All about F-Secure 5 (1)

F-Secure for Home Security description (F-Secure) Use case: track assets coming from a custom source (for example Active Directory) (F-Secure). Use case: search discovered hosts (F-Secure) Use case: export web scan findings (F-Secure) Use case: export system scan findings (F-Secure) Use case: export system scan findings in XML format (F-Secure) Use case: check for vulnerabilities […]

Read More

Create a Windows domain account (F-Secure) 0 (0)

To create a new domain account, you may use the command given here, which must be executed using administrator credentials. Log in as an administrator and open a command prompt with administrative privileges. Adjust the following command so it fits your organization and execute it: dsadd user “cn=radar_account,cn=users,dc=ORGANIZATION,dc=COM” -samid \ radar_account -upn [email protected] -pwd PASSWORD […]

Read More

Configuring Windows authenticated scanning (RPC) (F-Secure) 0 (0)

Before applying changes, F-Secure recommends that you discuss all potential changes to the Group Policy with your network administrator. For more information about Group Policy, refer to your Microsoft documentation on Group Policy deployment. The following summarizes the requirements for enabling authenticated scanning for Windows: A user account must meet one of the following requirements: […]

Read More

F-Secure PSB Computer Protection for Windows 0 (0)

For details on the latest release of Computer Protection for Windows, see the change log on F-Secure Community. Supported platforms Computer Protection for Windows supports the following operating system versions: Microsoft Windows 11 (all 32-bit and 64-bit editions), ARM-based tablets are not supported Microsoft Windows 10 (LTSC) version 1607 Microsoft Windows 10 (LTSC) version 1809 Microsoft […]

Read More

Simple test with Windows system tools (F-Secure Endpoint) 0 (0)

You can use this simple test to generate a monitored event on the endpoint to make sure that the Sensor is installed and working correctly. To run the test, follow these instructions: Log in to the monitored endpoint where you have deployed the sensor. Open the command prompt. Run the command to create a monitored […]

Read More

Installing the F-Secure Elements Endpoint Detection and Response client software for Windows 0 (0)

Instructions on how to install the sensor client on a Windows computer. To install the product: Log in to the F-Secure Elements EPP portal. Note: Alternatively, you can download the installation file without logging in by selecting the Downloads link on the login page. You need to have a subscription key for the product. Select Downloads on the sidebar. The Downloads page […]

Read More

How to reinitialize the installed Computer Protection software? (F-Secure) 0 (0)

The fs_oneclient_logout tool allows you to log out from F-Secure Computer Protection so that you can re-enter the subscription key to connect a device to the correct company in the management portal. The fs_oneclient_logout tool allows you to log out from F-Secure Computer Protection so that you can re-enter the subscription key to connect a device to the correct […]

Read More

WMI classes in the Windows registry (F-Secure) 0 (0)

All the WMI classes described in this section are also reflected to the Windows registry. The classes can be found under the following path: for 64-bit systems: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\F-Secure\Monitoring for 32-bit systems: HKEY_LOCAL_MACHINE\SOFTWARE\F-Secure\Monitoring Note: The WMI Provider setting must be turned on in the F-Secure Elements EPP portal for this registry key to appear. Source : Official F-Secure Brand […]

Read More

Integration with Datto RMM for Windows computers (F-Secure) 0 (0)

Information about the components that you can use to install and manage F-Secure Computer Protection for Windows using the Datto platform. The Datto’s online components repository (ComStore) contains the following F-Secure components: Deploy F-Secure Computer Protection [WIN] Use this scripting component to install F-Secure Computer Protection on target computers. You need provide a valid license […]

Read More