-
How does the Automatic Update Agent (AUA) fetch its updates by order of priority?
How does the Automatic Update Agent (AUA) fetch its updates by order of priority? This article describes what logic Automatic Update Agent (AUA) uses to prioritize its updates fetch. Legend: PMS Policy Manager Server PMp Policy Manager proxy (Update proxy) HTTPp HTTP proxy RDP Root Distribution Point (F-Secure Update…
-
What's new in Policy Manager for Linux 14.00?
What's new in Policy Manager for Linux 14.00? F-Secure Policy Manager for Linux 14.00 was released on November 14, 2018. To find out the latest information about the Policy Manager for Linux 14.00 release, the Release Notes are available here.
-
Updating malware definitions in isolated networks
Updating malware definitions in isolated networks Note: This feature is available for Policy Manager 13.10 (Linux & Windows) and newer only. Policy Manager offers two options for updating virus definitions in isolated networks that have no direct connection to the Internet. If your network configuration allows Policy…
-
Understanding the intermediate server failover time setting
Understanding the intermediate server failover time setting This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works. Intermediate server failover time setting The intermediate server failover time setting specifies (in hours) the failover time to…
-
Optimize network bandwidth usage in large multi-site corporate environments
Optimize network bandwidth usage in large multi-site corporate environments Symptoms To maintain a high protection level, you may notice an increase in bandwidth due to the increased number of updates released per day. Policy Manager Proxy (PMP) installations are especially affected as the additional strain on the likely…
-
Restrictions with double-byte character use
Restrictions with double-byte character use Symptoms If double-byte characters are used in the server addresses, the communication with the server will not function properly. Diagnosis When defining a connection to a server, only DNS valid names can be used. If double-byte characters are used in the server addresses, the…
-
Policy Manager identifies cloned virtual machines as identical machines and not registering as separate hosts
Policy Manager identifies cloned virtual machines as identical machines and not registering as separate hosts Symptoms When deploying cloned virtual machines from a template, Policy Manager identifies them as identical machines even when each machine is configured to have unique accounts in Active Directory. The machines…
-
Windows login taking longer than usual after installing the product
Windows login taking longer than usual after installing the product Symptoms Windows login is taking exceptionally long after installing the F-Secure product. Diagnosis After having installed the F-Secure product on several workstations in the network, you notice that the Windows login is taking longer than usual, even…
-
Using the Policy Manager for Windows Database Recovery Tool (Version 10.00 and later)
Using the Policy Manager for Windows Database Recovery Tool (Version 10.00 and later) This article describes the use of the database recovery tool available since PM version 12.10. For version 12.00 and newer, the recovery tool is included in the installation with the following file path: Program Files (x86)…
-
Using archives to update malware definitions
Using archives to update malware definitions When you cannot use a connection to an intermediate proxy due to security policies, you can update the malware definitions using the tool provided with Policy Manager. The tool for downloading updates is bundled with Policy Manager and can be extracted with the provided…