F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 184

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

184
Step 1.
Step 2.
Spyware Control also detects riskware. Riskware is any program that
does not intentionally cause harm but can be dangerous if misused,
especially if set up incorrectly. Examples of such programs are chat
programs (IRC), or file transfer programs. If you want to allow the use of
these programs in the managed domain, you should include them in the
test environment and allow their use when you are checking and
configuring rules for the applications in Spyware and Riskware Reported
by hosts table.
Create a Test Domain and Enable Spyware
Scanning
1. Create a test environment with a few computers that have the
programs normally used in your company installed.
2. Import these hosts to the centrally managed domain.
3. Go to the Settings tab and select the Real-Time Scanning page.
Enable spyware scanning on the hosts by selecting Scan for spyware
in the Spyware Scanning on File Access section.
Alternatively, you can launch a manual spyware scan on the hosts.
4. Click
to save the policy data.
5. Click
to distribute the policy.
Check the Reported Spyware and Riskware
1. A list of the spyware and riskware found during the scanning is
displayed in the Spyware and Riskware Reported by hosts table.
Check the list of reported spyware and riskware. If there are
applications that are needed in your organization, select the
application in the table and click
2. A dialog asking you to confirm the action is opened. Check the
information displayed in the dialog, and if you are sure you want to
allow the spyware or riskware to run on the host or domain, click OK.
3. The selected application will be moved into the Applications Excluded
from Spyware Scanning table.
Allow
Application.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents