Integration with Kaseya RMM for Windows computers (F-Secure) 0 (0)

Instructions on how to manage the F-Secure Computer Protection for Windows and the F-Secure Server Protection for Windows software using the Kaseya portal. To simplify a monitoring and management of F-Secure Computer Protection and F-Secure Server Protection from the Kaseya portal, you can use the following pre-created set of agent procedures: https://download.sp.f-secure.com/PSB/RMM/Kaseya/Kaseya_F-Secure.xml You first need to […]

Read More

Creating a new computer profile (F-Secure) 0 (0)

You can create profiles that can be assigned to specific computers. To create a new profile: Under Profiles > Computer Protection for Mac, select  next to an existing profile, and select Clone profile. The Profile for Computer Protection page opens. Enter a name and description for the new profile. You can also select a label for the new profile. Make desired changes […]

Read More

Using F-Secure Endpoint Proxy with a Computer Protection profile 0 (0)

F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading updates to Computer Protection clients. This proxy caches GUTS2 updates — the malware signature database. If the PMP is not available, Computer Protection clients automatically fall back to accessing GUTS2 directly. To configure […]

Read More

How can I remove F-Secure ID PROTECTION completely from a PC? (Windows) 0 (0)

Follow these instructions if you want to remove the app completely from your Windows computer. For the time being, the easiest way to remove ID PROTECTION completely from you computer is to use our Uninstallation Tool for Windows. To uninstall the product, do as follows: Go to the Support Tools webpage. Under Uninstallation tool for Windows, select Download. The FsUninsallationTool.exe file is […]

Read More

How we handle anonymity in the app (F-Secure Windows) 0 (0)

We have no way of decrypting any information that you have saved in the app. Anyone using F-Secure ID PROTECTION is anonymous to F-Secure, so we have no way of identifying an individual user’s data. We never see any of your information at any stage, and therefore we can’t decrypt it or hand it over […]

Read More