F-SECURE LINUX SECURITY Manual page 4

Table of Contents

Advertisement

4 | F-Secure Linux Security | TOC
Chapter 4: Administering the Product ...........................................29
Chapter 5: Using the Product..........................................................33
Installing Command Line Scanner Only .....................................................................24
Using The Product With Samba Servers.....................................................................25
Creating a Backup .................................................................................................................27
Uninstallation .........................................................................................................................27
Basics of Using F-Secure Policy Manager ............................................................................30
Accessing the Web User Interface ........................................................................................30
Testing the Antivirus Protection .............................................................................................31
Summary................................................................................................................................34
I Want to.......................................................................................................................34
Scanning for Viruses...............................................................................................................37
What are Viruses and Other Malware?........................................................................37
Stopping Viruses and Other Malware..........................................................................40
Methods of Protecting the Computer from Malware ...................................................42
Firewall Protection..................................................................................................................50
What Is a Firewall?......................................................................................................50
What Are Security Profiles?.........................................................................................51
Firewall Rules..............................................................................................................53
Firewall Settings...........................................................................................................56
Integrity Checking ..................................................................................................................57
Known Files List ..........................................................................................................57
Software Installation Mode ..........................................................................................59
Baseline.......................................................................................................................60
Rootkit Prevention .......................................................................................................61
General Settings ....................................................................................................................62
Alerts ...........................................................................................................................62
Automatic Updates ......................................................................................................65
F-Secure Policy Manager Proxies ..............................................................................66
About ...........................................................................................................................66

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Linux security 7.02

Table of Contents