Installing Command Line Scanner Only .....................................................................24
Using The Product With Samba Servers.....................................................................25
Creating a Backup .................................................................................................................27
Uninstallation .........................................................................................................................27
Chapter 4: Administering the Product ...........................................29
Basics of Using F-Secure Policy Manager ............................................................................30
Accessing the Web User Interface ........................................................................................30
Testing the Antivirus Protection .............................................................................................31
Chapter 5: Using the Product..........................................................33
Summary................................................................................................................................34
I Want to.......................................................................................................................34
Scanning for Viruses...............................................................................................................37
What are Viruses and Other Malware?........................................................................37
Stopping Viruses and Other Malware..........................................................................40
Methods of Protecting the Computer from Malware ...................................................42
Firewall Protection..................................................................................................................50
What Is a Firewall?......................................................................................................50
What Are Security Profiles?.........................................................................................51
Firewall Rules..............................................................................................................53
Firewall Settings...........................................................................................................56
Integrity Checking ..................................................................................................................57
Known Files List ..........................................................................................................57
Software Installation Mode ..........................................................................................59
Baseline.......................................................................................................................60
Rootkit Prevention .......................................................................................................61
General Settings ....................................................................................................................62
Alerts ...........................................................................................................................62
Automatic Updates ......................................................................................................65
F-Secure Policy Manager Proxies ..............................................................................66
About ...........................................................................................................................66
4 | F-Secure Linux Security | TOC