•installing application software to local and remote systems,
•monitoring the activities of all systems in the enterprise to ensure
compliance with corporate policies and centralized control.
When the system has been set up, you can see status information from
the entire managed domain in one single location. In this way it is very
easy to make sure that the entire domain is protected, and to modify the
protection settings when necessary. You can also restrict the users from
making changes to the security settings, and be sure that the protection
is always up-to-date.
10 | F-Secure Client Security | Introduction
System requirements
This section provides the system requirements for both Policy Manager Server and Policy Manager Console.
Policy Manager Server
In order to install Policy Manager Server, your system must meet the minimum requirements given here.
Microsoft Windows:Operating system:
•Microsoft Windows Server 2003 SP1 or higher
(32-bit); Standard, Enterprise, Web Edition or Small
Business Server editions
•Windows Server 2003 SP1 or higher (64-bit);
Standard or Enterprise editions
•Windows Server 2008 SP1 (32-bit); Standard,
Enterprise or Web Server editions
•Windows Server 2008 SP1 (64-bit); Standard,
Enterprise, Web Server, Small Business Server or
Essential Business Server editions
•Windows Server 2008 R2; Standard, Enterprise or
Web Server editions
Disk space:
P4 2 GHz processor or faster.Processor:
Managing more than 5000 hosts or using Web
Reporting requires P4 3 GHz level processor or faster.
512 MB RAM, 1 GB RAM recommended.Memory:
Managing more than 5000 hosts or using Web
Reporting requires 1 GB RAM.
5 GB of free hard disk space; 8 GB or more is
recommended. The disk space requirements depend
on the size of the installation.
In addition to this it is recommended to allocate about
1 MB per host for alerts and policies. The actual disk
space consumption per host is hard to anticipate, since
it depends on how the policies are used and how many
installation packages are stored.
10 Mbit network.Network:
Managing more than 5000 hosts requires a 100 Mbit
network.
Policy Manager Console
In order to install Policy Manager Console, your system must meet the minimum requirements given here.
F-Secure Client Security | Introduction | 11
Microsoft Windows:Operating system:
•Windows XP Professional (SP2 or higher)
•Windows Vista (32-bit or 64-bit) with or without
SP1; Business, Enterprise or Ultimate editions
•Windows 7 (32-bit or 64-bit); Professional,
Enterprise or Ultimate editions
•Microsoft Windows Server 2003 SP1 or higher
(32-bit); Standard, Enterprise, Web Edition or Small
Business Server editions
•Windows Server 2003 SP1 or higher (64-bit);
Standard or Enterprise editions
•Windows Server 2008 SP1 (32-bit); Standard,
Enterprise or Web Server editions
•Windows Server 2008 SP1 (64-bit); Standard,
Enterprise, Web Server, Small Business Server or
Essential Business Server editions
•Windows Server 2008 R2; Standard, Enterprise or
Web Server editions
Display:
P4 2 GHz processor or faster.Processor:
Managing more than 5000 hosts requires P4 3 GHz
processor or faster.
512 MB of RAM.Memory:
Managing more than 5000 hosts requires 1 GB of
memory.
200 MB of free hard disk space.Disk space:
Minimum 16-bit display with resolution of 1024x768
(32-bit color display with 1280x1024 or higher
resolution recommended).
10 Mbit network.Network:
Managing more than 5000 hosts requires a 100 Mbit
network.
12 | F-Secure Client Security | Introduction
Main components
The power of Policy Manager lies in the F-Secure management architecture, which provides high scalability
for a distributed, mobile workforce.
Policy Manager
Console
Policy Manager
Server
Management
Agent
Policy Manager Console provides a centralized management console for the security of
the managed hosts in the network. It enables the administrator to organize the network
into logical units for sharing policies. These policies are defined in Policy Manager Console
and then distributed to the workstations through Policy Manager Server. Policy Manager
Console is a Java-based application that can be run on several different platforms. It can
be used to remotely install the Management Agent on other workstations without the
need for local login scripts, restarting, or any intervention by the end user.
Policy Manager Console includes two different user interfaces:
•Anti-virus mode user interface that is optimized for managing Client Security and
Anti-virus for Workstations.
•Advanced mode user interface that can be used for managing other F-Secure
products.
Policy Manager Server is the repository for policies and software packages distributed
by the administrator, as well as status information and alerts sent by the managed hosts.
Communication between Policy Manager Server and the managed hosts is accomplished
through the standard HTTP protocol, which ensures trouble-free performance on both
LAN and WAN.
Management Agent enforces the security policies set by the administrator on the managed
hosts, and provides the end user with a user interface and other services. It handles all
management functions on the local workstations and provides a common interface for
all F-Secure applications, and operates within the policy-based management infrastructure.
Web Reporting
Update Server &
Agent
Web Reporting is an enterprise-wide, web-based graphical reporting system included in
Policy Manager Server. With Web Reporting you can quickly create graphical reports
based on historical trend data, and identify computers that are unprotected or vulnerable
to virus outbreaks.
Update Server & Agent are used for updating virus and spyware definitions on the
managed hosts, and are included in Policy Manager Server. The Automatic Update Agent
allows users to receive virus definition database updates and data content without
interrupting their work to wait for files to download from the web. It downloads files
automatically in the background using bandwidth not being used by other Internet
applications. If Automatic Update Agent is always connected to the Internet, it will
automatically receive new virus definition updates within about two hours after they have
been published by F-Secure.
Features
Some of the main features of Policy Manager are described here.
F-Secure Client Security | Introduction | 13
Software distribution
Configuration and policy
management
Event management
Performance management
•Installation of F-Secure products on hosts from one central location, and
updating of executable files and data files, including virus definitions updates.
•Updates can be provided in several ways:
•From an F-Secure CD.
•From the F-Secure web site to the customer. These can be automatically
‘pushed’ by Automatic Update Agent, or voluntarily ‘pulled’ from the
F-Secure web site.
•Policy Manager Console can be used to export pre-configured installation
packages, which can also be delivered using third-party software, such as
SMS and similar tools.
•Centralized configuration of security policies. The policies are distributed
from Policy Manager Server by the administrator to the user’s workstation.
Integrity of the policies is ensured through the use of digital signatures.
•Reporting to the Event Viewer (local and remote logs), e-mail, and report
files and creation of event statistics.
•Statistics and performance data handling and reporting.
Task management
•Management of virus scanning tasks and other operations.
14 | F-Secure Client Security | Introduction
Product registration
You have the option of providing F-Secure with information regarding the use of Policy Manager by registering
your product.
The following questions and answers provide some more information about registering your installation of
Policy Manager. You should also view the F-Secure license terms
(http://www.f-secure.com/en_EMEA/estore/license-terms/) and privacy policy
(http://www.f-secure.com/en_EMEA/privacy.html).
Why does F-Secure collect data?
In order to improve our service, we collect statistical information regarding the use of F-Secure products. To
help F-Secure provide better service and support, you can allow us to link this information to your contact
information. To allow this, please enter the customer number from your license certificate during the installation
of Policy Manager.
What information is sent?
We collect information that cannot be linked to the end user or the use of the computer. The collected
information includes F-Secure product versions, operating system versions, the number of managed hosts
and the number of disconnected hosts. The information is transferred in a secure and encrypted format.
What do I benefit from submitting information to F-Secure?
When you contact our support, we can provide a solution to your problem more quickly based on the information
collected. In addition, with this information we can further develop our product and services to match the
needs of our customers even better.
Where is the information stored and who can access it?
The data is stored in F-Secure's highly secured data center, and only F-Secure's assigned employees can
access the data.
F-Secure Client Security | Introduction | 15
Application management
Policy Manager includes various components to manage applications within your network.
Management Agent
The Management Agent enforces the security policies set by the administrator on the managed hosts. It acts
as a central configuration component on the hosts, and for example, interprets the policy files, sends
autoregistration requests and host status information to Policy Manager, and performs policy-based installations.
Cisco Network Admission Control (NAC) Support
F-Secure Corporation participates in the Network Admission Control (NAC) collaboration led by Cisco
Systems®. The Cisco NAC can be used to restrict the network access of hosts that have too old virus definition
databases, or the antivirus or firewall module disabled.
16 | F-Secure Client Security | Introduction
Basic terminology
Here you will find descriptions for some of the commonly used terms in this guide.
Host
Policy
Policy domain
Policy
inheritance
Host refers to a computer that is centrally managed with Policy Manager.
A security policy is a set of well-defined rules that regulate how sensitive information and
other resources are managed, protected, and distributed. The management architecture
of F-Secure software uses policies that are centrally configured by the administrator for
optimum control of security in a corporate environment.
The information flow between Policy Manager Console and the hosts is accomplished by
transferring policy files.
Policy domains are groups of hosts or subdomains that have a similar security policy.
Policy inheritance simplifies the defining of a common policy. In Policy Manager Console,
each policy domain automatically inherits the settings of its parent domain, allowing for
easy and efficient management of large networks. The inherited settings may be overridden
for individual hosts or domains. When a domain's inherited settings are changed, the
changes are inherited by all of the domain’s hosts and subdomains.
The policy can be further refined for subdomains or even individual hosts. The granularity
of policy definitions can vary considerably among installations. Some administrators might
want to define only a few different policies for large domains. Other administrators might
attach policies directly to each host, achieving the finest granularity.
Installing the product
Chapter
2
Topics:
•
Installation steps
•
Changing the web browser path
•
Uninstalling the product
Here you will find instructions for installing the main product components;
Policy Manager Server and Policy Manager Console.
18 | F-Secure Client Security | Installing the product
Installation steps
Follow these steps in the order given here to install Policy Manager Server and Policy Manager Console on
the same machine.
Download and run the installation package
The first stage in installing Policy Manager is to download and run the installation package.
To begin installing the product:
1.
Download the installation package from www.f-secure.com/webclub.
You will find the file in the Download section of the Policy Manager page.
2. Double-click the executable file to begin installation.
Setup begins.
3. Select the installation language from the drop-down menu and click Next to continue.
4. Read the license agreement information, then select I accept this agreement and click Next to continue.
Select components to install
The next stage is to select the product components to install.
To continue installing the product:
1. Select the components to install and click Next to continue.
•Select both Policy Manager Server and Policy Manager Console to install both components on the
same machine.
•Select Policy Manager Server if you want to install Policy Manager Console on a separate machine.
2. Choose the destination folder and then click Next.
It is recommended to use the default installation directory. If you want to install the product in a different
directory, you can click Browse and select a new directory.
Note: If you have Management Agent installed on the same machine, this window will not be shown.
3. Enter your customer number and then click Next.
You can find your customer number in the license certificate provided with the product.
4. If setup does not detect any previous installation of Policy Manager, it asks you to confirm if a previous
installation of the product exists:
•If a previous version has been installed, select I have an existing F-Secure Policy Manager
installation. Enter the communication directory path of the installed Policy Manager. The contents of
this directory will be copied under <server installation directory>\commdir\ (communication
directory under the Policy Manager Server installation directory), and this will be the directory that
Policy Manager Server will use as a repository. You can use the previous commdir as a backup, or
you can delete it once you have verified that Policy Manager Server is correctly installed.
•If no previous version has been installed, select I do not have an existing F-Secure Policy Manager.
This will not require an existing commdir, and will create an empty commdir in the default location
(under <F-Secure Policy Manager 5 installation directory>\commdir).
5. Click Next to continue.
6. Select whether you want to keep the existing settings or change them:
F-Secure Client Security | Installing the product | 19
Note: This dialog is displayed only if a previous installation of Policy Manager Server was detected
on the computer.
•By default the setup keeps the existing settings. Select this option if you have manually updated the
Policy Manager Server configuration. This option automatically keeps the existing administration, host
and web reporting ports.
•If you want to change the ports from the previous installation, select Change settings. This option
overwrites the edited configuration and restores the default settings.
7. Click Next to continue.
8. Select the Policy Manager Server modules to enable:
•The Host module is used for communication with the hosts. The default port is 80.
•The Administration module is used for communication with Policy Manager Console. The default
HTTP port is 8080.
Note: If you want to change the default port for communication, you will also need to change the
HTTP Port Number setting in Policy Manager Console.
By default, access to the Administration module is restricted to the local machine. This is the most
secure way to use the product. When using a connection over a network, please consider securing the
communication with F-Secure SSH.
•The Web Reporting module is used for communication with Web Reporting. Select whether it should
be enabled. Web Reporting uses a local socket connection to the Administration module to fetch
server data. The default port is 8081.
By default, access to Web Reporting is allowed also from other computers. If you want to allow access
only from this computer, select Restrict access to the local machine.
9. Click Next to continue.
10. Select the product installation package(s) to install from the list of available packages, then click Next to
continue.
Complete installation of the product
The next stage is to complete the installation of the product.
1. Review the changes that setup is about to make, then click Start to start installing the selected components.
When completed, the setup shows whether all components were installed successfully.
2. Click Finish to complete the installation.
3. Restart your computer if you are prompted to do so.
Run Policy Manager Console
The last stage in setting up the product is to run Policy Manager Console for the first time.
To run Policy Manager Console for the first time:
1. Run Policy Manager Console by selecting Start ➤ Programs ➤ F-Secure Policy Manager Console ➤
F-Secure Policy Manager Console.
When Policy Manager Console is run for the first time, the Console Setup Wizard collects the information
needed to create an initial connection to the server. The first page of the Policy Manager Console setup
wizard summarizes the installation process.
2. Click Next to continue.
3. Select your user mode according to your needs:
20 | F-Secure Client Security | Installing the product
Administrator mode - enables all administrator features.•
•Read-only mode - allows you to view administrator data, but no changes can be made. If you select
Read-only mode, you will not be able to administer hosts. To change to Administrator mode, you
will need the admin.pub and admin.prv administration keys.
4. Click Next to continue.
5. Enter the address of the Policy Manager Server that is used for communicating with the managed hosts,
then click Next to continue.
6. Enter the path where the administrator’s public key and private key files will be stored.
By default, key files are stored in the Policy Manager Console installation directory: Program
Files\F-Secure\Administrator.
7. Click Next to continue.
Note: If the key-pair does not already exist, it will be created later in the setup process.
8. Move your mouse cursor around in the window to initialize the random seed used by the management
key-pair generator.
Using the path of the mouse movement ensures that the seed number for the key-pair generation algorithm
has enough random variation.
When the progress indicator has reached 100%, the Passphrase dialog box will open automatically.
9. Enter a passphrase, which will secure your private management key.
10. Re-enter your passphrase in the Confirm passphrase field and click Next.
11. Click Finish to complete the setup process.
Policy Manager Console will generate the management key-pair. After the key-pair is generated, Policy
Manager Console will start.
The setup wizard creates the user group FSPM users. The user who was logged in and ran the installer
is automatically added to this group. To allow another user to run Policy Manager you must manually add
this user to the FSPM users user group.
Policy Manager Console starts in Anti-virus mode, which is an optimized user interface for managing Client
Security, Anti-virus for Workstations and Anti-virus for Windows Servers. If you are going to use Policy Manager
Console for managing any other F-Secure product, you should use the Advanced mode user interface. You
can access it by selecting View ➤ Advanced mode from the menu.
When setting up workstations, you must provide them with a copy of the admin.pub key file (or access to
it). If you install the F-Secure products on the workstations remotely with Policy Manager, a copy of the
admin.pub key file is installed automatically on them. However, if you run the setup from a CD, you must
transfer a copy of the admin.pub key file manually to the workstations. The best and most secure method
is to copy the admin.pub file to a diskette and use this diskette for workstation installations. Alternatively,
you can put the admin.pub file in a directory that can be accessed by all hosts that will be installed with
remotely managed F-Secure products.
F-Secure Client Security | Installing the product | 21
Changing the web browser path
Policy Manager Console acquires the file path to the default web browser during setup.
If you want to change the web browser path:
1. Select Tools ➤ Preferences from the menu.
2. Select the Locations tab and enter the new file path.
22 | F-Secure Client Security | Installing the product
Uninstalling the product
Follow these steps to uninstall Policy Manager components.
To uninstall any Policy Manager components:
1. Open the Windows Start menu and go to Control Panel.
2. Select Add/Remove Programs.
3. Select the component you want to uninstall (Policy Manager Console or Policy Manager Server), and click
Add/Remove.
The F-Secure Uninstall dialog box appears.
4. Click Start to begin uninstallation.
5. When the uninstallation is complete, click Close.
6. Repeat the above steps if you want to uninstall other Policy Manager components.
7. When you have uninstalled the components, exit Add/Remove Programs.
8. It is recommended that you reboot your computer after the uninstallation.
Rebooting is necessary to clean up the files remaining on your computer after the uninstallation, and
before the subsequent installations of the same F-Secure products.
Anti-virus mode user interface
Chapter
3
Topics:
•
Policy domains tab
•
Management tabs
•
The toolbar
•
Menu commands
•
Settings inheritance
This section provides a reference of the settings available on the various
pages of the Anti-virus mode user interface.
Note: Policy Manager also includes another user interface, the
Advanced mode user interface. It is used to manage products other
than Client Security and Anti-virus for Workstations. It is also used
when you need to change advanced Client Security settings. You
can switch between the modes by selecting Advanced mode or
Anti-virus mode in the View menu.
The main components of the Anti-virus mode user interface are:
•The Policy domains tab that displays the structure of the managed
policy domains.
Installation and Operations that can be used for configuring and
monitoring Client Security installed on hosts as well as for carrying
out operations.
•The Message view at the bottom of the window that displays
informative messages from Policy Manager, for example, when the
virus definitions on the server have been updated.
24 | F-Secure Client Security | Anti-virus mode user interface
Policy domains tab
You can perform actions for policy domains and hosts within the Policy domains tab.
In the Policy domains tab, you can do the following:
•
Add a new policy domain by clicking theicon, which is located on the toolbar. A new policy domain
can be created only when a parent domain is selected.
•
Add a new host by clicking theicon.
•Find a host.
•View the properties of a domain or host. All hosts and domains should be given unambiguous names.
•Import autoregistered hosts.
•Autodiscover hosts from a Windows domain.
•Delete hosts or domains.
•Move hosts or domains, using cut and paste operations.
•Export a policy file.
After selecting a domain or host, you can access the above options from the Edit menu or by right-clicking
the selected host or domain. The Autodiscover and Import autoregistered hosts operations are also
available on the Installation tab.
Note: The domains referred to in the commands are not Windows NT or DNS domains. Policy domains
are groups of hosts or subdomains that have a similar security policy.
F-Secure Client Security | Anti-virus mode user interface | 25
Management tabs
This section describes the management tabs (Summary, Settings, Status, Alerts, Reports, Installation
and Operations), and the different pages on each of these tabs.
Summary tab
The Summary tab is designed to display the most important information concerning the selected domain(s)
or host(s) at a glance.
When a domain is selected, the Summary tab displays information about the whole domain. When a single
host is selected, you can see more detailed information concerning the host.
If some of the settings displayed on the Summary tab require your immediate attention or action, an icon is
displayed beside the setting. The icons can be interpreted as follows:
Warns of an error situation that requires your action.
The error cannot be fixed automatically. The icon is
displayed, for example, when the latest policies have
not been distributed, or when virus definitions on hosts
are outdated.
Warns of a situation that may require your action. This
does not create security problems yet, but it may lead
to a security problem later on if the problem is not fixed
now. The icon is displayed, for example, when there
are disconnected hosts.
The information displayed on the Summary tab depends on what is selected in the Policy domains tab:
•When a domain is selected, the Summary tab displays information divided into the following sections:
Policy Manager, Domain, Virus Protection for Workstations, and Internet Shield.
•When a host is selected, the sections are: Policy Manager, Host, Virus Protection and Internet Shield.
Summary tab when a domain is selected
The information described here is displayed on the Summary tab when a domain is selected on the Policy
domains tab.
Policy Manager
In the Policy Manager section you can:
•See the current Policy distribution status (Saved/Unsaved, Distributed/Undistributed), and when
necessary, save the policy data and distribute the new policies to hosts.
•See the status of the virus definitions on the server.
•See the status of the spyware definitions on the server.
•See the status of DeepGuard updates on the server.
•See the number of new autoregistered hosts. If there are new hosts, you can add them to the domain by
clicking Add these hosts to a domain....
•Autodiscover hosts from a Windows domain by clicking Autodiscover Windows hosts....
Domain
In the Domain section you can:
26 | F-Secure Client Security | Anti-virus mode user interface
•See the number of hosts that have the latest policy and access a summary of their latest policy update
by clicking View hosts’s latest policy update.... This takes you to the Status tab and Centralized
management page.
•See the number of disconnected hosts. You can also access a detailed list displaying the hosts’ connection
status by clicking View disconnected hosts..., which takes you to the Status tab and Centralized
management page.
•See a summary of new alerts. If you want to get more detailed information on the alerts, you can click on
View alerts by severity... link to access the Alerts tab.
The severity of the alerts is indicated by the following icons:
Info
DescriptionReferenceIcon
Normal operating information from
a host.
A warning from the host.Warning
Recoverable error on the host.Error
Unrecoverable error on the host.Fatal error
Security hazard on the host.Security alert
Virus Protection for Workstations
In the Virus Protection for Workstations section you can:
•See how many hosts in the domain have Virus Protection installed.
•See how many hosts in the domain have Real-time scanning enabled. If you want to see which hosts
have it enabled and which do not, click View hosts’ overall protection... to access more detailed
information on the Status tab and Overall protection page.
•See how many infections have been found in the domain. If you want to see host specific infection
information, click View hosts’ infection status... to access the Status tab and Overall protection page.
•See how many of the hosts have the latest virus definitions and whether the virus definitions on some
hosts are recent or outdated.
•Recent means that the virus definitions are not the latest ones.
•Outdated means that the virus definitions are older than the configured time limit.
Note: If you have F-Secure Anti-Virus 5.40 installed on some hosts, the virus definitions version
on these hosts is displayed as Unknown.
If you need to update the virus definitions on some hosts, click Update virus definitions..., which takes
you to the Operations tab.
Internet Shield
In the Internet Shield section you can:
•See how many hosts in the domain have Internet Shield installed.
•See what is the most common latest attack and what percentage of the domain has been affected. If you
want to get more detailed information on the latest attacks, you can click View Internet Shield Status...
to access the Status tab and Internet Shield page.
Summary tab when a host is selected
When a host is selected in the Policy domains tab, the Summary tab displays more detailed information in
the Host section.
F-Secure Client Security | Anti-virus mode user interface | 27
Host
In the Host section you can:
•See the name of the selected host displayed beside Computer identity. You can also access more
detailed information on the host by clicking View host properties.... This takes you to the Status tab and
Host properties page.
•See what is the active protocol (HTTP or file sharing), the address of the Policy Manager Server the host
is connected to and the date and time of the last connection.
•See whether the policy file the host is using is the latest one or not.
•See whether the host is disconnected or not.
•See a summary of new alerts. If you want to get more detailed information on the alerts, click on View
alerts by severity... to access the Alerts tab.
Virus Protection for Workstations
In addition to the information displayed when a domain is selected, the Virus Protection for Workstations
section also displays the version number of the virus definitions.
Internet Shield
In addition to the information displayed when a domain is selected, the Internet Shield section also displays
the currently selected Internet Shield security level for the host.
Settings tab
The Settings tab contains 12 different pages that are used for configuring the components of Client Security,
which are described briefly in this section.
Context menu on settings pages
By right-clicking any setting on a Settings tab page you can access a context menu that contains the following
options:
Clear
Force value
Show domain values
Locate in advanced mode
This option clears a setting that has been redefined
on the current level.
The Force value menu item is available only when a
policy domain is selected. You can use this command
to enforce the current domain setting to be active also
in all subdomains and hosts. In practice, this operation
clears the corresponding setting in all subdomains and
hosts below the current domain, enabling the
inheritance of the current value to all subdomains and
hosts. Use this menu entry cautiously: all values
defined in the subdomains or hosts under the selected
domain are discarded, and cannot be restored.
The Show domain values menu item is available only
when a policy domain is selected. You can use this
command to view a list of all policy domains and hosts
below the selected policy domain, together with the
value of the selected field. Click any domain or host
name to quickly select the domain or host on the
Policy domains tab. It is possible to open more than
one Domain value dialog simultaneously.
This option is for advanced users. It takes you to the
Advanced mode user interface and selects the setting
there.
28 | F-Secure Client Security | Anti-virus mode user interface
Automatic updates
The Automatic Updates page is divided into two sections; Automatic Updates and Neighborcast.
Automatic Updates
In the Automatic Updates section you can:
•Enable or disable automatic updates. Note that deselecting this setting disables all ways for the host to
get automatic updates.
•Specify the time interval for polling updates from Policy Manager Server.
•See a list of Policy Manager Proxy servers. You can also add new servers on the list, delete servers from
the list and edit their addresses and priorities.
•Select whether an HTTP proxy can be used and specify the HTTP proxy address.
•Select whether clients should download updates from each other in addition to any servers or proxies.
Neighborcast
Neighborcast allows clients to download updates from each other as well as from any available servers or
proxies. In this section you can:
•Set a client to serve updates to other clients.
•Set a client to download updates from other clients serving updates.
•Choose the port to use.
Real-time scanning
The settings displayed on this page affect the real-time scanning of hosts in the selected domain.
Unless otherwise stated, the settings listed on this page are valid for all Client Security versions. To view and
configure the settings that are no longer valid for Client Security 9 or higher and Anti-virus for Windows Servers
9 or higher, but that are valid for older product versions, click Settings for older clients (7.x, 8.x)....
General
In this section you can turn real-time scanning on or off.
File Scanning
In this section you can:
•Select which files will be scanned and define the included extensions.
•Select whether certain extensions will be excluded from the scan and define what they are.
•Select whether the users can exclude objects from real-time scanning.
•Select whether network drives are included in real-time scanning.
•Define the action to take automatically when an infected file is found (for Client Security 9 or higher and
Anti-virus for Windows Servers 9 or higher).
•Turn protection of the "Hosts" file on or off.
•Select whether tracking cookies are included in the scan.
DeepGuard
In this section you can:
•Turn DeepGuard on or off.
•Select the action to take when a system modification attempt is detected.
•Select whether to query a remote server to improve detection accuracy.
•Turn advanced process monitoring on or off.
F-Secure Client Security | Anti-virus mode user interface | 29
Manual scanning
The settings displayed on this page affect the scans that are run manually by the host users.
Manual File Scanning
In this section, the following options are available for selecting what to scan:
•Select which files will be scanned and define the included extensions.
•All files: All files will be scanned, regardless of their file extension. Forcing this option is not
recommended because it might slow down system performance considerably.
•Files with these extensions: Files with specified extensions will be scanned. To specify files that have
no extension, type .. You can use the wildcard ? to represent any letter. Enter each file extension
separated by a space.
•Select whether to scan inside compressed files. Select this check box to scan inside compressed ZIP,
ARJ, LZH, RAR, CAB, TAR, BZ2, GZ, JAR and TGZ files. Scanning inside large compressed files might use
a lot of system resources and slow down the system.
•Select whether certain extensions will be excluded from the scan and define what they are. You can specify
whether some files will not be scanned, and enter the extensions that will be excluded from scanning in
the Excluded extensions field.
•Select whether the users can exclude objects from real-time scanning. When Enable excluded objects
is selected, the users can specify individual files or folders that will not be scanned.
•From the Action on infection drop-down list, you can select the action Client Security will take when an
infected file is detected. Choose one of the following actions:
Ask after scan
Disinfect automatically
Rename automatically
Delete automatically
Report only
Rootkit Scanning
In this section you can:
DefinitionAction
Starts the Disinfection Wizard when an infected file
is detected.
Disinfects the file automatically when a virus is
detected.
Renames the file automatically when a virus is
detected.
Deletes the file automatically when a virus is
detected. Note that this option also deletes the object
the virus is attached to, so this option is not
recommended.
Indicates that a virus is found, and does not let you
open the infected object. This option only reports, it
does not take any action against the virus.
•Turn rootkit scanning on or off.
•Include or exclude rootkit scanning from full computer check.
•Specify whether detected suspicious items are shown in the disinfection wizard and in the scanning report
after a full computer check.
30 | F-Secure Client Security | Anti-virus mode user interface
Scheduled Scanning
The Configure scheduled scanning in advanced mode... link takes you to the Advanced mode user
interface, where scheduled scanning can be configured.
Manual Boot Sector Scanning
In this section you can:
•Turn manual scanning for floppy disk boot sectors on or off.
•Select the action to take when an infection is found.
Spyware control
The settings displayed on this page are spyware-specific, and provide additional spyware-specific settings
for real-time and manual scanning.
Applications Excluded from Spyware Scanning
This table displays a list of spyware and riskware that the administrators have allowed to run on the hosts.
Spyware and Riskware Reported by Hosts
This table displays spyware and riskware that the hosts have reported, and spyware and riskware that are
quarantined at the host(s). The table displays the type and the severity for each detected spyware and riskware
application. All spyware and riskware with the Potentially active status were allowed to run on the host by
the administrator.
If you want users to be able to decide the spyware and riskware items that are allowed, you can do so with
the Allow users to define the allowed spyware items drop-down list.
Quarantine management
This page is used to manage malware that has been quarantined on managed hosts.
Quarantine content
This table displays a list of quarantined items on the hosts. Each table row displays the object type, name,
file path and the number of hosts on which the object has been quarantined.
Actions to perform on quarantined objects
This table displays a list of the quarantined objects that have been processed. The quarantined objects are
either released (allowed) or deleted. The action indicated here is distributed to the managed hosts, so whenever
the malware in question is detected on a host, the selected action is applied. When the action is set to Release,
an appropriate exclusion rule needs to be in place on the Spyware control or Real-time scanning page,
depending on the object type, to prevent the object from being quarantined in future.
The applied actions are automatically cleaned from this table once there are no pending actions left for the
corresponding hosts (no hosts report this object as quarantined).
E-mail scanning
This page includes separate settings for incoming and outgoing e-mail scanning. The settings in the General
section are common for both.
Incoming E-mail Scanning
In this section you can:
•Turn incoming e-mail scanning on or off.
Loading...
+ 144 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.