Business Suite

Sort by:
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article describes the use of the database recovery tool available since PM version 12.10.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
The following steps describe Policy Manager Proxy node installation for both Windows and Linux.
View full article
Next-gen proxy is a role of Policy Manager Server, in which it proxies certain requests to Master Server while serving BackWeb and software updates...
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
To find out the latest information about the Client Security for Mac 12.30 release, read carefully the Release Notes for the product.
View full article
To find out the latest information about these releases (both Standard and Premium), read carefully the Release Notes for these products.
View full article
This article lists the system requirements for Client Security for Mac 12.30.
View full article
This article lists down all the current known issues for F-Secure Linux Security 11.10.
View full article
When you upgrade F-Secure Internet Gatekeeper from version 5.xx to version 5.40, services may not be automatically started.
View full article
This article describes the steps on how to perform a Scanning and Reputation Server upgrade from an older version to a latest version.
View full article
You are not able to access F-Secure Web Console. Instead, the following error message is displayed: https://127.0.0.1:25023/common/main.php: The page...
View full article
Creating a new file on CIFS (Samba) file share blocks the operation and the system for 30 seconds before finishing. Other file operations and malware...
View full article
This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or...
View full article
When administrators make changes to the match list content at the below locations in F-Secure Web Console, they are not prompted to save the changes....
View full article
Linux Security 11.00 on RHEL/CentOS 7.x causes processes to hang when on-access scanning is turned on. The system log warns about one or more...
View full article
When deploying cloned virtual machines from a template, Policy Manager identifies them as identical machines even when each machine is configured to...
View full article
Policy Manager Console prompts an error message: "Cannot connect to the server: localhost:8080. Check that the host name and port number are correct....
View full article
To find out the latest information about the F-Secure E-mail and Server Security 12.x and Server Security 12.x, read carefully the Release Notes for...
View full article
To maintain a high protection level, you may notice an increase in bandwidth due to the increased number of updates released per day. Policy Manager...
View full article
The Foxit Reader installed is a Consumer version, not the Enterprise version. Software Updater only detects the Enterprise version.
View full article
After initialing a manual scan, the server/system experiences noticeable degradation in performance causing the server/system to hang.
View full article
After upgrading to Linux Security Full Edition version 11.00, the following error message appears on the web UI: The requested resource is not...
View full article
With the Internet Gateway (IGK) for Linux 5.30 release, allowing or denying access to HTTPS sites in the Web Content Control settings may not work in...
View full article
All Linux distributions are transitioning to systemd. Out of the box, systemd services make use of namespaces to contain their temporary files. For...
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article
This article provides information on installing the F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server.
View full article
This article lists down all the current known issues for F-Secure Linux Security 11.00.
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
Real-time Black Lists (RBL's) are used to publish the addresses of computers or networks that are linked to spamming. When this setting is on, the...
View full article
Software Updater only installs security-related updates automatically. The installation of non-security-related updates and service packs is required...
View full article
If you want to exclude files or folders from being scanned by Real-Time scanning, follow these steps:
View full article
This article describes what logic Automatic Update Agent (AUA) uses to prioritize its updates fetch.
View full article
The Software Updater supports a number of software and programs. You can find the full list of supported programs here.
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
Even though Java Development Kit (JDK) is listed as a product supported by SWUP, we want to emphasize that SWUP does not patch JRE (32-bit and 64-bit)...
View full article
In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer...
View full article
If double-byte characters are used in the server addresses, the communication with the server will not function properly.
View full article
Some updates, for example Notepad++, WinZip, and 7-Zip, are released unsigned. Software Updater does not automatically install unsigned updates and...
View full article
If your corporate network is behind a proxy or a firewall that has strict deny rules, Software Updater may be unable to download patches from some...
View full article
Software Updater is a feature that ensures the operating systems and applications used in your organization are always up-to-date. This lowers the...
View full article
In certain circumstances, the error message can occur when attempting to send or receive mail via F-Secure Internet Gatekeeper for Linux (FSIGK).
View full article
This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams.
View full article
This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux.
View full article
When faced with large Downadup potential, it may be useful to disable autorun or USB sticks completely. This article refers extensively to two...
View full article
This article explains how the Launch Scan After Update functionality works for the Anti-Virus component.
View full article
This article describes how you can disable or enable the content management features of Microsoft Exchange 2007 Transport Agent.
View full article
It might occasionally happen that the quarantine database is not available, e.g. due to a network problem or it may have run out of space. It is...
View full article