Software Installation Mode - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

1. Enter the filename of the file you want to monitor to the
more than one file, separate each filename with a space.
2. Select the protection method you want to use.
Select
Monitor
Select
Protect
it cannot be changed.
3. Select whether you want to prevent the access to the modified file.
Select
Allow
Select
Deny
executed.
4. If you want to ignore changes to some attributes of the file, select one or more of the
Attributes
checkboxes:
Mode: Changes to file permissions are ignored
User: Changes to file ownership are ignored
Group: Changes to file group are ignored
Size: Changes to file size are ignored
Modification time: Changes to file modification time are ignored
Hash: Changes to the content of the file are ignored
Note: Ignoring only the hash attribute is not usually desirable, since modifying file
contents usually changes the modification time and size as well.
5. Click
Add to known files
Integrity checking does not protect new or modified files before you regenerate the baseline.
Regenerate the baseline to protect files you have added.
Note: You can add a single file or multiple files to the baseline at the same time.

Software Installation Mode

Use the Software Installation Mode when you want to modify system files and programs.
Integrity Checking prevents unauthorized and unwanted modifications of system files and
programs. When you update your operating system, apply a security update or install new
versions of software, you need to modify files that Integrity Checking monitors.
to only monitor the file. Monitored file may be modified.
to deny all modifications of the file. The protected file can be opened but
to allow the access to the modified file when it is executed or opened.
to deny the access to the modified file. Modified files cannot be opened or
to add the entry to the Known Files List.
F-Secure Linux Security | Using the Product | 59
Filename
field. If you want to add
Ignored

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents