Business Suite

Sort by:
If you want to exclude files or folders from being scanned by Real-Time scanning, follow these steps:
View full article
This article provides information on how you can exclude files from scanning by using wildcard characters in the F-Secure antivirus products.
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article describes how you can export Internet headers and message body properly in Microsoft Outlook 2003 and 2007.
View full article
The default update server address uses a global dynamic content delivery network unsuitable for setting up an IP address based access control policy....
View full article
Policy Manager Console prompts an error message: "Cannot connect to the server: localhost:8080. Check that the host name and port number are correct....
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
The F-Secure Anti-Virus for Windows Servers Web Console access is, by default, restricted to the local host only. You need to modify the webui.cnf...
View full article
You are not able to access F-Secure Web Console. Instead, the following error message is displayed: https://127.0.0.1:25023/common/main.php: The page...
View full article
This article contains some pointers about installing F-Secure Client Security and F-Secure Policy Manager. It is intended for use by technical staff...
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
This article provides you with information about the Ilauncher command line parameters.
View full article
The Software Updater supports a number of software and programs. You can find the full list of supported programs here.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
Software Updater only installs security-related updates automatically. The installation of non-security-related updates and service packs is required...
View full article
F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings...
View full article
This article explains what firewall packet logging is and how to use it.
View full article
The following steps describe Policy Manager Proxy node installation for both Windows and Linux.
View full article
Some updates, for example Notepad++, WinZip, and 7-Zip, are released unsigned. Software Updater does not automatically install unsigned updates and...
View full article
This article describes how you can configure the MyNetwork rule in F-Secure Policy Manager.
View full article
You have installed and configured F-Secure Anti-Virus for MS Exchange. E-mail scanning is working well since it is blocking e-mails, quarantining them...
View full article
This article describes how you can use ilauncher.exe with a limited user account to install the F-Secure software.
View full article
This article describes the use of the database recovery tool available since PM version 12.10.
View full article
Starting from version 13.00, Business Suite products are switching to GUTS2 as a replacement for BackWeb to download virus definition updates. From...
View full article
Software Updater is a feature that ensures the operating systems and applications used in your organization are always up-to-date. This lowers the...
View full article
To maintain a high protection level, you may notice an increase in bandwidth due to the increased number of updates released per day. Policy Manager...
View full article
This article describes what logic Automatic Update Agent (AUA) uses to prioritize its updates fetch.
View full article
This article describes how you can disable or enable the content management features of Microsoft Exchange 2007 Transport Agent.
View full article
To be able to combat the more adaptive and targeted attackers of the future even better, F-Secure has made a significant engine update.
View full article
To register your F-Secure Policy Manager in an isolated or offline environment, you need to get an offline registration file (or token) from F-Secure...
View full article
This article describes an issue in F-Secure Anti-Virus for Microsoft Exchange where database cannot be accessed.
View full article
After having installed the F-Secure product on several workstations in the network, you notice that the Windows login is taking longer than usual,...
View full article
This article describes how to upgrade from F-Secure Policy Manager 12 to version 13.
View full article
When you cannot use a connection to an intermediate proxy due to security policies, you can update the malware definitions using the tool provided...
View full article
This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works.
View full article
F-Secure Software Updater scans computers for missing software updates, and keeps Windows and third-party applications up to date and patched from...
View full article
This article describes the steps on how to perform a Scanning and Reputation Server upgrade from an older version to a latest version.
View full article
Application Control and the firewall
View full article
When faced with large Downadup potential, it may be useful to disable autorun or USB sticks completely. This article refers extensively to two...
View full article
If you have installed Client Security on hosts that do not have a network connection, you can update the malware definitions using the tool provided...
View full article
If your network setup does not allow Policy Manager to connect to the Internet, but allows connections to internal resources that can access the...
View full article
In all of the supported F-Secure Anti-Virus for Microsoft Exchange versions, the SA account is used during installation. This article explains why...
View full article
If your corporate network is behind a proxy or a firewall that has strict deny rules, Software Updater may be unable to download patches from some...
View full article
Next-gen proxy is a role of Policy Manager Server, in which it proxies certain requests to Master Server while serving BackWeb and software updates...
View full article
The firewall drops some frames during network communication, preventing proper operation of third-party applications.
View full article