
Important:
If you install software without the Software Installation Mode when Integrity
Checking monitors updated files, you may be unable to install or use the new software. For
example, Integrity Checking may prevent a kernel update from booting properly as new
drivers are not in the baseline.
Baseline
Integrity Checking is set up by creating a baseline of the system files that you want to protect.
A default set of system files is added to the
Known Files List
during the installation. By default,
Kernel Module Verification
is enabled during the installation and the baseline is generated from
the
Known Files List
. If you do not enable the
Kernel Module Verification
during the installation,
you have to generate the baseline manually before Integrity Checking is enabled.
All files that are added to the baseline during the installation are set to
Allow
and
Alert
protection
mode.
Note:
The default list of known files is generated upon installation, and contains the most
important system files. The list of files differs between distributions. Run
/opt/f-secure/fsav/bin/fslistfiles
to retrieve the exact list of files.
Scanning for Viruses
The product stops
viruses
and other
malware
.
What are Viruses and Other Malware?
Malware are programs specifically designed to damage the computer, use the computer for
illegal purposes without users knowledge or steal information from the computer.
Malware can:
•
take control over the web browser,
•
redirect the web search attempts,
•
show unwanted advertising,
•
keep track on the visited web sites,
•
steal personal information such as your banking information,
•
use the computer to send spam, and
•
use the computer to attack other computers.
Malware programs can also cause the computer to become slow and unstable.
F-Secure Linux Security | Using the Product |
37
Содержание LINUX SECURITY
Страница 1: ...F Secure Linux Security...
Страница 2: ......
Страница 14: ......
Страница 28: ......
Страница 32: ......
Страница 84: ...Note Press ctrl C to cancel your changes 84 F Secure Linux Security Command Line Tools...
Страница 120: ...G 1 G Man Pages fsav 2 fsavd 32 dbupdate 48 fsfwc 52 fsic 55 fschooser 62 fsims 64 fssetlanguage 67...
Страница 150: ...CHAPTERG G 31 For more information see F Secure home page...
Страница 166: ...CHAPTERG G 47 dbupdate 8 fsav 1 For more information see F Secure home page...
Страница 170: ...CHAPTERG G 51 fsav 1 and fsavd 8 For more information see F Secure home page...
Страница 188: ...H 69 H Config Files fsaua_config 70 fssp conf 75...
Страница 219: ...H 100 expiredText EVALUATION PERIOD EXPIRED nTo purchase license please check http www F Secure com purchase n...