cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories...
View full article
After having installed the F-Secure product on several workstations in the network, you notice that the Windows login is taking longer than usual,...
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works.
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
The firewall drops some frames during network communication, preventing proper operation of third-party applications.
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
This article contains some pointers about installing F-Secure Client Security and F-Secure Policy Manager. It is intended for use by technical staff...
View full article
Policies are single files created on F-Secure Policy Manager and automatically picked up by the client machines. They define the settings of the...
View full article
This article explains what firewall packet logging is and how to use it.
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article
This article describes how you can configure the MyNetwork rule in F-Secure Policy Manager.
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
If you want to exclude an object (file or folder) from being scanned by Real-Time scanning, add the filename or the full path of the object into the...
View full article
To exclude a process from real-time scanning:
View full article
Use the executable POLUTIL.exe tool located in the Common directory under the root of your product's installation directory to export the data that...
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
When the subscription on the Computer Protection (Windows) endpoint client expires, it locks its functionality. To get back to normal mode, you need a...
View full article
It might occasionally happen that the quarantine database is not available, e.g. due to a network problem or it may have run out of space. It is...
View full article
You notice that the amount of spam messages remains the same even though it should grow steadily. This indicates a problem in the Network...
View full article
This article describes how you can disable or enable the content management features of Microsoft Exchange 2007 Transport Agent.
View full article
The F-Secure Anti-Virus for Windows Servers Web Console access is, by default, restricted to the local host only. You need to modify the webui.cnf...
View full article
F-Secure Computer Protection can be installed remotely using SCCM/GPO and any other deployment method using a network installer MSI. This step-by-step...
View full article
This article describes how you can create a rule to block e-mails with a specific character set.
View full article
Removing a computer from PSB Portal will add the computer to a blacklist which prevents the computer to be connected back to the PSB Portal. This will...
View full article
This article explains how to accept all incoming e-mails regardless of the domain they have been sent to.
View full article
This article describes how to stop and start the F-Secure Secure Messaging Security Gateway (FSMSG) PPS service if necessary.
View full article
You cannot use the Anti-Virus mode of PMC to administer Linux products. Use the Advanced mode instead.
View full article
Real-time Black Lists (RBL's) are used to publish the addresses of computers or networks that are linked to spamming. When this setting is on, the...
View full article
This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux.
View full article
This article describes the exit codes of fsav(3), the command line scanner module included in the Security Platform and F-Secure Linux Security.
View full article
A MIB is an informational file that describes the settings that can be made with an F-Secure product and their settings for this product.
View full article
This article describes which ports to open in the firewall to enable virus and spam database updates for F-Secure Messaging Security Gateway (FSMSG).
View full article
This article provides information about Linux syslog-related information for configuring the F-Secure Management Agent Alert forwarding.
View full article
This article describes how you can import users and groups with LDAP import.
View full article
This article describes how you can add users to F-Secure PSE user repository automatically.
View full article
This article describes how you can enable end-user digests.
View full article
This article describes how you can force TLS encryption with Microsoft Exchange.
View full article
This article describes how you can create domain-specific reports.
View full article
This article describes how you can specify the spam policy to block bulk and phishing emails.
View full article
This article describes how you can create a domain-specific spam policy. At first, you need to add a domain group, then add a spam policy.
View full article
This article describes how you can add new domain/customer policy routes.
View full article
This article describes how you can add a new domain/customer for outbound email.
View full article
This article describes how you can add a new domain/customer for inbound email.
View full article
This article explains how you can add a footer, such as a disclaimer, to all outbound mail of an F-Secure Messaging Security Gateway (MSG) Server.
View full article