Common Topics

Sort by:
If you need to recover an item, such as a false positive, from the quarantine, use the fsdumpqrt tool for this. It helps you to get sample files from...
View full article
To exclude a process from real-time scanning:
View full article
If you want to exclude objects from being scanned by Real-Time scanning, follow these steps:
View full article
To prevent users from using the devices, the administrator should select "Blocked" access level for the desired rule.
View full article
This article explains why the use of the at sign (@) as part of a password for the http proxy access is problematic.
View full article
This article describes the meaning of the F-Secure Automatic Update Agent (AUA) connection settings. AUA is the component in the product that is...
View full article
This article lists and explains the reputation and prevalence property values used in the Application Control rules.
View full article
It is not recommended to use any characters other than the standard Roman character set with any of F-Secure's products.
View full article
This article contains a table listing and describing all the Email and Server Security client services and processes that are running on your server...
View full article