250
Do not send the virus sample to any personal e-mail address at F-Secure
Corporation -your messages will be deleted by our e-mail scanner. Send
hoax samples and virus-related questions also to
If the virus sample is too big to send by e-mail, you can upload it (in ZIP
archive) to our ftp site:
ftp://ftp.europe.f-secure.com/incoming
Send a message to
with the name of the archive
that you have uploaded and also a description of the virus sample.
10.4.4 In What Language
Send all virus descriptions, problems and questions in English whenever
possible.
10.4.5 Response Times
Our usual response time is 24-48 hours. Complicated cases may take a
longer time to investigate. If you do not get a reply from us within a week,
please re-send your message to
.
10.5
What to Do in Case of a Virus Outbreak?
This section contains a checklist of what you should do and remember in
case there is a virus outbreak in the company network.
1.
Disconnect the infected computer from the network immediately.
If the infection keeps spreading, the whole network should be taken
down without delay. All outgoing traffic should be blocked. Employees
must be instructed to report suspicious activities on their computers
immediately.
2.
Try to identify whether it is a real infection or a possible false alarm.
Scan the computer with the latest version of F-Secure Client Security
with the latest virus definitions updates. If the infection is identified
exactly, go to Step 3. If the infection is identified as a '
possible new
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...