172
To enable ActiveX protection, select the
Prevent all ActiveX from running
check box. ActiveX protection prevents the users’ web browsers from
running ActiveX web applications. Some web sites may use ActiveX to
install unwanted software on computers. However, there are also web
pages which the users cannot view without ActiveX.
ActiveX protection can be enabled only when System Control is enabled.
5.5
Configuring Rootkit Scanning
Rootkit scanning can be used to scan for files and drives hidden by
rootkits. Rootkits are typically used to hide malicious software, such as
spyware, from users, system tools and traditional antivirus scanners. The
items hidden by rootkits are often infected with viruses, worms or trojans.
5.5.1
Rootkit Scanning Configuration Settings
Select
Enable rootkit scanning
to enable scanning for files and drives
hidden by rootkits. This option also enables users to run local quick scans
for rootkits and other hidden items.
Select
Include rootkit scanning in full computer check
to scan for items
hidden by rootkits when a full computer check is started from the local
host, or when a manual scanning operation is launched from Policy
Manager Console.
Select
Show suspicious items after full computer check
to specify that
detected suspicious items are shown in the disinfection wizard and in the
scanning report after a full computer check. When this option is selected,
you can see from the scanning reports whether any items hidden by
rootkits have been detected on the managed hosts.
5.5.2
Launching a Rootkit Scan for the Whole Domain
In this example a rootkit scan is launched for the whole domain.
1.
Select
Root
in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Manual Scanning
page.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...