-
How do I set the first and last names in my F-Secure Business Account?
How do I set the first and last names in my F-Secure Business Account? To configure the first and last names for your F-Secure Business Account: * Log in to the F-Secure Elements Security Center. * In the top-right corner, click on the user icon and select My settings. The My settings window opens. * Select the Change…
-
The Log4J Vulnerabilities (CVE-2021-44228 / CVE-2021-45046) – which F-Secure products are affected, what it means, what steps should you take
Note: This article will be updated as more information becomes available. We recommend you check back from time to time. Update 2021-12-22: F-Secure Policy Manager 15.30 has been released, which includes a revised Java Runtime Environment which addresses these issues without the need to patch. Customers are advised to take…
-
Unified navigation for F-Secure Elements
Background With the introduction of the unified navigation menu for F-Secure Elements, it is possible for the administrator to navigate between the various parts of the Elements solution easily. Unified navigation brings collapsible submenus for Endpoint Protection, Endpoint Detection and Response, Vulnerability…
-
F-Secure Elements name changes
UPDATE: 15 October 2021 Changes to the Portals have now been released IMPORTANT NOTES: Any images here show work in progress. We do not guarantee that the final versions will be identical to the images shown here. To see the images in more detail, you can click on them and they will open in full size on a new browser tab.…
-
F-Secureにサンプルを送信するための製品固有の方法
F-Secureにサンプルを送信するための製品固有の方法 F-Secureのコーポレート製品およびF-Secure SAFEの中には、独自のサンプル報告機能を備えているものがあります。サンプル提出ページからファイルを送信する前に、製品とそのサンプル提出方法を確認してください。 サンプルレポート機能を持つF-Secure製品 お使いのF-Secure製品に、ユーザーインターフェースを通じてサンプルを報告するためのボタンやその他の機能が含まれている場合は、一般的なサンプル提出ページからサンプルを提出する代わりに、そのオプションを使用してください。…
-
F-Secure statement on July 2nd Kaseya VSA incident
On July 2nd, Kaseya learned of a cyber attack affecting their VSA Remote Monitoring and Management (RMM) software. Reporting suggests that the attackers were able to deliver ransomware to managed service providers (MSPs) using the software, and potentially, to those MSPs’ clients. Threat actors apparently used an…
-
How to grant F-Secure Support remote login access to Salesforce org
How to grant F-Secure Support remote login access to Salesforce org This article describes how a Salesforce administrator can enable remote access to their Salesforce org for F-Secure Support. Sometimes to be able to assist you with your support issues, F-Secure Support may request that you temporarily grant them remote…
-
F-secureエンドポイント製品は電子メールをスキャンして感染やウイルスを検出しますか?
Issue: F-Secureエンドポイント製品は電子メールをスキャンして感染やウイルスを検出しますか? この記事は以下に適用されます。 F-secure SAFE /インターネットセキュリティ ビジネススイート:クライアントセキュリティ/サーバーセキュリティ Elements Endpoint Protection:コンピューター用EPPおよびサーバー用EPP Resolution: F-Secureエンドポイント製品は電子メールをすぐにスキャンしません。電子メールからファイルを実行すると、リアルタイムスキャンが自動的に開始され、ファイルを開いたり実行したりする前にスキャンします。 Article no: 000002814 The…
-
Migrating to a Usage-Based Security model and changing subscription types in the Partner Portal
Migrating to a Usage-Based Security model and changing subscription types in the Partner Portal This article applies to you if you are an F-Secure Partner and want to migrate or change the subscription types from an Annual (Yearly) or Monthly (SaaS) subscription to a Usage-Based Security subscription model for any of…
-
Hafnium exploit on Microsoft Exchange – Are you protected?
Several vulnerabilities were recently discovered in Microsoft Exchange Server products, which can be exploited by malicious individuals to gain a foothold into an Exchange server. This exploit is known as Hafnium, and can also be used as the entry point to get deeper into the organizational network, as often the Exchange…