You can create tickets on the Vulnerabilities page, as well as from the results of a system scan or web scan. Tickets in Elements Vulnerability Management allow you to track how the detected vulnerabilities are handled and mitigated. Each ticket can contain multiple vulnerabilities, which can be grouped, for example, based on either the target network segment […]
Articles Tagged: F-Secure for Home
Viewing tickets (F-Secure)
You can filter, sort, and view ticket details on the Tickets page. Go to the Tickets page. Tip: You can filter the tickets that you want to see listed on the page to get a more relevant view. Click the name of the ticket that you want to view. Each ticket contains several details: Ticket properties contains general information about the […]
Deleting reports (F-Secure)
You can delete both existing summary reports or summary report templates. Go to the Reports page. Go to either Summary reports or Templates tab. Select the items that you want to delete. The action bar opens. Click Delete. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Creating summary report templates (F-Secure)
Summary report templates give you an easy way to generate different summary reports that follow a uniform style. Go to the Reports page. Go to the Templates tab. Click the menu icon and select Add summary report template. Follow the steps in the wizard to specify the content to include in the report. Save the template. You can now use […]
Creating summary reports (F-Secure)
You can create your own report on the Reports page. Make sure that you are on the Summary reports tab. Click the menu icon and select Add Summary Report. Follow the steps in the wizard to specify the content to include in the report. Once the report is created, it is added to the list on the Summary Reports page. You can […]
Key-based authentication (recommended) (F-Secure)
The recommended way of authenticating to Linux systems is by using public/private keys. The following instructions describe how to create keys for authenticating and configure the F-Secure Elements Security Center for Linux authenticated scanning using keys. Log on to the Linux system with the F-Secure Elements Vulnerability Management user account and create a new key […]
Password-based authentication (F-Secure)
You need to configure all the Linux systems that should be scanned to allow password authentication over SSH. Make sure that the following line is present in the /etc/ssh/sshd_config file: PasswordAuthentication yes Run the following command: sudo passwd radar-user In the F-Secure Elements Security Center, go to Templates and open the Network scan templates tab. Create a new scan template or […]
Prepare the user account for Linux authenticated scanning (F-Secure)
To allow scan nodes to log on to Linux systems, it is recommended to create a specific user account on the systems that are used by the F-Secure Radar scan node to authenticate. Run the following command to create a new account: sudo useradd radar-user -m Add the following line to the /etc/sudoers file to avoid the […]
Upload encryption keys to F-Secure Radar scan node
After uploading the public key, you also need to upload the private key to the scan node that you want to use. Log in to the F-Secure Radar scan node. For Windows scan nodes: Start the F-Secure Radar Scan Node – Control Center. You can find this via the Start Menu after unfolding the nSense group, or by […]
Upload encryption keys to F-Secure Elements Security Center
Once the public/private key pair has been created, the public key can be uploaded to the F-Secure Elements Security Center. Log in to the F-Secure Elements Security Center. Go to Settings and then the General settings tab. Open Encryption keys and click Add encryption key. Specify a name and a description (optional) for the public key. Note: The name that you enter for […]