For details on the latest release of PSB Management Portal, see the change log on F-Secure Community. Supported browsers PSB Management Portal supports the latest versions of the following browsers: Microsoft Internet Explorer (end of support: 1 May 2020) Microsoft Edge Mozilla Firefox Google Chrome Safari Supported languages The supported languages are English, Czech, Danish, Dutch, […]
Category: F-Secure
F-Secure Business(1304)
F-Secure Endpoint(43)
F-Secure Home(1301)
Reporting false positives (F-Secure Endpoint)
All detected anomalies are not actual attacks. If you determine that the detection is not an attack and it has a too high risk level score, you can report the detection as a false positive. To request whitelisting: Log in to the portal with your email address and password. The Home view opens. Select the … item from the […]
Advanced test with Powershell (F-Secure Endpoint)
You can use this test to view what an advanced attack in the organization network may look like in the F-Secure Elements Endpoint Detection and Response portal. For this test, you need: a Windows workstation that is running the Sensor, and an access to the F-Secure Elements Endpoint Detection and Response portal. Note: We recommend that […]
Simple test with Windows system tools (F-Secure Endpoint)
You can use this simple test to generate a monitored event on the endpoint to make sure that the Sensor is installed and working correctly. To run the test, follow these instructions: Log in to the monitored endpoint where you have deployed the sensor. Open the command prompt. Run the command to create a monitored […]
Forensics package contents (F-Secure Endpoint)
The forensics package is a zip archive that contains the following information about device. Note: The package is available for 14 days and contains the latest archive that has been collected from the device. Product and system information basic/product_info.txt Product version, license, update status, profile settings basic/settings.txt Product settings basic/systeminfo.log Operating system, hardware profile (memory and […]
Process activities (F-Secure Endpoint)
This table lists some of the most common process activities that sensors detect. Abnormal file accesses The process is accessing multiple file types or system files without privileges, for example. Abnormal file modification The process is making unusual changes in system files, making files executable, or removing log files or executable files, for example. Abnormal […]
Incident types (F-Secure Endpoint)
This table lists some of the most common incident types. Category Description Directed attack The attack targets a specific host. Lateral movement The attack moves between hosts while searching for the device that would be the eventual target of the attack. Spoofing The attack uses falsified data to try to disguise itself. Persistence The attack […]
Responding to a targeted attack (F-Secure Endpoint)
Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Acknowledging an incident (F-Secure Endpoint)
Instructions what to do when you receive an email notification about a new broad context detection. Follow these instructions when you receive an alert of a new detection: Open the portal to check the details of the broad context detection. Check the risk level score of the detection and its details view, the list of […]
Best practices (F-Secure Endpoint)
Best practices are instructions on how to best use F-Secure Elements Endpoint Detection and Response features. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team