-
Updating F-Secure Linux Security databases manually
Updating F-Secure Linux Security databases manually This article explains how you can update the F-Secure Linux Security virus databases manually. Note: This article assumes deep technical understanding of both F-Secure's products and the relevant operating system. If you are unsure, contact F-Secure support for…
-
Configuring F-Secure AUA to use Policy Manager Proxy or HTTP proxy
Configuring F-Secure AUA to use Policy Manager Proxy or HTTP proxy This article describes how you can configure F-Secure Automatic Update Agent (AUA) to use F-Secure Policy Manager Proxy (PMP) or HTTP proxy. To configure AUA to use PMP, do as follows: * Edit the following AUA configuration file:…
-
Linux Security real-time protection causes performance issue
Linux Security real-time protection causes performance issue Further analysis is needed to pin-point the problematic file and/or process that is causing the performance issue. By setting fsoasd (real-time inspection process) log to debug mode, it is possible to record all accesses that perform real-time virus and…
-
Setting HTTP proxy for Linux Security
Setting HTTP proxy for Linux Security This article describes how you can setup an HTTP proxy for Linux Security. You can configure F-Secure Anti-Virus to download database updates by using an HTTP proxy server. To set the HTTP proxy * in F-Secure Policy Manager Console: * G to F-Secure Automatic Update Agent > Settings >…
-
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams. Note: This article assumes technical understanding of both F-Secure's products and the relevant operating system. If you are unsure, please…
-
Log file not containing human-readable time information
Log file not containing human-readable time information This article describes how you can show human-readable time information in the logs. In the log file, access time is shown as seconds from epoch time (1970/01/01 00:00:00 GMT). To show the time in human-readable format, use the logconv command as follows: * Enter…
-
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper Note: This article applies to customers using F-Secure Internet Gatekeeper (IGK) versions 4 and 5. If you are using spam filtering and have enabled the Real-time Black List (RBL) feature, read this article carefully. Real-time Black Lists…
-
Virtual Host on HTTP reverse proxy
Virtual Host on HTTP reverse proxy On the HTTP proxy, only one parent server can be specified. Because this product connects to the specified parent server based on the IP address, there is no problem on host-based Virtual Host. In this case, you can specify the web server's IP address as the parent server. On IP-based…
-
F-Secure Internet Gatekeeper 5.0 does not contain a web UI
F-Secure Internet Gatekeeper 5.0 does not contain a web UI In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer distributed with the product. As a consequence, this release does not contain a web UI, but is also significantly…
-
Internet Gatekeeper information logs
Internet Gatekeeper information logs The information in this article applies to F-Secure Internet Gatekeeper version 5.x and later. Note: Bracketed strings indicate fields that vary from message to message. Brackets ('<' and '>') are not actually printed as part of messages; they are included below for clarity only.…