4. Add network interfaces to the Trusted network interfaces list and separate each entry with
a comma.
All traffic to trusted network interfaces is allowed.
Integrity Checking
Integrity Checking protects important system files against unauthorized modifications.
You can use Integrity Checking to block any modification attempts to protected files, regardless
of file system permissions.
Use Integrity Checking Wizards on the I want to... page to generate and verify the file system
baseline. The file system baseline guards your computer against unauthorized file changes. For
more integrity checking options, configure settings in the Advanced mode.
Integrity Checking works by comparing files on the disk to the baseline, which is a
cryptographically signed list of file properties. Integrity Checking can be configured to send alerts
to the administrator about modification attempts of the monitored files.
Known Files List
The Known Files List contains all files that the product monitors and protects.
The baseline is created from the Known Files List by reading the properties of the files in the
list and cryptographically signing the result. Integrity Checking compares this result to real-time
file accesses.
Note: The Known Files List in the Web User Interface shows only the baseline status that
is currently stored in the product. To view the actual, up-to-date file system status, use the
Verify baseline operation in Web User Interface or run the fsic command line utility.
Using the Known Files List Search
Use search filters to select files you want to view in the Known Files List.
1. Select files you want to view in the known files list.
• Select Modified and new to display all files that have been modified or added to the
baseline.
• Select Modified to display all files that have been modified.
• Select New to display all files that have been added to the baseline.
F-Secure Linux Security | Using the Product | 57