EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #50 background imageLoading...
Page #50 background image
3. Add directories that should be scanned to the Directories to scan box. Add one directory
per line.
4. Click Save task to add the scheduled scanning task into the schedule.
A scheduled scan can take several hours, so it is a good idea to run it when the system is idle,
for exampe during the night. Another alternative is to configure several scheduled scan tasks,
and to scan only some directories at one time.
Configure how alerts and reports are handled in the Alerts page.
Firewall Protection
The firewall protects the computer against unsafe Internet traffic as well as against attacks
originating from inside the local-area network.
The product:
Protects against intruders who try to access the computer without a permission. They may,
for example, try to steal personal information, such as files, passwords or credit card numbers.
Provides protection against information theft as unauthorized access attempts can be
prohibited and detected.
The firewall keeps the computer protected after the product is installed automatically.
What Is a Firewall?
The firewall protects the computer by allowing safe Internet traffic and blocking unsafe traffic.
Typically, the firewall allows all traffic from your computer to the Internet, but blocks all traffic
from the Internet to your computer unless you specifically allow it. By blocking the inbound traffic,
the firewall protects your computer against malicious software, such as worms, and prevents
intruders from accessing your computer.
The computer is protected with the predefined firewall settings. Usually, you do not have to
change them. However, you may have to change the settings, if you use a very strict security
level, or if you have added your own firewall rules or services.
Caution: Do not turn the firewall off. If you do, the computer is vulnerable to all network
attacks.
50 | F-Secure Linux Security | Using the Product

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals