F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 5

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

4.5.2 Installation Instructions .................................................................................154
4.6
Installing on an Infected Host...................................................................................155
4.7
How to Check That the Management Connections Work ........................................156
Chapter 5
5.1
5.2
Configuring Automatic Updates ...............................................................................159
5.2.1 How do Automatic Updates Work?...............................................................160
5.2.2 Automatic Updates Configuration Settings...................................................160
5.2.4 Configuring Policy Manager Proxy ...............................................................162
5.3
Configuring Real-Time Scanning .............................................................................164
5.3.1 Real-Time Scanning Configuration Settings.................................................164
5.3.2 Enabling Real-Time Scanning for the Whole Domain ..................................166
5.3.3 Forcing all Hosts to Use Real-Time Scanning..............................................167
5.4
Configuring System Control .....................................................................................169
5.4.1 System Control Configuration Settings.........................................................169
5.4.2 System Control Server Queries (DeepGuard 2.0)........................................170
5.5
Configuring Rootkit Scanning (Blacklight)................................................................170
5.5.1 Rootkit Scanning Configuration Settings ......................................................171
5.5.2 Launching a Rootkit Scan for the Whole Domain.........................................171
5.6
Configuring E-mail Scanning....................................................................................172
5.6.1 E-mail Scanning Configuration Settings .......................................................172
5.7
Configuring Web Traffic (HTTP) Scanning...............................................................176
5.7.1 HTTP Scanning Configuration Settings........................................................176
5.7.3 Excluding a Web Site from HTTP Scanning.................................................177
5.8
Configuring Spyware Scanning................................................................................179
5.8.1 Spyware Control Settings .............................................................................179
5.8.2 Setting up Spyware Control for the Whole Domain ......................................183
5.8.3 Launching Spyware Scanning in the Whole Domain....................................185
v
157

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents