5.8
Configuring Spyware Scanning
5.8.1
Spyware Control Settings
Spyware scanning protects the hosts against different types of spyware,
such as data miners, monitoring tools and dialers. In centrally managed
mode spyware scanning can be set, for example, to report the spyware
items found on hosts to the administrator or to quarantine all found
spyware items automatically. It is also possible to allow the use of certain
spyware applications by specifying them as allowed spyware on the
Spyware Control page.
A Note About Cleaning Spyware and Riskware
Spyware is a gray area between a fully legitimate application and a virus/
trojan. Some spyware may be necessary to run ordinary applications,
while most spyware is just malware and should not be allowed to run
even once. By default, F-Secure Spyware Scanning is configured to allow
all spyware to run. You can check whether you need to allow some
spyware to run on your network before you tighten the security and
prevent all new spyware from executing.
Spyware scanning also detects and reports riskware. Riskware is any
program that does not intentionally cause harm but can be dangerous if
misused, especially if set up incorrectly. Examples of such programs are
chat programs (IRC), or file transfer programs.
Spyware Scanning on File Access
To enable real-time spyware scanning, select the Scan for spyware check
box.
CHAPTER 5
179
Need help?
Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?
Questions and answers