EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #107 background imageLoading...
Page #107 background image
DescriptionElement
Officially assigned ports are available from:
ftp://ftp.iana.org/assignments/port-numbers
Integrity Checking
Following tables display the integrity checking settings.
Known Files
The following user interface controls appear on the Advanced User Interface Integrity
Checking Known Files page.
DescriptionElement
This table contains files that have been added
to integrity checking.
Known files
Rootkit Prevention
The following user interface controls appear on the Advanced User Interface Integrity
Checking Rootkit Prevention page.
DescriptionElement
When enabled, integrity checking will verifyKernel module verification
kernel modules before they are allowed to load.No
Only baselined and matching kernel modulesYes
Report are allowed to load.
If disabled, integrity checking will not perform
any checking for kernel modules.
If report only, integrity checking will check the
kernel modules against baselined information
but will only alert if kernel modules do not
F-Secure Linux Security | Advanced Web User Interface | 107

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals