Firewall configuration (F-Secure) 0 (0)

When Windows Firewall is on, its user and network rules are applied to the devices. F-Secure Firewall profiles provide an additional security layer on top of the Windows Firewall user rules and other domain rules. The F-Secure firewall profiles or rules are not applied if Windows Firewall is off. Therefore, we recommend that you always […]

Read More

Finding the hardware ID for a device (F-Secure) 0 (0)

You can use the hardware ID with blocking rules. Follow these instructions to find the hardware ID with Windows Device Manager: Open Windows Device Manager in the client computer. Find the correct device in the list. Tip: Expand the device type to see all the devices. Right-click the device and select Properties. Go to Details tab. Select one of the following […]

Read More

Blocking hardware devices (F-Secure) 0 (0)

You can block the access to devices with predefined rules. By default, rules do not block any devices. To block devices, follow these instructions. Under Profiles, select a profile. The Profile page opens. From the menu on the left, select Device control. Under Device access rules, you can add or remove rules to control the devices and allow […]

Read More

Excluding devices using a mask (F-Secure) 0 (0)

You can exclude devices to which you do not want to apply any device access rules. Note: Device control is available only in Premium products. If you want to exclude, for example, all USB devices, instead of entering full device IDs, you can use a mask “USB\*” to filter the devices. To exclude devices using a […]

Read More

Setting up Device control (F-Secure) 0 (0)

You can set restrictions on how users can access USB devices (for example, web cams and hard disks) and whether removable mass storage devices are allowed to execute installers. To set up Device control: Under Profiles, select a profile. The Profile page opens. From the menu on the left, select Device control. Turn Device control on. Note: If Device control […]

Read More

Using Device control (F-Secure) 0 (0)

Device control blocks certain hardware devices to protect the network. It prevents malware from spreading to the network from external devices such as USB storage devices and DVD/CD-ROM drives. When a blocked device is plugged into the client computer, Device control turns it off to prevent access to it. Source : Official F-Secure Brand Editor […]

Read More

Scheduling scans (F-Secure) 0 (0)

Set the product to scan viruses and other harmful applications at regular times. To schedule a scan: Under Profiles, select Manual scanning > Scheduled scanning. Turn scheduled scanning on. Select how often you would like the scheduled scanning to run: Daily – scan every day Weekly – scan on selected days during the week Monthly – scan every month […]

Read More

Setting up DeepGuard (F-Secure) 0 (0)

DeepGuard provides extra security layers with both behavior-based and access control protection. It monitors applications to detect potentially harmful changes to the system. Note: We strongly recommend that you keep DeepGuard on, because it provides critical protection, for example, against ransomware. When DeepGuard is on, the following protections are on: Exploit protection Ransomware protection Heuristic analysis […]

Read More

Using F-Secure Endpoint Proxy with a Computer Protection profile 0 (0)

F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading updates to Computer Protection clients. This proxy caches GUTS2 updates — the malware signature database. If the PMP is not available, Computer Protection clients automatically fall back to accessing GUTS2 directly. To configure […]

Read More

Replacing data in tables (F-Secure) 0 (0)

Instructions on how to replace data in tables. When you select Replace from file (JSON), all the existing values in the table are deleted and replaced with the values in the .json file. Select Profiles on the sidebar. Select the desired profile. On the Profile page, select the relevant setting, and make sure the setting is turned on. To replace […]

Read More