Hello, I have configured a web scan with F-Secure radar for our web application using Polymer JavaScript framework (utilizing Shadow DOM). Since the F-Secure Radar Web recorder does not seem to support web sites using shadow dom i recorded the login process with fiddler. I saved the login-traffic captured by Fiddler in a…
Hello, We have configured Alert Sending from our Policy Manager Console (15.10.94031) to an email address where IT support can view the alerts generated from the endpoints running CS 15.10 Premium. The problem is that after upgrading the Policy Manager Console from version 14.x to 15.10 and the CS endpoints from 14.22…
Hello we are upgrading our clients 14.00 and 14.10 to 15.10 by pushing the upgrade from PM Most of then hang on "in progress". We are using Linux PMProxies on these remote locations. What logs can we check (client and PM Proxy) to find information on what is going wrong? Thanks Klaas
device not modified for download
Hello there, newbe here but using F-secure client already since years. After installing MAC OS Big sure i get the notice that my macbook is not secure because there is a problem with real time scanning version 14.0 (30708). What do i have to do to fix it? GRts and thw in advance. Ronn
Hi, I am wondering if someone knows if there is any way of using the API with POST/PUT data to FSPMS 15.0x? I am looking for a way to push urls to the webbrowser protection. For example when we get ioc that a phishing try is in the wild in our org. It would be great if it was possible to do that programmaticaly so that not…
Hello, Where can I found more info regard dns query is blocked from network filter alerts I saw in Policy Manager ? i would like to know reason why is request blocked. Thank you Kind regards Nenad
Hello, Server Security Premium 14.10 - Can anyone explain how aua log files are rotate ? I have found them in c:\ProgramData\F-Secure\Log\AUA\ aua.log aua1.log aua2.log Are they rotate every week, or when log file fill up to some size or some other rule is in place ? Thank you Kind regards Nenad
Our company intends to purchase usb armory. But now we have a problem. We intend to use usb armory as a trusted computing module to verify the trustworthiness of computers and certain programs. Therefore, whether usb armory supports secondary development and whether the secondary development is convenient is very important…
We use a web application called HubTran and we have 2 users that it will not load images unless the F-Secure Ultralight Hoster service is disabled. We have other users that don't have this issue. I updated the F-Secure agent to 14.22 but that didn't fix the issue.
It looks like you're new here. Sign in or register to get started.