-
Understanding the intermediate server failover time setting
Understanding the intermediate server failover time setting This article explains how the intermediate server failover time setting found in F-Secure Automatic Update Agent (FSAUA) works. Intermediate server failover time setting The intermediate server failover time setting specifies (in hours) the failover time to…
-
Optimize network bandwidth usage in large multi-site corporate environments
Optimize network bandwidth usage in large multi-site corporate environments Symptoms To maintain a high protection level, you may notice an increase in bandwidth due to the increased number of updates released per day. Policy Manager Proxy (PMP) installations are especially affected as the additional strain on the likely…
-
Restrictions with double-byte character use
Restrictions with double-byte character use Symptoms If double-byte characters are used in the server addresses, the communication with the server will not function properly. Diagnosis When defining a connection to a server, only DNS valid names can be used. If double-byte characters are used in the server addresses, the…
-
Policy Manager identifies cloned virtual machines as identical machines and not registering as separate hosts
Policy Manager identifies cloned virtual machines as identical machines and not registering as separate hosts Symptoms When deploying cloned virtual machines from a template, Policy Manager identifies them as identical machines even when each machine is configured to have unique accounts in Active Directory. The machines…
-
Windows login taking longer than usual after installing the product
Windows login taking longer than usual after installing the product Symptoms Windows login is taking exceptionally long after installing the F-Secure product. Diagnosis After having installed the F-Secure product on several workstations in the network, you notice that the Windows login is taking longer than usual, even…
-
Using the Policy Manager for Windows Database Recovery Tool (Version 10.00 and later)
Using the Policy Manager for Windows Database Recovery Tool (Version 10.00 and later) This article describes the use of the database recovery tool available since PM version 12.10. For version 12.00 and newer, the recovery tool is included in the installation with the following file path: Program Files (x86)…
-
Using archives to update malware definitions
Using archives to update malware definitions When you cannot use a connection to an intermediate proxy due to security policies, you can update the malware definitions using the tool provided with Policy Manager. The tool for downloading updates is bundled with Policy Manager and can be extracted with the provided…
-
Getting Hardware ID for a device
Getting Hardware ID for a device There are several ways to get the Hardware ID for a device for the Device Control rules; Using Device Control statistics or Windows Device Manager. Using Device Control statistics to get Hardware ID * Open Device Control statistics in Policy Manager. * Find the device that should be used…
-
Installing F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server
Installing F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server This article provides information on installing the F-Secure Linux Security 11 and Policy Manager for Linux 12 on the same server. Limitations and compatibility issues * By default, firewall in Linux Security (LS) will block ports…
-
Using Policy Manager Proxy to update malware definitions
Using Policy Manager Proxy to update malware definitions If your network setup does not allow Policy Manager to connect to the Internet, but allows connections to internal resources that can access the Internet, you can use Policy Manager Proxy to keep the malware definitions up to date. This is the most convenient…