cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
F-Secure has made the decision to end its own Mobile Device Management (MDM) solution as a part of F-Secure Freedome for Business, F-Secure Protection...
View full article
In F-Secure Computer Protection, the firewall profile defined in the PSB portal sets the rules in the Windows Firewall on the end-point computers,...
View full article
The product uses Windows Firewall to protect your computer.
View full article
Your computer is protected with predefined firewall settings. Usually, you do not have to change them. However, you may have to change the settings,...
View full article
To collect the client's database and diagnostic information, do as follows:
View full article
F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading...
View full article
This guidance is for upgrading from F-Secure PSB E-mail and Server Security 11.x to version 12.x on all supported Windows platforms.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
This article explains what you need to do to get the F-Secure Messaging Security Gateway (MSG) product upgraded to the latest version.
View full article
This article describes how you can force TLS encryption with Microsoft Exchange.
View full article
You can manually assign F-Secure Cloud Protection licenses to selected users in the following way:
View full article
The F-Secure Cloud Protection application comes with a number of privacy-related settings that can be configured on the Administration page. These...
View full article
The Scheduled Scanning feature in F-Secure Cloud Protection allows you to (re)scan Salesforce files and attachments for harmful and disallowed content...
View full article
Once the scheduled job is created, you can modify its settings in the AFSC__FS_ManualScanSetting__c custom object, which stores settings for the...
View full article
Although it may be easier to validate the automatic assign rule conditions in the Assign Licenses window, you can also use the Automatic License...
View full article
This article describes how you can import users and groups with LDAP import.
View full article
F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings...
View full article
There might be cases where legitimate email is considered as spam. This may happen, for example, with automated systems generating non-standard SMTP...
View full article
This article describes how you can specify the spam policy to block bulk and phishing emails.
View full article
This article describes how you can create a domain-specific spam policy. At first, you need to add a domain group, then add a spam policy.
View full article
This article describes how you can enable end-user digests.
View full article
This article describes how you can add new domain/customer policy routes.
View full article
This article describes how you can add a new domain/customer for outbound email.
View full article
This article describes how you can add a new domain/customer for inbound email.
View full article
This article describes how you can create domain-specific reports.
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
After installation of our Mac product on macOS High Sierra, a red F-Secure (X) icon may appear when running real-time scanning.
View full article
During the first part of 2018, we have added several exciting enhancements to F-Secure Radar, which we highlight in this article.
View full article
The mobile device has been added, but it hasn't connected to PSB.
View full article
To be protected against harmful and disallowed content, an F-Secure Cloud Protection license must be assigned to each user in your Salesforce...
View full article
Starting from version 13.00, Business Suite products are switching to GUTS2 as a replacement for BackWeb to download virus definition updates. From...
View full article
DeepGuard analyzes the behavior of programs, and blocks new and undiscovered viruses, worms, and other malicious programs that try to make potentially...
View full article
Application control is a premium feature that strengthens your protection for the installation and launch of applications, installers, and scripts....
View full article
Content Filtering is a feature in the PSB portal located within the Browsing Protection tab. Content Filtering allows you to block web content based...
View full article
In Protection Service for Business (PSB), you can exclude all Microsoft and/or Java SW updates from our software updater by using a keyword and/or a...
View full article
Our license model for F-Secure Radar is simple. The license model offers the following options: Scalable pricing based on the number of devices to...
View full article
This article gives a quick overview of the Neighborcast feature in the F-Secure Automatic Update Agent (AUA), and also provides detailed information...
View full article
As part of our product alignment process, we are pleased to announce some product names changes within Protection Service for Business (PSB). These...
View full article
F-Secure Protection Service for Business (PSB) products get upgraded to the latest version through the PSB's channel upgrade functionality. This means...
View full article
This article explains why the use of the at sign (@) as part of a password for the http proxy access is problematic.
View full article
Use the executable POLUTIL.exe tool located in the Common directory under the root of your product's installation directory to export the data that...
View full article
It is not recommended to use any characters other than the standard Roman character set with any of F-Secure's products.
View full article
DeepGuard settings in most F-Secure business products are configured to provide the best possible protection depending on the level of control you...
View full article
Application Control and the firewall
View full article
To exclude a process from real-time scanning:
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article
This article explains what firewall packet logging is and how to use it.
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
If you need to recover an item, such as a false positive, from the quarantine, use the fsdumpqrt tool for this. It helps you to get sample files from...
View full article
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article