EasyManua.ls Logo

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY User Manual

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #169 background imageLoading...
Page #169 background image
CHAPTER F 167
So even if inode data is changed Hash might be same (touch
on a file will change inode data) however IF hash is changed
and inode data is still same then file contents has been modi-
fied and it's mtime set back to what it was with utime() (man 2
utime).
If --show-details is specified, then deviations against baseline
are reported as follows
[Note] ( RA) /bin/ls Hash does not match
baselined hash
[Note] ( RA) /bin/ls inode information
does not match baselined data
mode:uid:gid:len:mtime hash
Old
81ed:0:0:31936:1096007887
e2c2f03d5460690211fa497592543371
Now
81ed:0:0:31940:1096388689
08c4eae2cf02c4214ba48cb89197aa66
If no deviations are found and --show-all is also specified
then following will be reported
[ OK ] ( RA) /bin/ls
(81ed:0:0:620676:1077202297)
baseline action reports
When --baseline is specified the integrity checker will recalcu-

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the F-SECURE ANTI-VIRUS LINUX SERVER SECURITY and is the answer not in the manual?

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY Specifications

General IconGeneral
Product NameF-Secure Anti-Virus Linux Server Security
CategorySoftware
Real-time ProtectionYes
ManagementCentralized Management
TypeAntivirus
PlatformLinux
Operating System CompatibilityLinux
Protection TypeMalware Protection
Protection FeaturesReal-Time Scanning
Update MethodAutomatic Updates
LicensingSubscription-based
Supported DistributionsRed Hat Enterprise Linux, SUSE Linux Enterprise Server, Debian, Ubuntu

Summary

Introduction

Key Features and Benefits

Details the superior protection, heuristic scanning, riskware detection, and transparent end-user experience.

Deployment

Installation

System Requirements

Lists the operating systems, kernel, glibc, processor, memory, and disk space needed for installation.

Installation Instructions

Provides instructions for both stand-alone and centrally managed installations.

Upgrading from a Previous Product Version

Details the process and considerations for upgrading from earlier versions of F-Secure Anti-Virus.

Getting Started

Testing the Antivirus Protection

Describes how to test the antivirus protection using the EICAR test file.

User Interface - Advanced Mode

Virus Protection

Covers real-time, scheduled, and manual scanning, including actions on infection.

Firewall Protection

Explains firewall components, security profiles, rules, and network services.

Command Line Tools

Firewall Protection

Explains the 'fsfwc' command line tool for managing firewall security levels.

Integrity Checking

Covers command line tools like 'fsic' and 'fsims' for system integrity and baseline management.

Appendix E: Troubleshooting

User Interface

Addresses common issues related to logging in, the F-icon, and enabling debug logs.

Integrity Checking

Resolves issues with symlinks and large numbers of modified files for Integrity Checking.

Firewall

Troubleshoots access to samba shares, network browsing, and NFS server access.

Virus Protection

Details on enabling debug logs for real-time scanning and using HTTP proxy for updates.

Appendix F: Man Pages

fsav

Detailed manual page for the fsav command line interface.

fsavd

Manual page describing the F-Secure Anti-Virus daemon and its options.

dbupdate

Manual page for the dbupdate script used for virus definition database updates.

fsfwc

Manual page for the fsfwc command line interface for firewall daemon.

fsic

Manual page for the fsic command line interface for integrity checker.

Appendix G: Config Files

Related product manuals