10
Protection of Critical
System Files
› Critical information of system files is stored and automatically
checked before access is allowed.
› The administrator can protect files against changes so that it is
not possible to install, for example, a trojan version.
› The administrator can define that all Linux kernel modules are
verified before the modules are allowed to be loaded.
› An alert is sent to the administrator when a modified system file is
found.
Easy to Deploy and
Administer
› The default settings apply in most systems and the product can
be taken into use without any additional configuration.
› Security policies can be configured and distributed from one
central location.
Extensive Alerting
Options
› The product has extensive monitoring and alerting functions that
can be used to notify any administrator in the company network
about any infected content that has been found.
› Alerts can be forwarded to F-Secure Policy Manager Console,
e-mail and syslog.