F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 6

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

5.9
Preventing Users from Changing Settings ...............................................................187
5.9.1 Setting all Virus Protection Settings Final.....................................................187
5.10 Configuring F-Secure Client Security Alert Sending ................................................188
5.10.2 Disabling F-Secure Client Security Alert Pop-ups ........................................190
5.11 Monitoring Viruses on the Network ..........................................................................190
5.12 Testing your Antivirus Protection .............................................................................190
Chapter 6
6.1
Overview: What can Internet Shield be Used for? ...................................................193
6.1.1 Global Firewall Security Levels ....................................................................193
6.1.2 Security Level Design Principles ..................................................................195
6.2
Configuring Internet Shield Security Levels and Rules ............................................196
6.2.1 Selecting an Active Security Level for a Workstation ...................................196
6.3
Configuring Network Quarantine..............................................................................201
6.3.1 Network Quarantine Settings........................................................................201
6.3.2 Enabling Network Quarantine in the Whole Domain ....................................201
6.3.3 Fine-Tuning Network Quarantine .................................................................202
6.4
Configuring Internet Shield Rule Alerts ....................................................................203
6.4.1 Adding a New Internet Shield Rule with Alerting ..........................................203
6.5
Configuring Application Control................................................................................207
6.5.1 Application Control Configuration Settings ...................................................209
6.5.2 Setting up Application Control for the First Time ..........................................210
6.5.4 Editing an Existing Application Control Rule ................................................213
6.5.5 Disabling Application Control Pop-ups .........................................................214
6.6
How to use Alerts for Checking that Internet Shield Works? ...................................215
6.7
Configuring the Intrusion Prevention........................................................................216
6.7.1 Intrusion Prevention Configuration Settings .................................................217
6.7.2 Configuring IPS for Desktops and Laptops ..................................................218
Chapter 7
7.1
Overview ..................................................................................................................221
vi
192
220

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents