180
1.
Click the
Add
button under the
Trusted Sites
table. This creates a
new line in the table.
2.
Click on the line you just created so that it becomes active, and type
http://*.example.com/*
This excludes all the sub-domains.
3.
Click the
Add
button under the
Trusted Sites
table. This creates
another new line in the table.
4.
Click on the line you just created so that it becomes active, and type
http://example.com/*
This excludes the second-level domain.
Step 3.
Excluding a Sub-Directory from HTTP Scanning
To exclude a sub-directory from HTTP scanning, enter the URL of the
domain with the directory path in the Trusted Sites table as follows:
1.
Click the
Add
button under the
Trusted Sites
table. This creates a
new line in the table.
2.
Click on the line you just created so that it becomes active, and type
http://www.example2.com/news/*
Step 4.
1.
Click
to save the policy data.
2.
Click
to distribute the policy.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...