F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 7

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

7.2
How to Check the Protection Status from Outbreak Tab .........................................221
7.3
How to Check that all the Hosts Have the Latest Policy ..........................................221
7.4
7.5
7.6
How to Check that there are no Disconnected Hosts ..............................................223
7.7
Viewing Scanning Reports .......................................................................................223
7.8
Viewing Alerts ..........................................................................................................224
7.9
Creating a Weekly Infection Report .........................................................................225
7.10 Monitoring a Possible Network Attack......................................................................225
Chapter 8
8.1
Overview: Upgrading Software ................................................................................228
8.1.1 Using the Installation Editor..........................................................................228
Chapter 9
9.1
Overview ..................................................................................................................233
9.2
Scanning File Viruses Manually ...............................................................................233
9.3
Viewing the Latest Scanning Report on a Local Host ..............................................234
9.4
Adding a Scheduled Scan from a Local Host...........................................................234
9.5
Logging and Log File Locations on Local Hosts ......................................................235
9.5.1 The LogFile.log file .......................................................................................235
9.5.2 Packet Logging.............................................................................................236
9.5.3 The Action.log file .........................................................................................237
9.5.4 Other Log Files .............................................................................................239
9.6
9.7
Suspending Downloads and Updates ......................................................................240
9.8
Allowing Users to Unload F-Secure Products ..........................................................240
10.1 Malware Information and Tools on the F-Secure Web Pages .................................243
10.2 How to Send a Virus Sample to F-Secure ...............................................................244
10.2.1 How to Package a Virus Sample ..................................................................244
10.2.2 What Should Be Sent ...................................................................................244
vii
227
232
242

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents