cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
The global F-Secure content delivery network used by the definition database update services uses dynamic addressing and traffic routing. The content...
View full article
This article describes how you can check whether a mail server is responding or not. It explains how to do this in principle and provides links to...
View full article
This article describes how you can setup an HTTP proxy for Linux Security.
View full article
This article explains how you can update the F-Secure Linux Security virus databases manually.
View full article
This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy.
View full article
After installing the latest major Windows 10 update, referred to as the "Creators" update, you may notice that the Windows 10 Defender Security Center...
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
This article provides information on installing the F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server.
View full article
If the F-Secure Messaging Security Gateway has been in evaluation with an evaluation activation key, it must be activated with a real activation key...
View full article
On the HTTP proxy, only one parent server can be specified.
View full article
In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer...
View full article
This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams.
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 5.x and later.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
Scanning e-mails that are encrypted with Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols is not supported. When TLS and SSL...
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
There are 28 web site categories that the F-Secure Cloud Protection application can be configured to check and block access to.
View full article
This article lists the Salesforce editions onto which the F-Secure Cloud Protection application can be installed.
View full article
F-Secure Cloud Protection supports the same archive formats as other F-Secure products, including but not limited to ZIP, 7Z, ARJ, RAR, JAR, LZH, CAB,...
View full article
This article lists the Salesforce objects where F-Secure Cloud Protection scans the URLs.
View full article
The F-Secure Cloud Protection for Salesforce application can be found in the Salesforce AppExchange marketplace.
View full article
Yes. You can get a free trial from Salesforce AppExchange. The app comes with a trial license which allows you to install it and use all its features...
View full article
Yes, it is possible to whitelist web sites. In the URL Protection settings you can define hosts, domains or exact URLs that will be excluded from web...
View full article
This article describes how you can buy an F-Secure Cloud Protection for Salesforce license for your organization.
View full article
Yes it does scan such files provided that a third-party application is using standard Salesforce objects (such as ContentDocument/ContentVersion or...
View full article
No. The F-Secure Cloud Protection for Salesforce app is installed without entering a license key or a serial number.
View full article
Yes you can. The F-Secure Cloud Protection application is Lightning-ready, and it can be used in both Classical and Lightning Experience user...
View full article
Yes, you can. The files excluded from scanning can be specified in the File Protection settings. Exclusions are defined by file extension and/or file...
View full article
As malicious files cannot be disinfected without breaking their structure or content, the F-Secure Cloud Protection for Salesforce app blocks or...
View full article
This article describes what Messaging Security Gateway (MSG) backs up and how the process work.
View full article
This article describes how you can change the settings to use a Policy Manager Server (PMS) as the source for database updates.
View full article
When problems occur, packet capturing is sometimes helpful for troubleshooting to see what happens on the server. This article explains how you can...
View full article
When Windows crashes (blue screen of death), it creates memory dump files. These files contain information about the computer's memory at the time of...
View full article
This article describes how you can place F-Secure Internet Gatekeeper for Linux sandwich-like between the same Postfix.
View full article
This article describes how you can change the directory for the log files in Internet Gatekeeper.
View full article
This article describes how you can show human-readable time information in the logs.
View full article
Yes, PSB Workstation Security can be installed on top of F-Secure Client Security. There is no need to uninstall Client Security before installing PSB...
View full article
This article describes how you can send test messages from the command line to test an F-Secure Messaging Secure Gateway (FSMSG) appliance...
View full article
This article explains how to accept all incoming e-mails regardless of the domain they have been sent to.
View full article
This article describes how to upgrade from F-Secure Policy Manager 11 to version 12.
View full article
This article explains how you can send false spam positives and false spam negatives to Proofpoint for further analysis.
View full article
This article explains what you need to do to get the F-Secure Messaging Security Gateway (MSG) product upgraded to the latest version.
View full article
Quarantining infected files is designed to work for files on the local hard disk only. Files on removable media (e.g. USB memory sticks) or remote...
View full article
The following steps describe Policy Manager Proxy node installation for both Windows and Linux.
View full article
This article describes how to stop and start the F-Secure Secure Messaging Security Gateway (FSMSG) PPS service if necessary.
View full article
You cannot use the Anti-Virus mode of PMC to administer Linux products. Use the Advanced mode instead.
View full article
Real-time Black Lists (RBL's) are used to publish the addresses of computers or networks that are linked to spamming. When this setting is on, the...
View full article
This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux.
View full article
This article describes the exit codes of fsav(3), the command line scanner module included in the Security Platform and F-Secure Linux Security.
View full article
A MIB is an informational file that describes the settings that can be made with an F-Secure product and their settings for this product.
View full article