cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
All Linux distributions are transitioning to systemd. Out of the box, systemd services make use of namespaces to contain their temporary files. For...
View full article
This error message appears if the fsicout.txt file is present in the /opt/f-secure/fsav/tomcat/webapps/fsecure/ directory during the upgrade. If this...
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 4.10 and later.
View full article
By default, fetchmail retrieves e-mails by using the "TOP" POP command. On the other hand, because the "TOP" POP command is normally used to fetch...
View full article
When deploying Policy Manager Server (PMS) or F-Secure Policy Manager Proxy (PMP) in large environments with hundreds of users, the Windows 2003...
View full article
The reason for this is that the file is not actually downloaded by the client itself but by FSIGK for Linux. To be able to scan the file, it needs to...
View full article
In certain circumstances, the error message can occur when attempting to send or receive mail via F-Secure Internet Gatekeeper for Linux (FSIGK).
View full article
The on-access scanner daemon is not running after installing Linux Security. Consequently, no file access is scanned for malware.
View full article
There might be cases where legitimate email is considered as spam. This may happen, for example, with automated systems generating non-standard SMTP...
View full article
When administrators make changes to the match list content at the below locations in F-Secure Web Console, they are not prompted to save the changes....
View full article
When you upgrade F-Secure Internet Gatekeeper from version 5.xx to version 5.40, services may not be automatically started.
View full article
Linux Security 11.00 on RHEL/CentOS 7.x causes processes to hang when on-access scanning is turned on. The system log warns about one or more...
View full article
Creating a new file on CIFS (Samba) file share blocks the operation and the system for 30 seconds before finishing. Other file operations and malware...
View full article
This article lists down all the current known issues for F-Secure Linux Security 11.00.
View full article
If a user is logged on to the computer with a restricted account and the folder that the user scans does not include write permissions to restricted...
View full article
When the user turns off real-time scanning, the Scan and remove viruses from e-mails checkbox is grayed out indicating that the e-mail scanning is...
View full article
Sometimes after the product has reported that it successfully removed an infected file, the file may still remain visible in Windows Explorer for a...
View full article
If you have slow or limited broadband connection, downloading and installing PSB Workstation Security database updates on several Windows computers...
View full article
This article describes the new features and improvements in PSB E-mail and Server Security 11.00. It also lists the dropped features.
View full article
If you have technical issues with your Linux security product, this article tells you how to create an FSDIAG file which you can then attach to your...
View full article
To find out the latest information about these releases (both Standard and Premium), read carefully the Release Notes for these products.
View full article
To find out the latest information about the F-Secure E-mail and Server Security 12.x and Server Security 12.x, read carefully the Release Notes for...
View full article
F-Secure Security Cloud API for AWS is designed to improve security by providing real-time threat intelligence to any application or service. The API...
View full article
The API is designed to enhance the security of applications and services that allow users to submit text and links to external content. For example:
View full article
This article lists the system requirements for Client Security for Mac 12.30.
View full article
In order to use the real-time operations in PSB Workstation Security 12.01, you need to allow clients to communicate with the following service...
View full article
With F-Secure Radar, there are a wide range of substantial benefits that help your business curb potential risks to your corporate security. In this...
View full article
F-Secure Radar is a vulnerability management and security scanning solution that gives your business the tools to control and manage the IT security...
View full article
With Radar, there are several different scanning engines that work together to keep you safe.
View full article
As a vulnerability scanning and management solution, F-Secure Radar follows a five-step workflow to secure the system assets in your business network....
View full article
There are two ways of deploying F-Secure Radar into your corporate IT systems. From the Radar Cloud as a SaaS (Software as a Service); or As an...
View full article
With the Internet Gateway (IGK) for Linux 5.30 release, allowing or denying access to HTTPS sites in the Web Content Control settings may not work in...
View full article
The API is designed to be integrated into any application or service. It provides real-time threat intelligence that applications can use, for example...
View full article
Applies to: Protection Service for Email, Messaging Security Gateway 8.x   Simple Mail Transfer Protocol (SMTP) is responsible for sending out email messages. Therefore, if you get an SMTP error message, it means that for some reason your emails were not sent. It is very important to understand why this has happened so that you can fix the problem. All SMTP codes consist of three digits, e.g. 550, 221, 354, etc. However, not all of them indicate an error. To understand how these codes work, you have to know that each digit (the first, the second and the third) have a specific meaning of their own.   SMTP return codes   The first digit indicates whether your command was accepted and processed. It can have one of the following five values: Mail server has accepted the command but does not yet take any action. A confirmation message is required. Mail server has completed the task successfully without errors. Mail server has understood the request, but requires further information to complete it. Mail server has encountered a temporary failure. If the command is repeated without any change, it might be completed. Try again, it may help. Mail server has encountered a fatal error. Your request cannot be processed. As you can see, the codes that start with values 4 and 5 are the ones that indicate that your message will not be sent until you find and fix the problem.   The second digit can have one of the following values: Syntax error Information reply, for example to HELP request Refers to the connection status Refers to the status of the mail server Values 3 and 4 are not used.   The third (last) digit of the code indicates the details of the mail transferring status. The following lists the most important SMTP error codes: 421 Service not available, closing transmission channel (This may be a reply to any command if the service knows it must shut down.) 450 Requested mail action not taken: mailbox unavailable (E.g. mailbox busy) 451 Requested action aborted: local error in processing 452 Requested action not taken: insufficient system storage 500 Syntax error, command unrecognized (This may include errors, such as 'command line too long') 501 Syntax error in parameters or arguments 502 Command not implemented 503 Bad sequence of commands 504 Command parameter not implemented 550 Requested action not taken: mailbox unavailable (E.g. mailbox not found, no access) 551 User not local; please try 552 Requested mail action aborted: exceeded storage allocation 553 Requested action not taken: mailbox name not allowed (E.g. mailbox syntax incorrect) 554 Transaction failed   Other codes that provide you with helpful information about what is happening with the email messages are as follows: 211 System status, or system help reply 214 Help message (Information on how to use the receiver or the meaning of a particular non-standard command. This reply is useful only to a human user.) 220 Service ready 221 Service closing transmission channel 250 Requested mail action okay, completed 251 User not local; will forward to 354 Start mail input; end with a dot (.)
View full article
This article explains in detail what kind of information is sent upstream when new databases are polled or the product is activated.   Whenever F-Secure Messaging Security Gateway (FSMSG) polls for database updates, it will upload heartbeat data to the Proofpoint update server (update2.proofpoint.com). This data is sent over through the same secure HTTPS channel that is used for downloading the virus and spam definition databases.   The data is used to monitor that the product is running normally. If any problems with the product should occur, this data can be used to troubleshoot the problem. In some cases, it also enables F-Secure to alert the customer about potential problems, such as of a low disk space.   The heartbeat signal includes the following data:   The current timestamp Your customer ID The current version of the operating system The current version of the FSMSG software When the FSMSG software was last updated The current version of the Spam Detection Module When the Spam Detection Module was last updated The current version of the Virus Protection Module When the Virus Protection Module was last updated The time stamp of the last heartbeat The amount of disk space remaining on the FSMSG server The amount of disk space occupied by the Quarantine repository The Watchdog timer re-start activity The number of core files, if any The number of messages in the quarantine The number of messages processed since the server start-up The number of messages processed in the last 24 hours The number of viruses found in the last 24 hours The percentage of messages that contain spam The number of errors in the log The system load and performance data The memory usage The system uptime In addition to this, upon the product activation it will send the password information over the HTTPS connection to the Proofpoint update server. The password information is first encrypted and archived in a separate file, which then will be uploaded to the update server. This way F-Secure support can assist in possible troubleshooting situations which may require root level access to the system.   If you have any questions about the data that is sent, contact F-Secure technical support.
View full article
Below is a list of the persistent processes started by Linux Security 11. They are shown in the process list when you issue, for example the following command:   ps aux | grep f-secure   Programs marked with an asterisk (*) can appear multiple times on the process list. In addition, the "postmaster" process starts multiple "postgres" child processes that are not included here for clarity.   /bin/sh /opt/f-secure/common/postgresql/bin/startup.sh /bin/sh /opt/f-secure/fssp/bin/clstate_updated.rc /bin/sh /opt/f-secure/fssp/libexec/fsupdated.rc /opt/f-secure/common/perl/bin/perl /opt/f-secure/fsav/sbin/fsadhd /opt/f-secure/common/perl/bin/perl -w /opt/f-secure/fsav/sbin/fsoasd /opt/f-secure/common/postgresql/bin/postmaster /opt/f-secure/fsaua/bin/fsaua /opt/f-secure/fsav/bin/fsfwd /opt/f-secure/fsav/bin/fstatusd /opt/f-secure/fsav/java/bin/java /opt/f-secure/fsav/libexec/fsaccd-x86_64 * /opt/f-secure/fsav/libexec/fsadhd /opt/f-secure/fsav/libexec/fsoasd_bh * /opt/f-secure/fsav/libexec/fsoasd_th /opt/f-secure/fsav/perl/bin/perl /opt/f-secure/fsav/bin/fsfwd.run /opt/f-secure/fsav/perl/bin/perl -w /opt/f-secure/fsav/bin/fsavpmd * /opt/f-secure/fsav/perl/bin/perl -w /opt/f-secure/fsav/libexec/fslmalerter /opt/f-secure/fsma/bin/fvch /opt/f-secure/fssp/libexec/fsupdated /opt/f-secure/fssp/sbin/fsavd *   Below is the list of log files written by Linux Security 11 in normal operation:   /opt/f-secure/fsav/tomcat/logs/*.log   /var/opt/f-secure/common/postgresql/postgresql.log /var/opt/f-secure/fsaua/fsauadbg.log /var/opt/f-secure/fsaua/fsaua.log /var/opt/f-secure/fsav/fsadhd.log /var/opt/f-secure/fsav/fsavpmd.log /var/opt/f-secure/fsav/fsfwd.log /var/opt/f-secure/fsav/fslmalerter.log /var/opt/f-secure/fsav/fsoasd.log /var/opt/f-secure/fsma/log/fsma.log /var/opt/f-secure/fssp/aua_api.log /var/opt/f-secure/fssp/dbupdate.log /var/opt/f-secure/fssp/log/clstate_update.log /var/opt/f-secure/fssp/log/fsupdated.log   Depending on the configuration, some processes and log files listed above may not be present at all. For example, the "clstate" process and log file appear only in PSB mode.
View full article