EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #59 background imageLoading...
Page #59 background image
1. Enter the filename of the file you want to monitor to the Filename field. If you want to add
more than one file, separate each filename with a space.
2. Select the protection method you want to use.
Select Monitor to only monitor the file. Monitored file may be modified.
Select Protect to deny all modifications of the file. The protected file can be opened but
it cannot be changed.
3. Select whether you want to prevent the access to the modified file.
Select Allow to allow the access to the modified file when it is executed or opened.
Select Deny to deny the access to the modified file. Modified files cannot be opened or
executed.
4. If you want to ignore changes to some attributes of the file, select one or more of the Ignored
Attributes checkboxes:
Mode: Changes to file permissions are ignored
User: Changes to file ownership are ignored
Group: Changes to file group are ignored
Size: Changes to file size are ignored
Modification time: Changes to file modification time are ignored
Hash: Changes to the content of the file are ignored
Note: Ignoring only the hash attribute is not usually desirable, since modifying file
contents usually changes the modification time and size as well.
5.
Click Add to known files to add the entry to the Known Files List.
Integrity checking does not protect new or modified files before you regenerate the baseline.
Regenerate the baseline to protect files you have added.
Note: You can add a single file or multiple files to the baseline at the same time.
Software Installation Mode
Use the Software Installation Mode when you want to modify system files and programs.
Integrity Checking prevents unauthorized and unwanted modifications of system files and
programs. When you update your operating system, apply a security update or install new
versions of software, you need to modify files that Integrity Checking monitors.
F-Secure Linux Security | Using the Product | 59

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals