
Configuring spyware scanning
Spyware scanning protects the hosts against different types of spyware, such as data miners, monitoring
tools and dialers.
In centrally managed mode, spyware scanning can be set, for example, to report the spyware items found
on hosts to the administrator or to quarantine all found spyware items automatically. It is also possible to
allow the use of certain spyware applications by specifying them as allowed spyware on the Spyware Control
page.
A note about cleaning spyware and riskware
Spyware is a gray area between a fully legitimate application and a virus/trojan. Some spyware may be
necessary to run ordinary applications, while most spyware is just malware and should not be allowed to run
even once. By default, spyware scanning is configured to allow all spyware to run. You can check whether
you need to allow some spyware to run on your network before you tighten the security and prevent all new
spyware from executing.
Spyware scanning also detects and reports riskware. Riskware is any program that does not intentionally
cause harm but can be dangerous if misused, especially if set up incorrectly. Examples of such programs
are chat programs (IRC), or file transfer programs.
Spyware control settings
The settings for spyware scanning are described here.
Spyware scanning is included as part of real-time scanning and manual scanning. When
Real-time scanning
enabled
is selected on the
Real-time scanning
page, spyware scanning is also turned on. Similarly, whenever
a manual scan is run, spyware is automatically included in the scan. The action taken when spyware is
detected is determined by the action selected on the
Real-time scanning
and
Manual scanning
pages.
The
Applications excluded from spyware scanning
table displays the spyware and riskware items that
have been allowed by the administrator.
The
Spyware and riskware reported by hosts
table contains the following information:
Spyware and riskware reported by hosts
Displays the name of the spyware object or riskware.
Spyware or Riskware Name
Displays the spyware type. The type can be adware,
data miner, dialer, malware, monitoring tool, porn
Type
dialer, riskware, vulnerability, worm, cookie (tracking
cookie) or misc (miscellaneous).
Displays the severity of the spyware item. This is a
value from 3 to 10.
Severity
Displays the name of the host on which the spyware
item was found.
Host
Displays the current status of the spyware item. The
statuses are:
Spyware Status
Potentially active
- The spyware item is still potentially
active on the host. No action has been taken on the
host against the spyware item.
F-Secure Client Security | Configuring virus and spyware protection |
77
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 2: ......
Страница 8: ...8 F Secure Client Security TOC...
Страница 44: ......
Страница 62: ......
Страница 86: ......
Страница 101: ...4 Click to save and distribute the policy F Secure Client Security Configuring Internet Shield 101...
Страница 114: ......
Страница 118: ......
Страница 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Страница 148: ......
Страница 157: ...4 Click to save and distribute the policy F Secure Client Security Advanced features Internet Shield 157...
Страница 158: ......