Other Business Security Products

Sort by:
This article explains how you can send false spam positives and false spam negatives to Proofpoint for further analysis.
View full article
This article describes how to stop and start the F-Secure Secure Messaging Security Gateway (FSMSG) PPS service if necessary.
View full article
This article describes how you can send test messages from the command line to test an F-Secure Messaging Secure Gateway (FSMSG) appliance...
View full article
This article explains what you need to do to get the F-Secure Messaging Security Gateway (MSG) product upgraded to the latest version.
View full article
This article describes how you can force TLS encryption with Microsoft Exchange.
View full article
This article describes how you can create a rule to block e-mails with a specific character set.
View full article
If the F-Secure Messaging Security Gateway has been in evaluation with an evaluation activation key, it must be activated with a real activation key...
View full article
This article explains how you can add a footer, such as a disclaimer, to all outbound mail of an F-Secure Messaging Security Gateway (MSG) Server.
View full article
This article explains how to accept all incoming e-mails regardless of the domain they have been sent to.
View full article
You can manually assign F-Secure Cloud Protection licenses to selected users in the following way:
View full article
The F-Secure Cloud Protection application comes with a number of privacy-related settings that can be configured on the Administration page. These...
View full article
The Scheduled Scanning feature in F-Secure Cloud Protection allows you to (re)scan Salesforce files and attachments for harmful and disallowed content...
View full article
Once the scheduled job is created, you can modify its settings in the AFSC__FS_ManualScanSetting__c custom object, which stores settings for the...
View full article
Although it may be easier to validate the automatic assign rule conditions in the Assign Licenses window, you can also use the Automatic License...
View full article
This article describes how you can import users and groups with LDAP import.
View full article
There might be cases where legitimate email is considered as spam. This may happen, for example, with automated systems generating non-standard SMTP...
View full article
This article describes how you can specify the spam policy to block bulk and phishing emails.
View full article
This article describes how you can create a domain-specific spam policy. At first, you need to add a domain group, then add a spam policy.
View full article
This article describes how you can enable end-user digests.
View full article
This article describes how you can add new domain/customer policy routes.
View full article
This article describes how you can add a new domain/customer for outbound email.
View full article
This article describes how you can add a new domain/customer for inbound email.
View full article
This article describes how you can create domain-specific reports.
View full article
This article describes how you can add users to F-Secure PSE user repository automatically.
View full article
You can modify the bulk score for a sender in order to safelist the sender. There are two options to change the bulk score of a sender:
View full article
This article describes what Messaging Security Gateway (MSG) backs up and how the process work.
View full article
This article explains in detail what kind of information is sent upstream when new databases are polled or the product is activated.
View full article
This article describes how you can check whether a mail server is responding or not. It explains how to do this in principle and provides links to...
View full article
This article describes which ports to open in the firewall to enable virus and spam database updates for F-Secure Messaging Security Gateway (FSMSG).
View full article
F-Secure Security Cloud API for AWS is designed to improve security by providing real-time threat intelligence to any application or service. The API...
View full article
The API is designed to enhance the security of applications and services that allow users to submit text and links to external content. For example:
View full article
The API is designed to be integrated into any application or service. It provides real-time threat intelligence that applications can use, for example...
View full article
There are 28 web site categories that the F-Secure Cloud Protection application can be configured to check and block access to.
View full article
This article lists the Salesforce editions onto which the F-Secure Cloud Protection application can be installed.
View full article
F-Secure Cloud Protection supports the same archive formats as other F-Secure products, including but not limited to ZIP, 7Z, ARJ, RAR, JAR, LZH, CAB,...
View full article
This article lists the Salesforce objects where F-Secure Cloud Protection scans the URLs.
View full article
The F-Secure Cloud Protection for Salesforce application can be found in the Salesforce AppExchange marketplace (Japanese AppExchange) .
View full article
To be protected against harmful and disallowed content, an F-Secure Cloud Protection license must be assigned to each user in your Salesforce...
View full article
Yes. You can get a free trial from Salesforce AppExchange. The app comes with a trial license which allows you to install it and use all its features...
View full article
Yes, it is possible to whitelist web sites. In the URL Protection settings you can define hosts, domains or exact URLs that will be excluded from web...
View full article
This article describes how you can buy an F-Secure Cloud Protection for Salesforce license for your organization.
View full article
No. The F-Secure Cloud Protection for Salesforce app has a built-in license key that is managed through the Salesforce License Management app by...
View full article
Yes it does scan such files provided that a third-party application is using standard Salesforce objects (such as ContentDocument/ContentVersion or...
View full article
Yes you can. The F-Secure Cloud Protection application is Lightning-ready, and it can be used in both Classical and Lightning Experience user...
View full article
Yes, you can. The files excluded from scanning can be specified in the File Protection settings. Exclusions are defined by file extension and/or file...
View full article
As malicious files cannot be disinfected without breaking their structure or content, the F-Secure Cloud Protection for Salesforce app blocks or...
View full article
We don't analyze exported files during the export process. However, all files have already been analyzed both during the upload phase and on every...
View full article
Issue: How to allow users to be able to see and manage the encrypted messages they have sent through Messaging Security Gateway using the end user web service? Resolution: To enable management of sent encrypted messages in the end user web service (euweb): Log into the Messaging Security Gateway Web UI. Click on the System tab. From the left-side menu, navigate to End User Services > Web Application. Under Settings, change Show Encryption Key Management to On. Click Save Changes at the top left corner. Article no: 000015840
View full article
Issue: Submitting a False positive or False negative for MSG Resolution: This article explains how you can send false spam positives and false spam negatives to Proofpoint for further analysis.   Both administrators and end users can report false positives and false negatives. For end users, the administrator must first enable end user digests. End users can then report false positives and false negatives from the digest. Reporting false negatives requires the use of the Audit folder in the Quarantine. It also requires setting up a Spam Reporting Group.   False negatives False negatives are messages that are considered spam by the end user, but since they were scored below 50 by the MLX engine, they were delivered to the end user. By reporting these messages to the Proofpoint Attack Response Center (PARC), you can help improve spam effectiveness against that specific type of message. In order to fully examine the reported message, PARC requires the entire original/unaltered message. Since the best way to capture the original message is in the quarantine (before it arrives at your mail server), we use the "Audit Messages" feature to store Not Spam messages in the Audit folder. There are two steps required to enable the reporting of false negatives: Enable Auditing in all Spam Policies Enable Audit Messages for users Enable Auditing in all Spam Policies This option will quarantine (into the Audit folder) any message (<200K) marked as Not Spam that is also not being quarantined by any other rule. Click Spam Detection > Policies. Edit the Default policy. Edit the Not Spam rule. Select the Include in Audit folder box. Click Save Changes. Repeat these steps for all other spam policies. Note: The "Not Spam" messages will not be copied into the Audit folder until the "Audit Message" feature is actually enabled for one or more users (next step). Enable Audit Messages for users Navigate to Groups and Users / Users and select the checkbox next to each user who will use this feature. Click the Groups button. Under "Available Groups" column, click Spam Reporting, then click >> to move it under the "Add" column. Click Save Changes. Once these steps have been completed, mail marked as "Not Spam" will begin appearing in the Audit folder in the quarantine. For performance reasons, we do not recommend that you enable Audit Messages for all users. If you do decide to enable it for all users, do so on Groups and Users / Global. False positives False positives are messages are scored as spam but are considered valid e-mail by the end user. False positives are very rare and are treated with the highest priority by Proofpoint. Digests allow for the reporting of false positives in the default configuration. Users click the Not Spam link next to an individual message and that e-mail is then delivered directly from the Quarantine to the Proofpoint Attack Response Center. If this link does not appear in your digest, check the following: Click Digest / Commands / Display Spam False-Positive Link (on). Click Digest / Filters / Modules. Click Spam, Options and then Digest Commands. "Report False Positive Spam" should be on the right-hand side. Digest / Content / Labels. Verify the name assigned to "Report False Positive Spam". Reporting directly from the Quarantine An administrator can perform the same reporting function, but directly from the Quarantine: Navigate to Quarantine / Messages. Search for message by Subject, Sender, Recipient, etc. Select the checkbox next to the message and click Options / Report. If you do not want your users to be able to report messages directly from their digest, and wish to only have administrators report directly from the quarantine, change the following options: Digest > Commands. Disable "Report False Positive Spam". Digest > Commands. Disable "Report False Negative Spam". Groups and Users > Groups. Select the checkbox next to Spam Reporting and click Attributes. Set "Include Audit Messages in Digest" to "Default" and save. These changes will still store both spam and not spam in the quarantine, but the end users will no longer see the Audit section in their digest and they will no longer see the "Not Spam" option in the Quarantine section. Article no: 000001938
View full article
Issue: A user has forgotten their password to Secure Reader and there is no direct way to reset it. Resolution: For internal users, the password can be reset through the appliance webGUI: Log in to the appliance webGUI Go to the System-tab Navigate to User Management->Users on the right Search for the users email-address Click the email address to bring up the user details Go to the Authentication-tab Click the Reset-button next to the password The user will get a welcome email with a temporary password and a link to the end user services that is valid for 30 minutes For external users, the recommendation from Proofpooint is to remove the user and have them re-register: Log in to the appliance webGUI Go to the System-tab Navigate to User Management->Users on the right Search for the users email-address Check the box to the left of the account that needs to be removed Click the Delete-button on top of the user list The next time the user tries to access the Secure Reader, they will be prompted to create a new account Removing a user has no impact on how the user can access mails in the future. After the re-registering they will be able to access all their secure mails as before, as long as they are still stored on the appliance. Although the temporary password sent by the welcome-email will work for an external user to access the Secure Reader, the link in the mail to the end user services will not. As this might cause unwanted confusion the better solution is to remove the current user completely. Article no: 000007798
View full article