F-Secure Linux Security Ii | Contents |

F-Secure Linux Security Ii | Contents |

F-Secure Linux Security ii | Contents | Contents Chapter 1: Welcome ......................................................................................5 1.1 How the product works .....................................................................................................................................6 1.1.1 Protection against malware ................................................................................................................6 1.1.2 Host Intrusion Prevention System ......................................................................................................6 1.2 Key features and benefits ..................................................................................................................................7 1.2.1 Superior protection against viruses and worms .................................................................................7 1.2.2 Transparent to end-users ...................................................................................................................7 1.2.3 Protection of critical system files ........................................................................................................7 1.2.4 Easy to deploy and administer ...........................................................................................................7 1.2.5 Extensive alerting options ..................................................................................................................7 Chapter 2: Deployment .................................................................................8 2.1 Deployment on multiple stand-alone Linux workstations ................................................................................9 2.2 Deployment on multiple centrally managed Linux workstations .....................................................................9 2.3 Central deployment using image files ..............................................................................................................9 Chapter 3: Installation .................................................................................10 3.1 System requirements ........................................................................................................................................11 3.1.1 List of used system resources ............................................................................................................11 3.2 Pre-installation checklist..................................................................................................................................12 3.2.1 Requirements for Amazon Linux distributions...................................................................................13 3.2.2 Requirements for CentOS and Red Hat Enterprise Linux distributions.............................................13 3.2.3 Requirements for Debian distributions.............................................................................................15 3.2.4 Requirements for Oracle Linux distributions....................................................................................16 3.2.5 Requirements for SUSE Linux Enterprise Server distributions...........................................................17 3.2.6 Requirements for Ubuntu distributions............................................................................................18 3.3 Stand-alone installation ...................................................................................................................................19 3.4 Policy Manager managed installation .............................................................................................................20 3.5 PSB managed installation..................................................................................................................................21 3.6 Upgrading........................................................................................................................................................21 3.6.1 Upgrading from a previous product version ....................................................................................21 3.6.2 Upgrading the evaluation version ....................................................................................................22 3.6.3 Upgrading PSB managed product to the newest version ................................................................22 3.7 Custom installations.........................................................................................................................................23 3.7.1 Preparing for custom installation......................................................................................................23 3.7.2 Unattended installation ....................................................................................................................23 3.7.3 Installing command line scanner only .............................................................................................24 3.7.4 Using the product with Samba servers.............................................................................................24 3.8 Creating a backup ...........................................................................................................................................25 3.9 Replacing the default web UI certificate..........................................................................................................26 | Contents | iii 3.10 Uninstallation ................................................................................................................................................26 Chapter 4: Administering the product .........................................................27 4.1 Basics of using F-Secure Policy Manager .........................................................................................................28 4.2 Accessing the web user interface ...................................................................................................................28 4.3 Configuring a proxy connection to download updates...................................................................................28 4.4 Downloading updates manually......................................................................................................................29 4.5 Testing the antivirus protection .....................................................................................................................29 Chapter 5: Administering the product ..........................................................30 5.1 Accessing the web user interface .....................................................................................................................31 5.2 Configuring a proxy connection to download updates....................................................................................31 5.3 Downloading updates manually.......................................................................................................................31 5.4 Testing the antivirus protection ......................................................................................................................32 Chapter 6: Using the product........................................................................33 6.1 Summary..........................................................................................................................................................34 6.1.1 I want to.............................................................................................................................................34 6.2 Scanning for viruses.........................................................................................................................................34 6.2.1 What are viruses and other malware?...............................................................................................34 6.2.2 Stopping viruses and other malware................................................................................................36 6.2.3 Methods of protecting the computer from malware ......................................................................37 6.3 Firewall protection...........................................................................................................................................43 6.3.1 What is a firewall?..............................................................................................................................43 6.3.2 What are security profiles?...............................................................................................................43 6.3.3 Firewall rules.....................................................................................................................................45 6.3.4 Firewall settings...............................................................................................................................47 6.4 Integrity checking ..........................................................................................................................................47 6.4.1 Known files list .................................................................................................................................48 6.4.2 Software installation mode .............................................................................................................50 6.4.3 Baseline............................................................................................................................................50

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    83 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us