Common Topics

Sort by:
Issue: Steps to clear up ORSP cache in F-Secure SAFE/Client Security/Computer Protection Resolution: Follow the steps below to clear the ORSP cache:  Click Start, type in cmd.exe in the search bar, and press Enter.  A black command prompt box will appear on the screen. Type in the following and press Enter: For SAFE (64-bit) - cd C:\Program Files (x86)\F-Secure\SAFE\apps\Ultralight\ulcore\<random number folder> For SAFE (32-bit) -  cd C:\Program Files\F-Secure\SAFE\apps\Ultralight\ulcore\<random number folder> For Client Security (64-bit) - cd C:\Program Files (x86)\F-Secure\Client Security\Ultralight\ulcore\<random number folder> For Client Security (32-bit) - cd C:\Program Files\F-Secure\Client Security\Ultralight\ulcore\<random number folder> For Computer Protection (64-bit) - cd C:\Program Files (x86)\F-Secure\PSB\Ultralight\ulcore\<random number folder> For Computer Protection (32-bit) - cd C:\Program Files\F-Secure\PSB\Ultralight\ulcore\<random number folder> Note: Look for a folder with the latest greatest number for <random number folder> if you have more than one folder. Next, type in the following (note the double dash -) and press Enter: orspdiag.exe --cache-clear Type Y when asked to. Once done, you may close the prompt. Article no: 000004992
View full article
Issue: With the firewall enabled in F-Secure Client Security 14 / Computer Protection, I am unable to reach the network share or printer Resolution: The default firewall rule blocks unknown inbound/outbound connections. Ensure that you have allowed the network traffic in the product firewall to port 135, 137-139 and 445. Whitelist the affected printer IP or port number to the firewall rule. In case this does not help, we recommend to check the local firewall rules in the Windows Firewall user interface and ensure that there is no potential conflict between F-Secure firewall rules, and local firewall rules. Article no: 000011040
View full article
Issue: This article describes the steps to generate debug logs for Computer Protection for Windows and Client Security 14 (and newer). Debug logs are needed in some instances by R&D to investigate some problems in detail. Resolution: FSDIAG with debug logs is needed in order to collect additional log files.  Steps:  Download the debug tool from here Double click fsloglevel.exe Select Full Logging Click OK Restart the computer. Reproduce the steps that caused the original problem, take note of exact time of the problem. Generate FSDIAG by following steps explained here Kindly run the fsloglevel.exe tool a second time after submitting the logs. Click on Normal Logging to turn off the debug mode (it slows down your machine a bit).  Article no: 000009164
View full article
When Windows crashes (blue screen of death), it creates memory dump files. These files contain information about the computer's memory at the time of...
View full article
To receive notifications for all types of threats, configure your settings in the Email and Server Security web console.
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
Use the executable POLUTIL.exe tool located in the Common directory under the root of your product's installation directory to export the data that...
View full article
If you have technical issues with your Linux security product, this article tells you how to create an FSDIAG file which you can then attach to your...
View full article
If you need to recover an item, such as a false positive, from the quarantine, use the fsdumpqrt tool for this. It helps you to get sample files from...
View full article
To exclude a process from real-time scanning:
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
This article explains why the use of the at sign (@) as part of a password for the http proxy access is problematic.
View full article
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article
This article describes the meaning of the F-Secure Automatic Update Agent (AUA) connection settings. AUA is the component in the product that is...
View full article
This article lists and explains the reputation and prevalence property values used in the Application Control rules.
View full article
It is not recommended to use any characters other than the standard Roman character set with any of F-Secure's products.
View full article
Below is a list of the persistent processes started by Linux Security 11. They are shown in the process list when you issue, for example the following...
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
This article contains a table listing and describing all the Email and Server Security client services and processes that are running on your server...
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
DeepGuard settings in most F-Secure business products are configured to provide the best possible protection depending on the level of control you...
View full article
DeepGuard analyzes the behavior of programs, and blocks new and undiscovered viruses, worms, and other malicious programs that try to make potentially...
View full article
Application control is a premium feature that strengthens your protection for the installation and launch of applications, installers, and scripts....
View full article
Issue: When installing F-Secure Computer Protection or Client Security 14.xx, the following error message is logged: Conflicting Oneclient product already installed. Resolution: This error indicates that either F-Secure Computer Protection or F-Secure Client Security 14.xx has been previously installed on the computer. The uninstallation of the previous product has left some leftover files on the computer which are conflicting with the new installation. To resolve this issue: Download the Oneclient-compatible uninstallation tool (Uninstallation Tool for Windows - Client Security 13.x & 14.x, Computer Protection, and Rapid Detection Service) from the Support tools page. Run the tool. Here is a direct link to the tool. Article no: 000011403
View full article
Issue: Customers own (developed) file causes a false positive detection by the F-Secure products.  Resolution: To solve the issue, first sign the file with the digital signature certificate and then submit the file to F-Secure: Open the Submit A Sample portal. Click Choose File and select the file to be submitted. Select I want to give more details about this sample and to be notified of the analysis result. Fill in the required details. Note: Select "False Positive" as the Sample Type and write "File whitelisting request" in the Subject field. Click Submit sample file. The submitted file will be subjected to a verification process. Once verified clean, the file will be added to the list and the database will be updated accordingly to prevent the file from causing new false positive detections.        Article no: 000005979
View full article