Adding a firewall rule to a network isolation profile (F-Secure) 0 (0)

When you isolate a computer from a network, a strict set of firewall rules are applied to prevent the computer from connecting to the internet. Note: The isolated computer retains its device profile, including its firewall profile. The isolation rules are applied but not shown in the profile editor. By default, the firewall profile turns off […]

Read More

Adding a rule (F-Secure) 0 (0)

To add a rule: Go to Profiles and select a profile. The General settings page opens. From the left pane, select Firewall. The Firewall page opens. Select the profile that you want to edit or to which you want to add a new rule. In the Firewall rules table, you can see the rules that have been created for the […]

Read More

Firewall configuration (F-Secure) 0 (0)

When Windows Firewall is on, its user and network rules are applied to the devices. F-Secure Firewall profiles provide an additional security layer on top of the Windows Firewall user rules and other domain rules. The F-Secure firewall profiles or rules are not applied if Windows Firewall is off. Therefore, we recommend that you always […]

Read More

Finding the hardware ID for a device (F-Secure) 0 (0)

You can use the hardware ID with blocking rules. Follow these instructions to find the hardware ID with Windows Device Manager: Open Windows Device Manager in the client computer. Find the correct device in the list. Tip: Expand the device type to see all the devices. Right-click the device and select Properties. Go to Details tab. Select one of the following […]

Read More

Blocking hardware devices (F-Secure) 0 (0)

You can block the access to devices with predefined rules. By default, rules do not block any devices. To block devices, follow these instructions. Under Profiles, select a profile. The Profile page opens. From the menu on the left, select Device control. Under Device access rules, you can add or remove rules to control the devices and allow […]

Read More

Excluding devices using a mask (F-Secure) 0 (0)

You can exclude devices to which you do not want to apply any device access rules. Note: Device control is available only in Premium products. If you want to exclude, for example, all USB devices, instead of entering full device IDs, you can use a mask “USB\*” to filter the devices. To exclude devices using a […]

Read More

Setting up Device control (F-Secure) 0 (0)

You can set restrictions on how users can access USB devices (for example, web cams and hard disks) and whether removable mass storage devices are allowed to execute installers. To set up Device control: Under Profiles, select a profile. The Profile page opens. From the menu on the left, select Device control. Turn Device control on. Note: If Device control […]

Read More

Using Device control (F-Secure) 0 (0)

Device control blocks certain hardware devices to protect the network. It prevents malware from spreading to the network from external devices such as USB storage devices and DVD/CD-ROM drives. When a blocked device is plugged into the client computer, Device control turns it off to prevent access to it. Source : Official F-Secure Brand Editor […]

Read More

Scheduling scans (F-Secure) 0 (0)

Set the product to scan viruses and other harmful applications at regular times. To schedule a scan: Under Profiles, select Manual scanning > Scheduled scanning. Turn scheduled scanning on. Select how often you would like the scheduled scanning to run: Daily – scan every day Weekly – scan on selected days during the week Monthly – scan every month […]

Read More

Setting up DeepGuard (F-Secure) 0 (0)

DeepGuard provides extra security layers with both behavior-based and access control protection. It monitors applications to detect potentially harmful changes to the system. Note: We strongly recommend that you keep DeepGuard on, because it provides critical protection, for example, against ransomware. When DeepGuard is on, the following protections are on: Exploit protection Ransomware protection Heuristic analysis […]

Read More