
F-Secure Linux Security ii | Contents | Contents Chapter 1: Welcome ......................................................................................5 1.1 How the product works .....................................................................................................................................6 1.1.1 Protection against malware ................................................................................................................6 1.1.2 Host Intrusion Prevention System ......................................................................................................6 1.2 Key features and benefits ..................................................................................................................................7 1.2.1 Superior protection against viruses and worms .................................................................................7 1.2.2 Transparent to end-users ...................................................................................................................7 1.2.3 Protection of critical system files ........................................................................................................7 1.2.4 Easy to deploy and administer ...........................................................................................................7 1.2.5 Extensive alerting options ..................................................................................................................7 Chapter 2: Deployment .................................................................................8 2.1 Deployment on multiple stand-alone Linux workstations ................................................................................9 2.2 Deployment on multiple centrally managed Linux workstations .....................................................................9 2.3 Central deployment using image files ..............................................................................................................9 Chapter 3: Installation .................................................................................10 3.1 System requirements ........................................................................................................................................11 3.1.1 List of used system resources ............................................................................................................11 3.2 Pre-installation checklist..................................................................................................................................12 3.2.1 Requirements for Amazon Linux distributions...................................................................................13 3.2.2 Requirements for CentOS and Red Hat Enterprise Linux distributions.............................................13 3.2.3 Requirements for Debian distributions.............................................................................................15 3.2.4 Requirements for Oracle Linux distributions....................................................................................16 3.2.5 Requirements for SUSE Linux Enterprise Server distributions...........................................................17 3.2.6 Requirements for Ubuntu distributions............................................................................................18 3.3 Stand-alone installation ...................................................................................................................................19 3.4 Policy Manager managed installation .............................................................................................................20 3.5 PSB managed installation..................................................................................................................................21 3.6 Upgrading........................................................................................................................................................21 3.6.1 Upgrading from a previous product version ....................................................................................21 3.6.2 Upgrading the evaluation version ....................................................................................................22 3.6.3 Upgrading PSB managed product to the newest version ................................................................22 3.7 Custom installations.........................................................................................................................................23 3.7.1 Preparing for custom installation......................................................................................................23 3.7.2 Unattended installation ....................................................................................................................23 3.7.3 Installing command line scanner only .............................................................................................24 3.7.4 Using the product with Samba servers.............................................................................................24 3.8 Creating a backup ...........................................................................................................................................25 3.9 Replacing the default web UI certificate..........................................................................................................26 | Contents | iii 3.10 Uninstallation ................................................................................................................................................26 Chapter 4: Administering the product .........................................................27 4.1 Basics of using F-Secure Policy Manager .........................................................................................................28 4.2 Accessing the web user interface ...................................................................................................................28 4.3 Configuring a proxy connection to download updates...................................................................................28 4.4 Downloading updates manually......................................................................................................................29 4.5 Testing the antivirus protection .....................................................................................................................29 Chapter 5: Administering the product ..........................................................30 5.1 Accessing the web user interface .....................................................................................................................31 5.2 Configuring a proxy connection to download updates....................................................................................31 5.3 Downloading updates manually.......................................................................................................................31 5.4 Testing the antivirus protection ......................................................................................................................32 Chapter 6: Using the product........................................................................33 6.1 Summary..........................................................................................................................................................34 6.1.1 I want to.............................................................................................................................................34 6.2 Scanning for viruses.........................................................................................................................................34 6.2.1 What are viruses and other malware?...............................................................................................34 6.2.2 Stopping viruses and other malware................................................................................................36 6.2.3 Methods of protecting the computer from malware ......................................................................37 6.3 Firewall protection...........................................................................................................................................43 6.3.1 What is a firewall?..............................................................................................................................43 6.3.2 What are security profiles?...............................................................................................................43 6.3.3 Firewall rules.....................................................................................................................................45 6.3.4 Firewall settings...............................................................................................................................47 6.4 Integrity checking ..........................................................................................................................................47 6.4.1 Known files list .................................................................................................................................48 6.4.2 Software installation mode .............................................................................................................50 6.4.3 Baseline............................................................................................................................................50
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages83 Page
-
File Size-