Integration with Kaseya RMM for Mac computers (F-Secure) 0 (0)

Instructions on how to manage the F-Secure Computer Protection for Mac software using the Kaseya portal. To manually install the Kaseya agent to a remote computer: Log in to the Kaseya portal. Select Agent > Packages > Manage Packages to download the agent package. Note: The full filename for a Macintosh agent install package is KcsSetup.app. The package is downloaded as a KcsSetup.zip file that […]

Read More

Integration with Kaseya RMM for Windows computers (F-Secure) 0 (0)

Instructions on how to manage the F-Secure Computer Protection for Windows and the F-Secure Server Protection for Windows software using the Kaseya portal. To simplify a monitoring and management of F-Secure Computer Protection and F-Secure Server Protection from the Kaseya portal, you can use the following pre-created set of agent procedures: https://download.sp.f-secure.com/PSB/RMM/Kaseya/Kaseya_F-Secure.xml You first need to […]

Read More

Using third-party RMM tools (F-Secure) 0 (0)

F-Secure Elements EPP supports the integration of third-party Remote Monitoring and Management (RMM) tools. Deploy the MSI packages and monitor your system through the RMM tools, and manage the system through the portal. Deploy and manage your system through the portal, and monitor the system through the RMM tools. Note: The current version of F-Secure Elements […]

Read More

Removing devices (F-Secure) 0 (0)

Instructions on how to remove devices. You can remove devices in the following ways: With the Move to blocklist option, you can remove one or more devices at once. The devices are moved to a blocklist and are no longer visible in the portal. Note: The blocklist is a list that contains devices that have been in a […]

Read More

Isolating devices from network (F-Secure) 0 (0)

You can isolate one or more devices from the network. Note: Network isolation does not apply to mobile devices. To isolate a device from the network: Note: Use network isolation with caution and only in case of a network attack. On the Devices page, select the devices that you want to isolate from the network. Select Network isolation > Isolate from network. […]

Read More

Filtering security events (F-Secure) 0 (0)

You can filter the security events shown in the Security events (PILOT) page. To filter security events: On the Security events PILOT page, select . The Filters pane opens. From the Filter drop-down menu, select one of the two filtering options: Severity Source From the Value drop-down menu, select one of the following: Severity – the following severity levels are available: Information; Attention; Action needed. Source – a […]

Read More

Viewing security events (F-Secure) 0 (0)

The Security events (PILOT) page shows all the security events in the system. Note: The feature is in a pilot phase, but available for everyone. To view security events: Select Security events (PILOT) on the sidebar. Note: You can use the scope selector to select the company for which you want to view the security events. The Security events (PILOT) page […]

Read More

Viewing more details of a device’s protection status (F-Secure) 0 (0)

To view more details of a specific device: Click Devices on the sidebar. If the scope selector is set to display all customer companies, select the company you wish to manage. The Devices page is displayed. On the Devices page, click on either Computers or Mobile devices. A table is displayed containing details of devices matching the selected type. You can change the table […]

Read More

Viewing a device’s protection status (F-Secure) 0 (0)

You can find more information about each individual computer or mobile device added to your F-Secure Elements EPP account, including its protection status, subscription details, device information, installed software and statistics. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team

Read More

Searching for mobile devices (F-Secure) 0 (0)

You can use various search criteria to find mobile devices. The mobile device search uses the following information to match your search string: Device owner Subscription key Device key IMEI code Phone number Operator name Software version Device type To search for a mobile device: Under Devices > Mobile devices, enter some text in the Search field. Tip: You can use […]

Read More