F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 245

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

1. Trojan or other standalone malware (malicious programs)
If you are sending a sample of a suspected standalone malware
(worm, backdoor, trojan, dropper), specify the location of the file on
the infected system and the way it was started (Registry, INI files,
Autoexec.bat, etc.). A description of the source of the file is also
useful.
2. A false alarm from one of our antivirus products
If you receive a missed or incorrect detection, or a false alarm with
F-Secure Client Security, try to send us the following:
the file in question
the F-Secure Client Security version number
the last virus definition updates date
a description of the system configuration
a description of how to reproduce the problem
the F-Secure Client Security scanning report file. For instructions
on how to save the file see:
http://support.f-secure.com/enu/home/virusproblem/samples/
index.shtml
3. A new virus or trojan
If you think an unknown infection is in the computer system and an
antivirus program does not find anything, please send us:
If you are running Windows XP the msinfo32 report. To create the
report:
i.
Select
Start > Run...
ii.
Type msinfo32 and click
iii. While viewing the System Summary node select
some Windows configuration files (WIN.INI, SYSTEM.INI) and
DOS configuration files (Autoexec.bat, Config.sys)
a full or partial export from a System Registry (this can be done
with the Regedit utility that all Windows versions have)
the contents of the \Start Menu\Programs\Startup\ folder
4. Virus that infects executable files
CHAPTER 10
OK
File >
245
Save.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents