F-Secure Computer Protection for Mac 0 (0)

Instructions on installing and administering the F-Secure Computer Protection for Mac software. For more information, see the F-Secure Computer Protection for Mac user guide here. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team

Read More

Example: Preventing a vulnerable version from running (F-Secure) 0 (0)

To use Application control to prevent vulnerable applications from running, for example, to block an unpatched version, use a Target file version attribute. For example, a program had a vulnerability that was patched in version 1.2.4. To block any version older than 1.2.4 from running, do the following. Create the following exclusion rule: Give the […]

Read More

Adding exclusion rules (F-Secure) 0 (0)

You can add your own exclusion rules as follows: Select Add exclusion. Enter a name for the rule. From the Event drop-down menu, select the event that triggers the rule. The following table lists the available event types and when they are triggered. Event Description Application start Triggers when an executable file or script is launched. […]

Read More

Using Application control (F-Secure) 0 (0)

With Application control, you can set restrictions on which applications can run. To use Application control: Under Profiles, select a profile. In the Profile page that opens, select Application control. On the Application control page, turn Application control on or off. Note: By default, the Application control is on. Under Global rule, select one of the options: Allow all applications – if none […]

Read More

Application control (F-Secure) 0 (0)

Application control prevents execution and installation of applications, and prevents them from running scripts. Note: Application control is available only in F-Secure Computer Protection Premium for Windows and F-Secure Server Protection Premium for Windows. Application Control reduces the risks that malicious, illegal, and unauthorized software pose in the corporate environment. It provides the following features: Security […]

Read More

Tips for using DataGuard (F-Secure) 0 (0)

If a program runs from Program Files, it is not blocked; if the same program runs from AppData\Local for example, it is blocked by DataGuard. Therefore, we recommend that in Windows you install software programs under Program Files. Windows has built-in security measures that make it harder for malware distributors to get into that location. If a […]

Read More

Setting up DataGuard (F-Secure) 0 (0)

You can define the folders that DataGuard protects on managed computers, and add trusted applications that you do not want DataGuard to block. When DataGuard is turned on, untrusted applications and malware (including ransomware) cannot modify files in folders that you define as protected. To use DataGuard: Under Profiles, select a profile. In the Profile page that opens, […]

Read More

Using DataGuard (F-Secure) 0 (0)

The Computer Protection Premium and the Server Protection Premium subscriptions add the F-Secure DataGuard feature that prevents unexpected applications from modifying data. Note: DataGuard is available only in the Premium versions of the F-Secure Computer Protection for Windows and F-Secure Server Protection for Windows software. If you do not have a Premium subscription, the DataGuard feature […]

Read More

Managing Computer Protection Premium and Server Protection Premium (F-Secure) 0 (0)

F-Secure Computer Protection for Windows and F-Secure Server Protection for Windows have a new variant, F-Secure Computer Protection Premium and F-Secure Server Protection Premium. They include advanced security features. The first advanced security feature is DataGuard, which provides extra protection against threats, such as ransomware. Source : Official F-Secure Brand Editor by : BEST Antivirus […]

Read More

Setting up tamper protection (F-Secure) 0 (0)

You can set up tamper protection to protect the F-Secure installer and processes. Tamper protection protects the F-Secure installer against end user and third-party changes and the F-Secure services, processes, files, and registry entries against any controlling attempts. To set up the tamper protection: Under Profiles, select Computer Protection for Windows or Server Protection. The Profiles page opens. Select the profile […]

Read More