CHAPTER 5
181
5.8
Configuring Spyware Scanning
Spyware scanning protects the hosts against different types of spyware,
such as data miners, monitoring tools and dialers. In centrally managed
mode spyware scanning can be set, for example, to report the spyware
items found on hosts to the administrator or to quarantine all found
spyware items automatically. It is also possible to allow the use of certain
spyware applications by specifying them as allowed spyware on the
Spyware Control page.
A Note About Cleaning Spyware and Riskware
Spyware is a gray area between a fully legitimate application and a virus/
trojan. Some spyware may be necessary to run ordinary applications,
while most spyware is just malware and should not be allowed to run
even once. By default, F-Secure Spyware Scanning is configured to allow
all spyware to run. You can check whether you need to allow some
spyware to run on your network before you tighten the security and
prevent all new spyware from executing.
Spyware scanning also detects and reports riskware. Riskware is any
program that does not intentionally cause harm but can be dangerous if
misused, especially if set up incorrectly. Examples of such programs are
chat programs (IRC), or file transfer programs.
5.8.1
Spyware Control Settings
Spyware Scanning on File Access
To enable real-time spyware scanning, select the
Scan for spyware
check
box.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...