18
1.1
Overview
This section describes the main components of F-Secure Client Security
and F-Secure Policy Manager and provides an introduction to policy
based management.
1.2
F-Secure Client Security Components and
Features
F-Secure Client Security is used for protecting the computer against
viruses, worms, spyware, rootkits and other malware, and against
unauthorized access from the network. F-Secure Client Security consists
of Virus Protection, Internet Shield, and Application Management. When
installing F-Secure Client Security, you can select which of these
components are installed.
1.2.1
Virus and Spy Protection
Virus and Spy Protection includes several scanning methods: Real-Time
Scanning, E-mail Scanning, Web Traffic Scanning, Rootkit Scanning, and
Manual Scanning. It also includes System Control, Automatic Updates,
the F-Secure Automatic Update Agent and the Virus News service.
Real-Time Scanning
The Real-Time Scanning feature gives you continuous protection against
viruses and spyware as files are opened, copied, moved, renamed and
downloaded from the Web.
Real-Time Scanning functions transparently in the background, looking
for viruses whenever you access files on the hard disk, diskettes, or
network drives. If you try to access an infected file, Real-Time Scanning
will automatically stop the virus from executing. It will then either remove it
from the file or display a warning, as specified in the security policy. For
more information, see “
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...