-
How to collect an MBR rootkit sample
How to collect an MBR rootkit sample This article explains how you can collect an MBR rootkit sample for F-Secure Labs to analyse. Before performing any of the steps, you need * a USB drive (or other similar removable media) AND * any rescue system CD available, such as KNOPPIX®. To collect an MBR rootkit sample, do as…
-
Resetting AUA and AUS database repositories in Linux
Resetting AUA and AUS database repositories in Linux This article describes how you can reset both F-Secure Automatic Update Agent (AUA) and F-Secure Automatic Update Server (AUS) database repositories in Linux. In some scenarios, you may need to reset AUA and AUS database repositories. For instance, if you suspect that…
-
How to register F-Secure Policy Manager which is in an isolated or offline environment
How to register F-Secure Policy Manager which is in an isolated or offline environment To register your F-Secure Policy Manager in an isolated or offline environment, you need to get an offline registration file (or token) from F-Secure support: * Contact F-Secure support by opening a support request. * Enter the…
-
How to start using the new Capricorn engine in isolated Policy Manager environments
How to start using the new Capricorn engine in isolated Policy Manager environments To be able to combat the more adaptive and targeted attackers of the future even better, F-Secure has made a significant engine update. The new Capricorn engine brings the following improvements: * Database size decreases by nearly 75%. *…
-
Upgrade from Policy Manager 12 to Policy Manager 13
Upgrade from Policy Manager 12 to Policy Manager 13 This article describes how to upgrade from F-Secure Policy Manager 12 to version 13. Database maintenance is automatically started as part of any Policy Manager upgrade or re-installation to ensure that the database structure is compatible with the latest version. The…
-
Setting up Policy Manager as proxy node
Setting up Policy Manager as proxy node The following steps describe Policy Manager Proxy node installation for both Windows and Linux. * Install Policy Manager Server to act as a Proxy node, using the standard Policy Manager installer. * Stop the Policy Manager service. * Windows: [net stop fsms] * Linux:…
-
How to exclude files or folders from Real-Time scanning in Policy Manager
How to exclude files or folders from Real-Time scanning in Policy Manager This article applies to the following F-Secure products: Policy Manager, Client Security, and Server Security If you want to exclude files or folders from being scanned by Real-Time scanning, follow these steps: In the Standard view * Select Root…
-
Using the Policy Manager for Linux Database Recovery Tool (Version 10.00 and later)
Using the Policy Manager for Linux Database Recovery Tool (Version 10.00 and later) This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or older, use the following recovery tool available on our ftp server: * Tool:…
-
Moving Policy Manager Server to a new server
Moving Policy Manager Server to a new server This article describes how you can move Policy Manager Server (PMS) to a new server. To move PMS: * Backup the current Policy Manager database folder: * Stop the F-Secure Policy Manager Server service (CMD: net stop fsms). * Backup <F-Secure>\Management Server 5\data\h2db\…
-
How do I create a custom firewall rule (service) for F-Secure Client Security 14.x?
How do I create a custom firewall rule (service) for F-Secure Client Security 14.x? The product uses Windows Firewall to protect your computer. A custom firewall rule (service) for F-Secure Client Security 14.x can be created either through F-Secure Policy Manager Console (PMC) or locally on the workstation where Client…