Common Topics

Sort by:
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
If you have technical issues with your Linux security product, this article tells you how to create an FSDIAG file which you can then attach to your...
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
This article explains why the use of the at sign (@) as part of a password for the http proxy access is problematic.
View full article
To exclude a process from real-time scanning:
View full article
Application control is a premium feature that strengthens your protection for the installation and launch of applications, installers, and scripts....
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
Below is a list of the persistent processes started by Linux Security 11. They are shown in the process list when you issue, for example the following...
View full article
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
This article describes the meaning of the F-Secure Automatic Update Agent (AUA) connection settings. AUA is the component in the product that is...
View full article
DeepGuard settings in most F-Secure business products are configured to provide the best possible protection depending on the level of control you...
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
This article lists and explains the reputation and prevalence property values used in the Application Control rules.
View full article
It is not recommended to use any characters other than the standard Roman character set with any of F-Secure's products.
View full article
Issue: Customers own (developed) file causes a false positive detection by the F-Secure products.  Resolution: To solve the issue, first sign the file with the digital signature certificate and then submit the file to F-Secure: Open the Submit A Sample portal. Click Choose File and select the file to be submitted. Select I want to give more details about this sample and to be notified of the analysis result. Fill in the required details. Note: Select "False Positive" as the Sample Type and write "File whitelisting request" in the Subject field. Click Submit sample file. The submitted file will be subjected to a verification process. Once verified clean, the file will be added to the list and the database will be updated accordingly to prevent the file from causing new false positive detections.        Article no: 000005979
View full article
Issue: This article is applicable to the following F-Secure products: Client Security, Policy Manager, PSB Portal, and Computer Protection Is there a way to prevent customers from copying data to USB storage devices with F-Secure device contol? Can we block all USB storage devices with Business Suite Products Resolution: You can limit or block access permissions for removable drives using Device control. Refer to the following link for instructions: Limiting access permissions for removable drives Blocking device access using predefined rules Getting Hardware ID for a device Note: Device control can only be configured from the Policy Manger or PSB Portal (Profile editor). There is no local configuration user interface.   Article no: 000002202
View full article
Issue: Malicious code has been found in MBR file (Master Boot Record), how to proceed for further investigation. Resolution: Collect the MBR log from the infected machine for further investigation whether it is valid infection or false positive from F-Secure product. Log Collection Instructions: Install Sector Inspector "secinspect.msi" on the infected machine and note the installation directory. Download link: https://www.microsoft.com/en-us/download/details.aspx?id=19470 Locate installation directory C:\Program Files\Windows Resource Kits\Tools or C:\Program Files (x86)\Windows Resource Kits\Tools Execute "secinspect.exe" using cmd with the following argument. secinspect.exe > <log name>MBR.log Collect "<log name>MBR.log" that was generated Once the log has been collected, you can uninstall the tool using the same installer file "secinspect.msi" and choose uninstall option Once "<log name>MBR.log" was collected, please submit through the Submit a Sample service portal (https://www.f-secure.com/en/web/labs_global/submit-a-sample) for further investigation. Select I want to give more details about this sample and to be notified of the analysis results. Malware team will investigate the log and give remediation instructions for further clean up.   Article no: 000006535
View full article