F-SECURE LINUX SECURITY Manual page 36

Table of Contents

Advertisement

36 | F-Secure Linux Security | Using the Product
h) Click
Add Service to This
The service is added to the new rule.
i) If you do not want to add other services to the same rule, click
Each rule must have at least one service. If the rule contains a new service, make sure
you have saved the service list in the
The rule is added to the active set of rules on the
j) Click
Save
to save the new rule list.
Verify Baseline
You can verify the baseline manually to make sure that your system is safe and all baselined
files are unmodified.
1. Enter your passphrase to verify the baseline.
2. Do not start any other integrity checking processes while the product verifies the baseline.
If an attacker has managed to gain a root access to the system and regenerated the baseline,
the regenerated baseline does not match against your passphrase when you verify the baseline.
Automatic Updates
F-Secure Automatic Update Agent keeps the protection on your computer updated.
F-Secure Automatic Update Agent retrieves the latest updates to your computer when you are
connected to the Internet.
Information about the latest virus definition database update can be found at:
http://www.F-Secure.com/download-purchase/updates.shtml
Software Installation Mode
Use the Software Installation Mode when you want to modify system files and programs.
Integrity Checking prevents unauthorized and unwanted modifications of system files and
programs. When you update your operating system, apply a security update or install new
versions of software, you need to modify files that Integrity Checking monitors.
When the Software Installation Mode is enabled, any process can load any kernel modules
regardless whether they are in the baseline or not and any process can change any files in the
baseline, whether those files are protected or not. The real-time scanning is still enabled and it
alerts of any malware found during the installation.
When leaving the Software Installation Mode, the product updates the known files list with new
files and generates the new baseline. If the integrity checking and the rootkit protection features
have been enabled, they are turned back on after the new baseline is generated.
Rule.
Network Services
Firewall Rules
Add to Firewall
Rules.
page.
table.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents