background image

2.

Click

Next

to apply the actions.

3.

Click

Next

to finish.

If

spyware

was found during the manual or scheduled scan, the

Scan Wizard

continues to the

spyware

cleaning step.

Actions you can take in real-time scanning

The

Action to take

column shows you what actions you can take for the infected files in real-time scanning.

Note:

In addition to files, the infection can be found also in a registry entry or a process.

The following actions can be taken for

virus

es:

What happens to the infected files

Action to take

The product tries to disinfect the

virus

es in any infected files that were

found during real-time scanning.

Disinfect automatically

The product moves any infected files found during real-time scanning to
the quarantine where it cannot harm your computer.

Quarantine automatically
(default)

The product renames any infected files found during real-time scanning.

Rename automatically

The product deletes any infected files found during real-time scanning.

Delete automatically

The product records the detected viruses in the logfile.log file, sends alerts
to Policy Manager, adds events to Windows Event log, and sends e-mail

Report only

notifications (according to the settings that are specified on the Alerts page
under General>Administration).

The following actions can be taken for

spyware

:

What happens to the infected files

Action to take

The product moves any spyware found during real-time scanning to the
quarantine where it cannot harm your computer.

Quarantine automatically

The product removes any spyware found during real-time scanning.

Remove automatically

The product leaves any spyware that was found during real-time scanning
as it is and records the detection in the logfile.log file, sends alerts to Policy

Report only (default)

Manager, adds events to Windows Event log, and sends e-mail notifications
(according to the settings that are specified on the Alerts page under
General>Administration).

Actions you can take in manual or scheduled scanning

The

Action to take

column shows you what actions you can take for the infected files in manual or scheduled

scanning.

Note:

In addition to files, the infection can be found also in a registry entry or a process.

The following actions can be taken for

virus

es:

What happens to the infected files

Action to take

The product asks you what to do if

virus

es are found during manual scanning.

Ask what to do (default)

34

| F-Secure Anti-Virus for Windows Servers | Protecting the server against malware

Содержание ANTI-VIRUS FOR WINDOWS SERVERS 9.00

Страница 1: ...F Secure Anti Virus for Windows Servers Administrator s Guide...

Страница 2: ......

Страница 3: ...Sending alerts 19 Specifying the maximum size of log file 20 Exporting settings 21 Exporting statistics 22 Chapter 3 Protecting the server against malware 23 What are viruses and other malware 24 Vir...

Страница 4: ...t connection settings 42 Add a Policy Manager proxy server 42 Chapter 5 Technical support 45 F Secure online support resources 46 F Secure support tool 46 Web Club 47 Virus descriptions on the Web 48...

Страница 5: ...for Windows Servers you can guard the valuable data stored on the server against viruses and other malware Topics Product license F Secure Anti Virus for Windows Servers is always up to date and work...

Страница 6: ...respective companies F Secure Corporation disclaims proprietary interest in the marks and names of others Although F Secure Corporation makes every effort to ensure that this information is accurate...

Страница 7: ...s Servers is managed with the Web Console In centrally administered mode it is managed centrally with F Secure Policy Manager components F Secure Policy Manager Server and F Secure Policy Manager Cons...

Страница 8: ...e that the product receives latest database updates Installing F Secure Anti Virus for Windows Servers Instructions on how to install F Secure Anti Virus for Windows Servers Follow these instructions...

Страница 9: ...5 Enter the product keycode Click Next to continue 6 Choose the components to install Click Next to continue F Secure Anti Virus for Windows Servers Introduction 9...

Страница 10: ...Secure Anti Virus for Windows Servers in stand alone mode you cannot configure settings and receive alerts and status information in F Secure Policy Manager Console Click Next to continue If you sele...

Страница 11: ...onsole setup You can transfer the public key in various ways use a shared folder on the file server a USB device or send the key as an attachment in an e mail message Click Next to continue 10 In the...

Страница 12: ...nts that will be installed is displayed Click Start to install the listed components 12 The installation status of the components is displayed Click Next to continue 12 F Secure Anti Virus for Windows...

Страница 13: ...Click Finish to close the Setup wizard After the installation is complete check the status of the automatic updates and make sure that the product receives the latest updates F Secure Anti Virus for...

Страница 14: ......

Страница 15: ...section describes how to get started with using the product Topics Logging in for the first time Setting up Web Console for remote use Sending alerts Specifying the maximum size of log file Exporting...

Страница 16: ...s Note If your company has an established process for creating and storing certificates follow that process to create and store the security certificate for F Secure Anti Virus for Windows Servers Web...

Страница 17: ...us for Windows Servers Web Console service to take the new certificate into use 3 Wait for the utility to complete After the utility window closes you can continue to log in to the Web Console and ins...

Страница 18: ...er In the Port field specify the port where the server listens for connections The default port is 25023 Setting up Web Console for remote use on Windows Server Core editions This section explains how...

Страница 19: ...2 Under Sending alerts by SMTP specify the SMTP server address alert message subject line and the return address of the alert e mail 3 Click Add new recipient to add a new entry in the E mail Address...

Страница 20: ...um size of the F Secure log file To specify the maximum size 1 Go to General Administration and open the Management tab 2 Under Logging specify the maximum size in KB of the F Secure log file 3 Click...

Страница 21: ...ings To see a list of the settings 1 Go to General and open the Status tab 2 On the right side under Tasks click Export settings A list of all F Secure Anti Virus for Windows Servers settings opens in...

Страница 22: ...ics To see a list of the statistics 1 Go to General and open the Status tab 2 On the right side under Tasks click Export statistics A list of all F Secure Anti Virus for Windows Servers statistics ope...

Страница 23: ...n they are found so that they can cause no harm Topics What are viruses and other malware Virus and spyware scanning scans your local hard drives any removable media such as portable drives or compact...

Страница 24: ...rus uses some of your computer s system resources may alter or damage files on your computer probably tries to use your computer to infect other computers may allow your computer to be used for illega...

Страница 25: ...VoIP Voice over Internet Protocol Remote Access Software such as VNC scareware which may try to scare or scam individuals into buying fake security software or software designed to bypass CD checks or...

Страница 26: ...se it takes a small amount of time and system resources The amount of time and system resources that real time scanning takes depend on for example the contents location and type of the file Files tha...

Страница 27: ...clude files with these extensions c Type a file extension that identifies the type of files that you want to exclude in the field next to the Add button To specify files that have no extension type Yo...

Страница 28: ...ing the product icon in the system tray Types of scan You can scan your whole computer or scan for a specific type of malware or a specific location The following lists the different types of scan Whe...

Страница 29: ...lect either of What will happen Option The program decides what to do to each malware item to automatically clean your computer Handle automatically recommended The program asks what you want to do to...

Страница 30: ...ys to scan from the list to the right Weekly To scan on up to three days a month To select which days Monthly 1 Select one of the Day options 2 Select the day of the month from the list next to the se...

Страница 31: ...your computer to scan in manual and scheduled scans Note Edit manual scanning settings to select files and folders you want to scan during the scheduled scan Two types of lists determine which files a...

Страница 32: ...n you want to be excluded from being scanned for viruses 5 Click OK to close the Exclude from scanning dialog box 6 Click Apply The selected file types are excluded from future manual and scheduled sc...

Страница 33: ...are found and you have set the program not to automatically handle viruses and spyware you can now select whether to clean delete quarantine or only block the files in which a virus or spyware was fou...

Страница 34: ...il Report only notifications according to the settings that are specified on the Alerts page under General Administration The following actions can be taken for spyware What happens to the infected fi...

Страница 35: ...s found during during manual or scheduled scanning as they are and records the detection in the scan report Report only Note If real time scanning is turned off any malware is still able to harm the s...

Страница 36: ...information on items in the quarantine 1 To view general information on the quarantined items go to the Quarantine page It shows the total number of items stored in quarantine 2 To view detailed infor...

Страница 37: ...llowing a Go to Quarantine Query b Select the quarantined items that you want to delete c Click Delete Note In the centrally administered mode you can view and handle quarantined files through both th...

Страница 38: ......

Страница 39: ...updates to your computer when you are connected to the Internet It detects the network traffic and does not disturb other Internet use even with a slow network connection Topics Turning automatic upd...

Страница 40: ...date automatically 1 Go to Automatic Updates Communications and click the General tab 2 Check the Turn on automatic updating check box to keep automatic updates turned on Clear the check box to turn...

Страница 41: ...ame and the date of the latest installed update 3 Last check time displays the time of the latest update check and Last check result displays whether the product retrieved any new updates 4 Click Chec...

Страница 42: ...directly Select Manually configure HTTP proxy to configure the HTTP proxy settings Select Use browser s HTTP proxy to use the same HTTP proxy settings that you have configured in your web browser 4 U...

Страница 43: ...e connection succeeds You can change the order of the proxy servers by selecting a proxy from the list and clicking the arrows to the right of the list 5 Click OK to add the new proxy server to the li...

Страница 44: ......

Страница 45: ...hapter 5 Technical support F Secure Technical Support is available through F Secure support web pages e mail and by phone Topics F Secure online support resources Web Club Virus descriptions on the We...

Страница 46: ...n folder if you prefer not to do it through the F Secure Anti Virus for Windows Servers Web Console The tool generates a file called FSDiag tar gz To run the F Secure Support Tool from F Secure Anti V...

Страница 47: ...to the Web Club on our Web site 1 Open F Secure Anti Virus for Windows Servers Web Console and click the Web Club link 2 To connect to the Web Club directly from your Web browser go to http www f sec...

Страница 48: ...rporation maintains a comprehensive collection of virus related information on its Web site To view the Virus Information Database connect to http www f secure com security_center 48 F Secure Anti Vir...

Отзывы: