EasyManua.ls Logo

F-SECURE LINUX SECURITY - Page 4

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Installing Command Line Scanner Only .....................................................................24
Using The Product With Samba Servers.....................................................................25
Creating a Backup .................................................................................................................27
Uninstallation .........................................................................................................................27
Chapter 4: Administering the Product ...........................................29
Basics of Using F-Secure Policy Manager ............................................................................30
Accessing the Web User Interface ........................................................................................30
Testing the Antivirus Protection .............................................................................................31
Chapter 5: Using the Product..........................................................33
Summary................................................................................................................................34
I Want to.......................................................................................................................34
Scanning for Viruses...............................................................................................................37
What are Viruses and Other Malware?........................................................................37
Stopping Viruses and Other Malware..........................................................................40
Methods of Protecting the Computer from Malware ...................................................42
Firewall Protection..................................................................................................................50
What Is a Firewall?......................................................................................................50
What Are Security Profiles?.........................................................................................51
Firewall Rules..............................................................................................................53
Firewall Settings...........................................................................................................56
Integrity Checking ..................................................................................................................57
Known Files List ..........................................................................................................57
Software Installation Mode ..........................................................................................59
Baseline.......................................................................................................................60
Rootkit Prevention .......................................................................................................61
General Settings ....................................................................................................................62
Alerts ...........................................................................................................................62
Automatic Updates ......................................................................................................65
F-Secure Policy Manager Proxies ..............................................................................66
About ...........................................................................................................................66
4 | F-Secure Linux Security | TOC

Table of Contents

Related product manuals