background image

When to use this type

What is scanned

Scan type

files, such as documents, music, images, and videos. This
type of scan is slow and recommended only if the Virus and
spyware scan has not found any malware and if you want to
be sure that the other parts of your computer do not contain
malicious files.

This type of scan is much quicker than a full scan. It searches
only the parts of your system that contain installed program

Parts of your computer for
viruses, spyware and riskware

Virus and
spyware scan

files.This scan type is recommended if you want to quickly
check whether your computer is clean, because it is able to
efficiently find and remove any active malware on your
computer.

When you suspect that a rootkit may be installed on your
computer. For example, if malware was recently detected in

Important system locations
where a suspicious item may

Rootkit scan

your computer and you want to make sure that it did not
install a rootkit.

mean a security problem.
Scans for hidden files, folders,
drives or processes

Clean malware automatically

If

malware

is found during the scan, you can either let the program automatically decide how to clean your

computer or you can decide yourself for each item.

1.

Select either of:

What will happen

Option

The program decides what to do to each

malware

item to

automatically clean your computer.

Handle automatically (recommended)

The program asks what you want to do to each

malware

item.

I want to decide item by item

2.

Click

Next

.

If you selected

Handle automatically (recommended)

, a window with the results of automatic malware

handling opens.

Note:

Some malware items may have a "Not processed" status, which means that the infected

file is inside an archive (for example, a zip file) and cannot be handled automatically. You can
delete the infected file by opening the archive and deleting the file manually. If the content of the
archive is not important, you can delete the whole archive.

If you selected

I want to decide item by item

, you must specify action for each detected malware.

3.

Click

Finish

to close the Scan Wizard.

View the results of manual scan

You can view a report of the scanning results after the scan is complete.

Note:

You might want to view this report because the action you selected may not always be the action

that was performed. For example, if you chose to clean an infected file, but the

virus

could not be

removed from the file, the product may have performed some other action to the file.

To view the report:

1.

Go to

Server Protection

Manual Scanning

and open the Status tab.

F-Secure Anti-Virus for Windows Servers | Protecting the server against malware |

29

Содержание Anti-Virus for Windows Servers

Страница 1: ...F Secure Anti Virus for Windows Servers Administrator s Guide...

Страница 2: ......

Страница 3: ...Sending alerts 19 Specifying the maximum size of log file 20 Exporting settings 21 Exporting statistics 22 Chapter 3 Protecting the server against malware 23 What are viruses and other malware 24 Vir...

Страница 4: ...t connection settings 42 Add a Policy Manager proxy server 42 Chapter 5 Technical support 45 F Secure online support resources 46 F Secure support tool 46 Web Club 47 Virus descriptions on the Web 48...

Страница 5: ...for Windows Servers you can guard the valuable data stored on the server against viruses and other malware Topics Product license F Secure Anti Virus for Windows Servers is always up to date and work...

Страница 6: ...respective companies F Secure Corporation disclaims proprietary interest in the marks and names of others Although F Secure Corporation makes every effort to ensure that this information is accurate...

Страница 7: ...s Servers is managed with the Web Console In centrally administered mode it is managed centrally with F Secure Policy Manager components F Secure Policy Manager Server and F Secure Policy Manager Cons...

Страница 8: ...e that the product receives latest database updates Installing F Secure Anti Virus for Windows Servers Instructions on how to install F Secure Anti Virus for Windows Servers Follow these instructions...

Страница 9: ...5 Enter the product keycode Click Next to continue 6 Choose the components to install Click Next to continue F Secure Anti Virus for Windows Servers Introduction 9...

Страница 10: ...Secure Anti Virus for Windows Servers in stand alone mode you cannot configure settings and receive alerts and status information in F Secure Policy Manager Console Click Next to continue If you sele...

Страница 11: ...onsole setup You can transfer the public key in various ways use a shared folder on the file server a USB device or send the key as an attachment in an e mail message Click Next to continue 10 In the...

Страница 12: ...nts that will be installed is displayed Click Start to install the listed components 12 The installation status of the components is displayed Click Next to continue 12 F Secure Anti Virus for Windows...

Страница 13: ...Click Finish to close the Setup wizard After the installation is complete check the status of the automatic updates and make sure that the product receives the latest updates F Secure Anti Virus for...

Страница 14: ......

Страница 15: ...section describes how to get started with using the product Topics Logging in for the first time Setting up Web Console for remote use Sending alerts Specifying the maximum size of log file Exporting...

Страница 16: ...s Note If your company has an established process for creating and storing certificates follow that process to create and store the security certificate for F Secure Anti Virus for Windows Servers Web...

Страница 17: ...us for Windows Servers Web Console service to take the new certificate into use 3 Wait for the utility to complete After the utility window closes you can continue to log in to the Web Console and ins...

Страница 18: ...er In the Port field specify the port where the server listens for connections The default port is 25023 Setting up Web Console for remote use on Windows Server Core editions This section explains how...

Страница 19: ...2 Under Sending alerts by SMTP specify the SMTP server address alert message subject line and the return address of the alert e mail 3 Click Add new recipient to add a new entry in the E mail Address...

Страница 20: ...um size of the F Secure log file To specify the maximum size 1 Go to General Administration and open the Management tab 2 Under Logging specify the maximum size in KB of the F Secure log file 3 Click...

Страница 21: ...ings To see a list of the settings 1 Go to General and open the Status tab 2 On the right side under Tasks click Export settings A list of all F Secure Anti Virus for Windows Servers settings opens in...

Страница 22: ...ics To see a list of the statistics 1 Go to General and open the Status tab 2 On the right side under Tasks click Export statistics A list of all F Secure Anti Virus for Windows Servers statistics ope...

Страница 23: ...n they are found so that they can cause no harm Topics What are viruses and other malware Virus and spyware scanning scans your local hard drives any removable media such as portable drives or compact...

Страница 24: ...rus uses some of your computer s system resources may alter or damage files on your computer probably tries to use your computer to infect other computers may allow your computer to be used for illega...

Страница 25: ...VoIP Voice over Internet Protocol Remote Access Software such as VNC scareware which may try to scare or scam individuals into buying fake security software or software designed to bypass CD checks or...

Страница 26: ...se it takes a small amount of time and system resources The amount of time and system resources that real time scanning takes depend on for example the contents location and type of the file Files tha...

Страница 27: ...clude files with these extensions c Type a file extension that identifies the type of files that you want to exclude in the field next to the Add button To specify files that have no extension type Yo...

Страница 28: ...ing the product icon in the system tray Types of scan You can scan your whole computer or scan for a specific type of malware or a specific location The following lists the different types of scan Whe...

Страница 29: ...lect either of What will happen Option The program decides what to do to each malware item to automatically clean your computer Handle automatically recommended The program asks what you want to do to...

Страница 30: ...ys to scan from the list to the right Weekly To scan on up to three days a month To select which days Monthly 1 Select one of the Day options 2 Select the day of the month from the list next to the se...

Страница 31: ...your computer to scan in manual and scheduled scans Note Edit manual scanning settings to select files and folders you want to scan during the scheduled scan Two types of lists determine which files a...

Страница 32: ...n you want to be excluded from being scanned for viruses 5 Click OK to close the Exclude from scanning dialog box 6 Click Apply The selected file types are excluded from future manual and scheduled sc...

Страница 33: ...are found and you have set the program not to automatically handle viruses and spyware you can now select whether to clean delete quarantine or only block the files in which a virus or spyware was fou...

Страница 34: ...il Report only notifications according to the settings that are specified on the Alerts page under General Administration The following actions can be taken for spyware What happens to the infected fi...

Страница 35: ...s found during during manual or scheduled scanning as they are and records the detection in the scan report Report only Note If real time scanning is turned off any malware is still able to harm the s...

Страница 36: ...information on items in the quarantine 1 To view general information on the quarantined items go to the Quarantine page It shows the total number of items stored in quarantine 2 To view detailed infor...

Страница 37: ...llowing a Go to Quarantine Query b Select the quarantined items that you want to delete c Click Delete Note In the centrally administered mode you can view and handle quarantined files through both th...

Страница 38: ......

Страница 39: ...updates to your computer when you are connected to the Internet It detects the network traffic and does not disturb other Internet use even with a slow network connection Topics Turning automatic upd...

Страница 40: ...date automatically 1 Go to Automatic Updates Communications and click the General tab 2 Check the Turn on automatic updating check box to keep automatic updates turned on Clear the check box to turn...

Страница 41: ...ame and the date of the latest installed update 3 Last check time displays the time of the latest update check and Last check result displays whether the product retrieved any new updates 4 Click Chec...

Страница 42: ...directly Select Manually configure HTTP proxy to configure the HTTP proxy settings Select Use browser s HTTP proxy to use the same HTTP proxy settings that you have configured in your web browser 4 U...

Страница 43: ...e connection succeeds You can change the order of the proxy servers by selecting a proxy from the list and clicking the arrows to the right of the list 5 Click OK to add the new proxy server to the li...

Страница 44: ......

Страница 45: ...hapter 5 Technical support F Secure Technical Support is available through F Secure support web pages e mail and by phone Topics F Secure online support resources Web Club Virus descriptions on the We...

Страница 46: ...n folder if you prefer not to do it through the F Secure Anti Virus for Windows Servers Web Console The tool generates a file called FSDiag tar gz To run the F Secure Support Tool from F Secure Anti V...

Страница 47: ...to the Web Club on our Web site 1 Open F Secure Anti Virus for Windows Servers Web Console and click the Web Club link 2 To connect to the Web Club directly from your Web browser go to http www f sec...

Страница 48: ...rporation maintains a comprehensive collection of virus related information on its Web site To view the Virus Information Database connect to http www f secure com security_center 48 F Secure Anti Vir...

Отзывы: