cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
F-Secure Computer Protection is now available. With the new release, Computer Protection will eventually replace the Workstation Security clients...
View full article
Our new security client, F-Secure Computer Protection, was released on September 27th and is growing fast in popularity. It will eventually replace...
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
As part of our product alignment process, we are pleased to announce some product names changes within Protection Service for Business (PSB). These...
View full article
The global F-Secure content delivery network used by the definition database update services uses dynamic addressing and traffic routing. The content...
View full article
In Protection Service for Business (PSB), you can exclude all Microsoft and/or Java SW updates from our software updater by using a keyword and/or a...
View full article
DeepGuard settings in most F-Secure business products are configured to provide the best possible protection depending on the level of control you...
View full article
Content Filtering is a feature in the PSB portal located within the Browsing Protection tab. Content Filtering allows you to block web content based...
View full article
To manage Apple (iOS) devices, create a company-specific Apple Push Notification (APN) certificate. You can start the APN certificate creation process...
View full article
This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy.
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
The following steps describe Policy Manager Proxy node installation for both Windows and Linux.
View full article
To find out the latest information about the Policy Manager for Linux 12.40 release, read carefully the Release Notes for F-Secure Policy Manager 12...
View full article
To find out the latest information about the Policy Manager for Windows 12.40 release, read carefully the Release Notes for F-Secure Policy Manager 12...
View full article
After installing the latest major Windows 10 update, referred to as the "Creators" update, you may notice that the Windows 10 Defender Security Center...
View full article
This article describes how you can check whether a mail server is responding or not. It explains how to do this in principle and provides links to...
View full article
This article describes how you can setup an HTTP proxy for Linux Security.
View full article
This article explains how you can update the F-Secure Linux Security virus databases manually.
View full article
This article provides information on installing the F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server.
View full article
If the F-Secure Messaging Security Gateway has been in evaluation with an evaluation activation key, it must be activated with a real activation key...
View full article
On the HTTP proxy, only one parent server can be specified.
View full article
In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer...
View full article
This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams.
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 5.x and later.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
Scanning e-mails that are encrypted with Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols is not supported. When TLS and SSL...
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
There are 28 web site categories that the F-Secure Cloud Protection application can be configured to check and block access to.
View full article
This article lists the Salesforce editions onto which the F-Secure Cloud Protection application can be installed.
View full article
F-Secure Cloud Protection supports the same archive formats as other F-Secure products, including but not limited to ZIP, 7Z, ARJ, RAR, JAR, LZH, CAB,...
View full article
This article lists the Salesforce objects where F-Secure Cloud Protection scans the URLs.
View full article
The F-Secure Cloud Protection for Salesforce application can be found in the Salesforce AppExchange marketplace.
View full article
Yes. You can get a free trial from Salesforce AppExchange. The app comes with a trial license which allows you to install it and use all its features...
View full article
Yes, it is possible to whitelist web sites. In the URL Protection settings you can define hosts, domains or exact URLs that will be excluded from web...
View full article
This article describes how you can buy an F-Secure Cloud Protection for Salesforce license for your organization.
View full article
Yes it does scan such files provided that a third-party application is using standard Salesforce objects (such as ContentDocument/ContentVersion or...
View full article
No. The F-Secure Cloud Protection for Salesforce app is installed without entering a license key or a serial number.
View full article
Yes you can. The F-Secure Cloud Protection application is Lightning-ready, and it can be used in both Classical and Lightning Experience user...
View full article
Yes, you can. The files excluded from scanning can be specified in the File Protection settings. Exclusions are defined by file extension and/or file...
View full article
As malicious files cannot be disinfected without breaking their structure or content, the F-Secure Cloud Protection for Salesforce app blocks or...
View full article
This article describes what Messaging Security Gateway (MSG) backs up and how the process work.
View full article
This article describes how you can change the settings to use a Policy Manager Server (PMS) as the source for database updates.
View full article
When problems occur, packet capturing is sometimes helpful for troubleshooting to see what happens on the server. This article explains how you can...
View full article
When Windows crashes (blue screen of death), it creates memory dump files. These files contain information about the computer's memory at the time of...
View full article
This article describes how you can place F-Secure Internet Gatekeeper for Linux sandwich-like between the same Postfix.
View full article
This article describes how you can change the directory for the log files in Internet Gatekeeper.
View full article
This article describes how you can show human-readable time information in the logs.
View full article
Yes, PSB Workstation Security can be installed on top of F-Secure Client Security. There is no need to uninstall Client Security before installing PSB...
View full article