How The Product Works; Protection Against Malware; Host Intrusion Prevention System - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

8 | F-Secure Linux Security | Welcome

How the Product Works

Protection Against Malware

Host Intrusion Prevention System

The product detects and prevents intrusions and protects against malware.
With the default settings, computers are protected right after the installation without any time
spent configuring the product.
The product protects the system against viruses and potentially malicious files.
When user downloads a file from the Internet, for example by clicking a link in an e-mail message,
the file is scanned when the user tries to open it. If the file is infected, the product protects the
system against the malware.
Real-time scanning gives you continuous protection against viruses and riskware items as
files are opened, copied, and downloaded from the Web. Real-time scanning functions
transparently in the background, looking for viruses whenever you access files on the hard
disk, diskettes, or network drives. If you try to access an infected file, the real-time protection
automatically stops the virus from executing.
When the real-time scanning has been configured to scan a limited set of files, the manual
scanning can be used to scan the full system or you can use the scheduled scanning to scan
the full system at regular intervals.
Automatic Updates keep the virus definitions always up-to-date. The virus definition databases
are updated automatically after the product has been installed. The virus definitions updates
are signed by the F-Secure Anti-Virus Research Team.
The Host Intrusion Prevention System ( HIPS) detects any malicious activity on the host, protecting
the system on many levels.
Integrity Checking protects the system against unauthorized modifications. It is based on the
concept of a known good configuration - the product should be installed before the computer
is connected to the network to guarantee that the system is in a known good configuration.
You can create a baseline of the system files you want to protect and block modification
attempts of protected files for all users.
The firewall component is a stateful packet filtering firewall which is based on Netfilter and
iptables. It protects computers against unauthorized connection attempts. You can use

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Linux security 7.02

Table of Contents