-
F-Secure Linux Security 11.10 known issues
F-Secure Linux Security 11.10 known issues This article lists down all the current known issues for F-Secure Linux Security 11.10. * Updates to the operating system kernel may cause compiling issues or malfunction of the Dazuko kernel driver (either due to updates including backports from upstream kernel, or significant…
-
Error message appears on web UI after upgrading to Linux Security 11.00
Error message appears on web UI after upgrading to Linux Security 11.00 Symptoms After upgrading to Linux Security Full Edition version 11.00, the following error message appears on the web UI: The requested resource is not available. Diagnosis This error message appears if the fsicout.txt file is present in the…
-
Creating new file on CIFS file share blocks for 30 seconds
Creating new file on CIFS file share blocks for 30 seconds Symptoms Creating a new file on CIFS (Samba) file share blocks the operation and the system for 30 seconds before finishing. Other file operations and malware detection work normally. Only the CIFS clients that mount the file share are affected. The CIFS file…
-
Updating F-Secure Linux Security databases manually
Updating F-Secure Linux Security databases manually This article explains how you can update the F-Secure Linux Security virus databases manually. Note: This article assumes deep technical understanding of both F-Secure's products and the relevant operating system. If you are unsure, contact F-Secure support for…
-
Configuring F-Secure AUA to use Policy Manager Proxy or HTTP proxy
Configuring F-Secure AUA to use Policy Manager Proxy or HTTP proxy This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy. To configure AUA to use PMP, do as follows: * Edit the following AUA configuration file:…
-
Linux Security real-time protection causes performance issue
Linux Security real-time protection causes performance issue Further analysis is needed to pin-point the problematic file and/or process that is causing the performance issue. By setting fsoasd (real-time inspection process) log to debug mode, it is possible to record all accesses that perform real-time virus and…
-
Setting HTTP proxy for Linux Security
Setting HTTP proxy for Linux Security This article describes how you can setup an HTTP proxy for Linux Security. You can configure F-Secure Anti-Virus to download database updates by using an HTTP proxy server. To set the HTTP proxy * in F-Secure Policy Manager Console: * G to F-Secure Automatic Update Agent > Settings >…
-
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams. Note: This article assumes technical understanding of both F-Secure's products and the relevant operating system. If you are unsure, please…
-
Log file not containing human-readable time information
Log file not containing human-readable time information This article describes how you can show human-readable time information in the logs. In the log file, access time is shown as seconds from epoch time (1970/01/01 00:00:00 GMT). To show the time in human-readable format, use the logconv command as follows: * Enter…
-
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper Note: This article applies to customers using F-Secure Internet Gatekeeper (IGK) versions 4 and 5. If you are using spam filtering and have enabled the Real-time Black List (RBL) feature, read this article carefully. Real-time Black Lists…