EasyManua.ls Logo

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY User Manual

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #168 background imageLoading...
Page #168 background image
166
an alert if file differs
from baselined
information.
-d, --delete target ... Remove target[s] from the
known files list. A new baseline needs to
be generated after all file deletions have
been performed.
verify action reports
If --show-all is specified, then also clean files are reported, as
follows.
[ OK ] PRA /bin/ls
[ OK ] P.D /bin/chmod
Characters on second column tell how file is handled in integ-
rity checking. P implies Protected, R is for Report (send alert
for every access to this file if file differs from baselined), A is
Allow access even if differs from baseline, D means that
access is denied if file does not match with baselined infor-
mation. '.' on either P or R column means that Protection or
Reporting respectively is not enabled.
If a change is detected against the baseline, it is reported as
follows
[Note] .RA /bin/ls Hash does not match
baselined hash
[Note] .RA /bin/ls inode information
does not match baselined data

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the F-SECURE ANTI-VIRUS LINUX SERVER SECURITY and is the answer not in the manual?

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY Specifications

General IconGeneral
Product NameF-Secure Anti-Virus Linux Server Security
CategorySoftware
Real-time ProtectionYes
ManagementCentralized Management
TypeAntivirus
PlatformLinux
Operating System CompatibilityLinux
Protection TypeMalware Protection
Protection FeaturesReal-Time Scanning
Update MethodAutomatic Updates
LicensingSubscription-based
Supported DistributionsRed Hat Enterprise Linux, SUSE Linux Enterprise Server, Debian, Ubuntu

Summary

Introduction

Key Features and Benefits

Details the superior protection, heuristic scanning, riskware detection, and transparent end-user experience.

Deployment

Installation

System Requirements

Lists the operating systems, kernel, glibc, processor, memory, and disk space needed for installation.

Installation Instructions

Provides instructions for both stand-alone and centrally managed installations.

Upgrading from a Previous Product Version

Details the process and considerations for upgrading from earlier versions of F-Secure Anti-Virus.

Getting Started

Testing the Antivirus Protection

Describes how to test the antivirus protection using the EICAR test file.

User Interface - Advanced Mode

Virus Protection

Covers real-time, scheduled, and manual scanning, including actions on infection.

Firewall Protection

Explains firewall components, security profiles, rules, and network services.

Command Line Tools

Firewall Protection

Explains the 'fsfwc' command line tool for managing firewall security levels.

Integrity Checking

Covers command line tools like 'fsic' and 'fsims' for system integrity and baseline management.

Appendix E: Troubleshooting

User Interface

Addresses common issues related to logging in, the F-icon, and enabling debug logs.

Integrity Checking

Resolves issues with symlinks and large numbers of modified files for Integrity Checking.

Firewall

Troubleshoots access to samba shares, network browsing, and NFS server access.

Virus Protection

Details on enabling debug logs for real-time scanning and using HTTP proxy for updates.

Appendix F: Man Pages

fsav

Detailed manual page for the fsav command line interface.

fsavd

Manual page describing the F-Secure Anti-Virus daemon and its options.

dbupdate

Manual page for the dbupdate script used for virus definition database updates.

fsfwc

Manual page for the fsfwc command line interface for firewall daemon.

fsic

Manual page for the fsic command line interface for integrity checker.

Appendix G: Config Files

Related product manuals