background image

F-Secure Client Security

Administrator's Guide

Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00

Страница 1: ...F Secure Client Security Administrator s Guide...

Страница 2: ......

Страница 3: ...Run Policy Manager Console 19 Changing the web browser path 21 Uninstalling the product 22 Chapter 3 Anti virus mode user interface 23 Policy domains tab 24 Management tabs 25 Summary tab 25 Settings...

Страница 4: ...ger Server 64 Configuring Policy Manager Proxy 65 Configuring clients to download updates from each other 65 Configuring real time scanning 67 Real time scanning settings 67 Enabling real time scannin...

Страница 5: ...rity level for a certain domain only 90 Configuring network quarantine 93 Network quarantine settings 93 Turning network quarantine on in the whole domain 93 Fine tuning network quarantine 93 Configur...

Страница 6: ...file manually 128 Suspending downloads and updates 129 Allowing users to unload F Secure products 130 Chapter 10 Virus information 131 Malware information and tools on the F Secure web pages 132 How...

Страница 7: ...interface 150 Using packet filtering 150 Configuring security level autoselection 152 Troubleshooting connection problems 153 Adding new services 154 Creating a new Internet service based on the defau...

Страница 8: ...8 F Secure Client Security TOC...

Страница 9: ...mpliance with corporate policies and centralized control Product registration Application management When the system has been set up you can see status information from the entire managed domain in on...

Страница 10: ...ise or Web Server editions P4 2 GHz processor or faster Processor Managing more than 5000 hosts or using Web Reporting requires P4 3 GHz level processor or faster 512 MB RAM 1 GB RAM recommended Memor...

Страница 11: ...eb Server editions Windows Server 2008 SP1 64 bit Standard Enterprise Web Server Small Business Server or Essential Business Server editions Windows Server 2008 R2 Standard Enterprise or Web Server ed...

Страница 12: ...Server and the managed hosts is accomplished through the standard HTTP protocol which ensures trouble free performance on both LAN and WAN Management Agent enforces the security policies set by the a...

Страница 13: ...t pre configured installation packages which can also be delivered using third party software such as SMS and similar tools Configuration and policy management Centralized configuration of security po...

Страница 14: ...mber from your license certificate during the installation of Policy Manager What information is sent We collect information that cannot be linked to the end user or the use of the computer The collec...

Страница 15: ...le interprets the policy files sends autoregistration requests and host status information to Policy Manager and performs policy based installations Cisco Network Admission Control NAC Support F Secur...

Страница 16: ...hat have a similar security policy Policy domain Policy inheritance simplifies the defining of a common policy In Policy Manager Console each policy domain automatically inherits the settings of its p...

Страница 17: ...g the product Here you will find instructions for installing the main product components Policy Manager Server and Policy Manager Console Topics Installation steps Changing the web browser path Uninst...

Страница 18: ...ll the product in a different directory you can click Browse and select a new directory Note If you have Management Agent installed on the same machine this window will not be shown 3 Enter your custo...

Страница 19: ...uses a local socket connection to the Administration module to fetch server data The default port is 8081 By default access to Web Reporting is allowed also from other computers If you want to allow...

Страница 20: ...complete the setup process Policy Manager Console will generate the management key pair After the key pair is generated Policy Manager Console will start The setup wizard creates the user group FSPM u...

Страница 21: ...acquires the file path to the default web browser during setup If you want to change the web browser path 1 Select Tools Preferences from the menu 2 Select the Locations tab and enter the new file pat...

Страница 22: ...alog box appears 4 Click Start to begin uninstallation 5 When the uninstallation is complete click Close 6 Repeat the above steps if you want to uninstall other Policy Manager components 7 When you ha...

Страница 23: ...nt Security settings You can switch between the modes by selecting Advanced mode or Anti virus mode in the View menu Settings inheritance The main components of the Anti virus mode user interface are...

Страница 24: ...ous names Import autoregistered hosts Autodiscover hosts from a Windows domain Delete hosts or domains Move hosts or domains using cut and paste operations Export a policy file After selecting a domai...

Страница 25: ...displayed for example when there are disconnected hosts The information displayed on the Summary tab depends on what is selected in the Policy domains tab When a domain is selected the Summary tab dis...

Страница 26: ...access more detailed information on the Status tab and Overall protection page See how many infections have been found in the domain If you want to see host specific infection information click View h...

Страница 27: ...described briefly in this section Context menu on settings pages By right clicking any setting on a Settings tab page you can access a context menu that contains the following options This option clea...

Страница 28: ...cted domain Unless otherwise stated the settings listed on this page are valid for all Client Security versions To view and configure the settings that are no longer valid for Client Security 9 or hig...

Страница 29: ...g in the Excluded extensions field Select whether the users can exclude objects from real time scanning When Enable excluded objects is selected the users can specify individual files or folders that...

Страница 30: ...d spyware items drop down list Quarantine management This page is used to manage malware that has been quarantined on managed hosts Quarantine content This table displays a list of quarantined items o...

Страница 31: ...d to the scanning of web traffic for example downloaded files General In this section you can turn HTTP scanning on or off HTTP Scanning Select the action to take on infection Select the action to tak...

Страница 32: ...firewall is in use the firewall rules are checked in the order in which they are displayed in the table from top to bottom For security levels with the Normal filtering mode it is possible to define d...

Страница 33: ...cations that the hosts have reported and for which no rules exist yet In this section you can also Select the default action for client applications Select the default action for server applications S...

Страница 34: ...ss and e mail subject to be used when forwarding alerts by e mail Alert Forwarding This table can be used to configure where the alerts that are of certain severity are to be forwarded Centralized man...

Страница 35: ...ings Policy Manager Server URL address of Policy Manager Server Incoming packages polling interval Defines how often the host tries to fetch incoming packages from Policy Manager Server for example ba...

Страница 36: ...ducts The virus definitions date and version information is also displayed for hosts that have Anti virus for Citrix Servers Anti virus for Windows Servers Internet Gatekeeper or Anti virus for Micros...

Страница 37: ...plays the following information for each alert severity date and time description host and user and the product the alert relates to When an alert is selected in the alert list the lower half of the p...

Страница 38: ...by importing them to the policy domain tree The Installation packages view shows the available installation packages and detailed information on their content Installation packages Note Due to the ch...

Страница 39: ...to the currently selected domain Displays the Properties box of a host or domain Launches the Autodiscover Windows Hosts tool New hosts will be added to the currently selected policy domain Starts pu...

Страница 40: ...oregistered hosts Imports hosts from the Windows domain structure Autodiscover Windows hosts Installs software remotely and imports the hosts specified by IP address or WINS name Push install to Windo...

Страница 41: ...lation packages Tools Changes login passphrase the passphrase protecting the Policy Manager Console private key Change passphrase Lets you select the reporting methods and the domains hosts and produc...

Страница 42: ...terface The inherited settings and settings that have been redefined on the current level are displayed in a different way on the Policy Manager user interface Description Inherited Not inherited A cl...

Страница 43: ...them on the current page After this the users cannot change these settings Disallow user changes Clears all the settings that have been redefined on the current page and restores the default or inher...

Страница 44: ......

Страница 45: ...be administered from one single location Checking that the management connections work There are also some issues that you should take into consideration so that you can profit the most from the centr...

Страница 46: ...r The Name field specifies what the connection will be called in the Connection field in the Login dialog If the Name field is left empty the URL or the directory path is displayed The Public key file...

Страница 47: ...ould switch unnecessary polling off by clearing the polling item you want to disable However automatic polling should be disabled only if some performance problems occur Disable All Polling disables a...

Страница 48: ...so import all hosts to the root domain first and create the domain structure later when the need for that arises The hosts can then be cut and pasted to the new domains All domains and hosts must have...

Страница 49: ...installed on the hosts and after the hosts have sent an autoregistration request Management Agent will have to be installed from a CD ROM from a login script or some other way To import autoregistere...

Страница 50: ...cy Manager Console is closed To add a new custom property a Right click a column heading and select Add new custom property The New custom property dialog opens b Enter a name for the custom property...

Страница 51: ...available Any changes made to the domain structure are implemented even though you exit Policy Manager Console without saving changes to the current policy data Push installations This section describ...

Страница 52: ...cted Windows domain 5 Click Install to continue After you have selected your target hosts you still need to push install the applications to hosts Push install to Windows hosts You can also select tar...

Страница 53: ...nagement Agent and the selected products on the hosts During this process the Status line will display the procedure in process You can click Cancel at any time to stop the installation 7 When the Sta...

Страница 54: ...lation task The Progress field displays information that is different for hosts and for domains Progress If a host is selected the Progress field displays one of the following messages The installatio...

Страница 55: ...not affect the button state Stop all only removes the operation from the policy If a host has already polled the previous policy file it may try to carry out the installation operation even though it...

Страница 56: ...he value will be presented as a cell value One example of how to utilize custom properties is to create a separate installation package for different organizational units which should be grouped under...

Страница 57: ...eft out password secret variation password secret with spaces Specifies the password of the user account The ilaunchr functionality stays the same if neither of these two parameters is given If only o...

Страница 58: ...Vista and Windows 7 Intel Pentium 4 2 GHz or higher On Windows XP Intel Pentium III 1 GHz or higher Operating system Windows 7 32 bit and 64 bit Windows Vista 32 bit and 64 bit Windows XP SP2 or newe...

Страница 59: ...ption key delivered with the product You can use the subscription key for the number of installations your license is for see the F Secure License note in this guide If you have problems in registerin...

Страница 60: ...launchr exe installation tool cannot be run on a computer that is infected with Klez You can download the Kleztool from ftp ftp europe f secure com anti virus tools kleztool zip The kleztool zip packa...

Страница 61: ...e steps given here 1 Check the Policy distribution status on the Summary tab 2 Save and distribute the polices if necessary 3 Go to the Status tab and select the Centralized management page 4 Check th...

Страница 62: ......

Страница 63: ...cted You can also monitor the scanning results and other information the managed hosts send back to Policy Manager Console Configuring e mail scanning Configuring web traffic HTTP scanning When a viru...

Страница 64: ...irectly from F Secure update server Note If Client Security is set to download neighborcast updates it may also download updates from other Client Security installations that have neighborcast enabled...

Страница 65: ...dates is selected 4 Click Add to add new servers to the list of available proxy servers This opens the Policy Manager Proxy server properties window 5 Enter a priority number for the Policy Manager Pr...

Страница 66: ...s page a To set clients in the selected domain to download updates from other clients select Enable Neighborcast client b To set clients in the selected domain to serve updates to other clients select...

Страница 67: ...Excluded extensions field This is most useful when scanning is set to All Files Enable excluded objects Excluded objects are individual files or folders which are normally set locally They can also b...

Страница 68: ...ies that are stored on disk not cookies that are only stored in the web browser s cache Manual scanning will detect cookies stored both on disk and in the web browser s cache File extension handling C...

Страница 69: ...time scanning on their computers Now a closed lock symbol is displayed beside all settings on this page 8 Click to save and distribute the policy Excluding Microsoft Outlooks s pst file from real tim...

Страница 70: ...unclear cannot identify the application as safe or unsafe default option DeepGuard blocks unsafe applications and allows safe applications automatically without asking the user any questions Automatic...

Страница 71: ...ss to the Internet to work If your network allows access only through an HTTP proxy set the Automatic Update Agent HTTP proxy setting to your proxy server s address to make sure server queries work F...

Страница 72: ...us items after full computer check to specify that detected suspicious items are shown in the disinfection wizard and in the scanning report after a full computer check When this option is selected yo...

Страница 73: ...oming e mail scanning 1 Action on incoming infected attachment Disinfect Attachment starts the disinfection wizard whenever an infected attachment is detected Remove Attachment deletes the attachment...

Страница 74: ...e mails 1 Select Root on the Policy domains tab 2 Go to the Settings tab and select the E mail scanning page 3 Configure incoming e mail scanning a Select Enable incoming e mail scanning b Select the...

Страница 75: ...d for example when handling password protected archives The actions available are Block blocks the file that could not be scanned Report Only ignores the file but reports it to the administrator Selec...

Страница 76: ...and enter http example com This excludes all the sub domains c Click the Add button under the Trusted sites table This creates another new line in the table d Click on the line you just created so tha...

Страница 77: ...ttings The settings for spyware scanning are described here Spyware scanning is included as part of real time scanning and manual scanning When Real time scanning enabled is selected on the Real time...

Страница 78: ...you should include them in the test environment and allow their use when you are checking and configuring rules for the applications in Spyware and riskware reported by hosts table 1 Create a test do...

Страница 79: ...y Allowing the use of a spyware or riskware component In this example the use of a spyware or riskware component that was found during the spyware scanning is allowed for one host 1 On the Policy doma...

Страница 80: ...to save and distribute the policy Releasing quarantined objects Infected files spyware or riskware that have been quarantined on hosts can be released from quarantine in which case they are allowed o...

Страница 81: ...d objects table and click Release The object is moved to the Actions to perform on quarantined objects table with Release given as the Action for the object 5 Click to save and distribute the policy F...

Страница 82: ...nge any settings This operation also makes the Advanced mode settings final Setting all virus protection settings as final In this example all the virus protection settings are set as final 1 Select R...

Страница 83: ...der s address for e mail alert messages in the E mail sender address From field c Enter the e mail alert message subject in the E mail subject field Refer to the MIB help text for a list of possible p...

Страница 84: ...ection section of the Summary tab If it displays new infections you can access more detailed information by clicking View hosts infection status It takes you to the Status tab and Virus protection pag...

Страница 85: ...oad the EICAR test file from http www europe f secure com virus info eicar_test_file shtml Alternatively use any text editor to create the file with the following single line in it X5O P AP 4 PZX54 P...

Страница 86: ......

Страница 87: ...component included in the Internet Shield can be used to restrict traffic based on the protocols used Application control is designed Configuring rule alerts Configuring application control to preven...

Страница 88: ...ty level allows all outbound TCP traffic and FTP file retrievals Everything else is denied and Home denied inbound TCP traffic generates alerts Local rules can be added to enable new network functiona...

Страница 89: ...is minimizes the security risk The drawback is that when new services are needed the firewall must be reconfigured This however is a small price to pay for increased security The opposite concept to d...

Страница 90: ...rs from changing the setting click the lock symbol beside it 5 Click to save and distribute the policy You can verify that the new security level change has become effective by going to the Status tab...

Страница 91: ...n the list This opens the Firewall rule wizard 4 Complete the Firewall rule wizard a On the Rule type page select Allow as the rule type b On the Remote hosts page select Any remote host to apply the...

Страница 92: ...vels page 3 Turn off the BrowserSecurity security level by clearing the Enabled check box beside it on the Firewall security levels table 4 On the Policy domains tab select the subdomain where you wan...

Страница 93: ...r turning off real time scanning on a host activates network quarantine Turning network quarantine on in the whole domain You can enable network quarantine for the whole domain by following the steps...

Страница 94: ...el being edited drop down menu Now all the rules that have been defined for this Internet Shield security level are displayed on the table 4 Click Add before to add the new rule as the first one on th...

Страница 95: ...in the Alert trap drop down list For this rule select Network event inbound service denied 4 Enter a descriptive comment for the alert in the Alert comment field This comment is displayed in the Clie...

Страница 96: ...you created You can test the rule you just created by pinging one of the managed hosts in the subdomain from a computer outside of that domain When you have done this you can check that the rule work...

Страница 97: ...whether to allow or deny the connection you can set application control to check from DeepGuard whether the connection should be allowed This reduces the amount of application control pop ups shown to...

Страница 98: ...n reduce the number of pop ups they see by selecting Do not prompt for applications that DeepGuard has identified Application control does not limit plug ins in browsers like Netscape or Microsoft Int...

Страница 99: ...the program already appears on the Unknown applications reported by hosts list 1 Select the application s for the rule a Go to the Settings tab and select the Application control page b Select Interne...

Страница 100: ...made 4 Select the new rule target a Select the domain or host that the rule affects In this case select Engineering Testing If the target host or domain already has a rule for any of the applications...

Страница 101: ...4 Click to save and distribute the policy F Secure Client Security Configuring Internet Shield 101...

Страница 102: ...wall rules page 2 Select the security level you want to use for testing purposes 3 To start the creation of the new rule click Add before This starts the Firewall rule wizard 4 Select Allow on the Rul...

Страница 103: ...ed into the alertlog with the packet header information IPs ports and protocol but it is also allowed to pass through the intrusion prevention component Alert severity The options available are No ale...

Страница 104: ...ect the Enable intrusion prevention check box d Select Log without dropping from the Action on malicious packet drop down list e Select Warning from the Alert severity drop down list f Select 25 from...

Страница 105: ...sure that your network environment is protected Topics Checking that all the hosts have the latest policy Checking that the server has the latest virus definitions Checking that the hosts have the lat...

Страница 106: ...he latest policy 3 If all hosts do not have the latest policy click View hosts latest policy update This takes you to the Status tab and Centralized management page 4 On the Centralized management pag...

Страница 107: ...at the virus definitions are up to date on the server 1 Select Root on the Policy domains tab 2 Go to the Summary tab and check that the virus definitions on the server are the latest available F Secu...

Страница 108: ...ives You can select the Status tab and the Overall protection page to see which hosts do not have the latest virus definitions Then select these hosts in the Policy domains tab go to the Operations ta...

Страница 109: ...nnected hosts click View disconnected hosts This takes you to the Status tab and Centralized management page 4 Check which of the hosts are disconnected and the possible reasons for this Note You can...

Страница 110: ...hosts in the Policy domains tab 2 Go to the Reports tab The scanning information from the selected hosts is displayed in the Reports table 3 Select a single host by clicking on a row in the table The...

Страница 111: ...ty level has its own icon Severity Normal operating information from a host Info A warning from the host Warning Recoverable error on the host Error Unrecoverable error on the host Fatal error Securit...

Страница 112: ...r report to be generated at regular intervals you have two options Web Reporting a web based tool with which you can generate a wide range of graphical reports from Client Security alerts and status i...

Страница 113: ...he Summary tab 3 Check what is displayed beside Most common recent attack 4 If there has been an attack you can access more detailed information by clicking View Internet Shield status This takes you...

Страница 114: ......

Страница 115: ...on hosts by using the Installation editor The editor creates policy based Topics Using the installation editor installation tasks that each host in the target domain will carry out after the next poli...

Страница 116: ...ing installed Progress of the installation task The Progress field displays information that is different for hosts and for domains Progress If a host is selected the Progress field displays one of th...

Страница 117: ...l subdomains by selecting the Recursively cancel installation for subdomains and hosts option in the confirmation dialog The Stop all button is enabled only if the current host or domain has an instal...

Страница 118: ......

Страница 119: ...re is a virus on a local host or if you need to perform some other administrative tasks locally Topics Scan manually Scan at set times Where to find firewall alerts and log files Connecting to Policy...

Страница 120: ...to complete It combines the quick malware scan and the hard drive scan It also checks for items that are possible hidden by a rootkit When you suspect that a specific location on your computer may ha...

Страница 121: ...2 Click Next View the results of manual scan You can view a report of the scanning results after the scan is complete Note You might want to view this report because the action you selected may not a...

Страница 122: ...2 Select the day of the month from the list next to the selected day 3 Repeat if you want to scan on another day 5 Select when you want to start the scan on the selected days Description Option The ti...

Страница 123: ...hed on the Virus and spyware scanning flyer 2 Click Show Report to see what happened during the scan Note If you opened the dialog from the Flyer History dialog the Show report button is disabled You...

Страница 124: ...ption the field shows information on the intrusion attempt pattern 5 To view alert details select the alert and click Details 6 To move to the next or previous alert click the Prev or Next button 7 Af...

Страница 125: ...ng is mainly aimed at experienced users who are familiar with computer networks You can turn the packet logging on if you have created your own set of firewall rules and want to check how they block t...

Страница 126: ...w shows all the logged connections You can view the following information Description Field Time in seconds from the moment when logging was started If the defined logging time is 60 seconds the Time...

Страница 127: ...eir information The lower pane of the window shows the information in hexadecimal and ASCII format If you want to view all types of network traffic and not only IP traffic clear the Filter non IP chec...

Страница 128: ...y Manager Console a Select the host on the Policy domains tab b Right click on the selected host and select Export host policy file from the context menu that opens c Save the host s policy file on so...

Страница 129: ...dial up connection When this option is enabled the user is allowed to temporarily suspend network communications for example automatic polling of policies sending statistics and automatic updates 1 S...

Страница 130: ...emory for games or similar applications Note Note that the main functions of the products are disabled during the time the product is unloaded and thus the computer becomes vulnerable to viruses and a...

Страница 131: ...on provides information on where to find out about viruses and how to handle viruses you encounter Topics Malware information and tools on the F Secure web pages How to send a virus sample to F Secure...

Страница 132: ...tware is here http www f secure com vulnerabilities The latest threats are also delivered to your desktop through Client Security as F Secure news Before sending us a sample you may consider trying ou...

Страница 133: ...p support f secure com enu home virusproblem samples index shtml What should be sent Here you will find what files and details to send as viruses are not all of the same type so they cannot all be sen...

Страница 134: ...er GetMBR can be downloaded from our ftp site ftp ftp f secure com anti virus tools getmbr zip If the infection is on a floppy disk create a DCF image of the infected diskette and send the DCF image f...

Страница 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...

Страница 136: ...twork it is recommended to take down the network until all infected computers are disinfected The network can be taken into use only after all computers are cleaned because a single infected machine c...

Страница 137: ...nt CTA a client software on the hosts that collects the security related information Using attributes for the application posture token from the host and communicates the data to Cisco Secure Access C...

Страница 138: ...talling Client Security locally select Cisco NAC Plugin in the Components to install dialog 2 Remote installations when installing Client Security remotely select Cisco NAC Plugin in the Components to...

Страница 139: ...Posture Validation Attributes definition file 1 Use the CSUtil tool on the Cisco Secure ACS server 2 Use the following command CSUtil exe addAVP fsnacpva def The fsnacpva def file is included in the...

Страница 140: ...ck Network admission control 4 Click Configure 5 Select Create new local policy 6 You can use the following Client Security related attributes in the rules for Application Posture Tokens Posture valid...

Страница 141: ...on tasks such as configuring scheduled scanning from the Advanced mode user interface and configuring the anti virus proxy Topics Configuring scheduled scanning Advanced DeepGuard settings Configuring...

Страница 142: ...parameters cell is selected the parameters that you can use and their formats are displayed as a help text in the Messages pane below the Scheduled tasks table 10 Select the task type by clicking the...

Страница 143: ...ing or denying events requested by a specific application automatically You can choose to allow all events for a safe application or deny all events for an application that should not be used 1 First...

Страница 144: ...o to deny all events for the application 9 Double click the Enabled cell for the new entry 10 Select Yes to enable to the rule 11 Click to save and distribute the policy The application rule cannot be...

Страница 145: ...virus definition updates through Policy Manager Proxy Policy Manager Proxy contacts Policy Manager Server and the F Secure distribution server when needed Workstations in remote offices also communica...

Страница 146: ...n view and edit the addresses from which the local Client Security gets automatic updates The addresses are used from top to bottom i e the first address on the list is the one used by default 3 Click...

Страница 147: ...ed processes 3 Enter the name of the process to exclude from the web traffic scanner To enter more than one process type a comma between the name of each process Do not enter any whitespace between th...

Страница 148: ......

Страница 149: ...some advanced Internet Shield features and also contains some troubleshooting information Topics Managing Internet Shield properties remotely Configuring security level autoselection Troubleshooting c...

Страница 150: ...terface mechanism is used to allow use of the firewalled host as a connection sharing server Firewall rules are not applied to traffic going through the trusted interface If it is used wrongly it can...

Страница 151: ...s tab 3 On the Policy tab select F Secure Internet Shield Settings Firewall engine Firewall engine 4 To make sure packet filtering is always turned on set this variable to Yes and select the Final che...

Страница 152: ...y the priority numbers starting from the smallest number Security level Enter the ID composed of number and name of the security level here for example 40office Method 1 Select DNS server IP address f...

Страница 153: ...ot work you can try to ping a DNS server Run nslookup to make sure that the DNS service is running You can also try to ping a known web address to make sure that the computer at the other end is not d...

Страница 154: ...irewall services table 3 Click the Add button to start the Firewall services wizard 4 Enter a service name a Define a unique name for the service in the Service name field you cannot have two services...

Страница 155: ...r port as 8000 8 Select a classification number for the service from the drop down list You can accept the default value 9 Select whether any extra filtering is to be applied for the traffic allowed b...

Страница 156: ...a rule with priority 1 will override a rule with priority 3 5 Double click the Phone number cell for the new row to add the phone numbers the rule applies to You can use the following characters to a...

Страница 157: ...4 Click to save and distribute the policy F Secure Client Security Advanced features Internet Shield 157...

Страница 158: ......

Страница 159: ...dsett ini Topics Configurable prodsett ini settings Caution Do not edit any prodsett ini settings in that are not included in this section Note Dependency between RequestInstallMode and InstallMode se...

Страница 160: ...ing the package When you add support for a new language to the package you should add that language here to make it effective List of languages being installed at the host This setting typically equal...

Страница 161: ...option executes a forced reboot at the host without prompting the user to save his her work Do not use this option until you are absolutely sure about the safety of this type of reboot for the target...

Страница 162: ...allation This component is always installed when you are installing a networked client You do not need to edit InstallMode 0 1 the RequestInstallMode or InstallMode settings for this component Setting...

Страница 163: ...a newer version already exists Settings for conflict detection and removal module FSSGSUP DLL This component is always run during the installation You do not need to edit the RequestInstallMode or Ins...

Страница 164: ...xists 0 Do not generate debug information default Debug 0 1 1 Write debug information into the debug log during installation and uninstallation 0 Do not install this component default InstallMode 0 1...

Страница 165: ...t except if a newer version already exists Settings for Client Security Network Scanner FSPSINST DLL 0 Install this component as defined in the InstallMode setting RequestInstallMode 1 1 Install this...

Страница 166: ...e InstallMode setting RequestInstallMode 1 1 Install this component if newer or not installed default 2 Install this component if there is no existing version of it installed or if the same or an olde...

Страница 167: ...Chapter 15 E mail scanning alert and error messages This section provides a list of the alert and error messages that e mail scanning can generate Topics Alert and error messages...

Страница 168: ...g Message Parser Failed System Error error The session was not aborted the specific message was not scanned E mail scanning initialization failed reason 610 E Mail Scanning Initialization Failed for r...

Страница 169: ...ses subject Email header The title subject filed of the message E Mail Attachment Scanning Failure When a scan fails the message is treated based 640 643 E Mail Attachment Scanning Failure Reason Desc...

Страница 170: ...Message content Definition Message ID Message title E mail was blocked 170 F Secure Client Security E mail scanning alert and error messages...

Страница 171: ...ed during client installation The products listed in this section are either detected so that the user can manually uninstall them or automatically uninstalled during the F Secure Client Security inst...

Страница 172: ...ender Total Security 2008 Bsecure Internet Protection Services v 4 5 BullGuard 7 0 CA Anti Virus CA eTrust Antivirus eTrust EZ Antivirus EZ Firewall CA Internet Security Suite Cisco VPN Client Firewal...

Страница 173: ...Privacy Service McAfee SecurityCenter McAfee SpamKiller McAfee VirusScan Professional Edition McAfee Total Protection McAfee Browser Protection Service McAfee Virus and Spyware Protection Service McAf...

Страница 174: ...date 3 3 Symantec Corporation Panda Antivirus 2007 Panda Antivirus Firewall 2007 Panda ClientShield Panda Internet Security 2008 Panda Antivirus Platinum Panda Platinum Internet Security Panda Platinu...

Отзывы: