EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #9 background imageLoading...
Page #9 background image
predefined security profiles which are tailored for common use cases to select the traffic you
want to allow and deny.
If an attacker gains a shell access to the system and tries to add a user account to login to
the system later, Host Intrusion Prevention System ( HIPS) detects modified system files and
alerts the administrator.
If an attacker has gained an access to the system and tries to install a userspace rootkit by
replacing various system utilities, HIPS detects modified system files and alerts the
administrator.
If an attacker has gained an access to the system and tries to install a kernel rootkit by loading
a kernel module for example through /sbin/insmod or /sbin/modprobe, HIPS detects
the attempt, prevents the unknown kernel module from loading and alerts the administrator.
If an attacker has gained an access to the system and tries to install a kernel rootkit by
modifying the running kernel directly via /dev/kmem, HIPS detects the attempt, prevents
write attempts and alerts the administrator.
Key Features and Benefits
The product offers superior protection against viruses and worms and is transparent to end-users.
Superior Protection against Viruses and Worms
The product scans files on any Linux-supported file system. This is the optimum solution for
computers that run several different operating systems with a multi-boot utility.
Scans files on any Linux-supported file system.
Note: The real-time scanning is not supported when using an NFS server, but other
scan methods work.
Superior detection rate with multiple scanning engines.
A heuristic scanning engine can detect suspicious, potentially malicious files.
The product can detect and categorize riskware items.
The product can be configured so that the users cannot bypass the protection.
Files are scanned for viruses when they are opened or closed and before they are executed.
You can specify what files to scan, how to scan them, what action to take when malicious
content is found and how to alert about the infections.
Recursive scanning of archive files.
Virus definition database updates are signed for security.
F-Secure Linux Security | Welcome | 9

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals