Business Suite

Sort by:
F-Secure Policy Manager for Windows 14.00 was released on November 14, 2018.
View full article
F-Secure Policy Manager for Linux 14.00 was released on November 14, 2018.
View full article
F-Secure Policy Manager for Linux 13.10 was released on December 20, 2017.
View full article
F-Secure Policy Manager 13.10 (Windows) was released on December 20, 2017.
View full article
Next-gen proxy is a role of Policy Manager Server, in which it proxies certain requests to Master Server while serving BackWeb and software updates...
View full article
Policy Manager offers two options for updating virus definitions in isolated networks that have no direct connection to the Internet.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
This article describes the exit codes of fsav(3), the command line scanner module included in the Security Platform and F-Secure Linux Security.
View full article
A MIB is an informational file that describes the settings that can be made with an F-Secure product and their settings for this product.
View full article
This article provides information about Linux syslog-related information for configuring the F-Secure Management Agent Alert forwarding.
View full article
On the HTTP proxy, only one parent server can be specified.
View full article
Real-time Black Lists (RBL's) are used to publish the addresses of computers or networks that are linked to spamming. When this setting is on, the...
View full article
This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux.
View full article
This article describes how you can show human-readable time information in the logs.
View full article
With the Internet Gateway (IGK) for Linux 5.30 release, allowing or denying access to HTTPS sites in the Web Content Control settings may not work in...
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 5.x and later.
View full article
In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer...
View full article
This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams.
View full article
To find out the latest information about these releases (both Standard and Premium), read carefully the Release Notes for these products.
View full article
To find out the latest information about the F-Secure E-mail and Server Security 12.x and Server Security 12.x, read carefully the Release Notes for...
View full article
This article describes how you can export Internet headers and message body properly in Microsoft Outlook 2003 and 2007.
View full article
This article describes the circumstances under which disclaimers may not be added to outgoing e-mails.
View full article
This article describes how you can disable or enable the content management features of Microsoft Exchange 2007 Transport Agent.
View full article
F-Secure Client Security 13.10 (Windows) was released on December 20, 2017.
View full article
To find out the latest information about the Client Security for Mac 13.x release, read carefully the Release Notes for the product.
View full article
To find out the latest information about the Client Security for Mac 12.30 release, read carefully the Release Notes for the product.
View full article
This article lists the system requirements for Client Security for Mac 13.
View full article
This article lists the system requirements for Client Security for Mac 12.30.
View full article
Before you install the product, we recommend that you review the sections in the following document (release notes) to make sure that your network,...
View full article
This article provides you with information about the Ilauncher command line parameters.
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
Application Control and the firewall
View full article
Software Updater only installs security-related updates automatically. The installation of non-security-related updates and service packs is required...
View full article
The Software Updater supports a number of software and programs. You can find the full list of supported programs here.
View full article
Software Updater is a feature that ensures the operating systems and applications used in your organization are always up-to-date. This lowers the...
View full article
Policies are single files created on F-Secure Policy Manager and automatically picked up by the client machines. They define the settings of the...
View full article
This article provides information on how you can exclude files from scanning by using wildcard characters in the F-Secure antivirus products.
View full article
This article explains how the Launch Scan After Update functionality works for the Anti-Virus component.
View full article
This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works.
View full article
This article describes how you can use ilauncher.exe with a limited user account to install the F-Secure software.
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
There are various malware monitoring opportunities available provided both by F-Secure and the operating system.
View full article
This article describes what logic Automatic Update Agent (AUA) uses to prioritize its updates fetch.
View full article
This article contains some pointers about installing F-Secure Client Security and F-Secure Policy Manager. It is intended for use by technical staff...
View full article
This article explains what firewall packet logging is and how to use it.
View full article
If double-byte characters are used in the server addresses, the communication with the server will not function properly.
View full article
All Linux distributions are transitioning to systemd. Out of the box, systemd services make use of namespaces to contain their temporary files. For...
View full article
Linux Security 11.00 on RHEL/CentOS 7.x causes processes to hang when on-access scanning is turned on. The system log warns about one or more...
View full article
You cannot use the Anti-Virus mode of PMC to administer Linux products. Use the Advanced mode instead.
View full article