background image

Configuring rule alerts

Internet Shield rule alerts can be used to get notifications if certain types of malware try to access the
computers.

It is possible to issue an alert every time a rule is hit or when illegal datagrams are received, which makes it
easy to see what kind of traffic is going on in your system.

Proper alerting can only be done by having proper granularity in the security level: have one rule for each
type of alert you want. Designing alerting based on broad rules will generate a lot of alerts, and any important
information might be lost in large volumes of useless noise.

Adding a new rule with alerting

In this example, a

Deny

rule with alerting is created for inbound ICMP traffic for a certain subdomain, so that

an alert is issued when somebody tries to ping the computer.

At the end of this example the rule is tested by pinging one of the computers in the subdomain. This example
also describes the different selections you can make when creating new rules with the

Firewall rules

wizard.

Select the rule type and denied service

The first step is to select the rule type and define the denied service.

To do this:

1.

Select the subdomain for which you want to create the rule on the

Policy domains

tab.

2.

Go to the

Settings

tab and select the

Firewall rules

page.

3.

Select the Internet Shield security level for which you want to add the new rule from the

Internet Shield

security level being edited

drop-down menu.

Now all the rules that have been defined for this Internet Shield security level are displayed on the table.

4.

Click

Add before

to add the new rule as the first one on the list.

This opens the

Firewall rule

wizard.

5.

Select

Deny

to deny the inbound ICMP connections.

6.

Specify affected hosts.

Choose whether to apply this rule to all connections or to selected connections only. You can either:

Check the

Any remote host

option to apply the rule to all Internet connections,

Check the

All hosts on locally connected networks

option to apply the rule to all connections form

the local network,

Check the

Specified remote hosts

option to apply the rule to an IP address, a range of IP addresses

or DNS addresses. When this option is selected, you can specify the addresses in the text field below.
If you want to enter several addresses or address ranges in the field, separate them by spaces.

For this rule, select

Any remote host

.

7.

Choose the denied service and direction for the rule.

Select the service for which this rule will apply, from the list of available services. If you want the rule to
apply to all services, select

All

from the top of the list. You can select as many individual services as you

want in this window.

For the chosen services, select the direction in which the rule will apply by clicking on the arrow in the

Direction

column. Repeated clicks cycle between the available choices. See the table below for examples.

Explanation

Direction

The service will be allowed/denied to/from your
computer in both directions.

<=>

94

| F-Secure Client Security | Configuring Internet Shield

Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00

Page 1: ...F Secure Client Security Administrator s Guide...

Page 2: ......

Page 3: ...Run Policy Manager Console 19 Changing the web browser path 21 Uninstalling the product 22 Chapter 3 Anti virus mode user interface 23 Policy domains tab 24 Management tabs 25 Summary tab 25 Settings...

Page 4: ...ger Server 64 Configuring Policy Manager Proxy 65 Configuring clients to download updates from each other 65 Configuring real time scanning 67 Real time scanning settings 67 Enabling real time scannin...

Page 5: ...rity level for a certain domain only 90 Configuring network quarantine 93 Network quarantine settings 93 Turning network quarantine on in the whole domain 93 Fine tuning network quarantine 93 Configur...

Page 6: ...file manually 128 Suspending downloads and updates 129 Allowing users to unload F Secure products 130 Chapter 10 Virus information 131 Malware information and tools on the F Secure web pages 132 How...

Page 7: ...interface 150 Using packet filtering 150 Configuring security level autoselection 152 Troubleshooting connection problems 153 Adding new services 154 Creating a new Internet service based on the defau...

Page 8: ...8 F Secure Client Security TOC...

Page 9: ...mpliance with corporate policies and centralized control Product registration Application management When the system has been set up you can see status information from the entire managed domain in on...

Page 10: ...ise or Web Server editions P4 2 GHz processor or faster Processor Managing more than 5000 hosts or using Web Reporting requires P4 3 GHz level processor or faster 512 MB RAM 1 GB RAM recommended Memor...

Page 11: ...eb Server editions Windows Server 2008 SP1 64 bit Standard Enterprise Web Server Small Business Server or Essential Business Server editions Windows Server 2008 R2 Standard Enterprise or Web Server ed...

Page 12: ...Server and the managed hosts is accomplished through the standard HTTP protocol which ensures trouble free performance on both LAN and WAN Management Agent enforces the security policies set by the a...

Page 13: ...t pre configured installation packages which can also be delivered using third party software such as SMS and similar tools Configuration and policy management Centralized configuration of security po...

Page 14: ...mber from your license certificate during the installation of Policy Manager What information is sent We collect information that cannot be linked to the end user or the use of the computer The collec...

Page 15: ...le interprets the policy files sends autoregistration requests and host status information to Policy Manager and performs policy based installations Cisco Network Admission Control NAC Support F Secur...

Page 16: ...hat have a similar security policy Policy domain Policy inheritance simplifies the defining of a common policy In Policy Manager Console each policy domain automatically inherits the settings of its p...

Page 17: ...g the product Here you will find instructions for installing the main product components Policy Manager Server and Policy Manager Console Topics Installation steps Changing the web browser path Uninst...

Page 18: ...ll the product in a different directory you can click Browse and select a new directory Note If you have Management Agent installed on the same machine this window will not be shown 3 Enter your custo...

Page 19: ...uses a local socket connection to the Administration module to fetch server data The default port is 8081 By default access to Web Reporting is allowed also from other computers If you want to allow...

Page 20: ...complete the setup process Policy Manager Console will generate the management key pair After the key pair is generated Policy Manager Console will start The setup wizard creates the user group FSPM u...

Page 21: ...acquires the file path to the default web browser during setup If you want to change the web browser path 1 Select Tools Preferences from the menu 2 Select the Locations tab and enter the new file pat...

Page 22: ...alog box appears 4 Click Start to begin uninstallation 5 When the uninstallation is complete click Close 6 Repeat the above steps if you want to uninstall other Policy Manager components 7 When you ha...

Page 23: ...nt Security settings You can switch between the modes by selecting Advanced mode or Anti virus mode in the View menu Settings inheritance The main components of the Anti virus mode user interface are...

Page 24: ...ous names Import autoregistered hosts Autodiscover hosts from a Windows domain Delete hosts or domains Move hosts or domains using cut and paste operations Export a policy file After selecting a domai...

Page 25: ...displayed for example when there are disconnected hosts The information displayed on the Summary tab depends on what is selected in the Policy domains tab When a domain is selected the Summary tab dis...

Page 26: ...access more detailed information on the Status tab and Overall protection page See how many infections have been found in the domain If you want to see host specific infection information click View h...

Page 27: ...described briefly in this section Context menu on settings pages By right clicking any setting on a Settings tab page you can access a context menu that contains the following options This option clea...

Page 28: ...cted domain Unless otherwise stated the settings listed on this page are valid for all Client Security versions To view and configure the settings that are no longer valid for Client Security 9 or hig...

Page 29: ...g in the Excluded extensions field Select whether the users can exclude objects from real time scanning When Enable excluded objects is selected the users can specify individual files or folders that...

Page 30: ...d spyware items drop down list Quarantine management This page is used to manage malware that has been quarantined on managed hosts Quarantine content This table displays a list of quarantined items o...

Page 31: ...d to the scanning of web traffic for example downloaded files General In this section you can turn HTTP scanning on or off HTTP Scanning Select the action to take on infection Select the action to tak...

Page 32: ...firewall is in use the firewall rules are checked in the order in which they are displayed in the table from top to bottom For security levels with the Normal filtering mode it is possible to define d...

Page 33: ...cations that the hosts have reported and for which no rules exist yet In this section you can also Select the default action for client applications Select the default action for server applications S...

Page 34: ...ss and e mail subject to be used when forwarding alerts by e mail Alert Forwarding This table can be used to configure where the alerts that are of certain severity are to be forwarded Centralized man...

Page 35: ...ings Policy Manager Server URL address of Policy Manager Server Incoming packages polling interval Defines how often the host tries to fetch incoming packages from Policy Manager Server for example ba...

Page 36: ...ducts The virus definitions date and version information is also displayed for hosts that have Anti virus for Citrix Servers Anti virus for Windows Servers Internet Gatekeeper or Anti virus for Micros...

Page 37: ...plays the following information for each alert severity date and time description host and user and the product the alert relates to When an alert is selected in the alert list the lower half of the p...

Page 38: ...by importing them to the policy domain tree The Installation packages view shows the available installation packages and detailed information on their content Installation packages Note Due to the ch...

Page 39: ...to the currently selected domain Displays the Properties box of a host or domain Launches the Autodiscover Windows Hosts tool New hosts will be added to the currently selected policy domain Starts pu...

Page 40: ...oregistered hosts Imports hosts from the Windows domain structure Autodiscover Windows hosts Installs software remotely and imports the hosts specified by IP address or WINS name Push install to Windo...

Page 41: ...lation packages Tools Changes login passphrase the passphrase protecting the Policy Manager Console private key Change passphrase Lets you select the reporting methods and the domains hosts and produc...

Page 42: ...terface The inherited settings and settings that have been redefined on the current level are displayed in a different way on the Policy Manager user interface Description Inherited Not inherited A cl...

Page 43: ...them on the current page After this the users cannot change these settings Disallow user changes Clears all the settings that have been redefined on the current page and restores the default or inher...

Page 44: ......

Page 45: ...be administered from one single location Checking that the management connections work There are also some issues that you should take into consideration so that you can profit the most from the centr...

Page 46: ...r The Name field specifies what the connection will be called in the Connection field in the Login dialog If the Name field is left empty the URL or the directory path is displayed The Public key file...

Page 47: ...ould switch unnecessary polling off by clearing the polling item you want to disable However automatic polling should be disabled only if some performance problems occur Disable All Polling disables a...

Page 48: ...so import all hosts to the root domain first and create the domain structure later when the need for that arises The hosts can then be cut and pasted to the new domains All domains and hosts must have...

Page 49: ...installed on the hosts and after the hosts have sent an autoregistration request Management Agent will have to be installed from a CD ROM from a login script or some other way To import autoregistere...

Page 50: ...cy Manager Console is closed To add a new custom property a Right click a column heading and select Add new custom property The New custom property dialog opens b Enter a name for the custom property...

Page 51: ...available Any changes made to the domain structure are implemented even though you exit Policy Manager Console without saving changes to the current policy data Push installations This section describ...

Page 52: ...cted Windows domain 5 Click Install to continue After you have selected your target hosts you still need to push install the applications to hosts Push install to Windows hosts You can also select tar...

Page 53: ...nagement Agent and the selected products on the hosts During this process the Status line will display the procedure in process You can click Cancel at any time to stop the installation 7 When the Sta...

Page 54: ...lation task The Progress field displays information that is different for hosts and for domains Progress If a host is selected the Progress field displays one of the following messages The installatio...

Page 55: ...not affect the button state Stop all only removes the operation from the policy If a host has already polled the previous policy file it may try to carry out the installation operation even though it...

Page 56: ...he value will be presented as a cell value One example of how to utilize custom properties is to create a separate installation package for different organizational units which should be grouped under...

Page 57: ...eft out password secret variation password secret with spaces Specifies the password of the user account The ilaunchr functionality stays the same if neither of these two parameters is given If only o...

Page 58: ...Vista and Windows 7 Intel Pentium 4 2 GHz or higher On Windows XP Intel Pentium III 1 GHz or higher Operating system Windows 7 32 bit and 64 bit Windows Vista 32 bit and 64 bit Windows XP SP2 or newe...

Page 59: ...ption key delivered with the product You can use the subscription key for the number of installations your license is for see the F Secure License note in this guide If you have problems in registerin...

Page 60: ...launchr exe installation tool cannot be run on a computer that is infected with Klez You can download the Kleztool from ftp ftp europe f secure com anti virus tools kleztool zip The kleztool zip packa...

Page 61: ...e steps given here 1 Check the Policy distribution status on the Summary tab 2 Save and distribute the polices if necessary 3 Go to the Status tab and select the Centralized management page 4 Check th...

Page 62: ......

Page 63: ...cted You can also monitor the scanning results and other information the managed hosts send back to Policy Manager Console Configuring e mail scanning Configuring web traffic HTTP scanning When a viru...

Page 64: ...irectly from F Secure update server Note If Client Security is set to download neighborcast updates it may also download updates from other Client Security installations that have neighborcast enabled...

Page 65: ...dates is selected 4 Click Add to add new servers to the list of available proxy servers This opens the Policy Manager Proxy server properties window 5 Enter a priority number for the Policy Manager Pr...

Page 66: ...s page a To set clients in the selected domain to download updates from other clients select Enable Neighborcast client b To set clients in the selected domain to serve updates to other clients select...

Page 67: ...Excluded extensions field This is most useful when scanning is set to All Files Enable excluded objects Excluded objects are individual files or folders which are normally set locally They can also b...

Page 68: ...ies that are stored on disk not cookies that are only stored in the web browser s cache Manual scanning will detect cookies stored both on disk and in the web browser s cache File extension handling C...

Page 69: ...time scanning on their computers Now a closed lock symbol is displayed beside all settings on this page 8 Click to save and distribute the policy Excluding Microsoft Outlooks s pst file from real tim...

Page 70: ...unclear cannot identify the application as safe or unsafe default option DeepGuard blocks unsafe applications and allows safe applications automatically without asking the user any questions Automatic...

Page 71: ...ss to the Internet to work If your network allows access only through an HTTP proxy set the Automatic Update Agent HTTP proxy setting to your proxy server s address to make sure server queries work F...

Page 72: ...us items after full computer check to specify that detected suspicious items are shown in the disinfection wizard and in the scanning report after a full computer check When this option is selected yo...

Page 73: ...oming e mail scanning 1 Action on incoming infected attachment Disinfect Attachment starts the disinfection wizard whenever an infected attachment is detected Remove Attachment deletes the attachment...

Page 74: ...e mails 1 Select Root on the Policy domains tab 2 Go to the Settings tab and select the E mail scanning page 3 Configure incoming e mail scanning a Select Enable incoming e mail scanning b Select the...

Page 75: ...d for example when handling password protected archives The actions available are Block blocks the file that could not be scanned Report Only ignores the file but reports it to the administrator Selec...

Page 76: ...and enter http example com This excludes all the sub domains c Click the Add button under the Trusted sites table This creates another new line in the table d Click on the line you just created so tha...

Page 77: ...ttings The settings for spyware scanning are described here Spyware scanning is included as part of real time scanning and manual scanning When Real time scanning enabled is selected on the Real time...

Page 78: ...you should include them in the test environment and allow their use when you are checking and configuring rules for the applications in Spyware and riskware reported by hosts table 1 Create a test do...

Page 79: ...y Allowing the use of a spyware or riskware component In this example the use of a spyware or riskware component that was found during the spyware scanning is allowed for one host 1 On the Policy doma...

Page 80: ...to save and distribute the policy Releasing quarantined objects Infected files spyware or riskware that have been quarantined on hosts can be released from quarantine in which case they are allowed o...

Page 81: ...d objects table and click Release The object is moved to the Actions to perform on quarantined objects table with Release given as the Action for the object 5 Click to save and distribute the policy F...

Page 82: ...nge any settings This operation also makes the Advanced mode settings final Setting all virus protection settings as final In this example all the virus protection settings are set as final 1 Select R...

Page 83: ...der s address for e mail alert messages in the E mail sender address From field c Enter the e mail alert message subject in the E mail subject field Refer to the MIB help text for a list of possible p...

Page 84: ...ection section of the Summary tab If it displays new infections you can access more detailed information by clicking View hosts infection status It takes you to the Status tab and Virus protection pag...

Page 85: ...oad the EICAR test file from http www europe f secure com virus info eicar_test_file shtml Alternatively use any text editor to create the file with the following single line in it X5O P AP 4 PZX54 P...

Page 86: ......

Page 87: ...component included in the Internet Shield can be used to restrict traffic based on the protocols used Application control is designed Configuring rule alerts Configuring application control to preven...

Page 88: ...ty level allows all outbound TCP traffic and FTP file retrievals Everything else is denied and Home denied inbound TCP traffic generates alerts Local rules can be added to enable new network functiona...

Page 89: ...is minimizes the security risk The drawback is that when new services are needed the firewall must be reconfigured This however is a small price to pay for increased security The opposite concept to d...

Page 90: ...rs from changing the setting click the lock symbol beside it 5 Click to save and distribute the policy You can verify that the new security level change has become effective by going to the Status tab...

Page 91: ...n the list This opens the Firewall rule wizard 4 Complete the Firewall rule wizard a On the Rule type page select Allow as the rule type b On the Remote hosts page select Any remote host to apply the...

Page 92: ...vels page 3 Turn off the BrowserSecurity security level by clearing the Enabled check box beside it on the Firewall security levels table 4 On the Policy domains tab select the subdomain where you wan...

Page 93: ...r turning off real time scanning on a host activates network quarantine Turning network quarantine on in the whole domain You can enable network quarantine for the whole domain by following the steps...

Page 94: ...el being edited drop down menu Now all the rules that have been defined for this Internet Shield security level are displayed on the table 4 Click Add before to add the new rule as the first one on th...

Page 95: ...in the Alert trap drop down list For this rule select Network event inbound service denied 4 Enter a descriptive comment for the alert in the Alert comment field This comment is displayed in the Clie...

Page 96: ...you created You can test the rule you just created by pinging one of the managed hosts in the subdomain from a computer outside of that domain When you have done this you can check that the rule work...

Page 97: ...whether to allow or deny the connection you can set application control to check from DeepGuard whether the connection should be allowed This reduces the amount of application control pop ups shown to...

Page 98: ...n reduce the number of pop ups they see by selecting Do not prompt for applications that DeepGuard has identified Application control does not limit plug ins in browsers like Netscape or Microsoft Int...

Page 99: ...the program already appears on the Unknown applications reported by hosts list 1 Select the application s for the rule a Go to the Settings tab and select the Application control page b Select Interne...

Page 100: ...made 4 Select the new rule target a Select the domain or host that the rule affects In this case select Engineering Testing If the target host or domain already has a rule for any of the applications...

Page 101: ...4 Click to save and distribute the policy F Secure Client Security Configuring Internet Shield 101...

Page 102: ...wall rules page 2 Select the security level you want to use for testing purposes 3 To start the creation of the new rule click Add before This starts the Firewall rule wizard 4 Select Allow on the Rul...

Page 103: ...ed into the alertlog with the packet header information IPs ports and protocol but it is also allowed to pass through the intrusion prevention component Alert severity The options available are No ale...

Page 104: ...ect the Enable intrusion prevention check box d Select Log without dropping from the Action on malicious packet drop down list e Select Warning from the Alert severity drop down list f Select 25 from...

Page 105: ...sure that your network environment is protected Topics Checking that all the hosts have the latest policy Checking that the server has the latest virus definitions Checking that the hosts have the lat...

Page 106: ...he latest policy 3 If all hosts do not have the latest policy click View hosts latest policy update This takes you to the Status tab and Centralized management page 4 On the Centralized management pag...

Page 107: ...at the virus definitions are up to date on the server 1 Select Root on the Policy domains tab 2 Go to the Summary tab and check that the virus definitions on the server are the latest available F Secu...

Page 108: ...ives You can select the Status tab and the Overall protection page to see which hosts do not have the latest virus definitions Then select these hosts in the Policy domains tab go to the Operations ta...

Page 109: ...nnected hosts click View disconnected hosts This takes you to the Status tab and Centralized management page 4 Check which of the hosts are disconnected and the possible reasons for this Note You can...

Page 110: ...hosts in the Policy domains tab 2 Go to the Reports tab The scanning information from the selected hosts is displayed in the Reports table 3 Select a single host by clicking on a row in the table The...

Page 111: ...ty level has its own icon Severity Normal operating information from a host Info A warning from the host Warning Recoverable error on the host Error Unrecoverable error on the host Fatal error Securit...

Page 112: ...r report to be generated at regular intervals you have two options Web Reporting a web based tool with which you can generate a wide range of graphical reports from Client Security alerts and status i...

Page 113: ...he Summary tab 3 Check what is displayed beside Most common recent attack 4 If there has been an attack you can access more detailed information by clicking View Internet Shield status This takes you...

Page 114: ......

Page 115: ...on hosts by using the Installation editor The editor creates policy based Topics Using the installation editor installation tasks that each host in the target domain will carry out after the next poli...

Page 116: ...ing installed Progress of the installation task The Progress field displays information that is different for hosts and for domains Progress If a host is selected the Progress field displays one of th...

Page 117: ...l subdomains by selecting the Recursively cancel installation for subdomains and hosts option in the confirmation dialog The Stop all button is enabled only if the current host or domain has an instal...

Page 118: ......

Page 119: ...re is a virus on a local host or if you need to perform some other administrative tasks locally Topics Scan manually Scan at set times Where to find firewall alerts and log files Connecting to Policy...

Page 120: ...to complete It combines the quick malware scan and the hard drive scan It also checks for items that are possible hidden by a rootkit When you suspect that a specific location on your computer may ha...

Page 121: ...2 Click Next View the results of manual scan You can view a report of the scanning results after the scan is complete Note You might want to view this report because the action you selected may not a...

Page 122: ...2 Select the day of the month from the list next to the selected day 3 Repeat if you want to scan on another day 5 Select when you want to start the scan on the selected days Description Option The ti...

Page 123: ...hed on the Virus and spyware scanning flyer 2 Click Show Report to see what happened during the scan Note If you opened the dialog from the Flyer History dialog the Show report button is disabled You...

Page 124: ...ption the field shows information on the intrusion attempt pattern 5 To view alert details select the alert and click Details 6 To move to the next or previous alert click the Prev or Next button 7 Af...

Page 125: ...ng is mainly aimed at experienced users who are familiar with computer networks You can turn the packet logging on if you have created your own set of firewall rules and want to check how they block t...

Page 126: ...w shows all the logged connections You can view the following information Description Field Time in seconds from the moment when logging was started If the defined logging time is 60 seconds the Time...

Page 127: ...eir information The lower pane of the window shows the information in hexadecimal and ASCII format If you want to view all types of network traffic and not only IP traffic clear the Filter non IP chec...

Page 128: ...y Manager Console a Select the host on the Policy domains tab b Right click on the selected host and select Export host policy file from the context menu that opens c Save the host s policy file on so...

Page 129: ...dial up connection When this option is enabled the user is allowed to temporarily suspend network communications for example automatic polling of policies sending statistics and automatic updates 1 S...

Page 130: ...emory for games or similar applications Note Note that the main functions of the products are disabled during the time the product is unloaded and thus the computer becomes vulnerable to viruses and a...

Page 131: ...on provides information on where to find out about viruses and how to handle viruses you encounter Topics Malware information and tools on the F Secure web pages How to send a virus sample to F Secure...

Page 132: ...tware is here http www f secure com vulnerabilities The latest threats are also delivered to your desktop through Client Security as F Secure news Before sending us a sample you may consider trying ou...

Page 133: ...p support f secure com enu home virusproblem samples index shtml What should be sent Here you will find what files and details to send as viruses are not all of the same type so they cannot all be sen...

Page 134: ...er GetMBR can be downloaded from our ftp site ftp ftp f secure com anti virus tools getmbr zip If the infection is on a floppy disk create a DCF image of the infected diskette and send the DCF image f...

Page 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...

Page 136: ...twork it is recommended to take down the network until all infected computers are disinfected The network can be taken into use only after all computers are cleaned because a single infected machine c...

Page 137: ...nt CTA a client software on the hosts that collects the security related information Using attributes for the application posture token from the host and communicates the data to Cisco Secure Access C...

Page 138: ...talling Client Security locally select Cisco NAC Plugin in the Components to install dialog 2 Remote installations when installing Client Security remotely select Cisco NAC Plugin in the Components to...

Page 139: ...Posture Validation Attributes definition file 1 Use the CSUtil tool on the Cisco Secure ACS server 2 Use the following command CSUtil exe addAVP fsnacpva def The fsnacpva def file is included in the...

Page 140: ...ck Network admission control 4 Click Configure 5 Select Create new local policy 6 You can use the following Client Security related attributes in the rules for Application Posture Tokens Posture valid...

Page 141: ...on tasks such as configuring scheduled scanning from the Advanced mode user interface and configuring the anti virus proxy Topics Configuring scheduled scanning Advanced DeepGuard settings Configuring...

Page 142: ...parameters cell is selected the parameters that you can use and their formats are displayed as a help text in the Messages pane below the Scheduled tasks table 10 Select the task type by clicking the...

Page 143: ...ing or denying events requested by a specific application automatically You can choose to allow all events for a safe application or deny all events for an application that should not be used 1 First...

Page 144: ...o to deny all events for the application 9 Double click the Enabled cell for the new entry 10 Select Yes to enable to the rule 11 Click to save and distribute the policy The application rule cannot be...

Page 145: ...virus definition updates through Policy Manager Proxy Policy Manager Proxy contacts Policy Manager Server and the F Secure distribution server when needed Workstations in remote offices also communica...

Page 146: ...n view and edit the addresses from which the local Client Security gets automatic updates The addresses are used from top to bottom i e the first address on the list is the one used by default 3 Click...

Page 147: ...ed processes 3 Enter the name of the process to exclude from the web traffic scanner To enter more than one process type a comma between the name of each process Do not enter any whitespace between th...

Page 148: ......

Page 149: ...some advanced Internet Shield features and also contains some troubleshooting information Topics Managing Internet Shield properties remotely Configuring security level autoselection Troubleshooting c...

Page 150: ...terface mechanism is used to allow use of the firewalled host as a connection sharing server Firewall rules are not applied to traffic going through the trusted interface If it is used wrongly it can...

Page 151: ...s tab 3 On the Policy tab select F Secure Internet Shield Settings Firewall engine Firewall engine 4 To make sure packet filtering is always turned on set this variable to Yes and select the Final che...

Page 152: ...y the priority numbers starting from the smallest number Security level Enter the ID composed of number and name of the security level here for example 40office Method 1 Select DNS server IP address f...

Page 153: ...ot work you can try to ping a DNS server Run nslookup to make sure that the DNS service is running You can also try to ping a known web address to make sure that the computer at the other end is not d...

Page 154: ...irewall services table 3 Click the Add button to start the Firewall services wizard 4 Enter a service name a Define a unique name for the service in the Service name field you cannot have two services...

Page 155: ...r port as 8000 8 Select a classification number for the service from the drop down list You can accept the default value 9 Select whether any extra filtering is to be applied for the traffic allowed b...

Page 156: ...a rule with priority 1 will override a rule with priority 3 5 Double click the Phone number cell for the new row to add the phone numbers the rule applies to You can use the following characters to a...

Page 157: ...4 Click to save and distribute the policy F Secure Client Security Advanced features Internet Shield 157...

Page 158: ......

Page 159: ...dsett ini Topics Configurable prodsett ini settings Caution Do not edit any prodsett ini settings in that are not included in this section Note Dependency between RequestInstallMode and InstallMode se...

Page 160: ...ing the package When you add support for a new language to the package you should add that language here to make it effective List of languages being installed at the host This setting typically equal...

Page 161: ...option executes a forced reboot at the host without prompting the user to save his her work Do not use this option until you are absolutely sure about the safety of this type of reboot for the target...

Page 162: ...allation This component is always installed when you are installing a networked client You do not need to edit InstallMode 0 1 the RequestInstallMode or InstallMode settings for this component Setting...

Page 163: ...a newer version already exists Settings for conflict detection and removal module FSSGSUP DLL This component is always run during the installation You do not need to edit the RequestInstallMode or Ins...

Page 164: ...xists 0 Do not generate debug information default Debug 0 1 1 Write debug information into the debug log during installation and uninstallation 0 Do not install this component default InstallMode 0 1...

Page 165: ...t except if a newer version already exists Settings for Client Security Network Scanner FSPSINST DLL 0 Install this component as defined in the InstallMode setting RequestInstallMode 1 1 Install this...

Page 166: ...e InstallMode setting RequestInstallMode 1 1 Install this component if newer or not installed default 2 Install this component if there is no existing version of it installed or if the same or an olde...

Page 167: ...Chapter 15 E mail scanning alert and error messages This section provides a list of the alert and error messages that e mail scanning can generate Topics Alert and error messages...

Page 168: ...g Message Parser Failed System Error error The session was not aborted the specific message was not scanned E mail scanning initialization failed reason 610 E Mail Scanning Initialization Failed for r...

Page 169: ...ses subject Email header The title subject filed of the message E Mail Attachment Scanning Failure When a scan fails the message is treated based 640 643 E Mail Attachment Scanning Failure Reason Desc...

Page 170: ...Message content Definition Message ID Message title E mail was blocked 170 F Secure Client Security E mail scanning alert and error messages...

Page 171: ...ed during client installation The products listed in this section are either detected so that the user can manually uninstall them or automatically uninstalled during the F Secure Client Security inst...

Page 172: ...ender Total Security 2008 Bsecure Internet Protection Services v 4 5 BullGuard 7 0 CA Anti Virus CA eTrust Antivirus eTrust EZ Antivirus EZ Firewall CA Internet Security Suite Cisco VPN Client Firewal...

Page 173: ...Privacy Service McAfee SecurityCenter McAfee SpamKiller McAfee VirusScan Professional Edition McAfee Total Protection McAfee Browser Protection Service McAfee Virus and Spyware Protection Service McAf...

Page 174: ...date 3 3 Symantec Corporation Panda Antivirus 2007 Panda Antivirus Firewall 2007 Panda ClientShield Panda Internet Security 2008 Panda Antivirus Platinum Panda Platinum Internet Security Panda Platinu...

Reviews: