background image

 

Copyright © 2010 F-Secure Corporation. All rights reserved.              Page 15 of 15 

After installing CS9, F-Secure Exploit Shield 0.7 shortcuts and binaries might still be 
present. 

For users who had previously installed CS9 Beta 1 without uninstalling F-Secure Exploit Shield 
0.70, after proceeding to install CS9, users will notice that the shortcuts and binaries for F-
Secure Exploit Shield 0.7 are still present. For those who had not installed CS9 Beta 1 on top of 
F-Secure Exploit Shield 0.7, or had uninstalled CS9 Beta 1 components before installing CS9, 
this issue will not be present. 

Contact Information and Feedback 

We are looking forward to hearing comments and feedback on the product functionality, 
usability and performance.  

Please report any technical issues through the F-Secure support web site: 

http://support.f-

secure.com/

 

If you are reporting a technical problem, please attach F-Secure system summary report to the 
feedback.  To collect the system summary report, you need to have administrator rights. In 
Windows XP, select first Start | All Programs | F-Secure Client Security 9.00, right-click on 
”Support Tool”, select Run as and finally select to run the program as administrator. In Windows 
Vista and Windows 7, select Start | All Programs | F-Secure Client Security 9.00, right-click on 
“Support Tool” and select Run as administrator. 

For technical issues you can also consult the Client Security forum available from here: 

http://forum.f-secure.com/

 

 

Summary of Contents for CLIENT SECURITY 9.01 - S

Page 1: ...Please consult them for the latest information about those components What s in This File Installation and System Requirements Product Contents Dropped and Unsupported Features New Features Fixed Issu...

Page 2: ...venian Spanish Swedish and Turkish 4 Dropped and Unsupported Features Features that have been dropped since F Secure Anti Virus Client Security 8 01 include Security News removed The security news fea...

Page 3: ...ead malware is automatically removed and the user is notified of this This behavior can be configured in Settings Virus and spyware scanning There are now only two available options when virus or spyw...

Page 4: ...d malware try to infect the user s browser to steal information like passwords bank credentials or even money from the user s online banking session DeepGuard has been extended to provide protection a...

Page 5: ...on Some components that are active during the boot up phase have been re designed to be less CPU intensive This results in faster boot up time Several processes removed The functionality of the follow...

Page 6: ...tomatic configuration of HTTP Proxy using PAC Proxy Auto Configuration scripts or WPAD Web Proxy Auto Discovery has been added 6 Fixed Issues Following lists contain all issues reported in maintenance...

Page 7: ...is because the installation if being finalized in the background by downloading and installing various updates etc The effect is more visible during the first reboot after a fresh installation where m...

Page 8: ...s protection features Multiple entries in Virus and spyware history log 65384 When real time scanning detects an infected file on the system and it is automatically cleaned two or more entries of the...

Page 9: ...cycle Bin is implemented as a simple folder rename operation if the folder is located on the same hard disk as the Recycle Bin folder Real time scanning does no scan files upon folder rename operation...

Page 10: ...time scanning will block access to the infected files and the backup process will be aborted Real time scanning may interfere with System Restore 56695 In case virus or spyware infections are present...

Page 11: ...s when the user attempts to unpack a compressed zipped folder that contains an infected file This behavior is by design When real time scanning detects an infected file it blocks access to this file t...

Page 12: ...s executed A typical scenario where this happens is when the Perform full computer check scan is executed in an infected computer As a result error messages or action None are shown for items that wer...

Page 13: ...ng systems for online games and software genuineness checking Turn off Advanced Process Monitoring from Settings DeepGuard to resolve the problem We appreciate if these compatibility issues are brough...

Page 14: ...led Only thing that helps in this case is to uninstall Web Traffic Scanning 7 6 Internet Shield Firewall in Cisco VPN Client does not work with F Secure Internet Shield 52211 Cisco VPN Client has a bu...

Page 15: ...looking forward to hearing comments and feedback on the product functionality usability and performance Please report any technical issues through the F Secure support web site http support f secure c...

Reviews: