Interactive guidance (F-Secure Endpoint) 0 (0)

The Elements Security Center (ESC) contains interactive guidance that shows how to use the portal and informs about new features. After you log in to the portal for the first time, we strongly recommend that you watch the introduction tour that opens. To open the interactive guidance window later, select the question mark icon on […]

Read More

Switching between monitored organizations (F-Secure Endpoint) 0 (0)

Use the scope selector to broaden or narrow the scope of information displayed in the F-Secure Elements Endpoint Detection and Response portal. To use the scope selector to focus on a particular organization: Select the  icon in the top-left corner. A drop-down menu is displayed, listing all the customer organizations associated with your account. Select the […]

Read More

Logging in (F-Secure Endpoint) 0 (0)

Instructions on how to log into the F-Secure Business Account portal. With the F-Secure Business Account portal, you are able to log in to both the F-Secure Elements Endpoint Protection portal and the F-Secure Elements Endpoint Detection and Response portal with the same credentials, as well as set up two-factor authentication. Log in to your […]

Read More

Verifying that managed hosts are connected (F-Secure Endpoint) 0 (0)

After your customer has installed the F-Secure Elements Endpoint Detection and Response client software, you should check that the hosts are connected to the service. Some data, for example detections, is not immediately available in the service statistics. However, once the client software is installed, it should appear on the Devices list. Go to the Devices page and select Host […]

Read More

Installing the client software for Windows remotely (F-Secure Endpoint) 0 (0)

Follow these instructions to install F-Secure Elements Endpoint Detection and Response client software for Windows remotely. For the installation, you need the following: A domain controller with Active Directory installed and an end-point host joined to domain. The F-Secure MSI Transformation tool (FsMsiTool.exe) available at https://download.sp.f-secure.com/msitool/FsMsiTool.exe. The .msi installer file to F-Secure Elements Endpoint Detection and Response. Download […]

Read More

Installing the F-Secure Elements Endpoint Detection and Response client software for Mac 0 (0)

Instructions on how to install the sensor client on a Mac computer. You need rights to administer the computer to install the product. Follow these instructions to install the product: Log in to the F-Secure Elements EPP portal. Select Downloads on the sidebar. The Downloads page opens. Under F-Secure Elements EDR and EPP for Computers > Mac, select MPKG and follow the instructions to […]

Read More

Installing the F-Secure Elements Endpoint Detection and Response client software for Windows 0 (0)

Instructions on how to install the sensor client on a Windows computer. To install the product: Log in to the F-Secure Elements EPP portal. Note: Alternatively, you can download the installation file without logging in by selecting the Downloads link on the login page. You need to have a subscription key for the product. Select Downloads on the sidebar. The Downloads page […]

Read More

Glossary (F-Secure) 0 (0)

A list of terms used in F-Secure Elements Endpoint Detection and Response. Anomaly A new, previously unidentified event or a sequence of events that most likely result from malicious activities. Broad context detection F-Secure Elements Endpoint Detection and Response uses real-time behavioral, reputational, and big data analysis with machine learning to collect multiple detections that […]

Read More