
v
Local Installation System Requirements ...................................................... 157
How to Check That the Management Connections Work ........................................ 159
Configuring Virus and Spyware Protection
Overview: What can Virus and Spyware Protection be Used for? ........................... 161
How do Automatic Updates Work?............................................................... 163
Automatic Updates Configuration Settings................................................... 163
Configuring Automatic Updates from Policy Manager Server ......................164
Configuring Policy Manager Proxy ............................................................... 165
Real-Time Scanning Configuration Settings................................................. 166
Enabling Real-Time Scanning for the Whole Domain .................................. 169
Forcing all Hosts to Use Real-Time Scanning.............................................. 169
Excluding Microsoft Outlooks's .pst File from Real-Time Scanning ............. 170
System Control Configuration Settings......................................................... 171
Rootkit Scanning Configuration Settings ...................................................... 172
Launching a Rootkit Scan for the Whole Domain......................................... 172
E-mail Scanning Configuration Settings ....................................................... 173
Enabling E-mail Scanning for Incoming and Outgoing E-mails .................... 176
HTTP Scanning Configuration Settings........................................................ 178
Enabling Web Traffic Scanning for the Whole Domain ................................ 179
Excluding a Web Site from HTTP Scanning................................................. 179
Setting up Spyware Control for the Whole Domain ...................................... 185
Launching Spyware Scanning in the Whole Domain.................................... 187
Allowing the Use of a Spyware or Riskware Component .............................188
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...