displays the text...
ONFIGURING NTERNET HIELD Overview: What can Internet Shield be Used for?....193 Configuring Internet Shield Security Levels and Rules .... 196 Configuring Network Quarantine ..........201 Configuring Internet Shield Rule Alerts ........203 Configuring Application Control..........207 How to use Alerts for Checking that Internet Shield Works?..215 Configuring the Intrusion Prevention ........
For detailed explanations of different security levels, see “Global Firewall Security Levels”, 193. 6.1.1 Global Firewall Security Levels The Global Firewall Security levels that exist in the F-Secure Internet Shield are: Network quarantine If the Network Quarantine feature is enabled, this security level will be automatically selected when the network quarantine criteria on the host are met.
Page 194
Block all This security level blocks all network traffic. Mobile This security level allows normal web browsing and file retrievals (HTTP, HTTPS, FTP), as well as e-mail and Usenet news traffic. Encryption programs, such as VPN and SSH are also allowed.
CHAPTER 6 In this security level all network traffic, inbound Disabled and outbound, is allowed and no alerts are generated. Local rules cannot be created. 6.1.2 Security Level Design Principles Each security level has a set of pre-configured Firewall Rules. In addition, you can create new rules for all security levels for which the Filtering Mode Normal is displayed in the Firewall Security Levels table.
Configuring Internet Shield Security Levels and Rules This section explains how you can set and select the security levels based on the users' needs. In the practical configuration examples it is assumed that the managed hosts have been imported into the domain structure that was created in chapter 4, which means that, for example, laptops and desktops are located in their own subdomains.
CHAPTER 6 You can verify that the new security level change has become effective by going to the Status tab and selecting the Overall Protection window. If the selected security level cannot be used for some reason, the default security level is used instead. The current default security level can be seen in the Global Security Levels table on the Firewall Security levels page.
6.2.3 Adding a New Security Level for a Certain Domain Only In this example a new security level with two associated rules is created. The new security level is added only for one subdomain and the hosts are forced to use the new security level. This subdomain contains computers that are used only for Internet browsing, and are not connected to the company LAN.
Page 199
CHAPTER 6 3. Click Add Before to add a rule that allows outbound HTTP traffic as the first one on the list. This opens the Firewall Rule Wizard. 4. In the Rule Type window select Allow as the rule type. 5.
Page 200
3. Disable the BrowserSecurity security level by clearing the Enabled check box beside it in the Firewall Security Levels table. 4. Select the subdomain where you want to use this security level in the Policy Domains tab. 5. Enable the BrowserSecurity security level by selecting the Enabled check box beside it in the Firewall Security Levels table.
CHAPTER 6 Configuring Network Quarantine Network Quarantine is an Internet Shield feature that makes it possible to restrict the network access of hosts that have very old virus definitions and/or that have Real-time Scanning disabled. Their normal access rights are automatically restored once the virus definitions are updated and/or Real-time Scanning is enabled again.
6. Click to save the policy data. 7. Click to distribute the policy. 6.3.3 Fine-Tuning Network Quarantine Network Quarantine is implemented by forcing hosts to the Network Quarantine security level, which has a restricted set of firewall rules. You can add new Allow rules to the firewall rules in the Network Quarantine security level to allow additional network access to hosts in Network Quarantine.
CHAPTER 6 Configuring Internet Shield Rule Alerts Internet Shield rule alerts can be used to get notifications if certain types of malware try to access the computers. It is possible to issue an alert every time a rule is hit or when illegal datagrams are received, which makes it easy to see what kind of traffic is going on in your system.
Page 204
Step 3. Specify Affected Hosts Choose whether to apply this rule to all connections or to selected connections only. You can either: Check the Any remote host option to apply the rule to all Internet connections, Check the All hosts on locally connected networks option to apply the rule to all connections form the local network Check the Specified remote hosts option to apply the rule to an IP address, a range of IP addresses or DNS addresses.
Page 205
Network event: inbound service denied. 4. Enter a descriptive comment for the alert in the Alert comment: field. This comment is displayed in the F-Secure Client Security local user interface. 5. You can accept the default values for the rest of the fields in this window.
Page 206
You can also add a descriptive comment for the rule to help you understand the rule when it is displayed in the Firewall Rules Table. If you need to make any changes to the rule, click Back through the rule. If you are satisfied with your new rule, click Finish.
CHAPTER 6 1. Select the subdomain for which you created the rule in the Policy Domains tab. 2. Go to the Summary tab, and check if any new security alerts are displayed for the domain. 3. To see the alert details, click View alerts by severity..
Page 208
How Application Control and System Control Work Together? When Application Control detects an outbound connection attempt, and when it is set to prompt the user to decide whether to allow or deny the connection, you can set Application Control to check from System Control whether the connection should be allowed.
CHAPTER 6 6.5.1 Application Control Configuration Settings The Application Control page displays the following information: Application Rules for Known Applications Application Displays the executable file name. Act as Client (out) The following actions are available: Deny, Allow, User Decision. See for explanations below. Act as Server (in) The following actions are available: Deny, Allow, User Decision.
You can decide what happens when the application tries to connect to the network with the Default Action for client applications and Default action for server applications selections. The possible actions are: Action Deny Denies all application’s connections to the network.
Page 211
CHAPTER 6 3. Select Report from the Send notifications for new applications drop-down list, so that the new applications will appear on the Unknown Applications Reported by Hosts list. 4. Define the allow rules for these applications. For more information, “Creating a Rule for an Unknown Application on Root Level”, 212.
4. Click to distribute the policy. 6.5.3 Creating a Rule for an Unknown Application on Root Level In this example a rule will be created to deny the use of Internet Explorer 4. In this case it is assumed that it already appears on the list of Unknown Applications Reported by Hosts list.
CHAPTER 6 Step 4. Select the Rule Target 1. Select the domain or host that the rule affects from the domains and hosts displayed in the window. If the target host or domain already has a rule defined for any of the applications affected by the rule, you are prompted to select whether to proceed and overwrite the existing rule at the host.
Step 2. Edit the Application Rule Type 1. Select the action to take when the application acts as a client and tries to make an outbound connection. In this case select Allow for Act as Client (out). 2. Select the action to take when the application acts as a server and an inbound connection attempt is made.
CHAPTER 6 1. Select Root in the Policy Domains tab. 2. Go to the Settings tab and select the Application Control page. On this page select: Allow from the Default action for server applications drop-down list. Allow from the Default action for client applications drop-down list.
3. To start the creation of the new rule, click Before. This starts the Firewall Rule Wizard. 4. In the Rule Type window select Allow. 5. In the Remote hosts window select Any remote host. 6. In the Services window select Ping from the Service drop-down list, and both from the Directions drop-down list.
CHAPTER 6 6.7.1 Intrusion Prevention Configuration Settings The Intrusion Prevention configuration settings can be found in the Intrusion Prevention section on the Firewall Security Levels page. Enable intrusion prevention If enabled, intrusion prevention is used to monitor inbound traffic in order to find intrusion attempts. If disabled, intrusion prevention does not monitor traffic.
What is a False Positive? False positive is an alert that wrongly indicates that the related event has happened. In the F-Secure Client Security Internet Shield the alert text usually indicates this by using words like "probable" or "possible". These kind of alerts should be eliminated or minimized.
Page 219
CHAPTER 6 3. Select the Enable intrusion prevention check box. 4. Select Log without dropping from the Action on malicious packet: drop-down list. 5. Select Warning from the Alert severity: drop-down list. 6. Select 25% from the Detection sensitivity: drop-down list. Step 2.
OW TO HECK THAT NVIRONMENT IS ROTECTED Overview................... 221 How to Check the Protection Status from Outbreak Tab..221 How to Check that all the Hosts Have the Latest Policy... 221 How to Check that the Server has the Latest Virus Definitions 222 How to Check that the Hosts have the Latest Virus Definitions 222 How to Check that there are no Disconnected Hosts....
1. Select Root in the Policy Domains tab. 2. Go to the Outbreak tab. It displays a list of F-Secure Virus News items, and shows how many hosts are protected against each virus. When you select a news item, detailed information about that virus is displayed.
4. On the Centralized Management page you can see which of the hosts do not have the latest policy. You can also see the possible reasons for this: for example, the host is disconnected or there has been a fatal error at the host. How to Check that the Server has the Latest Virus Definitions 1.
CHAPTER 7 How to Check that there are no Disconnected Hosts 1. Select Root in the Policy Domains tab. 2. Go to the Summary tab and check what is displayed in the Domain section beside Disconnected hosts. 3. If there are disconnected hosts, click View disconnected hosts..
Viewing Alerts If there has been a problem with a program or with an operation, the hosts can send alerts and reports about it. It is a good idea to check regularly that there are no new alerts, and also to acknowledge (and delete) the alerts the reasons of which you have already troubleshooted.
If you want to create a weekly infection report (or some other report to be generated at regular intervals), you have two options: F-Secure Policy Manager Web Reporting, a web based tool with which you can generate a wide range of graphical reports from F-Secure Client Security alerts and status information.
Page 226
3. Check what is displayed beside Most common recent attack. If there has been an attack, you can access more detailed information by clicking View Internet Shield Status..This takes you to the Status tab and Internet Shield page, where you can see detailed information on the latest and recent attacks on different hosts.
Installation Editor creates policy-based installation tasks that each host in the target domain will carry out after the next policy update. It is also possible to upgrade F-Secure Client Security by using any other installation scheme explained in Adding Hosts”, 130...
Page 229
CHAPTER 8 Installed Version Version number of the product. If there are multiple versions of the product installed, all version numbers will be displayed. For hosts, this is always a single version number. Version to Install Version numbers of the available installation packages for the product.
Page 230
The Installation Editor then prepares a distribution installation package that is customized for the specific installation operation. The new package is saved on F-Secure Policy Manager Server. Start button is used to start the installation operations selected in the Version to Install field.
Page 231
CHAPTER 8 operation from the policy by clicking Stop All. This will cancel the installation operations defined for the selected policy domain or host. It is possible to stop all installation tasks in the selected domain and all subdomains by selecting the Recursively cancel installation for subdomains and hosts option in the confirmation dialog.
Viewing the Latest Scanning Report on a Local Host ..234 Adding a Scheduled Scan from a Local Host ....234 Logging and Log File Locations on Local Hosts ....235 Connecting to F-Secure Policy Manager and Importing a Policy File Manually ............239 Suspending Downloads and Updates......240...
Show report to view the report in your Web browser. When you perform a scan, F-Secure Client Security uses the manual scanning settings from the current Virus Protection level. You can see the scanning report also in the scanning report list on...
Viewing the Latest Scanning Report on a Local Host The Virus & Spy Protection tab in the F-Secure Client Security user interface displays the scanning report status. If you have an unread report waiting, the status is shown as “New report available”. You can access the report by clicking View..
Advanced Mode user interface, see “Configuring Scheduled Scanning”, 255. Logging and Log File Locations on Local Hosts From the F-Secure Client Security local user interface you can access several log files that provide you with data about the network traffic. 9.5.1 The LogFile.log file LogFile.log contains all alerts that F-Secure Client Security has generated...
The log format is binary and is compatible with the tcpdump format. It can be read either with the packet log viewer provided by F-Secure or with a common packet logging application like Wireshark. 4. To view the packetlog file, double click it in the window.
CHAPTER 9 Home users can use the packet logging to record evidence of intrusion attempts. The Logging Directory The logging directory is defined when installing the application. It can be changed by clicking Browse. 9.5.3 The Action.log file The action log is collecting data about the actions done by the firewall continuously.
Page 238
Receiving connection If the application has opened a LISTEN connection it is acting as an server and remote computers can connect to the port which the connection was opened for. Action log records these also these connections. 07/15/03 16:48:00 info appl control unknown allow...
Connecting to F-Secure Policy Manager and Importing a Policy File Manually If you need to initialize a connection from the local host to the F-Secure Policy Manager Server, you can do it as follows: 1. Go to the Central Management page, where you can see the date and time of last connection to the Policy Manager Server.
Suspending Downloads and Updates This option is configured from the F-Secure Policy Manager Console. It is useful for hosts that are sometimes used via a slow dial-up line. When this option is enabled, the user is allowed to suspend network communications, for example automatic polling of policies, sending statistics and Automatic Updates, temporarily.
Page 241
CHAPTER 9 3. Select one of the options from the Allow users to unload products drop-down menu. 4. Click to save the policy data. 5. Click to distribute the policy.
IRUS NFORMATION Malware Information and Tools on the F-Secure Web Pages .. 243 How to Send a Virus Sample to F-Secure........ 244 What to Do in Case of a Virus Outbreak? ........ 248...
CHAPTER 10 10.1 Malware Information and Tools on the F-Secure Web Pages You can find a list of sources of information about malware and useful tools at: http://www.f-secure.com/security_center/ For information of the latest security threats you can check these sources: The F-Secure blog: http://www.f-secure.com/weblog/...
10.2 How to Send a Virus Sample to F-Secure This section is for advanced users. This section covers the following topics for sending a virus sample to F-Secure Security Lab: How to package a virus sample What files to send...
Page 245
2. A false alarm from one of our antivirus products If you receive a missed or incorrect detection, or a false alarm with F-Secure Client Security, try to send us the following: the file in question the F-Secure Client Security version number...
Page 246
If an infection or false alarm is on a CD, you can send the CD to our office in Finland. For the address, see below. Please include a description of the problem, and a printed F-Secure Client Security report, if possible. We will return your CD if it has no...
3. If the sample is on some physical media, for example a CD, DVD or USB drive, you can send the physical media to us at: Security Labs F-Secure Corporation Tammasaarenkatu 7 PL 24 00181 Helsinki Finland 10.2.4 In What Language...
Support through our support web page: http://support.f-secure.com If you need urgent assistance, please point it out in your message. 4. If it is a new virus, try to locate a sample and send it to F-Secure Security Labs through the sample submission webform at: http://www.f-secure.com/samples Provide as much information about the problem as possible.
Page 249
7. When provided with a disinfection solution, test it on one computer first. If it works, it can be applied to all infected computers. Scan the cleaned computers with F-Secure Client Security and the latest virus definitions updates to ensure that no infected files are left.
Page 250
ETTING P THE ISCO NAC P LUGIN Introduction................251 Installing the Cisco NAC Plugin..........251 Attributes to be Used for Application Posture Token ....252...
F-Secure NAC plug-in communicates with Cisco® Trust Agent (CTA), a client software on the hosts that collects the security related information from the host and communicates the data to Cisco Secure Access Control Server (ACS).
For more information about CSUtil, see Cisco ACS documentation. 11.3 Attributes to be Used for Application Posture Token To configure the Cisco ACS server to monitor F-Secure product related security attributes, do the following: 1. Select the External User Databases button on the Cisco ACS server user interface.
Page 253
CHAPTER 11 Posture Validation Attributes for Anti-Virus Attribute-name Type Example Software-Name string F-Secure Anti-Virus Software-Version version 8.0.0.0 Dat-Date date [the date of database] Protection-Enabled unsigned integer 1=enabled, 0=disabled Posture Validation Attributes for Firewall Attribute-name Type Example Software-Name string F-Secure Internet...
Page 254
DVANCED EATURES IRUS AND PYWARE ROTECTION Overview................... 255 Configuring Scheduled Scanning ..........255 Advanced System Control Settings.......... 257 Configuring Policy Manager Proxy ........... 260 Configuring Automatic Updates on Hosts from Policy Manager Proxy ..................260 Configuring a Host for SNMP Management ......261 Excluding an Application from the Web Traffic Scanner...
2. Select Root in the Policy Domains pane. 3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select: F-Secure/F-Secure Anti-Virus 5. On the Product View pane (on the right) select the Scheduling Table page.
Page 256
9. Next click the Scheduling Parameters cell, and the click Edit. Now you can enter the parameters for the scheduled scan. A scheduled scan that is to be run weekly, every Monday starting at 8 p.m, from August 25, 2003 onwards, is configured as follows: ‘/t20:00 / b2003-08-25 /rweekly’...
2. Select Root in the Policy Domains pane. 3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select: F-Secure > F-Secure System Control > Settings > Show Notification Flyer on Deny Events...
2. Select Root in the Policy Domains pane. 3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select: F-Secure > F-Secure System Control > Settings > Local Administrator Control 5. Select All processes in the Product View pane.
Page 259
3. Select Root in the Policy Domains pane. 4. Select the Policy tab in the Properties pane (the middle pane). 5. On the Policy tab, select: F-Secure > F-Secure System Control > Settings > Applications 6. Click to add a new rule.
F-Secure Update server or the corporate F-Secure Policy Manager Server. F-Secure Policy Manager Proxy resides in the same remote network as the hosts that use it as a database distribution point. There should be one F-Secure Policy Manager Proxy in every network that is behind slow network lines.
6. When you have added all the proxies, click OK. 12.6 Configuring a Host for SNMP Management The F-Secure SNMP Management Extension is a Windows NT SNMP extension agent, which is loaded and unloaded with the master agent. The SNMP service normally starts on Windows start-up so the extension agent is always loaded.
Mode. 2. Select the Policy tab in the Properties pane. 3. On the Policy tab select F-Secure Client Security > Select Protocol Scanner > Trusted Applications > List of Trusted Processes. 4. Type the name of the process to exclude from the Web Traffic Scanner.
3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select: \F-Secure Internet Shield 5. Select the Logging tab in the Product View pane (on the right). This variable normally shows the status of the packet logging, Disabled means that it is not running, and Enabled that it is currently running on the host.
Policy Domains pane. 3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select the following path: \F-Secure Internet Shield\Settings\Firewall Engine\Allow Trusted Interface Select Enabled to enable Trusted Interface for the currently selected subdomain.
3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select the following path: \F-Secure Internet Shield\Settings\Firewall Engine\Firewall Engine To make sure the packet filtering is always enabled, set this variable to Yes, and select the Final check box. Remember to distribute the policy to enforce the change.
Page 267
CHAPTER 13 3. Select the Policy tab in the Properties pane (the middle pane). 4. On the Policy tab, select the following path: \F-Secure\F-Secure Internet Shield 5. In the Product View pane (on the right) select the Security Level Autoselection page.
9. The first security level is now ready. Click to add the second security level, in this example Mobile. 10. Enter the data in the cells by selecting a cell and clicking Edit. For the Mobile security level you should add the following data: Priority: The rules are checked in the order defined by the priority numbers, starting from the smallest number.
11. If nothing else helps, unload F-Secure products or set the Internet Shield to allow all mode. If even this does not help, it is likely that the problem is in routing or in some other component in the computer the user tries to connect to.
13.5.1 Creating a New Internet Service based on the Default HTTP In this example it is assumed that there is a web server running on a computer, and that web server is configured to use a non-standard web port. Normally a web server would serve TCP/IP port 80, but in this example it has been configured to serve port 8000.
Page 271
CHAPTER 13 Step 2. IP Protocol Number Select a protocol number for this service from the Protocol drop-down list. It contains the most commonly used protocols (TCP, UDP, ICMP). If your service uses any other protocol, refer to the table below and enter the respective number.
Page 272
Protocol Protocol Full Name Name Number ICMP Internet Control Message Protocol IGMP Internet Group Management Protocol IPIP IPIP Tunnels (IP in IP) Transmission Control Protocol Exterior Gateway Protocol Xerox PUP routing protocol User Datagram Protocol Xerox NS Internet Datagram Protocol IPV6 IP Version 6 encapsulation in IP version 4 RSVP...
Page 273
CHAPTER 13 Authentication Header protocol Protocol Independent Multicast COMP Compression Header protocol Raw IP packets Step 3. Initiator Ports If your service uses the TCP or UDP protocol, you need to define the initiator ports the service covers. The format for entering the ports and port ranges is as follows: “>port”...
Page 274
In this example, define the initiator port as >1023. Step 4. Responder Ports If your service uses the TCP or UDP protocol, you need to define the responder ports the service covers. In this example, define the responder port as 8000.
Page 275
CHAPTER 13 Step 5. Classification Number Select a classification number for the service from the drop down list. You can accept the default value. Step 6. Extra Filtering Select whether any extra filtering is to be applied for the traffic allowed by the service you are creating, in addition to the normal packet and stateful filtering.
Page 276
In this example you can accept the default, Disabled. When the service uses TCP protocol, and you do not have Application Control enabled, you can select Active mode FTP from the Extra Filtering drop-down menu. Active mode FTP requires special handling from the Firewall, as the information about the port that should be opened for the connection is included in the transferred data.
Page 277
CHAPTER 13 Step 7. Review and Accept the Rule 1. You can review your rule now. If you need to make any changes to the rule, click Back through the rule. 2. Click Finish to close the rule wizard. The rule you just created is now displayed in the Firewall Rules Table.
Advanced mode user interface. 2. From the Policy tab Select F-Secure > F-Secure Internet Shield > Settings > Dialup Control > Dialup Control. 3. Select enabled to switch Dialup Control on. 4. Click to save the policy data.
6. Select to Allow or Deny to allow or block the modem from calling the matching phone numbers. 7. Double-click the new row in the Comment column and add a description to explain the purpose of the rule to other F-Secure Policy Manager users. 8. Select Yes to enable the new rule.
The RequestInstallMode setting can override the selection for components, which have InstallMode=0. Configurable Prodsett.ini Settings You can edit edit the following settings in the prodsett.ini file. [F-Secure common] Common settings CD-Key=XXXX-XXXX-XXXX-XXXX-XXXX Enter the CD Key of the installation package here.
Page 283
APPENDIX A [F-Secure common] Common settings SupportedLanguages=ENG FRA DEU FIN SVE List of languages supported by the installation package. You can make the set of languages smaller by leaving out some unnecessary languages and repacking the package. When you add support for a new language to the package you should add that language here to make it effective.
Page 284
[F-Secure common] Common settings SecurityPolicy=0 | 1 | 2 The files and folders installed to NTFS and the product’s registry keys are protected with the NT security permissions according to the defined "SecurityPolicy": 0 = no special policy applied; files and folders inherit the security permissions from the parent.
Page 285
(default) 3 = Do not reboot after installation. [FSMAINST.DLL] Settings for F-Secure Management Agent RequestInstallMode=1 This component is always installed when you are installing a networked client. You do not need to edit the RequestInstallMode or InstallMode settings for this component.
Page 286
ServiceProviderMode=0 MibVersion= GatekeeperVersion= StatisticsFilterPattern1= UseOnlyUID= 0 = F-Secure Management Agent only uses all available identities (DNS name, IP address, WINS name, Unique Identity) to identify itself for the first time to the F-Secure Policy Manager Server. 1 = F-Secure Management Agent only uses its Unique Identity to identify itself to the F-Secure Policy Manager Server.
Page 287
This component is always installed when you are installing a networked client. You do not need to edit the RequestInstallMode or InstallMode settings for this component. FsmsServerUrl=http://fsmsserver URL to the F-Secure Policy Manager Server. FsmsExtensionUri=/fsms/fsmsh.dll Do not change this setting. FsmsCommdirUri=/commdir Do not change this setting.
Page 288
[FSAVINST.DLL] Settings for F-Secure Client Security - Virus Protection EnableRealTimeScanning=1 0 = Disable real-time scanning 1 = Enable real-time scanning (default). Debug=1 0 = Do not generate debug information. (default) 1 = Write debug information into the debug log during installation and uninstallation.
Page 289
APPENDIX A [MEHINST.DLL] Settings for SNMP Support RequestInstallMode=1 0 = Install this component as defined in the InstallMode setting. 1 = Install this component if newer, or not installed (default). 2 = Install this component if there is no existing version of it installed, or if the same or an older version exists.
Page 290
0 = Do not install this component. (default) 1 = Install this component, except if a newer version already exists. [FWINST.DLL] Settings for F-Secure Client Security - Internet Shield RequestInstallMode=1 0 = Install this component as defined in the InstallMode setting.
Page 291
APPENDIX A [FWINST.DLL] Settings for F-Secure Client Security - Internet Shield InstallDC=0 | 1 0 = Do not install Dial-up Control. (default) 1 = Install Dial-up Control InstallNetworkQuarantine=0 | 1 0 = Do not install Network Quarantine. (default) 1 = Install Network Quarantine.
Page 292
[FSPSINST.DLL] Settings for F-Secure Client Security - Network Scanner RequestInstallMode=1 0 = Install this component as defined in the InstallMode setting. 1 = Install this component if newer, or not installed (default). 2 = Install this component if there is no existing version of it installed, or if the same or an older version exists.
Page 293
APPENDIX A [FSNACINS.DLL] Settings for Cisco NAC Plugin RequestInstallMode=1 0 = Install this component as defined in the InstallMode setting. 1 = Install this component if newer, or not installed (default). 2 = Install this component if there is no existing version of it installed, or if the same or an older version exists.
E-Mail Attachment Virus Alert Message ID: 620-623 Definition: When a virus is found the virus is treated based on the configuration set on F-Secure Client Security Advanced configuration. The options to handle the virus are: Report only, disinfect virus or drop virus.
Page 296
Message ID: 630-633 Definition: When a malformed message is found it is treated based on the configuration set on F-Secure Client Security Advanced configuration. The options to handle malformed message are: Malformed message part was only reported, Malformed message part was dropped, Malformed e-mail was blocked.
Page 297
APPENDIX B Message: Malformed E-Mail Alert! Description: <description of the malformation> Message part: <malformed message pert> Action: <Action taken> Message < Message ID> from: <Email header: sender filed email address> to: < Email header: recipient filed email addresses> subject: < Email header: The title subject filed of the message >...
Overview During the F-Secure Client Security installation process these products are either detected so that the user can manually uninstall them or automatically uninstalled: Agnitum Outpost Firewall Pro 1.0 AOL Safety and Security Center avast! Antivirus AVG Anti-Virus 7.0 AVG Free Edition AVG Anti-Virus 7.1...
Page 301
EarthLink Toolbar EMBARQ Toolbar (Powered by EarthLink) PC Antivirus F-PROT Antivirus for Windows FortiClient F-Secure Anti-spyware F-Secure Anti-Virus Client Security Incompatible F-Secure product F-Secure Anti-spyware Broken or incompletely uninstalled product F-Secure VPN+ Client G DATA AntiVirenKit (German version only) G DATA InternetSecurity (German version only)
Page 302
Kaspersky(TM) Anti-Virus Personal 4.5 Kaspersky Anti-Virus Personal Pro Kaspersky Anti-Virus Personal Kerio Personal Firewall Kingsoft Internet Security (English version only) McAfee SecurityCenter McAfee VirusScan McAfee VirusScan Enterprise McAfee VirusScan Home Edition McAfee Internet Security McAfee Uninstall Wizard McAfee Personal Firewall McAfee Personal Firewall Plus McAfee Privacy Service McAfee SecurityCenter...
Page 303
APPENDIX C Norman Personal Firewall 1.42 Norman Virus Control NOD32 antivirus system (English, French, German, Hungarian, Romanian and Spanish, simplified Chinese, traditional Chinese, Czech, Croatian, Italian, Japanese, Dutch, Polish, Portuguese Russian and Slovenian versions only) PureSight Parental Control Radialpoint Security Services Radialpoint Servicepoint Agent 1.5.11 Sophos Anti-Virus Sophos Anti-Virus...
Page 305
APPENDIX C Trend Micro AntiVirus 2007 Trend Micro PC-cillin Internet Security 2007 Trend Micro Internet Security Pro ZoneAlarm ZoneAlarm Security Suite ZoomTownInternetSecurity v.4.5...
Page 307
Alert A message generated by an F-Secure product if there has been a problem with a program or with an operation. Alerts are also generated when a virus is found. The administrator and the user can define which alerts are generated, either by defining firewall rules or enabling or disabling specific alerts.
Page 308
Authorization The right to perform an action on an object. Also the act of proving this right. Backdoor A malicious application or plug-in that opens up a possibility for a remote user to access the compromised computer. This is very often an application that opens up one or more listening ports and waits for connections from the outside, but there are variations of this.
Page 309
Domain Name A unique name that identifies an Internet site (for example, F-Secure.com) The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address.
Page 310
False positive False positive is an alert that wrongly indicates that the related event has happened. In the F-Secure Internet Shield the alert text usually indicates this by using words like "probable" or "possible". This kind of alerts should be eliminated or minimised.
Page 311
CHAPTER D Hidden file Hidden files are not visible to users. It is possible that a rootkit is hiding the file from the normal file listings. Hidden process Hidden processes are not visible to users. It is possible that a rootkit is hiding the process from Windows Task Manager.
Page 312
IPSec (IETF) The IP Security Protocol is designed to provide interoperable, high quality, cryptography-based security for IPv4 and IPv6. The set of security services offered includes access control, connection-less integrity, data origin authentication, protection against replays, confidentiality (encryption), and limited traffic flow confidentiality. These services are provided at the IP layer, offering protection for IP and/or upper layer protocols.
Page 313
CHAPTER D Mbit Megabit. (SNMP terminology) Management Information Base. Detailed information about MIBs can be found from RFC1155-SMI, RFC1212-CMIB and RFC1213-MIB2. MIME Multipurpose Internet Mail Extension, a standard system for identifying the type of data contained in a file based on its extension. MIME is an Internet protocol that allows you to send binary files across the Internet as attachments to e-mail messages.
Page 314
A security policy is a set of well-defined rules that regulate how sensitive information and other resources are managed, protected, and distributed. The management architecture of F-Secure software uses policies that are centrally configured by the administrator for optimum control of security in a corporate environment.
Page 315
You can add new applications to the Quarantine when Virus & Spy Protection detects them. Random Seed The seed value for the cryptographically strong random number generator, which is updated each time an F-Secure application closes. Riskware Riskware is any program that does not intentionally cause harm but can be dangerous if misused, especially if set up incorrectly.
Page 316
Simple Network Management Protocol. A standard TCP/IP protocol used for monitoring and setting network parameters and counters of LAN- and WAN-connected repeaters, bridges, routers, and other devices. In F-Secure Policy Manager it is used for sending and monitoring alerts and statistics. Spyware Spyware is a software, which tracks user information and reports it without your knowledge via the Internet to third parties.
Page 317
IP addresses that begin with the same two or three numbers. System Event Log A service that records events in the system, security, and application logs. F-Secure Client Security events are recorded in application logs. TAC Score The TAC score determines how likely the application is malware, 1 being the least and 10 being the most problematic.
Page 318
Trojan A trojan is usually a standalone program that performs destructive or other malicious actions. Destructive actions can vary from erasing or modifying the contents of files on a hard drive to a complete destruction of data. A backdoor trojan is a remote access tool that can allow a hacker to get full control over the entire infected system.
Page 319
CHAPTER D Worm A computer program capable of replication by inserting copies of itself in networked computers.
Page 320
ECHNICAL UPPORT Overview................... 321 Web Club.................. 321 Advanced Technical Support............ 321 F-Secure Technical Product Training ........322...
The F-Secure Web Club provides assistance to users of F-Secure products. To enter, choose the Web Club command from the Help menu in the F-Secure application. The first time you use this option, enter the path and name of your Web browser and your location.
After installing the F-Secure software, you may find a ReadMe file in the F-Secure folder in the Windows Start > Programs menu. The ReadMe file contains late-breaking information about the product.
Page 323
The courses take place in modern and well-equipped classrooms. All of our courses consist of theory and hands-on parts. At the end of each course there is a certification exam. Contact your local F-Secure office or F-Secure Certified Training Partner to get information about the courses and schedules.
Page 324
They include antivirus and desktop firewall with intrusion prevention, antispam and antispyware solutions. Founded in 1988, F-Secure has been listed on the Helsinki Exchanges since 1999, and has been consistently growing faster than all its publicly listed competitors.
Need help?
Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?
Questions and answers