CHAPTER 10
249
If you receive a missed or incorrect detection, or a false alarm with
F-Secure Client Security, try to send us the following:
the file in question
the F-Secure Client Security version number
the last virus definition updates date
a description of the system configuration
a description of how to reproduce the problem
the F-Secure Client Security scanning report.
6.
An infection or a false alarm on a CD
If an infection or false alarm is on a CD, you can send the CD to our
office in Finland. Please include a description of the problem, and a
printed F-Secure Client Security report, if possible. We will return your
CD if it has no infection.
7.
Suspicious e-mail message
If have a suspicious e-mail message or a hoax, try to save it as a file
and then send it to
in a ZIP archive. If you
cannot save a suspicious e-mail message to a hard disk, you can still
forward it to
.
8.
A new virus or trojan
If you think an unknown infection is in the computer system and an
antivirus program does not find anything, please send us:
3-5 frequently used executable files
some Windows configuration files (WIN.INI, SYSTEM.INI) and
DOS configuration files (Autoexec.bat, Config.sys)
a full or partial export from a System Registry (this can be done
with the Regedit utility that all Windows versions have)
the contents of the
\Start Menu\Programs\Startup\
folder
10.4.3 Where to Send the Virus Sample
Send all virus, trojan, backdoor, worm and false alarm samples to:
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...