Sign In
Upload
Manuals
Brands
F-SECURE Manuals
Software
CLIENT SECURITY 7.00
F-SECURE CLIENT SECURITY 7.00 Manuals
Manuals and User Guides for F-SECURE CLIENT SECURITY 7.00. We have
2
F-SECURE CLIENT SECURITY 7.00 manuals available for free PDF download: Administrator's Manual, Getting Started Manual
F-SECURE CLIENT SECURITY 7.00 Administrator's Manual (315 pages)
Brand:
F-SECURE
| Category:
Software
| Size: 3 MB
Table of Contents
Table of Contents
3
About this Guide
10
Overview
11
Additional Documentation
13
Conventions Used in F-Secure Guides
15
Symbols
15
F-Secure Client Security Components and Features
18
Overview
18
Virus and Spy Protection
18
Internet Shield
21
Application Management
22
Introduction to F-Secure Policy Manager
23
Main Components of F-Secure Policy Manager
24
F-Secure Policy Manager Features
25
Basic Terminology
26
Chapter 1 Introduction
17
Chapter 2 Installing F-Secure Policy Manager
28
Overview
29
System Requirements
30
F-Secure Policy Manager Server
30
F-Secure Policy Manager Console
32
Installation Steps
33
Uninstalling F-Secure Policy Manager
55
Chapter 3 Introduction to F-Secure Policy Manager Anti-Virus Mode User Interface
56
Overview
57
Policy Domains Tab
58
Management Tabs
58
Summary Tab
59
Outbreak Tab
66
Settings Tab
68
Status Tab
102
Alerts Tab
110
Reports Tab
112
Installation Tab
113
Operations Tab
115
Toolbar
116
Menu Commands
117
Settings Inheritance
120
How Settings Inheritance Is Displayed on the User Interface
122
Locking and Unlocking All Settings on a Page at Once
123
Settings Inheritance in Tables
124
4 S Etting up the M N Anaged Etwork
125
Chapter 4 Setting up the Managed Network
125
Overview
126
Logging in for the First Time
126
Logging in
127
Creating the Domain Structure
130
Adding Policy Domains and Subdomains
132
Adding Hosts
132
Autoregistered Hosts
133
Windows Domains
133
F-Secure Push Installations
138
Policy-Based Installation
147
Local Installation and Updates with Pre-Configured Packages
151
Local Installation
156
Installation Instructions
157
Local Installation System Requirements
157
Installing on an Infected Host
158
How to Check that the Management Connections Work
159
5 C V Onfiguring Irus S and Pyware P Rotection
160
Chapter 5 Configuring Virus and Spyware Protection
160
Overview: What Can Virus and Spyware Protection be Used for
161
Configuring Automatic Updates
162
Automatic Updates Configuration Settings
163
How Do Automatic Updates Work
163
Configuring Automatic Updates from Policy Manager Server
164
Configuring Policy Manager Proxy
165
Configuring Real-Time Scanning
166
Real-Time Scanning Configuration Settings
166
Enabling Real-Time Scanning for the Whole Domain
169
Forcing All Hosts to Use Real-Time Scanning
169
Excluding Microsoft Outlooks's .Pst File from Real-Time Scanning
170
Configuring System Control
171
System Control Configuration Settings
171
Configuring Rootkit Scanning
172
Launching a Rootkit Scan for the Whole Domain
172
Rootkit Scanning Configuration Settings
172
Configuring E-Mail Scanning
173
E-Mail Scanning Configuration Settings
173
Enabling E-Mail Scanning for Incoming and Outgoing E-Mails
176
Configuring Web Traffic (HTTP) Scanning
178
HTTP Scanning Configuration Settings
178
Enabling Web Traffic Scanning for the Whole Domain
179
Excluding a Web Site from HTTP Scanning
179
Configuring Spyware Scanning
181
Spyware Control Settings
181
Setting up Spyware Control for the Whole Domain
185
Launching Spyware Scanning in the Whole Domain
187
Allowing the Use of a Spyware or Riskware Component
188
Preventing Users from Changing Settings
189
Setting All Virus Protection Settings Final
189
Configuring F-Secure Client Security Alert Sending
190
Monitoring Viruses on the Network
192
Testing Your Antivirus Protection
192
6 C I Onfiguring Nternet S Hield
194
Chapter 6 Configuring Internet Shield
195
Global Firewall Security Levels
195
Overview: What Can Internet Shield be Used for
195
Security Level Design Principles
197
Configuring Internet Shield Security Levels and Rules
198
Selecting an Active Security Level for a Workstation
198
Configuring a Default Security Level for the Managed Hosts
199
Adding a New Security Level for a Certain Domain Only
200
Configuring Network Quarantine
203
Enabling Network Quarantine in the Whole Domain
203
Network Quarantine Settings
203
Fine-Tuning Network Quarantine
204
Configuring Internet Shield Rule Alerts
205
Adding a New Internet Shield Rule with Alerting
205
Configuring Application Control
209
Application Control Configuration Settings
211
Setting up Application Control for the First Time
212
Creating a Rule for an Unknown Application on Root Level
214
Editing an Existing Application Control Rule
215
Disabling Application Control Pop-Ups
216
How to Use Alerts for Checking that Internet Shield Works
217
Configuring the Intrusion Prevention
218
Intrusion Prevention Configuration Settings
219
Configuring IDS for Desktops and Laptops
220
7 H C Ow to Heck that E the Nvironment Is P Rotected
222
How to Check that All the Hosts Have the Latest Policy
223
How to Check the Protection Status from Outbreak Tab
223
Overview
223
How to Check that the Hosts Have the Latest Virus Definitions
224
How to Check that the Server Has the Latest Virus Definitions
224
How to Check that There Are no Disconnected Hosts
225
Viewing Scanning Reports
225
Viewing Alerts
226
Creating a Weekly Infection Report
227
Monitoring a Possible Network Attack
228
Chapter 7 How to Check that the Environment Is Protected
230
Overview: Upgrading Software
230
Chapter 8 Upgrading Software
230
Using the Installation Editor
230
9 L H Ocal Ost O Perations
234
Overview
235
Scanning File Viruses Manually
235
Adding a Scheduled Scan from a Local Host
236
Viewing the Latest Scanning Report on a Local Host
236
Logging and Log File Locations on Local Hosts
237
Logfile.log
237
Packet Logging
238
Other Log Files
241
Connecting to F-Secure Policy Manager and Importing a Policy File Manually
241
Allowing Users to Unload F-Secure Products
242
Suspending Downloads and Updates
242
10 V Iirusnformation
244
Chapter 10 Virus Information
245
F-Secure Radar
245
Latest Threats
245
Virus Information
245
Virus Information on F-Secure Web Pages
245
How to Send a Virus Sample to F-Secure
246
How to Package a Virus Sample
246
What Should be Sent
247
Where to Send the Virus Sample
249
In What Language
250
Response Times
250
What to Do in Case of a Virus Outbreak
250
Viruses in the Wild
246
Introduction
254
Chapter 11 Setting up Cisco NAC Support
254
Installing Cisco NAC Support
254
Importing Posture Validation Attribute Definitions
255
Attributes to be Used for Application Posture Token
255
Chapter 12 Advanced Features: Virus and Spyware Protection
258
Configuring Scheduled Scanning
258
Overview
258
Configuring Policy Manager Proxy
260
Configuring Automatic Updates on Hosts from Policy Manager Proxy
261
Configuring a Host for SNMP Management
262
Chapter 13 Advanced Features: Internet Shield
264
Chapter 9 Local Host Operations
264
Managing Internet Shield Properties Remotely
264
Overview
264
Packet Logging
264
Trusted Interface
265
Packet Filtering
266
Configuring Security Level Autoselection
266
Troubleshooting Connection Problems
268
Adding New Services
269
Creating a New Internet Service Based on the Default HTTP
270
Appendix A Modifying PRODSETT.INI
279
A.1 Overview
279
A.2 Configurable Prodsett.ini Settings
279
B.1 Overview
293
Appendix B E-Mail Scanning Alert and Error Messages
297
Glossary
297
Technical Support
311
Advanced Technical Support
312
Overview
312
Virus Descriptions on the Web
312
Web Club
312
F-Secure Technical Product Training
313
Training Program
313
Contact Information
314
Advertisement
F-SECURE CLIENT SECURITY 7.00 Getting Started Manual (28 pages)
Brand:
F-SECURE
| Category:
Software
| Size: 0 MB
Table of Contents
Table of Contents
3
Chapter 1 Introduction
4
Chapter 2 F-Secure Client Security
5
System Requirements
5
Installation Options
6
Stand-Alone Installation
6
Remote Installation with F-Secure Policy Manager
10
Local Installation and F-Secure Policy Manager
12
Chapter 3 F-Secure Policy Manager
17
System Requirements
18
User Interfaces
20
Installation Instructions
20
Advertisement
Related Products
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
F-SECURE LINUX SECURITY 7.02
F-SECURE POLICY MANAGER 7.0 -
F-SECURE CLIENT SECURITY 9.01 - S
F-SECURE CLIENT SECURITY 9.00 - QUICK
F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
F-SECURE ANTI-VIRUS FOR MIMESWEEPER -
F-SECURE Categories
Software
Network Router
Gateway
More F-SECURE Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL