Instructions on how to manage the F-Secure Computer Protection for Windows and the F-Secure Server Protection for Windows software using the Kaseya portal. To simplify a monitoring and management of F-Secure Computer Protection and F-Secure Server Protection from the Kaseya portal, you can use the following pre-created set of agent procedures: https://download.sp.f-secure.com/PSB/RMM/Kaseya/Kaseya_F-Secure.xml You first need to […]
Category: F-Secure for Windows
Creating a new computer profile (F-Secure)
You can create profiles that can be assigned to specific computers. To create a new profile: Under Profiles > Computer Protection for Mac, select next to an existing profile, and select Clone profile. The Profile for Computer Protection page opens. Enter a name and description for the new profile. You can also select a label for the new profile. Make desired changes […]
Using F-Secure Endpoint Proxy with a Computer Protection profile
F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading updates to Computer Protection clients. This proxy caches GUTS2 updates — the malware signature database. If the PMP is not available, Computer Protection clients automatically fall back to accessing GUTS2 directly. To configure […]
How do I move from KEY to ID PROTECTION on mobile devices? (F-Secure Windows)
This topic explains how you can move from KEY to ID PROTECTION on your mobile device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You are using F-Secure KEY on your mobile device. You have an ID PROTECTION subscription and […]
How do I move from KEY to ID PROTECTION on desktop devices? (F-Secure Windows)
This topic explains how you can move from KEY to ID PROTECTION on your desktop device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You have previously used F-Secure KEY on a desktop device. You have an ID PROTECTION subscription […]
F-Secure ID PROTECTION replaces KEY in TOTAL. How do I take the new app into use with TOTAL? (Windows)
This topic only applies to you if you have a TOTAL subscription. A new app called ID PROTECTION has now replaced KEY in My F-Secure as part of our new offering to prevent identity theft. ID PROTECTION offers not only a password manager, but also email monitoring to keep track of data breaches and other […]
How can I remove F-Secure ID PROTECTION completely from a PC? (Windows)
Follow these instructions if you want to remove the app completely from your Windows computer. For the time being, the easiest way to remove ID PROTECTION completely from you computer is to use our Uninstallation Tool for Windows. To uninstall the product, do as follows: Go to the Support Tools webpage. Under Uninstallation tool for Windows, select Download. The FsUninsallationTool.exe file is […]
Does F-Secure collect information on the URLs and other information that users enter into ID PROTECTION? (Windows)
A short answer about data privacy. No. At F-Secure, we don’t collect any of your personal data or information you enter into F-Secure ID PROTECTION. For more information, see the F-Secure ID PROTECTION Privacy Policy here. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
How we handle anonymity in the app (F-Secure Windows)
We have no way of decrypting any information that you have saved in the app. Anyone using F-Secure ID PROTECTION is anonymous to F-Secure, so we have no way of identifying an individual user’s data. We never see any of your information at any stage, and therefore we can’t decrypt it or hand it over […]
Is my information encrypted at all times between ID PROTECTION and the server? (F-Secure Windows)
Yes, it is always encrypted. We use TLS/SSL to protect your information during the entire data transfer process. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team