3.10 Uninstallation..............................................................................................................30
Chapter 4 Getting Started 31
4.1 Accessing the Web User Interface.............................................................................32
4.2 Basics of Using F-Secure Policy Manager.................................................................32
4.3 Testing the Antivirus Protection .................................................................................33
Chapter 5 User Interface - Basic Mode 34
5.1 Summary ...................................................................................................................35
5.2 Common Tasks..........................................................................................................36
Chapter 6 User Interface - Advanced Mode 37
6.1 Alerts..........................................................................................................................38
6.2 Virus Protection..........................................................................................................40
6.2.1 Real-Time Scanning.......................................................................................40
6.2.2 Scheduled Scanning.......................................................................................45
6.2.3 Manual Scanning............................................................................................46
6.3 Firewall Protection......................................................................................................51
6.3.1 General Settings.............................................................................................53
6.3.2 Firewall Rules.................................................................................................54
6.3.3 Network Services............................................................................................56
6.4 Integrity Checking ......................................................................................................59
6.4.1 Known Files....................................................................................................59
6.4.2 Verify Baseline................................................................................................63
6.4.3 Generate Baseline..........................................................................................63
6.4.4 Rootkit Prevention..........................................................................................65
6.5 General Settings ........................................................................................................66
6.5.1 Communications.............................................................................................66
6.5.2 Automatic Updates.........................................................................................68
6.5.3 About..............................................................................................................71
Chapter 7 Command Line Tools 72
7.1 Overview....................................................................................................................73
7.2 Virus Protection..........................................................................................................73
7.2.1 fsav.................................................................................................................73