-
Setting up Policy Manager as proxy node
Setting up Policy Manager as proxy node The following steps describe Policy Manager Proxy node installation for both Windows and Linux. * Install Policy Manager Server to act as a Proxy node, using the standard Policy Manager installer. * Stop the Policy Manager service. * Windows: [net stop fsms] * Linux:…
-
How to exclude files or folders from Real-Time scanning in Policy Manager
How to exclude files or folders from Real-Time scanning in Policy Manager This article applies to the following F-Secure products: Policy Manager, Client Security, and Server Security If you want to exclude files or folders from being scanned by Real-Time scanning, follow these steps: In the Standard view * Select Root…
-
Using the Policy Manager for Linux Database Recovery Tool (Version 10.00 and later)
Using the Policy Manager for Linux Database Recovery Tool (Version 10.00 and later) This article describes the use of the database recovery tool available since PM version 12.10. If you are running the Policy Manager version 12.00 or older, use the following recovery tool available on our ftp server: * Tool:…
-
Moving Policy Manager Server to a new server
Moving Policy Manager Server to a new server This article describes how you can move Policy Manager Server (PMS) to a new server. To move PMS: * Backup the current Policy Manager database folder: * Stop the F-Secure Policy Manager Server service (CMD: net stop fsms). * Backup <F-Secure>\Management Server 5\data\h2db\…
-
How do I create a custom firewall rule (service) for F-Secure Client Security 14.x?
How do I create a custom firewall rule (service) for F-Secure Client Security 14.x? The product uses Windows Firewall to protect your computer. A custom firewall rule (service) for F-Secure Client Security 14.x can be created either through F-Secure Policy Manager Console (PMC) or locally on the workstation where Client…
-
How to verify if you are using the new Capricorn engine
How to verify if you are using the new Capricorn engine F-Secure has released a new generation engine for one of our core scanning engines, which, at F-Secure, we call Capricorn. The engine change brings significant improvements in the database size, decreasing it by nearly 75%. This has the benefit of reduced bandwidth…
-
Management Information Base files (MIBs)
Management Information Base files (MIBs) A MIB is an informational file that describes the settings that can be made with an F-Secure product and their settings for this product. MIB is part of SNMP (Simple Network Managment Protocol). A MIB describes a set of objects, such as the F-Secure modules (e.g. Anti-Virus) that…
-
On-demand scanner (fsav) exit codes
On-demand scanner (fsav) exit codes This article describes the exit codes of fsav(3), the command line scanner module included in the Security Platform and F-Secure Linux Security. FSAV has the following exit codes: * 0 - Normal exit; no viruses or suspicious files found. * 1 - Fatal error; unrecoverable error. (Usually…
-
Configuring syslog facility and priority
Configuring syslog facility and priority This article provides information about Linux syslog-related information for configuring the F-Secure Management Agent Alert forwarding. What is the default syslog facility used by F-Secure Client/Server Security and how does the syslog priority map to the F-Secure Alert severity?…
-
Pre-installation checklist for F-Secure Linux Security version 11.x
Pre-installation checklist for F-Secure Linux Security version 11.x Some Linux distributions and Linux installations may require certain software packages to be installed or workarounds to be applied before the F-Secure Linux Security product can be installed successfully. This article describes the most common…