Business Suite

Sort by:
Issue: Is SUSE Linux Enterprise Server 12 (SLES) a supported platform for F-Secure Linux Security 64? Resolution: SUSE Linux Enterprise Server 12 (SLES) has been added to the officially supported platforms for F-Secure Linux Security 64. For more details you can check the release notes on this link.   Article no: 000013134
View full article
Issue: F-Secure Linux Security 64 is not connecting to the Policy Manager Server and it is not visible in the "Import new hosts" tab in Policy Manager Console. Resolution: Verify the connection from F-Secure Linux Security 64 to the Policy Manager Server. If the issue persists, configure the address of Policy Manager Server using the server's IP address instead of hostname during the creation of the installation package. Article no: 000016582
View full article
Issue: How to update malware definitions for Policy Manager 13.x/14.x in an isolated network. Resolution: Policy Manager offers two options for updating virus definitions in isolated networks that have no direct connection to the Internet. If your network configuration allows Policy Manager to access internal resources with Internet access, we recommend that you use Policy Manager Proxy as the source for updates. For more details click here. If using Policy Manager Proxy is not an option, you can use a tool provided with Policy Manager to fetch the updates as an archive and copy that to the server where Policy Manager is installed. For more details click here. Article no: 000002697
View full article
Issue: When using image files to distribute product installations, how can I reset the host UID for Policy Manager Proxy to prevent duplicate hosts appearing in Policy Manager? Resolution: If you use image files to distribute product installations, you need to make sure that there are no unique ID conflicts. For Policy Manager Proxy this can be prevented by following the steps below: Stop F-Secure Policy Manager Server service:  Linux: [/etc/init.d/fspms stop] Windows: [net stop fsms] Remove following two files: Linux: /var/opt/f-secure/fspms/data/h2db/fspms.h2.db /var/opt/f-secure/fspms/data/fspms.jks Windows: <F-Secure Installation Folder>\Management Server 5\data\h2db\fspms.h2.db <F-Secure Installation Folder>\Management Server 5\data\fspms.jks Use fspmp-enroll-tls-certificate script to generate proxy node certificate. Run the script and authenticate yourself as root administrator of the Master Policy Manager: Linux: /opt/f-secure/fspms/bin/fspmp-enroll-tls-certificate Windows: <F-Secure Installation Folder>/Management Server 5/bin/fspmp-enroll-tls-certificate.bat Start F-Secure Policy Manager Server service: Linux: [/etc/init.d/fspms start] Windows: [net start fsms]   Article no: 000016987
View full article
This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or...
View full article
If your network setup does not allow Policy Manager to connect to the Internet, but allows connections to internal resources that can access the...
View full article
When you cannot use a connection to an intermediate proxy due to security policies, you can update the malware definitions using the tool provided...
View full article
This article describes how to upgrade from F-Secure Policy Manager 12 to version 13.
View full article
This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories...
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article provides information on installing the F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server.
View full article
To register your F-Secure Policy Manager in an isolated or offline environment, you need to get an offline registration file (or token) from F-Secure...
View full article
The product uses Windows Firewall to protect your computer.
View full article
Your computer is protected with predefined firewall settings. Usually, you do not have to change them. However, you may have to change the settings,...
View full article
This article explains how you can update the F-Secure Linux Security virus databases manually.
View full article
This article describes how you can setup an HTTP proxy for Linux Security.
View full article
Further analysis is needed to pin-point the problematic file and/or process that is causing the performance issue. By setting fsoasd (real-time...
View full article
This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy.
View full article
When problems occur, packet capturing is sometimes helpful for troubleshooting to see what happens on the server. This article explains how you can...
View full article
This article describes how you can place F-Secure Internet Gatekeeper for Linux sandwich-like between the same Postfix.
View full article
The default update server address uses a global dynamic content delivery network unsuitable for setting up an IP address based access control policy....
View full article
This article describes how you can change the settings to use a Policy Manager Server (PMS) as the source for database updates.
View full article
This article describes how you can change the directory for the log files in Internet Gatekeeper.
View full article
If you have installed Client Security on hosts that do not have a network connection, you can update the malware definitions using the tool provided...
View full article
The following steps describe Policy Manager Proxy node installation for both Windows and Linux.
View full article
F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings...
View full article
To be able to combat the more adaptive and targeted attackers of the future even better, F-Secure has made a significant engine update.
View full article
This article describes how you can configure the MyNetwork rule in F-Secure Policy Manager.
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
If double-byte characters are used in the server addresses, the communication with the server will not function properly.
View full article
All Linux distributions are transitioning to systemd. Out of the box, systemd services make use of namespaces to contain their temporary files. For...
View full article
Linux Security 11.00 on RHEL/CentOS 7.x causes processes to hang when on-access scanning is turned on. The system log warns about one or more...
View full article
You cannot use the Anti-Virus mode of PMC to administer Linux products. Use the Advanced mode instead.
View full article
This article lists down all the current known issues for F-Secure Linux Security 11.10.
View full article
This article lists down all the current known issues for F-Secure Linux Security 11.00.
View full article
After upgrading to Linux Security Full Edition version 11.00, the following error message appears on the web UI: The requested resource is not...
View full article
Creating a new file on CIFS (Samba) file share blocks the operation and the system for 30 seconds before finishing. Other file operations and malware...
View full article
The on-access scanner daemon is not running after installing Linux Security. Consequently, no file access is scanned for malware.
View full article
In certain circumstances, the error message can occur when attempting to send or receive mail via F-Secure Internet Gatekeeper for Linux (FSIGK).
View full article
When you upgrade F-Secure Internet Gatekeeper from version 5.xx to version 5.40, services may not be automatically started.
View full article
By default, fetchmail retrieves e-mails by using the "TOP" POP command. On the other hand, because the "TOP" POP command is normally used to fetch...
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 4.10 and later.
View full article
The reason for this is that the file is not actually downloaded by the client itself but by FSIGK for Linux. To be able to scan the file, it needs to...
View full article
To maintain a high protection level, you may notice an increase in bandwidth due to the increased number of updates released per day. Policy Manager...
View full article
F-Secure Software Updater scans computers for missing software updates, and keeps Windows and third-party applications up to date and patched from...
View full article
Next-gen proxy is a role of Policy Manager Server, in which it proxies certain requests to Master Server while serving BackWeb and software updates...
View full article
F-Secure Policy Manager for Linux 14.00 was released on November 14, 2018.
View full article
F-Secure Policy Manager for Linux 13.10 was released on December 20, 2017.
View full article