Configuring Spyware Scanning; Spyware Control Settings - F-SECURE CLIENT SECURITY 8.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

5.8

Configuring Spyware Scanning

5.8.1

Spyware Control Settings

Spyware scanning protects the hosts against different types of spyware,
such as data miners, monitoring tools and dialers. In centrally managed
mode spyware scanning can be set, for example, to report the spyware
items found on hosts to the administrator or to quarantine all found
spyware items automatically. It is also possible to allow the use of certain
spyware applications by specifying them as allowed spyware on the
Spyware Control page.
A Note About Cleaning Spyware and Riskware
Spyware is a gray area between a fully legitimate application and a virus/
trojan. Some spyware may be necessary to run ordinary applications,
while most spyware is just malware and should not be allowed to run
even once. By default, F-Secure Spyware Scanning is configured to allow
all spyware to run. You can check whether you need to allow some
spyware to run on your network before you tighten the security and
prevent all new spyware from executing.
Spyware scanning also detects and reports riskware. Riskware is any
program that does not intentionally cause harm but can be dangerous if
misused, especially if set up incorrectly. Examples of such programs are
chat programs (IRC), or file transfer programs.
Spyware Scanning on File Access
To enable real-time spyware scanning, select the Scan for spyware check
box.
CHAPTER 5
179

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Client security

Table of Contents