2
3.10 Uninstallation..............................................................................................................30
Chapter 4 Getting Started 31
4.1 Accessing the Web User Interface.............................................................................32
4.2 Basics of Using F-Secure Policy Manager.................................................................32
4.3 Testing the Antivirus Protection .................................................................................33
Chapter 5 User Interface - Basic Mode 34
5.1 Summary ...................................................................................................................35
5.2 Common Tasks..........................................................................................................36
Chapter 6 User Interface - Advanced Mode 37
6.1 Alerts..........................................................................................................................38
6.2 Virus Protection..........................................................................................................40
6.2.1 Real-Time Scanning.......................................................................................40
6.2.2 Scheduled Scanning.......................................................................................44
6.2.3 Manual Scanning............................................................................................44
6.3 Firewall Protection......................................................................................................49
6.3.1 General Settings.............................................................................................51
6.3.2 Firewall Rules.................................................................................................52
6.3.3 Network Services............................................................................................54
6.4 Integrity Checking ......................................................................................................57
6.4.1 Known Files....................................................................................................57
6.4.2 Verify Baseline................................................................................................61
6.4.3 Generate Baseline..........................................................................................61
6.4.4 Rootkit Prevention..........................................................................................63
6.5 General Settings ........................................................................................................64
6.5.1 Communications.............................................................................................64
6.5.2 Automatic Updates.........................................................................................66
6.5.3 About..............................................................................................................69
Chapter 7 Command Line Tools 70
7.1 Overview....................................................................................................................71
7.2 Virus Protection..........................................................................................................71
7.2.1 fsav.................................................................................................................71