cancel
Showing results for 
Search instead for 
Did you mean: 

Business Security

Sort by:
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
This article provides information on how you can exclude files from scanning by using wildcard characters in the F-Secure antivirus products.
View full article
Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the...
View full article
This article describes how you can move Policy Manager Server (PMS) to a new server.
View full article
The default update server address uses a global dynamic content delivery network unsuitable for setting up an IP address based access control policy....
View full article
This article describes how you can export Internet headers and message body properly in Microsoft Outlook 2003 and 2007.
View full article
If you have technical issues with your Linux security product, this article tells you how to create an FSDIAG file which you can then attach to your...
View full article
This article explains how you can send false spam positives and false spam negatives to Proofpoint for further analysis.
View full article
This article explains how you can update the F-Secure Linux Security virus databases manually.
View full article
F-Secure Policy Manager supports some advanced configuration using Java system properties. This article describes how you can specify the Java system...
View full article
This article describes how you can allow file sharing with F-Secure firewall turned on.
View full article
This article provides information about the firewall rules needed for Microsoft ActiveSync. It also gives instructions on how to configure the...
View full article
This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse.
View full article
You can reset the host UID by using FSMAUTIL (F-Secure Management Agent Utility). One way to do this would be adding a command to the user login...
View full article
To find the most up-to-date content for this topic, go to the Management Portal Help.
View full article
After installation of our Mac product on macOS High Sierra, a red F-Secure (X) icon may appear when running real-time scanning.
View full article
This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy.
View full article
To install Freedome for Business on your iOS device, your PSB administrator needs to create an APNS certificate for your company first.
View full article
This article contains some pointers about installing F-Secure Client Security and F-Secure Policy Manager. It is intended for use by technical staff...
View full article
You are not able to access F-Secure Web Console. Instead, the following error message is displayed: https://127.0.0.1:25023/common/main.php: The page...
View full article
The F-Secure Anti-Virus for Windows Servers Web Console access is, by default, restricted to the local host only. You need to modify the webui.cnf...
View full article
To manage Apple (iOS) devices, create a company-specific Apple Push Notification (APN) certificate. You can start the APN certificate creation process...
View full article
This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux.
View full article
This article gives a quick overview of the Neighborcast feature in the F-Secure Automatic Update Agent (AUA), and also provides detailed information...
View full article
Removing a computer from PSB Portal will add the computer to a blacklist which prevents the computer to be connected back to the PSB Portal. This will...
View full article
If you need to recover an item, such as a false positive, from the quarantine, use the fsdumpqrt tool for this. It helps you to get sample files from...
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories...
View full article
This article explains why the use of the at sign (@) as part of a password for the http proxy access is problematic.
View full article
Once your device is added to the Protection Service for Business (PSB) portal, an installation email is sent to the email address specified by the PSB...
View full article
The information in this article applies to F-Secure Internet Gatekeeper version 4.10 and later.
View full article
This article describes the exit codes of fsav(3), the command line scanner module included in the Security Platform and F-Secure Linux Security.
View full article
After installing the latest major Windows 10 update, referred to as the "Creators" update, you may notice that the Windows 10 Defender Security Center...
View full article
This article describes how you can setup an HTTP proxy for Linux Security.
View full article
This article provides you with information about the Ilauncher command line parameters.
View full article
This article describes how you can set up the F-Secure firewall for Windows 7 DirectAccess from Policy Manager Console (PMC).
View full article
Scanning e-mails that are encrypted with Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols is not supported. When TLS and SSL...
View full article
The Software Updater supports a number of software and programs. You can find the full list of supported programs here.
View full article
No, it doesn't cost anything. An Apple Push Notification service (APNs) certificate can be created free of charge via the Apple Push Certificate...
View full article
This article contains a table listing and describing all the E-mail and Server Security client services and processes that are running on your server...
View full article
EDR stands for Endpoint Detection and Response (EDR). Endpoint Detection Response (EDR) solutions are designed to continuously monitor and respond to...
View full article
There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager.
View full article
This article lists frequently asked questions related to administering Software Updater.
View full article
Software Updater only installs security-related updates automatically. The installation of non-security-related updates and service packs is required...
View full article
F-Secure has made the decision to end its own Mobile Device Management (MDM) solution as a part of F-Secure Freedome for Business, F-Secure Protection...
View full article
Use the executable POLUTIL.exe tool located in the Common directory under the root of your product's installation directory to export the data that...
View full article
Applies to: Protection Service for Email, Messaging Security Gateway 8.x   Simple Mail Transfer Protocol (SMTP) is responsible for sending out email messages. Therefore, if you get an SMTP error message, it means that for some reason your emails were not sent. It is very important to understand why this has happened so that you can fix the problem. All SMTP codes consist of three digits, e.g. 550, 221, 354, etc. However, not all of them indicate an error. To understand how these codes work, you have to know that each digit (the first, the second and the third) have a specific meaning of their own.   SMTP return codes   The first digit indicates whether your command was accepted and processed. It can have one of the following five values: Mail server has accepted the command but does not yet take any action. A confirmation message is required. Mail server has completed the task successfully without errors. Mail server has understood the request, but requires further information to complete it. Mail server has encountered a temporary failure. If the command is repeated without any change, it might be completed. Try again, it may help. Mail server has encountered a fatal error. Your request cannot be processed. As you can see, the codes that start with values 4 and 5 are the ones that indicate that your message will not be sent until you find and fix the problem.   The second digit can have one of the following values: Syntax error Information reply, for example to HELP request Refers to the connection status Refers to the status of the mail server Values 3 and 4 are not used.   The third (last) digit of the code indicates the details of the mail transferring status. The following lists the most important SMTP error codes: 421 Service not available, closing transmission channel (This may be a reply to any command if the service knows it must shut down.) 450 Requested mail action not taken: mailbox unavailable (E.g. mailbox busy) 451 Requested action aborted: local error in processing 452 Requested action not taken: insufficient system storage 500 Syntax error, command unrecognized (This may include errors, such as 'command line too long') 501 Syntax error in parameters or arguments 502 Command not implemented 503 Bad sequence of commands 504 Command parameter not implemented 550 Requested action not taken: mailbox unavailable (E.g. mailbox not found, no access) 551 User not local; please try 552 Requested mail action aborted: exceeded storage allocation 553 Requested action not taken: mailbox name not allowed (E.g. mailbox syntax incorrect) 554 Transaction failed   Other codes that provide you with helpful information about what is happening with the email messages are as follows: 211 System status, or system help reply 214 Help message (Information on how to use the receiver or the meaning of a particular non-standard command. This reply is useful only to a human user.) 220 Service ready 221 Service closing transmission channel 250 Requested mail action okay, completed 251 User not local; will forward to 354 Start mail input; end with a dot (.)
View full article
This article describes how you can import users and groups with LDAP import.
View full article
Some updates, for example Notepad++, WinZip, and 7-Zip, are released unsigned. Software Updater does not automatically install unsigned updates and...
View full article