EasyManua.ls Logo

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY User Manual

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #57 background imageLoading...
Page #57 background image
CHAPTER 6 55
If the profile contains more than 10 rules, use <<, <, > and >> arrows to
browse rules.
Add And Edit Rules
You can add a new firewall rule, for example, to allow access to a new
service in the network.
To add a new rule, click Add new rule below the list of rules.
When you edit the firewall rules, you should allow only the needed
services and deny all the rest to minimize the security risk.
Changing the order of the rules may affect all the other rules you
have created.
Type Choose whether the rule allows or denies the
service.
Remote host Enter details about target addresses. Enter the
IP address and the subnet in bit net mask
format. For example: 192.168.88.0/29.
You can use the following aliases as the target
address:
[myNetwork] - The local-area network.
[myDNS] - All configured DNS servers.
Description Enter a short description for the rule.
Services connected to this rule
Service Select services for which you want the rule to
apply. You can add multiple services to each
rule. Click Add Service to this rule after each
service you want to add. Each rule must have at
least one service.
If the rule contains a new service, make sure
you have saved the service list in the Network
Services page. For more information, see
Network Services, 56.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the F-SECURE ANTI-VIRUS LINUX SERVER SECURITY and is the answer not in the manual?

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY Specifications

General IconGeneral
Product NameF-Secure Anti-Virus Linux Server Security
CategorySoftware
Real-time ProtectionYes
ManagementCentralized Management
TypeAntivirus
PlatformLinux
Operating System CompatibilityLinux
Protection TypeMalware Protection
Protection FeaturesReal-Time Scanning
Update MethodAutomatic Updates
LicensingSubscription-based
Supported DistributionsRed Hat Enterprise Linux, SUSE Linux Enterprise Server, Debian, Ubuntu

Summary

Introduction

Key Features and Benefits

Details the superior protection, heuristic scanning, riskware detection, and transparent end-user experience.

Deployment

Installation

System Requirements

Lists the operating systems, kernel, glibc, processor, memory, and disk space needed for installation.

Installation Instructions

Provides instructions for both stand-alone and centrally managed installations.

Upgrading from a Previous Product Version

Details the process and considerations for upgrading from earlier versions of F-Secure Anti-Virus.

Getting Started

Testing the Antivirus Protection

Describes how to test the antivirus protection using the EICAR test file.

User Interface - Advanced Mode

Virus Protection

Covers real-time, scheduled, and manual scanning, including actions on infection.

Firewall Protection

Explains firewall components, security profiles, rules, and network services.

Command Line Tools

Firewall Protection

Explains the 'fsfwc' command line tool for managing firewall security levels.

Integrity Checking

Covers command line tools like 'fsic' and 'fsims' for system integrity and baseline management.

Appendix E: Troubleshooting

User Interface

Addresses common issues related to logging in, the F-icon, and enabling debug logs.

Integrity Checking

Resolves issues with symlinks and large numbers of modified files for Integrity Checking.

Firewall

Troubleshoots access to samba shares, network browsing, and NFS server access.

Virus Protection

Details on enabling debug logs for real-time scanning and using HTTP proxy for updates.

Appendix F: Man Pages

fsav

Detailed manual page for the fsav command line interface.

fsavd

Manual page describing the F-Secure Anti-Virus daemon and its options.

dbupdate

Manual page for the dbupdate script used for virus definition database updates.

fsfwc

Manual page for the fsfwc command line interface for firewall daemon.

fsic

Manual page for the fsic command line interface for integrity checker.

Appendix G: Config Files

Related product manuals