-
Linux Security real-time protection causes performance issue
Linux Security real-time protection causes performance issue Further analysis is needed to pin-point the problematic file and/or process that is causing the performance issue. By setting fsoasd (real-time inspection process) log to debug mode, it is possible to record all accesses that perform real-time virus and…
-
Setting HTTP proxy for Linux Security
Setting HTTP proxy for Linux Security This article describes how you can setup an HTTP proxy for Linux Security. You can configure F-Secure Anti-Virus to download database updates by using an HTTP proxy server. To set the HTTP proxy * in F-Secure Policy Manager Console: * G to F-Secure Automatic Update Agent > Settings >…
-
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues
F-Secure Internet Gatekeepr for Linux and HTTP streaming issues This article explains the functionality of F-Secure Internet Gatekeeper for Linux (FSIGK) in relation to HTTP streams. Note: This article assumes technical understanding of both F-Secure's products and the relevant operating system. If you are unsure, please…
-
Log file not containing human-readable time information
Log file not containing human-readable time information This article describes how you can show human-readable time information in the logs. In the log file, access time is shown as seconds from epoch time (1970/01/01 00:00:00 GMT). To show the time in human-readable format, use the logconv command as follows: * Enter…
-
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper
Using Real-time Blackhole Lists for spam filtering in F-Secure Internet Gatekeeper Note: This article applies to customers using F-Secure Internet Gatekeeper (IGK) versions 4 and 5. If you are using spam filtering and have enabled the Real-time Black List (RBL) feature, read this article carefully. Real-time Black Lists…
-
Virtual Host on HTTP reverse proxy
Virtual Host on HTTP reverse proxy On the HTTP proxy, only one parent server can be specified. Because this product connects to the specified parent server based on the IP address, there is no problem on host-based Virtual Host. In this case, you can specify the web server's IP address as the parent server. On IP-based…
-
F-Secure Internet Gatekeeper 5.0 does not contain a web UI
F-Secure Internet Gatekeeper 5.0 does not contain a web UI In this release, we have removed dependency to Java, which is a common source of security vulnerabilities. Java runtime environment is no longer distributed with the product. As a consequence, this release does not contain a web UI, but is also significantly…
-
Internet Gatekeeper information logs
Internet Gatekeeper information logs The information in this article applies to F-Secure Internet Gatekeeper version 5.x and later. Note: Bracketed strings indicate fields that vary from message to message. Brackets ('<' and '>') are not actually printed as part of messages; they are included below for clarity only.…
-
Limitations with HTTPS sites in the Web Content Control settings in IGK
Limitations with HTTPS sites in the Web Content Control settings in IGK With the Internet Gateway (IGK) for Linux 5.30 release, allowing or denying access to HTTPS sites in the Web Content Control settings may not work in certain situations as expected. These limitations apply to HTTPS sites when specifying them in the…
-
Scanning HTTPS (SSL) traffic
Scanning HTTPS (SSL) traffic This article provides information about scanning HTTPS (SSL) traffic by using F-Secure Internet Gatekeeper for Linux. Because HTTPS (SSL) traffic is encrypted, F-Secure Internet Gatekeeper for Linux cannot scan the contents of a file. However, by using the setup described in this article,…