Instructions on how to manage F-Secure Linux Protection using SolarWinds MSP. Monitoring a Linux device and the status of the F-Secure Linux Protection software in it requires that SolarWinds’s own Linux agent is running on the device. You can find the installation instructions in the Install a Linux agent section of the N-Central User Guide. Note: Automating the […]
Articles Tagged: F-Secure for windows
Integration with SolarWinds MSP RMM for Windows computers (F-Secure)
You can manage the Computer Protection and Server Protection for Windows software using SolarWinds MSP. For more information, see the SolarWinds MSP official documentation at: https://secure.n-able.com/webhelp/NC_11-0-0_en/Content/Help_20/Services/FSecure/Services_FSecureCentralMgmt.htm and https://secure.n-able.com/webhelp/NC_11-0-0_en/Content/Help_20/Automation/Policies/F_Secure/pol_FSecure_AV_Protection.htm. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Integration with Kaseya RMM for Linux computers (F-Secure)
Instructions on how to manage the F-Secure Linux Protection software using the Kaseya portal. To simplify the installation and monitoring of F-Secure Linux Protection using the Kaseya portal, you can use the following pre-created set of agent procedures: https://download.sp.f-secure.com/PSB/RMM/Kaseya/Kaseya_F-Secure_Linux_Procedures.xml. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team
Integration with Kaseya RMM for Windows computers (F-Secure)
Instructions on how to manage the F-Secure Computer Protection for Windows and the F-Secure Server Protection for Windows software using the Kaseya portal. To simplify a monitoring and management of F-Secure Computer Protection and F-Secure Server Protection from the Kaseya portal, you can use the following pre-created set of agent procedures: https://download.sp.f-secure.com/PSB/RMM/Kaseya/Kaseya_F-Secure.xml You first need to […]
Creating a new computer profile (F-Secure)
You can create profiles that can be assigned to specific computers. To create a new profile: Under Profiles > Computer Protection for Mac, select next to an existing profile, and select Clone profile. The Profile for Computer Protection page opens. Enter a name and description for the new profile. You can also select a label for the new profile. Make desired changes […]
Using F-Secure Endpoint Proxy with a Computer Protection profile
F-Secure Endpoint Proxy, also referred to as Policy Manager Proxy (PMP) is provided by F-Secure to minimize the bandwidth usage while downloading updates to Computer Protection clients. This proxy caches GUTS2 updates — the malware signature database. If the PMP is not available, Computer Protection clients automatically fall back to accessing GUTS2 directly. To configure […]
How do I move from KEY to ID PROTECTION on mobile devices? (F-Secure Windows)
This topic explains how you can move from KEY to ID PROTECTION on your mobile device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You are using F-Secure KEY on your mobile device. You have an ID PROTECTION subscription and […]
How do I move from KEY to ID PROTECTION on desktop devices? (F-Secure Windows)
This topic explains how you can move from KEY to ID PROTECTION on your desktop device. Note: These instructions do not apply to you if you have an F-Secure TOTAL subscription. These instructions apply to you in the following instances: You have previously used F-Secure KEY on a desktop device. You have an ID PROTECTION subscription […]
F-Secure ID PROTECTION replaces KEY in TOTAL. How do I take the new app into use with TOTAL? (Windows)
This topic only applies to you if you have a TOTAL subscription. A new app called ID PROTECTION has now replaced KEY in My F-Secure as part of our new offering to prevent identity theft. ID PROTECTION offers not only a password manager, but also email monitoring to keep track of data breaches and other […]
How can I remove F-Secure ID PROTECTION completely from a PC? (Windows)
Follow these instructions if you want to remove the app completely from your Windows computer. For the time being, the easiest way to remove ID PROTECTION completely from you computer is to use our Uninstallation Tool for Windows. To uninstall the product, do as follows: Go to the Support Tools webpage. Under Uninstallation tool for Windows, select Download. The FsUninsallationTool.exe file is […]