308
Subnet
Short for "subnetwork", it is a section of a network. Usually,
computers within the same subnet will be physically near to each
other and will have IP addresses that begin with the same two or
three numbers.
System Event Log
A service that records events in the system, security, and application
logs. F-Secure Client Security events are recorded in application
logs.
TAC Score
The TAC score determines how likely the application is malware,
1being the least and 10 being the most problematic. The product
does not notify you about objects with TAC score of 2 or less.
TCP/IP
(Transmission Control Protocol/Internet Protocol) This is the suite of
protocols that defines the Internet. Originally designed for the UNIX
operating system, TCP/IP software is now available for every major
kind of computer operating system. To be truly on the Internet, your
computer must have TCP/IP software.
Text file
Any file whose contents are intended by the file’s creator to be
interpreted as a sequence of one or more lines containing ASCII or
Latin printable characters.
Tracking cookie
Tracking cookies track your web browsing habits. They can collect
information of pages and advertisements you have seen or any other
activity during the browsing. Different websites can share tracking
cookies and each website with the same tracking cookie can read
and write new information into it.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...