Common Topics

Sort by:
This article describes how you can create the Automatic Update Agent (AUA) debug logs.
View full article
To exclude a process from real-time scanning:
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
The global F-Secure content delivery network used by F-Secure uses dynamic addressing and traffic routing. The content delivery network operates on...
View full article
This article lists and explains the reputation and prevalence property values used in the Application Control rules.
View full article
In Windows, every device has a few sets of properties that can be used to identify the device or the class of the device. In the table below the...
View full article
Device Control prevents threats from accessing your system via hardware devices, such as USB sticks, CD-ROM drives, and web cameras. This feature also...
View full article
DeepGuard settings in most F-Secure business products are configured to provide the best possible protection depending on the level of control you...
View full article
Application control is a premium feature that strengthens your protection for the installation and launch of applications, installers, and scripts....
View full article