CHAPTER 6
209
1.
Select the subdomain for which you created the rule in the
Policy
Domains
tab.
2.
Go to the
Summary
tab, and check if any new security alerts are
displayed for the domain.
3.
To see the alert details, click
View alerts by severity...
. This takes you
to the
Alerts
tab that displays a detailed list of Security Alerts.
6.5
Configuring Application Control
Application Control allows for safe browsing and is an excellent defence
against malicious computer programs. Application Control is also an
excellent tool for fighting trojans (for a definition of a Trojan horse and
other terms, see the “
) and other network malware as it
does not allow them to send any information to the network.
Application Control rules can be used to define more specific restrictions
to network traffic, on top of the restrictions defined in firewall rules. The
application permissions cannot be used to allow traffic that has been
denied by static firewall rules. However, if you have allowed some
network traffic in the static rules, you can use Application Control to
decide whether an application can be allowed to take advantage of the
rules or not. In other words, you can create a rule that allows traffic and
limit the use of that rule with Application Control.
When Application Control is centrally managed, the administrator can
decide which programs that access the network can be used in the
workstations. In this way it is possible to prevent the use of programs that
are against the company security policy, and to monitor which programs
the end users really are using.
The basic idea when configuring application control is to allow the
necessary applications and deny the rest.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...