
CHAPTER 5
171
5.4
Configuring System Control
F-Secure System Control is a new, host-based intrusion prevention
system that analyzes the behavior of files and programs. It can be used to
block intrusive ad pop-ups and to protect important system settings, as
well as Internet Explorer settings against unwanted changes.
If an application tries to perform a potentially dangerous action, it will be
checked for trust. Safe applications are allowed to operate, while actions
by unsafe applications are blocked.
When System Control is enabled, you can configure Application Control
in such a way that it asks users what to do only in those cases when
System Control does not trust an application.
5.4.1
System Control Configuration Settings
To enable System Control, select the
Enable System Control
check box.
You can select what to do when a system modification attempt is
detected. The following actions are available:
Action
Definition
Always ask
permission
System Control asks the users whether they
want to allow or block all monitored actions,
even when System Control identifies the
application as safe.
Ask when case is
unclear
System Control asks the users whether they
want to allow or block monitored actions only
when System Control cannot identify the
application as safe or unsafe (default option).
Automatic: Do not
ask
System Control blocks unsafe applications and
allows safe applications automatically without
asking the user any questions.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...