cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
To register your F-Secure Policy Manager in an isolated or offline environment, you need to get an offline registration file (or token) from F-Secure...
View full article
F-Secure has made the decision to end its own Mobile Device Management (MDM) solution as a part of F-Secure Freedome for Business, F-Secure Protection...
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article
To find the most up-to-date content for this topic, go to the Management Portal Help.
View full article
The default update server address uses a global dynamic content delivery network unsuitable for setting up an IP address based access control policy....
View full article
After installing the latest major Windows 10 update, referred to as the "Creators" update, you may notice that the Windows 10 Defender Security Center...
View full article
Scanning e-mails that are encrypted with Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols is not supported. When TLS and SSL...
View full article
We don't analyze exported files during the export process. However, all files have already been analyzed both during the upload phase and on every...
View full article
F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading...
View full article
The user has received a new email to download and activate the Freedome for Business app. However, the activation link does not work.
View full article
F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings...
View full article
This article explains how to accept all incoming e-mails regardless of the domain they have been sent to.
View full article
This article contains some pointers about installing F-Secure Client Security and F-Secure Policy Manager. It is intended for use by technical staff...
View full article
To be able to combat the more adaptive and targeted attackers of the future even better, F-Secure has made a significant engine update.
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
This article describes the use of the database recovery tool available since PM version 12.10.
View full article
This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or...
View full article
This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories...
View full article
Some updates, for example Notepad++, WinZip, and 7-Zip, are released unsigned. Software Updater does not automatically install unsigned updates and...
View full article
If your corporate network is behind a proxy or a firewall that has strict deny rules, Software Updater may be unable to download patches from some...
View full article
When you cannot use a connection to an intermediate proxy due to security policies, you can update the malware definitions using the tool provided...
View full article
This article explains how the Launch Scan After Update functionality works for the Anti-Virus component.
View full article
This article describes what logic Automatic Update Agent (AUA) uses to prioritize its updates fetch.
View full article
After having installed the F-Secure product on several workstations in the network, you notice that the Windows login is taking longer than usual,...
View full article
If you need to recover an item, such as a false positive, from the quarantine, use the fsdumpqrt tool for this. It helps you to get sample files from...
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works.
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
When deploying cloned virtual machines from a template, Policy Manager identifies them as identical machines even when each machine is configured to...
View full article
If you have installed Client Security on hosts that do not have a network connection, you can update the malware definitions using the tool provided...
View full article
F-Secure Policy Manager for Windows 14.00 was released on November 14, 2018.
View full article
F-Secure Policy Manager for Linux 14.00 was released on November 14, 2018.
View full article
F-Secure Policy Manager for Linux 13.10 was released on December 20, 2017.
View full article
F-Secure Policy Manager 13.10 (Windows) was released on December 20, 2017.
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
If double-byte characters are used in the server addresses, the communication with the server will not function properly.
View full article
To restore Browsing Protection on the web browser in use, or to install Browsing Protection on another web browser, manually reinstall or install the...
View full article
The firewall drops some frames during network communication, preventing proper operation of third-party applications.
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
There are various malware monitoring opportunities available provided both by F-Secure and the operating system.
View full article
Policies are single files created on F-Secure Policy Manager and automatically picked up by the client machines. They define the settings of the...
View full article
Next-gen proxy is a role of Policy Manager Server, in which it proxies certain requests to Master Server while serving BackWeb and software updates...
View full article
This article explains what firewall packet logging is and how to use it.
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article