cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings...
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
This article describes the use of the database recovery tool available since PM version 12.10.
View full article
This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or...
View full article
This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories...
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
This article describes how you can configure the MyNetwork rule in F-Secure Policy Manager.
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
If you want to exclude an object (file or folder) from being scanned by Real-Time scanning, add the filename or the full path of the object into the...
View full article
To exclude a process from real-time scanning:
View full article
This article provides information on how you can exclude files from scanning by using wildcard characters in the F-Secure antivirus products.
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
This article describes how to upgrade from F-Secure Policy Manager 12 to version 13.
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
This article describes how you can export Internet headers and message body properly in Microsoft Outlook 2003 and 2007.
View full article
When faced with large Downadup potential, it may be useful to disable autorun or USB sticks completely. This article refers extensively to two...
View full article
To add new users, you need a subscription for Password Protection.
View full article
You can sync your Password Protection passwords between devices by connecting these devices. To connect devices, you need to generate a...
View full article
Password Protection is set up and ready for use. You can create your first password entry.
View full article
To sync passwords and connect between devices, you need to generate a synchronization code. To generate a code:
View full article
To manage Apple (iOS) devices, create a company-specific Apple Push Notification (APN) certificate. You can start the APN certificate creation process...
View full article
This article describes how you can change the settings to use a Policy Manager Server (PMS) as the source for database updates.
View full article
When problems occur, packet capturing is sometimes helpful for troubleshooting to see what happens on the server. This article explains how you can...
View full article
When Windows crashes (blue screen of death), it creates memory dump files. These files contain information about the computer's memory at the time of...
View full article
This article describes how you can place F-Secure Internet Gatekeeper for Linux sandwich-like between the same Postfix.
View full article
This article describes how you can change the directory for the log files in Internet Gatekeeper.
View full article
This article describes how you can show human-readable time information in the logs.
View full article
This article describes how you can send test messages from the command line to test an F-Secure Messaging Secure Gateway (FSMSG) appliance...
View full article
This article explains how you can send false spam positives and false spam negatives to Proofpoint for further analysis.
View full article
This article explains what you need to do to get the F-Secure Messaging Security Gateway (MSG) product upgraded to the latest version.
View full article
Quarantining infected files is designed to work for files on the local hard disk only. Files on removable media (e.g. USB memory sticks) or remote...
View full article
This article describes how you can import users and groups with LDAP import.
View full article
This article describes how you can add users to F-Secure PSE user repository automatically.
View full article
This article describes how you can enable end-user digests.
View full article
This article describes how you can force TLS encryption with Microsoft Exchange.
View full article
This article describes how you can create domain-specific reports.
View full article
This article describes how you can specify the spam policy to block bulk and phishing emails.
View full article
This article describes how you can create a domain-specific spam policy. At first, you need to add a domain group, then add a spam policy.
View full article
This article describes how you can add new domain/customer policy routes.
View full article
This article describes how you can add a new domain/customer for outbound email.
View full article
This article describes how you can add a new domain/customer for inbound email.
View full article
Once your device is added to the Protection Service for Business (PSB) portal, an installation email is sent to the email address specified by the PSB...
View full article
This article describes how you can add a Freedome for Business subscription key to the Protection Service for Business (PSB) portal.
View full article
To install Freedome for Business on your iOS device, your PSB administrator needs to create an APNS certificate for your company first.
View full article