CHAPTER 5
171
5.4
Configuring System Control
F-Secure System Control is a new, host-based intrusion prevention
system that analyzes the behavior of files and programs. It can be used to
block intrusive ad pop-ups and to protect important system settings, as
well as Internet Explorer settings against unwanted changes.
If an application tries to perform a potentially dangerous action, it will be
checked for trust. Safe applications are allowed to operate, while actions
by unsafe applications are blocked.
When System Control is enabled, you can configure Application Control
in such a way that it asks users what to do only in those cases when
System Control does not trust an application.
5.4.1
System Control Configuration Settings
To enable System Control, select the
Enable System Control
check box.
You can select what to do when a system modification attempt is
detected. The following actions are available:
Action
Definition
Always ask
permission
System Control asks the users whether they
want to allow or block all monitored actions,
even when System Control identifies the
application as safe.
Ask when case is
unclear
System Control asks the users whether they
want to allow or block monitored actions only
when System Control cannot identify the
application as safe or unsafe (default option).
Automatic: Do not
ask
System Control blocks unsafe applications and
allows safe applications automatically without
asking the user any questions.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...