F-Secure Internet Security 2012
|
|
|
- Bethanie Rose
- 10 years ago
- Views:
Transcription
1 F-Secure Internet Security 2012
2
3 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection settings...8 Check the status of Real-time Protection Network...9 How to see what the product has done...9 View notification history...9 Change the notification settings...9 Real-time Protection Network...10 What is Real-time Protection Network...10 Real-time Protection Network benefits...10 What data you contribute...11 How we protect your privacy...12 Becoming a Real-time Protection Network contributor...12 Questions about Real-time Protection Network...12 How do I know that my subscription is valid...13 Activate a subscription...13 Chapter 2: Protecting the computer against malware...15 What are viruses and other malware...16 Viruses...16 Spyware...16 Rootkits...16 Riskware...17 How to scan my computer...17 Scan for malware...17 Scan at set times...19 Scan manually...20 Select files that are scanned...22 Select the action when something is found...25 View virus and spyware history...28 What is DeepGuard...28 How does DeepGuard work...28 How to turn DeepGuard on...29 Allow programs that DeepGuard has blocked...29 How to turn off advanced process monitoring...29 Protect against harmful system changes...30 How to see what DeepGuard has done...31 How to use the quarantine...31
4 4 F-Secure Internet Security 2012 TOC View quarantined items...31 Restore quarantined items...32 Change the mobile broadband settings...32 Suspended security updates...33 Chapter 3: Securing network connections...35 What is a firewall...36 What are firewall profiles...36 What are firewall rules and services...37 How to allow or block network traffic through the firewall...41 What to do if a firewall alert appears...41 How to create firewall services and rules...42 How to open a port through the firewall...46 Examples of creating firewall rules...46 Turn a firewall rule on or off...48 Change a firewall rule...49 Firewall settings...49 How to control network applications...51 What to do if an application control pop-up appears...51 Allow or deny connections for programs...52 Turn application control pop-ups on or off...53 What to do if a program stops working...53 How to prevent intruders...54 Select how intrusion attempts are handled...54 How to control dial-up connections...55 What to do if a dial-up control pop-up appears...55 Edit allowed phone numbers...56 View programs that are allowed to close dial-up connections...57 View dial-up connection attempts...57 What to do if you cannot access the Internet...57 Where to find firewall alerts and log files...58 View firewall alerts...58 View the action log...59 Chapter 4: Block spam...63 Set up my programs to filter spam...64 Microsoft programs...64 Netscape and Mozilla Thunderbird programs...65 Opera program...66 Eudora program...67 What if I receive a lot of spam...69 What are spam and phishing filtering levels...69 Change spam and phishing filtering level...70
5 F-Secure Internet Security 2012 TOC 5 Reset spam and phishing learning system...70 Set the port for protocols...70 Allow and block messages from specific addresses...71 Edit addresses I trust...71 Block messages from specific addresses...72 Protect against phishing attempts...73 Chapter 5: Using the Internet safely...75 How to run common tasks...76 How to protect your family members...76 Creating and editing Windows user accounts...76 What is browsing protection...76 How to turn browsing protection on or off...76 Browsing protection safety ratings...77 Protect against harmful content...78 What to do when a web site is blocked...78 Security summary for a web site...78 Making browsing safe for children...79 Limit access to web content...79 How to schedule browsing time...80 Restrict daily Internet browsing time...80 Viewing statistics...81
6 6 F-Secure Internet Security 2012 TOC
7 Chapter 1 Getting started Topics: How to use automatic updates How to see what the product has done Real-time Protection Network How do I know that my subscription is valid Information about how to get started with the product. This section describes how to change common settings and manage your subscriptions through the launch pad. The launch pad's common settings are settings that apply to all of the programs installed on the launch pad. Instead of changing the settings separately in each program, you can simply edit the common settings, which are then used by all of the installed programs. The launch pad's common settings include: Downloads, where you can view information about what updates have been downloaded and manually check if new updates are available. Connection settings, where you can change how your computer connects to the Internet. Notifications, where you can view past notifications and set what kind of notifications you want to see. Privacy settings, where you can select whether or not your computer is allowed to connect to the Real-time Protection Network. You can also manage your subscriptions for installed programs through the launch pad.
8 8 F-Secure Internet Security 2012 Getting started How to use automatic updates Automatic updates keeps the protection on your computer updated. The product retrieves the latest updates to your computer when you are connected to the Internet. It detects the network traffic and does not disturb other Internet use even with a slow network connection. Check the update status View the date and time of the latest update. When automatic updates are turned on, the product receives the latest updates automatically when you are connected to the Internet. To make sure that you have the latest updates: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Downloads. 4. Click Check now. The product connects to the Internet and checks for the latest updates. If the protection is not up-to-date, it retrieves the latest updates. Note: If you are using a modem, or have an ISDN connection to the Internet, the connection must be active to check for updates. Change the Internet connection settings Usually there is no need to change the default settings, but you can configure how the server is connected to the Internet so that you can receive updates automatically. To change the Internet connection settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Connection. 4. On the Internet connection list, select how your computer is connected to the Internet. Select Assume always connected if you have a permanent network connection. Note: If your computer does not actually have the permanent network connection and is set up for dial-on-demand, selecting Assume always connected can result in multiple dial-ups. Select Detect connection to retrieve updates only when the product detects an active network connection. Select Detect traffic to retrieve updates only when the product detects other network traffic. Tip: If you have an uncommon hardware configuration that causes the Detect connection setting to detect an active network connection even when there is none, select Detect traffic instead. 5. On the HTTP proxy list, select whether or not your computer uses a proxy server to connect to the Internet. Select No HTTP proxy if your computer is connected to the Internet directly.
9 F-Secure Internet Security 2012 Getting started 9 Select Manually configure HTTP proxy to configure the HTTP proxy settings. Select Use my browser's HTTP proxy to use the same HTTP proxy settings that you have configured in your web browser. Check the status of Real-time Protection Network To function properly, many product features depend on the Real-time Protection Network connectivity. If there are network problems or if your firewall blocks Real-time Protection Network traffic, the status is 'disconnected'. If no product features are installed that require access to Real-time Protection Network, the status is 'not in use'. To check the status: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Connection. Under Real-time Protection Network, you can see the current status of Real-time Protection Network. How to see what the product has done You can see what actions the product has taken to protect your computer on the Notifications page. The product will show a notification when it takes an action, for example when it finds a virus that it blocks. Some notifications may also be sent by your service provider, for example to let you know about new services that are available. View notification history You can see what notifications have been displayed in the notification history To view the notification history: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Notifications. 4. Click Show notification history. The notification history list opens. Change the notification settings You can select what type of notifications you want the product to display. To change the notification settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Notifications. 4. Select or clear Allow program messages to turn program messages on or off. When this setting is turned on, the product will show notifications from the installed programs.
10 10 F-Secure Internet Security 2012 Getting started 5. Select or clear Allow promotional messages to turn promotional messages on or off. 6. Click OK. Real-time Protection Network This document describes Real-time Protection Network, an online service from F-Secure Corporation that identifies clean applications and web sites while providing protection against malware and web site exploits. What is Real-time Protection Network Real-time Protection Network is an online service which provides rapid response against the latest Internet-based threats. As a contributor to Real-time Protection Network, you can help us to strengthen the protection against new and emerging threats. Real-time Protection Network collects statistics of certain unknown, malicious or suspicious applications and what they do on your device. This information is anonymous and sent to F-Secure Corporation for combined data analysis. We use the analyzed information to improve the security on your device against the latest threats and malicious files. How Real-time Protection Network works As a contributor to Real-time Protection Network, you can provide information on unknown applications and web sites and on malicious applications and exploits on web sites. Real-time Protection Network does not track your web activity or collect information on web sites that have been analyzed already, and it does not collect information on clean applications that are installed on your computer. If you do not want to contribute this data, Real-time Protection Network does not collect information of installed applications or visited web sites. However, the product needs to query F-Secure servers for the reputation of applications, web sites, messages and other objects. The query is done using a cryptographic checksum where the queried object itself is not sent to F-Secure. We do not track data per user; only the hit counter of the file or web site is increased. It is not possible to completely stop all network traffic to Real-time Protection Network, as it is integral part of the protection provided by the product. Real-time Protection Network benefits With Real-time Protection Network, you will have faster and more accurate protection against the latest threats and you will not receive unnecessary alerts for suspicious applications which are not malicious. As a contributor to Real-time Protection Network, you can help us to find new and undetected malware and remove possible false positives from our virus definition database. All participants in Real-time Protection Network help each other. When Real-time Protection Network finds a suspicious application on your device, you benefit from the analysis results when the same application has been found on other devices already. Real-time Protection Network improves the overall performance of your device, as the installed security product does not need to scan any applications that Real-time Protection Network has already analyzed and found clean. Similarly, information about malicious websites and unsolicited bulk messages is shared through Real-time Protection Network, and we are able to provide you with more accurate protection against web site exploits and spam messages. The more people that contribute to Real-time Protection Network, the better individual participants are protected.
11 F-Secure Internet Security 2012 Getting started 11 What data you contribute As a contributor to Real-time Protection Network, you provide information on applications stored on your device and the web sites that you visit so that Real-time Protection Network can provide the protection against the latest malicious applications and suspicious web sites. Analyzing the file reputation Real-time Protection Network collects information only on applications that do not have a known reputation and on files that are suspicious or known to be malware. Real-time Protection Network collects anonymous information of clean and suspicious applications on your device. Real-time Protection Network collects information of executable files only (such as Portable Executable files on the Windows platform, which have.cpl,.exe,.dll,.ocx,.sys,.scr, and.drv file extensions). Collected information includes: the file path where the application is in your device, the size of the file and when it was created or modified, file attributes and privileges, file signature information, the current version of the file and the company that created it, the file origin or its download URL, F-Secure DeepGuard and anti-virus analysis results of scanned files, and other similar information. Real-time Protection Network never collects any information of your personal documents, unless they have found to be infected. For any type of malicious file, it collects the name of the infection and the disinfection status of the file. With Real-time Protection Network, you can also submit suspicious applications for analysis. Applications that you submit include Portable Executable files only. Real-time Protection Network never collects any information of your personal documents and they are never automatically uploaded for analysis. Submitting files for analysis With Real-time Protection Network, you can also submit suspicious applications for analysis. You can submit individual suspicious applications manually when the product prompts you to do so. You can only submit Portable Executable files. Real-time Protection Network never uploads your personal documents. Analyzing the web site reputation Real-time Protection Network does not track your web activity or collect information on web sites that have been analyzed already. It makes sure that visited web sites are safe as you browse the web. When you visit a web site, Real-time Protection Network checks its safety and notifies you if the site is rated as suspicious or harmful. If the web site that you visit contains malicious or suspicious content or a known exploit, Real-time Protection Network collects the whole URL of the site so that the web page content can be analyzed. If you visit a site that has not been rated yet, Real-time Protection Network collects domain and subdomain names, and in some cases the path to the visited page, so that the site can be analyzed and rated. All the URL parameters that are likely to contain information that can be linked to you in a personally identifiable format are removed to protect your privacy. Note: Real-time Protection Network does not rate or analyze web pages in private networks, so it never collects any information on private IP network addresses (for example, corporate intranets).
12 12 F-Secure Internet Security 2012 Getting started Analyzing the system information Real-time Protection Network collects the name and version of your operating system, information about the Internet connection and the Real-time Protection Network usage statistics (for example, the number of times web site reputation has been queried and the average time for the query to return a result) so that we can monitor and improve the service. How we protect your privacy We transfer the information securely and automatically remove any personal information that the data may contain. Real-time Protection Network removes identifying data before sending it to F-Secure and it encrypts all collected information during the transfer to protect it from unauthorized access. The collected information is not processed individually; it is grouped with information from other Real-time Protection Network contributors. All data is analyzed statistically and anonymously, which means that no data will be connected to you in any way. Any information that might identify you personally is not included in the collected data. Real-time Protection Network does not collect IP addresses or other private information, such as addresses, user names and passwords. While we make every effort to remove all personally identifiable data, it is possible that some identifying data remains in the collected information. In such cases, we will not seek to use such unintentionally collected data to identify you. We apply strict security measures and physical, administrative and technical safeguards to protect the collected information when it is transferred, stored and processed. Information is stored in secured locations and on servers that are controlled by us, located either at our offices or at the offices of our subcontractors. Only authorized personnel can access the collected information. F-Secure may share the collected data with its affiliates, sub-contractors, distributors and partners, but always in a non-identifiable, anonymous format. Becoming a Real-time Protection Network contributor You help us to improve the Real-time Protection Network protection by contributing information of malicious programs and web sites. You can choose to be participate in Real-time Protection Network during the installation. With the default installation settings, you contribute data to Real-time Protection Network. You can change this setting later in the product. Follow these instructions to change Real-time Protection Network settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Privacy. 4. Check the participation check box to become a Real-time Protection Network contributor. Questions about Real-time Protection Network Contact information for any questions about Real-time Protection Network. If you have any further questions about Real-time Protection Network, please contact: F-Secure Corporation Tammasaarenkatu 7 PL 24
13 F-Secure Internet Security 2012 Getting started Helsinki Finland The latest version of this policy is always available on our web site. How do I know that my subscription is valid Your subscription type and status are shown on the Subscription status page. When the subscription is about to expire or if your subscription has expired, the overall protection status of the program on the corresponding launchpad icon changes. To check your subscription validity: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select View my subscriptions. 3. Select Subscription status to view information about your subscriptions for installed programs. 4. Select Installation status to see what programs are available to be installed. Your subscription status and expiry date are also shown on the program's Statistics page. If your subscription has expired, you need to renew your subscription to continue receiving updates and using the product. Note: When your subscription has expired, the product status icon is blinking on your system tray. Activate a subscription When you have a new subscription key or campaign code for a product, you need to activate it. To activate a subscription: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select View my subscriptions. 3. Choose one of the following: Click Activate subscription. Click Activate campaign code. 4. In the dialog box that opens, enter your new subscription key or campaign code and click OK. Tip: If you received your subscription key by , you can copy the key from the message and paste it into the field. After you have entered the new subscription key, the new subscription validity date is shown on the Subscription status page.
14
15 Chapter 2 Protecting the computer against malware Topics: What are viruses and other malware How to scan my computer What is DeepGuard How to use the quarantine Change the mobile broadband settings Virus and spyware scanning protects the computer from programs that may steal personal information, damage the server, or use it for illegal purposes. By default, all malware types are immediately handled when they are found, so that they can cause no harm. By default, Virus and spyware scanning scans your local hard drives, any removable media (such as portable drives or compact disks) and downloaded content automatically. You can set it to scan your s automatically as well. Virus and spyware scanning also watches your computer for any changes that may indicate malware. If any dangerous system changes, for example system settings or attempts to change important system processes are found, DeepGuard stops this program from running as it is likely to be malware.
16 16 F-Secure Internet Security 2012 Protecting the computer against malware What are viruses and other malware Malware are programs specifically designed to damage your computer, use your computer for illegal purposes without your knowledge, or steal information from your computer. Malware can: take control over your web browser, redirect your search attempts, show unwanted advertising, keep track on the web sites you visit, steal personal information such as your banking information, use your computer to send spam, and use your computer to attack other computers. Malware can also cause your computer to become slow and unstable. You may suspect that you have some malware on your computer if it suddenly becomes very slow and crashes often. Viruses Viruses are usually programs that can attach themselves to files and replicate themselves repeatedly; they can alter and replace the contents of other files in a way that may damage your computer. A virus is a program that is normally installed without your knowledge on your computer. Once there, the virus tries to replicate itself. The virus: uses some of your computer's system resources, may alter or damage files on your computer, probably tries to use your computer to infect other computers, may allow your computer to be used for illegal purposes. Spyware Spyware are programs that collect your personal information. Spyware may collect personal information including: Internet sites you have browsed, addresses from your computer, passwords, or credit card numbers. Spyware almost always installs itself without your explicit permission. Spyware may get installed together with a useful program or by tricking you into clicking an option in a misleading pop-up window. Rootkits Rootkits are programs that make other malware difficult to find. Rootkits hide files and processes. In general, they do this to hide malicious activity on your computer. When a rootkit is hiding malware, you cannot easily discover that your computer has malware. This product has a rootkit scanner that scans specifically for rootkits, so malware cannot easily hide itself.
17 F-Secure Internet Security 2012 Protecting the computer against malware 17 Riskware Riskware is not designed specifically to harm your computer, but it may harm your computer if it is misused. Riskware is not strictly speaking malware. Riskware programs perform some useful but potentially dangerous functions. Examples of riskware programs are: programs for instant messaging, such as IRC (Internet Relay Chat), programs for transferring files over the Internet from one computer to another, Internet phone programs, such as VoIP ( Voice over Internet Protocol), Remote Access Software, such as VNC, scareware, which may try to scare or scam individuals into buying fake security software, or software designed to bypass CD checks or copy protections. If you have explicitly installed the program and correctly set it up, it is less likely to be harmful. If the riskware is installed without your knowledge, it is most likely installed with malicious intent and should be removed. How to scan my computer You can scan your computer for malware in real time, manually, or you can schedule a scan at set times. Deciding which method to use depends on how powerful your computer is and how high a level of protection you want. Turning on all the virus and spyware scanning features can have a noticeable effort on your computer's speed if you have an older computer. Scan for malware Real-time scanning protects the computer by scanning all files when they are accessed and by blocking access to those files that contain malware. Real-time scanning works as follows: 1. Your computer tries to access a file. 2. The file is immediately scanned for malware before access to the file is allowed. 3. If malware is found in the file, real-time scanning removes the malware automatically before it can cause any harm. Does real-time scanning affect the performance of my computer Normally, you do not notice the scanning process because it takes a small amount of time and system resources. The amount of time and system resources that real-time scanning takes depend on, for example, the contents, location and type of the file. Files that take a longer time to scan: Compressed files, such as.zip files. Note: Compressed files are not scanned by default. Files on removable drives such as CDs, DVDs, and portable USB drives. Real-time scanning may slow down your computer if: you have a computer that is quite old, or
18 18 F-Secure Internet Security 2012 Protecting the computer against malware you access a lot of files at the same time. An example of this is opening a directory that contains many files. Turn real-time scanning on or off You can turn real-time scanning on to stop malware before it can harm your computer. To turn real-time scanning on: 2. Select Computer > Virus and spyware scanning. 3. Select Turn on real-time scanning. 4. Click OK. Scan my for malware scanning protects you against getting or sending viruses through your . scanning protects your computer against: getting a virus in a file attached to an sent to you, or accidentally sending a virus to someone else, when sending an with a file attached. When are messages and attachments scanned messages and attachments are scanned every time your program sends or receives messages from the mail server. The following messages are scanned by scanning: messages that are sent and received by programs, such as Microsoft Outlook and Outlook Express, Microsoft Mail, or Mozilla Thunderbird, that run as programs independent of your web browser. The following messages are not scanned by scanning: messages in webmail, which include applications that run in your web browser, such as Hotmail, Yahoo! mail or Gmail. Note: You must make sure that the ports used for different protocols (POP3, IMAP4, SMTP) are set up correctly. messages that are received and sent through other ports are not scanned. You are still protected against viruses even when the ports are not set correctly or you are using webmail. When you open the attachment, real-time scanning will detect that it has a virus and block the virus before it can cause harm. Note: Real-time scanning protects only your computer, but not your friends. Real-time scanning cannot scan attached files unless you open the attachment. This means that if you forward a message before opening the attachment, you may forward an infected to your friends if your scanning is not set up properly. Turn scanning on or off You can turn scanning on to scan your messages and attachments for viruses. To turn scanning on: 2. Select Internet > filtering. 3. Select Turn on filtering. 4. Click OK.
19 F-Secure Internet Security 2012 Protecting the computer against malware 19 Set the ports used for different protocols If your program uses a non-standard port, you must change the port that is scanned for viruses. Otherwise those messages will not be scanned for viruses. To set the ports: 1. Open your program and check which ports are being used to send and receive . Note these port numbers down. 2. Open the product. 3. On the main page, click Settings. 4. Select Internet > filtering. 5. Click Show protocols. 6. Enter the port number used for the POP3 protocol. 7. Click OK. Block tracking cookies By blocking tracking cookies, you stop web sites from being able to track the sites you visit on the Internet. Tracking cookies are small files that allow web sites to record what web sites you visit. To block tracking cookies from being installed: 2. Select Computer > Virus and spyware scanning. 3. Select Block tracking cookies. 4. Click OK. Scan at set times You can scan your computer for malware at regular intervals, for example daily, weekly or monthly. Scanning for malware is an intensive process. It requires the full power of your computer and takes some time to complete. For this reason, you might want to set the program to scan your computer when you are not using it. Schedule a scan Set the program to scan your computer at regular times. To schedule a scan: 2. Select Computer > Scheduled scanning. 3. Select Turn on scheduled scanning. 4. Select which days you would like to regularly scan for viruses and spyware. Option Description Daily Weekly Monthly To scan every day. To scan on selected days during the week. Select on which days to scan from the list to the right. To scan on up to three days a month. To select which days: 1. Select one of the Day options. 2. Select the day of the month from the list next to the selected day. 3. Repeat if you want to scan on another day.
20 20 F-Secure Internet Security 2012 Protecting the computer against malware 5. Select when you want to start the scan on the selected days. Option Description Start time After computer is not used for The time when the scan will start. You should select a time when you expect to not be using the computer. Select a period of idle time after which the scanning starts if the computer is not used. Cancel a scheduled scan You can cancel a scheduled scan locally if it starts when you do not want to run it. The scheduled scan will run at the next scheduled time. Scheduled scanning may have a noticeable effect of your computers performance. To cancel the scheduled scan: 1. Click Scheduled scan has started link on the Virus and spyware scanning flyer. The flyer stays for about 15 seconds, after which it disappears. If you do not click the link on the flyer, you cannot cancel the scheduled scanning any more. 2. Click Cancel on the Virus and spyware scanning window. 3. Click Close. The scheduled scan is canceled. The next scheduled scan will start as usual. View the results of scheduled scan When a scheduled scan finishes you can check if malware were found. To check the results of a scheduled scan: 1. Click the Scheduled scan has finished on the Virus and spyware scanning flyer. 2. Click Show report to see what happened during the scan. Note: If you opened the dialog from the Flyer history dialog, the Show report button is disabled. You cannot see the results of previous scheduled scans. 3. Click Close to close the dialog. Tip: You can view the results of the last scan also by clicking Settings > Computer > Scheduled scanning. Click View last scanning report. Scan manually You can scan your computer manually, if you suspect that you have malware on your computer. How to select the type of manual scan You can scan your whole computer or scan for a specific type of malware or a specific location. If you are suspicious of a certain type of malware, you can scan only for this type. If you are suspicious of a certain location on your computer, you can scan only that section. These scans will finish a lot quicker than a scan of your whole computer. To start manually scanning your computer: 1. On the main page, click the arrow under Scan. The scanning options are shown. 2. Select the type of scan.
21 F-Secure Internet Security 2012 Protecting the computer against malware 21 If you want to change the scanning settings, select Change scanning settings. 3. If you selected Choose what to scan, a window opens in which you can select which location to scan. The Scan Wizard opens. Types of scan You can scan your whole computer or scan for a specific type of malware or a specific location. The following lists the different types of scan: Scan type Full computer scan Choose what to scan Virus and spyware scan Rootkit scan What is scanned Your entire computer (internal and external hard drives) for viruses, spyware and riskware A specific file, folder or drive for viruses, spyware and riskware Parts of your computer for viruses, spyware and riskware Important system locations where a suspicious item may mean a security problem. Scans for hidden files, folders, drives or processes When to use this type When you want to be completely sure that there is no malware or riskware on your computer. This type of scan takes the longest time to complete. It combines the quick malware scan and the hard drive scan. It also checks for items that are possible hidden by a rootkit. When you suspect that a specific location on your computer may have malware, for example, the location contains downloads from potentially dangerous sources, such as peer-to-peer file sharing networks. Time the scan will take depends of the size of the target that you scan. The scan completes quickly if, for example, you scan a folder that contains only a few small files. This type of scan is much quicker than a full scan. It searches only the parts of your system that contain installed program files.this scan type is recommended if you want to quickly check whether your computer is clean, because it is able to efficiently find and remove any active malware on your computer. When you suspect that a rootkit may be installed on your computer. For example, if malware was recently detected in your computer and you want to make sure that it did not install a rootkit. Clean malware automatically If malware is found during the scan, you can either let the program automatically decide how to clean your computer or you can decide yourself for each item. 1. Select either of: Option Handle automatically (recommended) I want to decide item by item What will happen The program decides what to do to each malware item to automatically clean your computer. The program asks what you want to do to each malware item. 2. Click Next. If you selected Handle automatically (recommended), a window with the results of automatic malware handling opens. Note: Some malware items may have a "Not processed" status, which means that the infected file is inside an archive (for example, a zip file) and cannot be handled automatically. You can
22 22 F-Secure Internet Security 2012 Protecting the computer against malware delete the infected file by opening the archive and deleting the file manually. If the content of the archive is not important, you can delete the whole archive. If you selected I want to decide item by item, you must specify action for each detected malware. 3. Click Finish to close the Scan Wizard. View the results of manual scan You can view a report of the scanning results after the scan is complete. Note: You might want to view this report because the action you selected may not always be the action that was performed. For example, if you chose to clean an infected file, but the virus could not be removed from the file, the product may have performed some other action to the file. To view the report: 1. Click Show report. The report includes: The number of malware found. The type of malware found and links to descriptions of the malware on the Internet. The actions applied to each malware item. Any items that were excluded from the scan. The scanning engines that were used to scan for malware. Note: The number of scanned files can differ depending on whether files are scanned inside archives during the scan. If archived files have been scanned earlier, the scan results may be saved in the cache memory. 2. Click Finish to close the Scan Wizard. Tip: You can view the results of the last scan also by clicking Settings > Computer > Manual scanning. Click View last scanning report. Select files that are scanned You can select the types of file and parts of your computer to scan in manual and scheduled scans. Note: Edit manual scanning settings to select files and folders you want to scan during the scheduled scan. Two types of lists determine which files are scanned for viruses in manual and scheduled scans: Scanned file types list contains either all files or a defined list of file types. Lists of files excluded from scanning define exceptions to the list of scanned file types. File types or locations that are on the lists of excluded files are not scanned even if they are included in the list of scanned file types. The lists of scanned file types and excluded files let you define which parts of your computer will be scanned in different ways: You can include all files, and then optionally use the exclude list to exclude drives, directories, or files that you know are safe and do not want to be scanned. You can define a list of file types that you want to scan, so that only these file types are scanned.
23 F-Secure Internet Security 2012 Protecting the computer against malware 23 Include files You can select the file types that you want to be scanned for viruses and spyware in manual and scheduled scans. 2. Select Computer > Manual scanning. 3. Under Scanning options, select from the following settings: Scan only known file types (faster) Scan inside compressed files (zip, arj, lzh,...) Use advanced heuristics (slower) To scan only those file types that are most likely to have infections, for example, executable files. Selecting this option also makes the scanning faster. The files with the following extensions are scanned:.ani,.asp,.ax,.bat,.bin,.boo,.chm,.cmd,.com,.cpl,.dll,.doc,.dot,.drv,.eml,.exe,.hlp,.hta,.htm,.html,.htt,.inf,.ini,.job,.js,.jse,.lnk,.lsp,.mdb,.mht,.mpp,.mpt,.msg,.ocx,.pdf,.php,.pif,.pot,.ppt,.rtf,.scr,.shs,.swf,.sys,.td0,.vbe,.vbs,.vxd,.wbk,.wma,.wmv,.wmf,.wsc,.wsf,.wsh,.wri,.xls,.xlt,.xml,.zip,.jar,.arj,.lzh,.tar,.tgz,.gz,.cab,.rar,.bz2, and.hqx. To scan archive files and folders. To use all available heuristics during the scan to better find new or unknown malware. Note: If you select this option, the scanning takes longer, and can result in more false positives (harmless files reported as suspicious). 4. Click OK. The options you selected under Scanning options determine which files are included in future manual and scheduled scans. Note: All file types or locations on the excluded items list will override the settings that you defined here. File types on the excluded items list will not be scanned even if you selected them to be scanned here. Exclude file types You can exclude files from manual and scheduled scans by their file type. 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file type: a) Select the File Types tab. b) Select Exclude files with these extensions. c) Type a file extension that identifies the type of files that you want to exclude, in the field next to the Add button. To specify files that have no extension, type '.'. You can use the wildcard '?' to represent any single character, or '*' to represent any number of characters.
24 24 F-Secure Internet Security 2012 Protecting the computer against malware For example, to exclude executable files, type exe in the field. d) Click Add. 5. Repeat the previous step for any other extension you want to be excluded from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings. The selected file types are excluded from future manual and scheduled scans. Exclude files by location You can define a list of excluded folders or drives that you do not want to be scanned for viruses in manual and scheduled scanning. Note: Files in folders or drives that are excluded from scanning are not scanned even though they might be of a type that is included in scanned file types. To define a list of files, folders, or drives excluded by location: 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file, drive, or folder: a) Select the Objects tab. b) Select Exclude objects (files, folders,...). c) Click Add. d) Select the file, drive, or folder that you want to exclude from virus scanning. e) Click OK. Note: Some drives may be removable drives, such as CD, DVD or network drives. Network drives and empty removable drives cannot be excluded. 5. Repeat the previous step to exclude other files, drives, or folders from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings. The selected files, drives or folders are excluded from future manual and scheduled scans. View excluded applications You can view applications that you have excluded from future manual and scheduled scans, and remove them from the exclude list so they will be found in future scans. To view the applications that are excluded from scanning: 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. Select the Applications tab.
25 F-Secure Internet Security 2012 Protecting the computer against malware 25 Note: Only spyware and riskware applications can be excluded, not viruses. 5. To restore an application so that it will be found in future manual or scheduled scans: a) Select the application that you want to include in the scan again. b) Click Remove. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to exit. Scan inside compressed files and folders You can scan for viruses that hide inside compressed files. 2. Select Computer > Manual scanning. 3. If you want to scan archive files and folders, such as.zip files, select Scan inside compressed files (zip, arj, lzh,...). Compressed files take slightly longer to scan. 4. Click OK. Select the action when something is found If viruses are found and you have set the program not to automatically handle viruses, you can now select whether to clean, delete, quarantine or only block the files in which a virus was found. Note: This step of the Scan Wizard will be skipped if you have set the program to always handle viruses automatically during a manual or scheduled scan or if you have set the program to automatically process malware found during this scan. You are shown a list of infected files and the viruses that were found in these files. To handle these viruses from your computer: 1. Select the action to take for infected files. If you want to view the additional details of the infection, click the link in the Infection column. 2. Click Next to apply the actions. 3. Click Next to finish. If spyware was found during the manual or scheduled scan, the Scan Wizard continues to the spyware cleaning step. Actions you can take in real-time scanning The Action to take column shows you what actions you can take for the infected files in real-time scanning. Note: In addition to files, the infection can be found also in a registry entry or a process. The following actions can be taken for viruses: Action to take Disinfect automatically Quarantine automatically (default) Rename automatically Delete automatically What happens to the infected files The product tries to disinfect the viruses in any infected files that were found during real-time scanning. The product moves any infected files found during real-time scanning to the quarantine where it cannot harm your computer. The product renames any infected files found during real-time scanning. The product deletes any infected files found during real-time scanning.
26 26 F-Secure Internet Security 2012 Protecting the computer against malware Action to take Report only What happens to the infected files The product leaves any infected files found during real-time scanning as they are and only reports them. The following actions can be taken for spyware: Action to take Quarantine automatically Remove automatically Report only (default) What happens to the infected files The product moves any spyware found during real-time scanning to the quarantine where it cannot harm your computer. The product removes any spyware found during real-time scanning. The product leaves any spyware found during real-time scanning as they are and only reports them. Actions you can take in manual or scheduled scanning The Action to take column shows you what actions you can take for the infected files in manual or scheduled scanning. Note: In addition to files, the infection can be found also in a registry entry or a process. The following actions can be taken for viruses: Action to take Ask what to do (default) Disinfect automatically Quarantine automatically Rename automatically Delete automatically Report only What happens to the infected files The product asks you what to do if viruses are found during manual scanning. The product tries to automatically disinfect the viruses in any infected files that were found during manual or scheduled scanning. Note: It is not always possible to disinfect a virus in a file. If this is not possible, the file is quarantined (except when found on network or removable drives), so the virus cannot harm the computer. The product moves any infected files that were found during manual or scheduled scanning to the quarantine where they cannot harm the computer. The product renames any infected files that were found during manual or scheduled scanning. The product deletes any infected files that were found during manual or scheduled scanning. The product leaves any infected files that was found during during manual or scheduled scanning as they are and records the detection in the scan report. Note: If real-time scanning is turned off, any malware is still able to harm the computer if you select this option. The following actions can be taken for spyware: Action to take Ask what to do (default) Quarantine automatically What happens to the infected files The product asks you what to do if spyware is found during manual scanning. The product moves any spyware that was found during manual or scheduled scanning to the quarantine where it cannot harm the computer.
27 F-Secure Internet Security 2012 Protecting the computer against malware 27 Action to take Remove automatically Report only What happens to the infected files The product removes any spyware that was found during manual or scheduled scanning. The product leaves any spyware that was found during during manual or scheduled scanning as it is and records the detection in the scan report. Note: If real-time scanning is turned off, any malware is still able to harm the computer if you select this option. Default actions in real-time scanning The Default action column shows you what default actions you can select for infected files in real-time scanning. You can select one of the following default actions if malware is found: Default action Always ask me If unclear, ask me What happens if malware is found The program asks you what to do if malware is found during real-time scanning. When the program cannot identify the malware, it asks you what do you want to do with it. Default actions in manual and scheduled scanning The Default action column shows you what default actions you can select for infected files in manual and scheduled scanning. You can select one of the following default actions if malware is found: Default action Ask what to do Disinfect automatically Quarantine automatically Rename automatically Delete automatically Report only What happens if malware is found The program asks you what to do if malware is found during a manual scan. The program tries to automatically disinfect the viruses in any infected files that were found during a manual or scheduled scan. Note: It is not always possible to disinfect a virus in a file. If this is not possible, the file is quarantined (except when found on network or removable drives), so the virus cannot harm your computer. The program automatically moves any infected files found during a manual or scheduled scan to the quarantine where it cannot harm your computer. The program automatically renames any infected files found during a manual or scheduled scan. The program automatically deletes any infected files found during a manual or scheduled scan. The program leaves any infected files that were found during a manual or scheduled scan as they are and records the virus and spyware detection in the scan report. Note: If Real-time scanning is not on, any malware is still able to harm your computer if you select this option.
28 28 F-Secure Internet Security 2012 Protecting the computer against malware Default actions for DeepGuard The Default action column shows you what default actions you can select for DeepGuard. You can select one of the following default actions if DeepGuard detects a system modification attempt: Default action Always ask me If unclear, ask me Handle automatically What happens if malware is found DeepGuard asks you whether you want to allow or block all monitored actions, even when it identifies the application as safe. DeepGuard asks you whether you want to allow or block monitored actions only when it cannot identify the application as safe or unsafe. DeepGuard blocks unsafe applications and allows safe applications automatically without asking you any questions. View virus and spyware history Virus and spyware history shows you what the program has done to viruses and spyware that were found. To view the history: 2. Select Computer > Virus and spyware scanning. 3. Click View virus and spyware history. The Virus and spyware history opens. What is DeepGuard DeepGuard analyzes the content of files and behavior of programs, and blocks new and undiscovered viruses, worms, and other malicious programs that try to make potentially harmful changes to your computer. System changes that can be dangerous include: system setting (Windows registry) changes, attempts to turn off important system programs, for example, security programs like this product, and attempts to edit important system files. DeepGuard continuously watches for these changes and checks each program that attempts to change the system. How does DeepGuard work When DeepGuard detects a program attempting to make potentially harmful changes to the system, it allows the program to run in a safe-zone, unless you have specifically allowed or blocked the program. In the safe-zone, the program cannot harm your computer. DeepGuard analyzes what changes the program tried to make, and based on this, decides how likely the program is to be malware. DeepGuard automatically either allows or blocks the program, or asks you whether to allow or block the program, depending on: how likely the program is to be malware, and which action you have told DeepGuard to take when it detects a potentially harmful attempt to change the system.
29 F-Secure Internet Security 2012 Protecting the computer against malware 29 How to turn DeepGuard on By turning DeepGuard on, you can prevent suspicious programs from making potentially harmful system changes in your computer. Before you turn DeepGuard on, make sure you have Service Pack 2 installed if you have Windows XP. To turn DeepGuard on: 2. Select Computer > DeepGuard. 3. Select Turn on DeepGuard. 4. Click OK. Allow programs that DeepGuard has blocked You can allow a program, which DeepGuard has blocked, to make system changes. Sometimes DeepGuard may block a safe program from running, even if you want to use the program and know it to be safe. This happens because the program tries to make system changes that might be potentially harmful. You may also have unintentionally blocked a program when a DeepGuard pop-up has been shown. You can allow a blocked program by changing its permission in the Programs list. To allow a program that DeepGuard has blocked: 1. On the main page, click Tasks. 2. Click Allow an application to start. The Monitored applications list is shown. 3. Click the Permission column to sort the list into groups of allowed and denied programs. 4. Select the program, which you want to allow, and click Details. 5. Under Permission, select Allow. 6. Click OK. 7. Click Close. The program you selected is now allowed to run and make system changes. How to turn off advanced process monitoring For maximum protection, DeepGuard temporarily modifies running programs. Advanced process monitoring may cause problems with programs that make sure that they are not corrupted or modified. For example, online games with anti-cheating tools check that they have not been modified in any way when they are run. To turn advanced process monitoring off: 2. Select Computer > DeepGuard. 3. Clear Use advanced process monitoring. 4. Click OK.
30 30 F-Secure Internet Security 2012 Protecting the computer against malware Protect against harmful system changes If DeepGuard detects a program trying to make potentially harmful system changes and it cannot identify whether the program is safe or unsafe, it shows you a System modification attempt dialog box. The System modification attempt dialog box is shown if you have selected one of the following as the action for DeepGuard to take when it detects a potentially harmful attempt to change the system: Always ask me, or If unclear, ask me. DeepGuard may show the dialog box, for example, when you are installing some software. To decide whether to trust the program that is attempting to make system changes: 1. If you are unsure of the source of the modification attempt, click Details to view more information about the program. The Technical details section shows you: the name of the program trying to make the change, the location of the program, the change the program is attempting to make, and a risk score, which indicates how likely the program is to be malware : a low score indicates a program that is likely to be harmless, and a high score indicates a program that is likely to be malware. 2. Select one of the following options: Select If you... I trust the program. Allow it. think that the program is safe. The program is more likely to be safe if: it has a low risk score, the dialog box was displayed as a result of something you did, you recognize the program, or you got the program from a trusted source. I do not trust the program. Keep it blocked. suspect that the program is unsafe. The program is more likely to be unsafe if: it has a high risk score, you do no know the program, or you know the program and think it is suspicious. 3. Select Do not show this dialog for this program again if you want DeepGuard to apply your decision for this program when it tries to make system changes in the future. This option is visible only when you have selected Always ask me as the action on system modification attempts. The next time DeepGuard detects the same program, it will not ask you what to do, but applies your earlier decision. 4. If you want to send a sample of a program that tried to make system changes, do the following: a) Click Send a sample to F-Secure. A dialog box that explains the submission conditions is shown. b) Carefully read the conditions, and click Accept if you agree with the conditions and want to submit the sample.
31 F-Secure Internet Security 2012 Protecting the computer against malware 31 You may want to send a sample: if DeepGuard automatically blocks a program that you know to be safe, or when a System modification attempt dialog box is shown and you suspect the program may be malware. The system sends to F-Secure Corporation an electronic copy of the program, which was identified as a possible security threat. How to see what DeepGuard has done A small flyer is displayed when DeepGuard automatically blocks a program from making system changes. Flyers are small notifications that are shown at the bottom right-hand corner of your computer screen. They are shown, for example, if DeepGuard has denied the use of a program. These flyers are informational, and do not require any action from you. You can view all the shown flyers in the flyer history. If a program that you try to install or run does not work, it may be because DeepGuard is blocking that program from making system changes. In this case, you can have DeepGuard show you a small flyer when it automatically blocks a program. This way you know why the program did not work properly. How to use the quarantine Quarantine is a safe repository for files that may be harmful. Quarantined files cannot spread or cause harm to your computer. The product can quarantine malware, spyware, and riskware to make them harmless. You can restore applications or files from the quarantine later if you need them. If you do not need a quarantined item, you can delete it. Deleting an item in the quarantine removes it permanently from your computer. In general, you can delete quarantined malware. In most cases, you can delete quarantined spyware. It is possible that the quarantined spyware is part of a legitimate software program and removing it stops the actual program from working correctly. If you want to keep the program on your computer, you can restore the quarantined spyware. Quarantined riskware can be a legitimate software program. If you have installed and set up the program by yourself, you can restore it from the quarantine. If the riskware is installed without your knowledge, it is most likely installed with malicious intent and should be deleted. View quarantined items You can view more information on items in the quarantine. To view information on items in the quarantine: 2. Select Computer > Virus and spyware scanning. 3. Click Open quarantine. The Quarantine page shows the total number of items stored in quarantine. 4. To view detailed information on items in the quarantine, click Details. You can sort the content either by malware name or file path. A list of the first 100 items is shown with the type of the quarantined items, their name, and the path where the files were installed. 5. To view more information on a quarantined item, click the icon next to the item on the State column.
32 32 F-Secure Internet Security 2012 Protecting the computer against malware Restore quarantined items You can restore the quarantined items that you need. You can restore applications or files from the quarantine if you need them. Do not restore any items from the quarantine unless you are sure that items pose no threat. Restored items move back to the original location in your computer. To restore quarantined items: 2. Select Computer > Virus and spyware scanning. 3. Click Open quarantine. 4. Select the quarantined items that you want to restore. 5. Click Restore. Change the mobile broadband settings Select whether you want to download security updates when you use mobile broadband. Note: This feature is available only in Microsoft Windows 7. By default, security updates are always downloaded when you are in your home operator's network. However, the updates are suspended when you visit another operator's network. This is because the prices of connections may vary between operators, for example, in different countries. You might consider keeping this setting unchanged, if you want to save bandwidth and possibly, also costs, during your visit. Note: This setting applies only to mobile broadband connections. When the computer is connected to a fixed or wireless network, the product is automatically updated. To change the setting: 2. Select Other settings > Mobile broadband. 3. Select the preferred update option for mobile connections: Only in my home operator's network (recommended) Updates are always downloaded in your home operator's network. When you visit another operator's network, the updates are suspended. We recommend that you select this option to keep your security product up to date at expected costs. Always Updates are always downloaded, no matter what network you use. Select this option if you want to make sure that the security of your computer is always up to date regardless of the costs. Never When you use mobile broadband, no security updates are downloaded, not even in your home operator's network. You may want to select this option, for example, when: you use the mobile connection only temporarily, and you connect daily to a fixed or wireless network. your mobile connection has a data transfer limit, and you want to use the bandwidth for something else. 4. If you want to decide separately every time you exit your home operator's network, select Ask me each time I leave my home operator's network.
33 F-Secure Internet Security 2012 Protecting the computer against malware 33 Suspended security updates The security updates may be suspended when you use mobile broadband outside your home operator's network. In this case, you can see the Suspended notification flyer in the lower right corner of your screen. The updates are suspended because the prices of connections may vary between operators, for example, in different countries. You might consider keeping this setting unchanged, if you want to save bandwidth and possibly, also costs, during your visit. However, if you still want to change the settings, click the Change link. Note: This feature is available only in Microsoft Windows 7.
34
35 Chapter 3 Securing network connections Topics: The product protects your computer against unsafe Internet traffic. What is a firewall The product: How to allow or block network traffic through the firewall How to control network Protects you against intruders who try to access your computer without your permission. They may, for example, try to steal your personal information, such as files, passwords or credit card numbers. applications Blocks malicious Internet traffic such as trojans. They may, for How to prevent intruders How to control dial-up connections Where to find firewall alerts and log files example, destroy files on your computer, crash your computer, or open ports for hackers to access your computer. Blocks harmful Internet traffic such as spyware. Spyware may, for example, gather information about your addresses, passwords and credit card numbers. Prevents malicious dialer programs from using your modem or ISDN connection to dial into expensive pay-per-minute phone numbers. After you have installed the product, your network connections are automatically protected.
36 36 F-Secure Internet Security 2012 Securing network connections What is a firewall The firewall protects your computer by allowing safe Internet traffic and blocking unsafe traffic. Typically, the firewall allows all traffic from your computer to the Internet, but blocks all traffic from the Internet to your computer unless you specifically allow it. By blocking the inbound traffic, the firewall protects your computer against malicious software, such as worms, and prevents intruders from accessing your computer. Depending on your alerting settings, firewall alert pop-ups may be shown about the actions of the firewall. Your computer is protected with the predefined firewall settings. Usually, you do not have to change them. However, you may have to change the settings, if you use a very strict firewall profile, or if you have added your own firewall rules or services. Caution: Do not turn the firewall off. If you do, your computer is vulnerable to all network attacks. If a program stops working because it cannot connect to the Internet, change the firewall rules or application control settings instead of turning the firewall off. What are firewall profiles The firewall profile defines the level of protection on your computer. Each firewall profile has a predefined set of firewall rules, which define the type of traffic that is allowed to or denied from your computer. To some profiles you can also add rules that you have created yourself. Firewall profiles also define if Internet connections are automatically allowed for all applications, or if you can separately allow or deny each new connection attempt in an application control pop-up. There are several predefined firewall profiles, which range from very strict to very loose: A very strict firewall profile (Block all) usually blocks most of the network traffic. This may prevent you from using some of the programs on your computer. A medium profile (Normal) usually allows all outbound Internet traffic from your computer. The medium profile may deny some inbound services and generate alerts about them. A very loose profile (Allow all) usually allows all network traffic, both inbound and outbound, and does not generate any alerts. Because this profile leaves your computer unprotected, do not use it except for in special cases. Note: Depending on the product you are using, the names of firewall profiles can be different. Your computer is safe with the predefined firewall profile. You may need to change the profile to a stricter one, for example, if you use your laptop outside your home and open the Internet using a WLAN connection. How are firewall profiles related to firewall rules and services A firewall profile consists of several firewall rules. A firewall rule consists of several firewall services. Services are defined by the protocols and ports they use. For example, the Mobile firewall profile has a rule called Web browsing. This rule allows you to browse the web. The rule includes the services that are needed for web browsing, such as the HyperText Transfer Protocol (HTTP) service. This service uses the TCP and port number 80.
37 F-Secure Internet Security 2012 Securing network connections 37 How to change the firewall profile If you want to change the level of protection on your computer, change the firewall profile. To change the firewall profile : 1. On the main page, click Status. 2. Click Change settings on this page. 3. Next to Firewall, click the link, which shows the current firewall profile. The Change firewall profile dialog box opens. 4. Read the firewall profile descriptions carefully. 5. Select the appropriate profile from the list and click OK. The Status page now shows the new firewall profile. The firewall rules and application control settings change according to the selected firewall profile. What are firewall rules and services Firewall rules and services define how the firewall protects your network connections. What are firewall rules Firewall rules define what kind of Internet traffic is allowed or blocked. Each firewall profile has a predefined set of firewall rules, which you cannot change. You can only add new rules to some of the profiles. For some profiles you may not be able to add your own rules. There may also be a profile that has no predefined rules and that allows you to freely add your own set of rules. The selected firewall profile also affects the priority which your own rules receive in relation to the predefined rules. A firewall rule can be applied to traffic from the Internet to your computer (inbound), or from your computer to the Internet (outbound). A rule can also be applied to both directions at the same time. A firewall rule consists of firewall services, which specify the type of traffic and the ports that this type of traffic uses. For example, a rule called Web browsing has a service called HTTP, which uses the TCP and port number 80. Firewall rules also define whether firewall alert pop-ups are shown to you about the traffic that matches the firewall rules. When do you have to add a new firewall rule You may have to add a new firewall rule if you start using a new program or attach a new device to your computer, for example, a WLAN device or an IP camera. By adding all the services that the program or device needs to the same rule, you can easily: turn the rule on or off later, or remove the rule if you uninstall the program or remove the device. You also have to add a new rule if you have denied certain type of traffic but you want to allow it to certain IP addresses. In this case, you already have a general "deny" firewall rule. To allow the traffic to certain IP addresses, you have to create a more specific "allow" rule. For example, if the general rule denies all outbound FTP traffic, you may still want to allow FTP traffic to your Internet Service Provider's site to be able to update your web pages. You can do this by adding a more specific rule that allows FTP traffic to the Internet Service Provider's IP address, and give the rule a higher priority than for the "deny" rule.
38 38 F-Secure Internet Security 2012 Securing network connections View firewall rules You can view the currently active firewall rules to find out how the firewall allows or blocks traffic on your computer. Each firewall profile has its own set of active firewall rules. To view the rules: 2. Select Internet > Firewall. 3. Click the Rules tab. 4. Next to Current firewall profile, select the appropriate firewall profile. You can view a rules list, which contains the following information: Field In use Name Description If the checkbox is selected, the rule is currently on. If the checkbox is empty, the rule is currently off. Name of the rule. There are two types of rules: Predefined rules: These rules are shown in gray. They have been predefined for the currently selected firewall profile. Your own rules: If you have added your own rules, they are shown in black above the Your rules will be added here row. Type Rule type: : This rule allows network traffic. : This rule denies network traffic. : This rule generates alerts in the alert log and possibly shows an alert pop-up when the rule allows or denies network traffic. Remote host IP addresses and networks to which the rule applies. If the rule applies to all IP addresses, this field shows one of the following values: /0, ::/0 : The rule applies to all IPv4 and IPv6 addresses /0 : The rule applies to all IPv4 addresses. ::/0 : The rule applies to all IPv6 addresses. 5. To view the rule details, select a rule on the list and click Details. If the rule has been predefined, the Rule details dialog box opens and displays the predefined rule. After viewing the details, click Finish. If you have added the rule yourself, the Rule details dialog box opens. Click Next > until you see a summary of the rule. After viewing the details, click Cancel. Firewall rule details Firewall rule details include the name and type of the rule, the IP addresses and services to which the rule applies, and alerting settings. You can view the following information in the Rule details dialog box:
39 F-Secure Internet Security 2012 Securing network connections 39 Field Name Type Remote address Services Alerting Alert text Description Name of the rule. Type of the rule, which defines whether the rule allows or denies network traffic. IP addresses and networks to which the rule applies. If the rule applies to all IP addresses, the field shows one of the following values: /0, ::/0 : The rule applies to all IPv4 and IPv6 addresses /0 : The rule applies to all IPv4 addresses. ::/0 : The rule applies to all IPv6 addresses. The Service column shows the firewall services that the rule includes. The Direction column shows whether the rule applies to inbound services ( in), outbound services ( out) or both. Shows whether the rule generates alerts and shows alert pop-ups. If the rule generates alerts, shows the alert text that is shown in the alert log and pop-up. What are firewall services Firewall services define the type of traffic to which a firewall rule applies. Network services, such as web browsing, file sharing or remote console access, are examples of these firewall services. A service uses a certain protocol and port. For example, the HTTP service uses the TCP protocol and the port number 80. A firewall service uses two kinds of ports: Initiator port : the port on the computer that starts the connection. Responder port: the port on the computer where the connection ends. Whether the port on your own computer is an initiator port or responder port depends on the direction of the traffic: If the firewall service is for outbound traffic, the initiator port is the port on your own computer. The responder port is then the port on a remote computer. If the firewall service is for inbound traffic, the initiator port is the port on a remote computer. The responder port is then the port on your own computer. The responder ports are typically mentioned in the software documentation. The initiator port can usually be any port higher than However, for some games you may also have to define specific initiator ports. In this case, they are also mentioned in the software documentation. If you create a new firewall rule, you have several predefined services that you can add to the rule. You can also create and add your own services if the service that you need is not on the services list. View firewall services You can view the existing firewall services on the Services tab. To view the services:
40 40 F-Secure Internet Security 2012 Securing network connections 2. Select Internet > Firewall. 3. Click the Services tab. You can view the following information: Field Name Used in rule Description Name of the service. Name of the firewall rule, where the service is used. 4. To view details of a service, select the service on the list and click Details. The Service details dialog box opens. 5. After viewing the service details, click Close. What are dynamic firewall rules Dynamic firewall rules are created for connections from remote computers to server programs on your computer. If an application control pop-up is shown, and you allow an inbound connection, for example, to a peer-to-peer server program on your computer, the firewall creates a temporary, dynamic firewall rule. This rule is added to the dynamic rules list on the Activity tab. The rule opens a port for this program and keeps it open as long as the program listens to the port for inbound connections. When the program stops listening to the port, the rule closes the port and the dynamic rule is removed from the dynamic rules list. Depending on your application control settings, the application control pop-up may not be shown for all programs. If the pop-up is not shown, the dynamic firewall rule is automatically created for this program. View dynamic firewall rules The Activity tab shows the dynamic firewall rules which are currently active. Dynamic firewall rules are created for connections from remote computers to server programs on your computer. To view the dynamic firewall rules: 2. Select Internet > Firewall. 3. Click the Activity tab. You can view the following information: Application : The file name of the server program on your computer which currently listens to a port for inbound connections. Listening port : The port that the dynamic firewall rule has opened. The server program listens to this port for inbound connections. Remote address : The server program listens to the port for connections from the following IP addresses : /0 : All IPv4 addresses. ::/0 : All IPv6 addresses.
41 F-Secure Internet Security 2012 Securing network connections 41 How does the priority order of firewall rules work Firewall rules have a priority order that determines the order in which the rules are applied to network traffic. Firewall rules are shown as a list on the Rules tab. The rules are applied from top to bottom, and the first rule that matches the traffic overrides all the other rules below. The main principle is to allow only the needed traffic and block the rest. Therefore, the last rule of a firewall profile is the Deny rest rule. It blocks all the traffic that the rules above it do not specifically allow. Dynamic firewall rules are shown separately as a list on the Activity tab. The priority of the dynamic rules is lower than the priority of normal firewall rules. This means that if a firewall rule denies some traffic, the dynamic rule cannot allow it. However, the priority of the dynamic rules is higher than the priority of the predefined Deny rest rule. An example of how the priority order works You have added a rule that denies all outbound FTP traffic. Above the rule in the rules list, you add another rule that allows an FTP connection to your Internet Service Provider's IP address. This rule allows you to create an FTP connection to that IP address. You have added a rule that allows you to create an FTP connection to your Internet Service Provider's IP address. Above the rule in the rules list, you add another rule that denies all FTP traffic. This rule prevents you from creating an FTP connection to your Internet Service Provider's IP address (or any other IP address). How to allow or block network traffic through the firewall You can allow or block network traffic by using firewall rules. What to do if a firewall alert appears A firewall alert pop-up appears on your computer screen when the firewall detects suspicious network traffic on your computer. A pop-up is shown when alert pop-ups have been turned on and either of the following happen: the traffic matches one of the current firewall rules, and alerting has been turned on for this rule, or there has been an intrusion attempt on your computer, and alerting has been turned on for Intrusion Prevention. You do not necessarily have to do anything because the firewall blocks suspicious traffic automatically and prevents intrusion attempts (if Block and log attempt has been turned on in the intrusion prevention settings). If an alert pop-up appears, do the following: 1. Read the alert information. 2. To view the alert details, click Details >>. 3. If you do not want firewall alert pop-ups to be shown anymore, select the Do not show alert dialog again check box. 4. To get more information about the remote IP address, click DNS name. It shows the domain name of the IP address, for example, If the domain name cannot be resolved, the DNS name button becomes unavailable and no domain name is shown. 5. You can create a new firewall rule for the traffic that generated the alert. This rule can either allow or deny this kind of traffic in future. Click Create rule and fill in the rule information.
42 42 F-Secure Internet Security 2012 Securing network connections 6. To close the Firewall alert dialog box, click Close. Now you can continue using your computer normally. Turn the firewall alerts on or off You can select whether firewall alert pop-ups are shown. To turn the alert pop-ups on or off: 2. Select Internet > Firewall. 3. Click the Settings tab. 4. Click Show alert log. 5. To turn the pop-ups on, select the Show alert pop-ups checkbox. To turn the pop-ups off, clear the checkbox. 6. Click Close. If you turned the pop-ups on, you see a pop-up the next time some traffic matches the current firewall rules. This applies only to rules which have the alert logging and pop-ups active. If you turned the pop-ups off, they do not appear anymore. How to create firewall services and rules You can create your own firewall services and rules if you want to allow or deny some Internet traffic. Before starting to create a rule, select the firewall profile to which you want to add this rule. Note: You may not be able to add your own rules to all firewall profiles. Create a firewall service You may need to create a new firewall service, for example, if you start using a new program which needs to connect to the Internet and which does not have a predefined service. The service defines the protocols and ports the program uses. To find out this information, consult the documentation of the program. To create a firewall service : 2. Select Internet > Firewall. 3. Click the Services tab. 4. Click Add. The Add new service dialog box opens. 5. In the Name field, enter a name for the service. Use a name that you can easily identify. 6. From the Protocol list, select the protocol for the service: ICMP (1) TCP (6) UDP (17) If you want to use another IP protocol, enter the protocol number (0-255) in the field. 7. If the service uses the TCP or UDP protocol, define the initiator ports for the service. If the program documentation does not include the initiator ports, you can usually use any port number above a) Next to the Initiator ports field, click Edit. b) Add the ports :
43 F-Secure Internet Security 2012 Securing network connections 43 To enter a single port, enter the port number in the Single field, for example, To enter a port range, add the lowest and the highest port number of the range to the Range fields, for example, c) Click Add to list. d) Repeat the steps a-c to add all necessary ports. e) Click OK. 8. If the service uses the TCP or UDP protocol, define the responder ports for the service. The responder ports are usually mentioned in the program documentation. a) Next to the Responder ports field, click Edit. b) Add the ports : To enter a single port, enter the port number in the Single field. To enter a port range, add the lowest and the highest port of the range to the Range fields. c) Click Add to list. d) Repeat the steps a-c to add all necessary ports. e) Click OK. 9. If the service uses the ICMP protocol, define the ICMP type and code for the service. Click Edit to enter the values in the Type and Code fields. The allowed values are If you will use this service for allowing inbound traffic, you can define whether you want to allow also broadcast and multicast traffic. This kind of traffic is created by streaming programs, such as web radio or television. To allow them, select the Allow broadcasts and Allow multicasts checkboxes. Usually, you can leave these checkboxes unselected. 11. In the Add new service dialog box, click OK. Your new service is now shown on the services list on the Services tab. To deny or allow the traffic that the service defines, you need to add the service to a firewall rule which allows outbound Internet connections. Start creating a rule Enter a name for the rule and select whether the firewall rule denies or allows traffic. To start creating a rule: 2. Select Internet > Firewall. 3. Click the Rules tab. 4. Click Add. The Add new rule dialog box opens. 5. In the Name field, enter a name for the rule. Use a name that you can easily identify. 6. To either deny or allow traffic, select either Deny or Allow. 7. To create a rule that is valid only when you have an active dial-up connection, select Use this rule only with dial-up connection. This option is relevant only if you use a modem or ISDN for your Internet connection. You may want to select this option, for example, if you use a laptop outside your home network and access the Internet through a modem or ISDN connection. Outside your home, your laptop is not protected by the router firewall, and you may want to create a stricter rule that denies all unnecessary inbound traffic and use this rule outside home. Usually, you do not have to create a rule, and the default firewall profile protects your computer both inside and outside home. 8. Click Next.
44 44 F-Secure Internet Security 2012 Securing network connections Select the IP addresses Apply the rule to all network connections or specify the IP addresses and networks to which the new rule applies. Note: The IPv6-related options are only available if your operating system is Microsoft Windows Vista or Windows 7. To select the IP addresses : 1. Select one of the following options: To apply the rule to both IPv4 and IPv6 addresses, select Any IP address. To apply the rule to all IPv4 addresses, select Any IPv4 address. To apply the rule to all IPv6 addresses, select Any IPv6 address. To apply the rule to specific IP addresses and networks, select Custom and click Edit. The Addresses dialog box opens. 1. In the Addresses dialog box, select one of the following options on the Type list: Type IP address DNS name IP range IP subnet MyDNS MyNetwork IPv6 address IPv6 range IPv6 subnet Address example /29 [mydns] [mynetwork] 2001:db8:85a3:8d3:1319:8a2e:370: :db8:1234:: :db8:1234:FFFF:FFFF:FFFF:FFFF:FFFF 2001:db8:1234::/48 2. Enter the address in the Address field. 3. To add the address to the addresses list, click Add to list. 4. Repeat steps a-c to add all necessary addresses to the addresses list. 5. Click OK. 2. Click Next. How can you define an IP subnet If you want to define an IP subnet, use Classless Inter-Domain Routing (CIDR) notation. It is a standard notation that consists of a network address and subnet mask. For example: Network address Subnet mask CIDR notation / / /32
45 F-Secure Internet Security 2012 Securing network connections 45 Select the services and direction Select the services to which the firewall rule applies, and the direction of the traffic. To select the services and direction: 1. Select the services to which you want to apply the rule: If you want to apply the rule to all IP traffic, select All IP traffic on the list. If the service you need is not on the list, you need to create it first. The icon appears in the Direction column for the services you selected. 2. For every service, select the direction of the traffic to which the rule applies. The direction is from your computer to the Internet or vice versa. To select the direction, click the icon in the Direction column. Direction Explanation The service is allowed or denied in both directions. The service is allowed or denied if it is from the Internet to your own computer (inbound). The service is allowed or denied if it is from your own computer to the Internet (outbound). 3. Click Next. Select alerting options Select how the product notifies you when the firewall rule denies or allows traffic. To select the alerting option: 1. Select one of the following options: If you do not want to be notified, select No alert. No alerts are generated to the alerts log, and no alert pop-ups are shown to you. We recommend that you select this option if you are creating a rule for allowing traffic. If you want the product to generate alerts in the alerts log, select Log. If you want the product to generate alerts in the alerts log and to show alert pop-ups to you, select Log and pop-up. Note that you have to turn on the alert pop-ups also in the Firewall alerts dialog box. In the Alert text field, enter a description to be shown in the alerts log and pop-ups. 2. Click Next. Check and accept the rule Check and accept the new rule. To do this: 1. Check the rule summary. If you need to edit the rule, click Previous. 2. When you are satisfied with your new rule, click Finish. Your new rule is now shown on the rules list on the Rules tab, and it is automatically turned on. If you have created several rules, you can now define their priority order.
46 46 F-Secure Internet Security 2012 Securing network connections Define the priority order of firewall rules If you have created several new firewall rules, define their priority order. You may want to do this, for example, if a rule denies some traffic that you want to allow. In this case, you need to create a new "allow" rule and move this rule above the "deny" rule. In this way, the "allow" rule is first applied to traffic. You can only change the priority order of those rules that you have created yourself. To define the priority order: 2. Select Internet > Firewall. 3. Click the Rules tab. 4. Click on the rule you want to move and with the mouse button pressed down, drag the rule to the new location in the table. Rules are now applied to traffic according to the new priority order. How to open a port through the firewall You can open a port through the firewall if you want to allow some Internet traffic and you know the port number you want to open. You may not be able to add your own rules to all firewall profiles. Select the firewall profile to which you want to add the new rule before you open the port. When you open a port through the firewall, you create a new firewall rule and two new services. 1. On the main page, click Tasks. 2. Click Open firewall port. 3. In the Name field, enter a name for the new firewall rule. 4. In the Port number field, define the responder port for the rule. The responder port is usually mentioned in the product documentation. 5. Click OK. The new rule is added to the firewall rules list and two new services are created on the firewall services list for both the TCP and UDP protocols with the specified port number. Examples of creating firewall rules You can create a new firewall rule if you want to play a new network game, or share files on your home network. Create a rule for a network game This is an example of how to create firewall services and a firewall rule for an imaginary network game called Game_1. For creating the firewall services, you need to know the protocols that the game uses. You also need to know the ports that the game uses for inbound connections from the game server to your computer. In this case, they are the following: Protocol Port Type Location Ports UDP Initiator Game server 1024 UDP Responder Own computer 8889, 9961 TCP Initiator Game server 1025 TCP Responder Own computer 17475, 9961
47 F-Secure Internet Security 2012 Securing network connections 47 Note: You do not have to create firewall services or a firewall rule for outbound connections from your computer to the game server. To create the services and a rule for the inbound connections: 1. Add the new services as follows: Step Enter a name for the first service Select the protocol Enter the initiator port Enter the responder ports Enter a name for the second service Select the second protocol Enter the initiator port Enter the responder ports Example Service_Game_1_UDP UDP , 9961 Service_Game_1_TCP TCP , 9961 After you have added the services, they are shown on the services list. 2. Add a new firewall rule as follows: Step Enter a name for the rule Select the rule type Select the IP addresses Select the services Select the direction Select the alert type Example Rule_Game_1 Allow Any address Service_Game_1_UDP, Service_Game_1_TCP (from the Internet to your computer) No alert After you have added the rule, it becomes active and is shown on the rules list. Create a rule for sharing files on a home network This is an example of creating a new firewall rule for Windows file sharing to share files between computers on your home network. If you use a router on your network, check the Dynamic Host Configuration Protocol (DHCP) settings of your router to find out the IP address range allocated to your home network. For more information, consult the router documentation. The most usual IP address range for home networks is If you want to share files between all your computers, you have to create the same rule on all of the computers. To create the rule: 2. Select Internet > Firewall. 3. Click the Rules tab. 4. Click Add. 5. Enter a name and select the rule type:
48 48 F-Secure Internet Security 2012 Securing network connections Step Enter a name for the rule Select the rule type Example FileSharing Allow 6. Select the IP addresses : Step 1. Click Custom. 2. Click Edit. 3. Select IP range and enter the addresses of your computers in the field. 4. Click Add to list. Example Select the services and direction: Step Select the services that Windows file sharing uses Select the direction for both services Example SMB over TCP/IP (TCP) SMB over TCP/IP (UDP) Windows file sharing and network printers Windows network browsing ICMP / Internet Control Message Protocol (from the Internet to your computer) 8. Select the alerting type: Step Select the alerting type Example No alert 9. Check the summary of the rule and click Finish. Your new rule is now shown on the rules list on the Rules tab, and it is automatically turned on. 10. Test that the rule works. To do this, use Windows file sharing to share a folder or file and check whether you can access the folder or file from all of your computers. Tip: If you want to share the printer on your home network, create a similar rule. In this case, you have to only create an inbound "allow" rule on the computer to which the printer is connected. Turn a firewall rule on or off You can turn a firewall rule off to temporarily allow some traffic that the rule denies. You can turn those rules on or off that you have created yourself. To turn a rule on or off:
49 F-Secure Internet Security 2012 Securing network connections Select Internet > Firewall. 3. Click the Rules tab. 4. Do one of the following: If you want to turn a rule off, clear the checkbox in the In use column. If you want to turn the rule on, select the checkbox. Depending on your selection, the firewall rule is now either on or off. Change a firewall rule You can only change a firewall rule that you have created yourself. To change a rule: 2. Select Internet > Firewall. 3. Click the Rules tab. 4. Select the rule and click Details. The Rule details dialog box opens. 5. Make the necessary changes in each step and move to the next step by clicking Next. 6. In the Rule details dialog box, check the changes that you made. 7. If you are satisfied with the rule, click Finish. The changes that you made are applied to the rule. Firewall settings On the Settings tab, you can change the IPv6 settings and the alerting level, and allow all traffic between computers on a home network. The Settings tab also contains the Block IP fragments shorter than field. The firewall blocks IP packet fragments that are shorter than the recommended limit shown in this field. Short IP packet fragments may indicate a fragmentation attack, which may cause your computer to crash. We recommend that you do not change the limit in this field. Change the IPv6 settings On the Settings tab, you can define how the firewall handles IPv6 traffic. If your operating system is Microsoft Windows Vista or Windows 7, you can either block all IPv6 traffic or apply normal firewall rules to the traffic. If you use some other operating system, you can only block all or allow all IPv6 traffic. To change the IPv6 settings: 2. Select Internet > Firewall. 3. Click the Settings tab. 4. To define how the firewall handles IPv6 traffic, select one of the following options on the Select IPv6 traffic filtering options list: If you use Microsoft Windows Vista or Windows 7: Block : Blocks all IPv6 traffic. We recommend that you keep this option selected. Normal : Normal firewall rules define whether IPv6 traffic is allowed or blocked. You may want to select this option if you are using the IPv6 protocol on your computer.
50 50 F-Secure Internet Security 2012 Securing network connections If you use some other operating system: Block : All IPv6 traffic is blocked. We recommend that you keep this option selected. Allow : Allows all IPv6 traffic. You may want to select this option if you are using the IPv6 protocol on your computer. Note: Allowing all IPv6 traffic is a security risk because no firewall rules are applied to the IPv6 traffic. 5. Click OK. The changes that you made to the IPv6 settings are now active. What to do if you share an Internet connection If you want to share an Internet connection on your computer with the rest of your home network, you need to allow all traffic through the firewall between these computers. Note: Allow all traffic through the firewall only if you use Windows Internet Connection Sharing. If you want to share other resources, such as drives, files or printers, we recommend that you create new firewall rules for this purpose. You can allow all traffic through the firewall by defining the connection between the home network and the computer with the Internet connection as trusted. You can define a trusted network interface, if: You have a computer with an Internet connection. This computer has two network interface cards : One for the Internet connection, and one for the home network connection. You have activated Windows Internet Connection Sharing on the computer which has the Internet connection. You have installed our product with a firewall on all of your computers. This makes sure that it is safe to define a trusted interface between your computers. To define the trusted network interface, you need to select the network interface card (adapter) which connects the computer to the home network. To select the network interface card on the computer with the Internet connection: 2. Select Internet > Firewall. 3. Click the Settings tab. 4. On the Trusted network adapter list, select the network interface card (adapter) which connects your computer to the home network. The IP address of the computer is shown in the IP address field. 5. Click OK. Note: Because the firewall allows all traffic through the selected network interface, make sure that you do not select the Internet interface as trusted. If you do this, the firewall does not protect your computer anymore. The firewall now allows all traffic between the computer with the Internet connection and your home network, and you can use the Internet from all your computers. What If You Use a Digital TV Card If you use a digital TV card, and the television picture freezes, you may also have to define the interface to the television as trusted.
51 F-Secure Internet Security 2012 Securing network connections 51 How to control network applications Application control prevents harmful programs from connecting to the Internet. Application control protects you mainly against outbound threats that are caused by programs on your computer. Typically, when a program tries to connect to the Internet, application control shows a pop-up. In this pop-up you can allow or deny the connection: If you trust that the program is safe, you can allow the connection. For example, you can consider the program safe if you have just opened it yourself. When you allow the connection, the firewall opens a port for this program and allows the connection for as long as the program is open. When you close the program, the firewall closes the port. If you do not trust the program, you need to deny the connection. For example, a program can be unsafe if you do not recognize it or you have not installed it yourself. Depending on your application control settings, application control pop-ups may not be shown for programs that DeepGuard considers safe. These programs are allowed to connect to the Internet automatically. Application control also asks you whether you want to allow connections from the Internet to the programs on your computer. This happens, for example, if you are using Skype. Note: If a program does not work on your computer, do not turn off application control. If you do, the level of protection reduces on your computer. Instead, change the application control settings or firewall rules. What is the difference between the firewall and application control A firewall provides you general protection on the network level, whereas application control allows you to control the use of specific programs. The firewall protects you against threats that are caused by connections from the Internet to your computer (inbound). The firewall allows or denies connections on the basis of the IP protocols and IP addresses that the connections use. Application control mainly protects you against threats that are caused by connections from your computer to the Internet (outbound). Application control allows or denies connections on the basis of the programs that create the connections. What to do if an application control pop-up appears When an application control pop-up appears, you need to decide whether you allow or deny a connection attempt for the application. Application control pop-ups may indicate malicious activity, such as trojans, worms or spyware. On the other hand, the applicaiton control pop-up may appear when you use normal, clean applications. To decide whether you want to allow or deny the connection attempt: 1. Check the information about the connection attempt in the pop-up. Click Details to view more information of the connection attempt. The detailed information shows the name, file path, direction of the network connection and the IP address and port. 2. Select I trust the application. Allow connections to both directions in the following cases: You started the application yourself for the first time, which tries to connect to the Internet or the local network. You have updated the application on your computer since you last used it, which tries to connect to the Internet or the local network.. You started the application on your computer yourself, which is trying to start listening for inbound connections.
52 52 F-Secure Internet Security 2012 Securing network connections You have updated the application on your computer since you last used it, which is trying to start listening for inbound connections. If you do not recognize the application or you did not start the application yourself, select I do not trust the application. Block the connection. 3. Click OK. Depending on the action that you select, the connection is either allowed or denied and the program is added to the list of allowed or denied programs on the Applications tab. No pop-ups are shown anymore about the connection attempts of this program. Safe and unsafe programs and connection attempts Before allowing a connection in an application control pop-up, consider whether the program is safe. Which programs and connection attempts you can consider safe A known program that you have started yourself. Microsoft Windows operating system, which connects to the Internet for update services. Which programs and connection attempts you cannot consider safe Any program that you have received from an unknown source. Any program that you have not installed yourself, or you do not recognize. Any program, which you consider safe but which tries to connect to the Internet or act as a server without you starting it. Allow or deny connections for programs You can allow or deny Internet connections for programs on the Applications tab. You can, for example, allow a connection for a program that you have accidentally denied in an application control pop-up. By default, the Applications tab shows the following programs: All programs that you have allowed and denied when the Ask about all applications option is turned on. The allowed programs when the Allow all and add to the applications list option is turned on. The programs that you have manually added to the programs list. This tab does not show automatically allowed operating system programs or programs that DeepGuard considers safe. To allow or deny the connection for a program: 2. Select Internet > Application control. 3. Click the Applications tab. 4. Select the program and click Details. The Application details dialog box opens. 5. Under Outbound (client) connection, select the suitable option: Deny: If you want to deny the program from connecting to the Internet the next time the program is started. Allow: If you want to allow the program to connect to the Internet the next time the program is started. 6. Under Inbound (server) connection, select the suitable option: Deny: If you want to deny connections from the Internet to the program.
53 F-Secure Internet Security 2012 Securing network connections 53 Allow: If you want to allow connections from the Internet to the program. 7. Click OK. Tip: You can allow or deny Internet connections for a new program even before you have started to use it. Click Add and select the new program file to add it to the list. Then you can either allow or deny the inbound and outbound connections for this program. Turn application control pop-ups on or off You can turn the application control pop-ups on or off. Keep application control pop-ups turned on if you want to control which applications you allow to open connections to the Internet. If you do not want to choose applications which are allowed to open connections, you can allow all new applications to connect to the Internet. To turn application control pop-ups on or off: 2. Select Internet > Application control. 3. Click the Settings tab. 4. Select one of the following options: Select Allow all and add to the applications list to turn application control pop-ups off. The product allows connections for all programs automatically. If you do not want application control pop-ups to be shown for programs that DeepGuard has analyzed, select Ask when DeepGuard does not recognize the application. The product opens the application control pop-up only when an application that DeepGuard does not recognize tries to connect to the Internet. We recommend that you keep this selection selected. Select Ask about all applications to turn application control pop-ups on. A pop-up is shown to you the first time a new application tries to open a connection. 5. Click OK. Depending on your selection, the application control pop-ups are now either turned on or off. What to do if a program stops working If you start using a new program, for example a network game, it may stop working if it cannot connect to the Internet. This can happen, for example, for the following reasons: Your current firewall profile is very strict, and it denies Internet connections for most of the programs, including the network game you are using. You have missed an application control pop-up, and the pop-up has remained active on the background. You have accidentally denied the connection in the pop-up. To make sure that the program can connect to the Internet, do the following: 2. Select Internet > Firewall. 3. On the Rules tab, check the current firewall profile. If it is a very strict one, change it to a less strict one, and click OK. 4. Start the program and check whether it works now. 5. If the program does not work, turn application control pop-ups temporarily off to allow all connections for new programs.
54 54 F-Secure Internet Security 2012 Securing network connections 6. Select Internet > Application control. 7. On the Settings tab, select Allow all and add to the applications list, and click OK. 8. Start the program and check whether it works now. 9. If the program works, turn application control pop-ups back on. 10. Select Internet > Application control. 11. On the Settings tab, select Ask when DeepGuard does not recognize the application, and click OK. How to prevent intruders Intrusion prevention protects against network attacks aimed at open ports on your computer. Intrusion prevention uses predefined rules for recognizing network attacks. These rules contain information on known malicious traffic. When intrusion prevention recognizes traffic that matches a rule, it blocks the traffic (if the Block and log option is on) and generates an alert to the firewall alerts log. Depending on your settings, a firewall alert pop-up may also appear. Intrusion prevention recognizes and prevents malicious traffic caused by network worms such as the Sasser worm. The Sasser worm infects vulnerable systems by sending malicious traffic to the Microsoft network share service on TCP port 445. This service is used for sharing printers and files on a network. The worm opens a TCP connection to the port, and sends malicious traffic through the port. The traffic overflows the system, and may cause, for example, the whole system to crash. Note: Do not turn intrusion prevention off. If you do, the level of protection on your computer reduces. What is the difference between the firewall and intrusion prevention The difference to the firewall is that intrusion prevention blocks only traffic that it considers malicious, and lets other traffic through a port. The firewall either allows or blocks all traffic that goes through the port. Select how intrusion attempts are handled On the Intrusion prevention tab, you can select how intrusion attempts are handled. The intrusion attempts can be either automatically blocked and logged, or only logged. To select how intrusion attempts are handled: 2. Select Internet > Intrusion prevention. 3. Select one of the following options: Block and log attempt: Select this option if you want to both block and log the intrusion attempts. The attempts are blocked and information about the attempts is shown in the Firewall alerts dialog box. Log: Select this option if you want to only log the intrusion attempts. Information about the attempts is shown in the Firewall alerts dialog box. 4. If you want that a Firewall alert pop-up is shown if an intrusion attempt is suspected, select Alert when intrusion attempt is suspected. 5. Click OK. The intrusion prevention setting has now been changed.
55 F-Secure Internet Security 2012 Securing network connections 55 How to control dial-up connections Dial-up control prevents malicious dialer programs from opening connections to expensive pay-per-minute phone numbers. Malicious dialer programs may try to close your Internet connection and open a new dial-up connection to another number. The connection to this number may be very expensive and benefits the creator of this dialer program. By using dial-up control, you can prevent these malicious dialer programs from closing and opening new connections. Dial-up control also prevents you from dialing accidentally to wrong or expensive numbers. You can make sure that dial-up connections are safe by defining: the numbers to which programs can open a dial-up connection, and the programs that are allowed to close dial-up connections. Note: Dial-up control is meant for users who use a modem or ISDN for their Internet connection. Virus and spyware scanning recognizes the malicious dialer programs as spyware and can remove them from your computer. If a new malicious dialer program is not recognized, dial-up control prevents this dialer program from opening any dial-up connections. If you suspect that you have an unrecognized dialer on your computer, you can send the dialer file as a sample to F-Secure. After that, F-Secure updates the virus and spyware definition databases and you can scan your computer again. The dialer is then recognized and can be removed from your computer. What to do if a dial-up control pop-up appears If a New dial attempt pop-up appears, you can either allow or deny the dial-up connection. To allow or deny a dial-up connection : 1. Check the name of the program. 2. Check the phone number. 3. Either allow or deny the dial-up connection : If the number is correct (given by your service provider) and the program is the one you have opened yourself: 1. Select Remember this decision. 2. Click Allow. If the number is wrong, or the connection was opened automatically: 1. Select Remember this decision. 2. Click Deny. The connection is allowed or denied based on the decision you made. The number and information about the program is added to the numbers list on the Number list tab. After this: If you have allowed the connection, no pop-up is shown if a program tries to open a dial-up connection to this number again. If you have denied the connection, and a program tries to open a dial-up connection to this number, a Denied dial attempt pop-up appears. Close the pop-up by clicking Close.
56 56 F-Secure Internet Security 2012 Securing network connections Note: A connection pop-up may appear if a program tries to close a dial-up connection. If the program is the one that you have closed yourself, you can allow the closing of the dial-up connection. You can do this by clicking Allow. If the program is not the one you have closed, you must deny the closing by clicking Deny. Denying the closing attempt makes sure that no malicious dialer programs can close your Internet connection and open a new connection to another number. Edit allowed phone numbers You can add phone numbers to the numbers list on the Number list tab if you want to allow or deny dial-up connections to these numbers. To add a new number to the list: 2. Select Internet > Dial-up control. 3. Click the Number list tab. 4. Click Add. The Add number/range dialog box opens. 5. In the Description field, enter a description for the number. 6. In the Number field, enter the number: You can use the following characters: #* You can use an area code and country code, for example, , You can use other characters, such as a space or a hyphen, for grouping the numbers. However, note that dial-up control disregards other characters than the ones mentioned above. For example, it treats as the same number as You can enter a number range by using the following wildcards: "?" to replace any single number. For example, to deny the dial-up connection to certain service numbers, enter 0900? "X" or "x" to replace one or several numbers. You can use this wildcard, for example, if you want to deny dial-up connections to abroad. If you normally use "00" to dial abroad, enter "00x" to deny all dial-up connections abroad. 7. Select whether you want to deny or allow the dial-up connection attempts: Select Denied to block all dial-up connection attempts to the number you entered. Select Allowed to allow dial-up connections to the number you entered. 8. Click OK. The Number list tab now shows the phone number or number range, and the action you selected: If you allowed the number, the icon is shown in front of the number. If you denied the number, the icon is shown in front of the number. 9. If you need to change the priority order of numbers click on the number on the list you want to move and with the mouse button pressed down, drag the number to the new location in the table. Note: The Number list tab may include some predefined numbers if your service provider has denied or allowed dial-up connections to certain numbers. You cannot change or remove these numbers.
57 F-Secure Internet Security 2012 Securing network connections 57 View programs that are allowed to close dial-up connections You can view safe programs, which are allowed to close dial-up connections, on the Settings tab. This tab shows the following programs: Safe programs that are always allowed to close dial-up connections, for example, the web browser that you are using. Programs for which you are asked whether you want to allow or deny the closing of the dial-up connection. The tab shows the programs that you have allowed to close dial-up connections. This tab does not show the denied programs. If you have denied an application to close the dial-up connection in a pop-up, the application cannot close the connection until you restart the computer. If you allow an application to close the dial-up connection, the application can close it any time and you do not have to make the selection again. To view the programs: 2. Select Internet > Dial-up control. 3. Click the Settings tab. This tab shows a list of programs that are allowed to close dial-up connections. View dial-up connection attempts By activating the logging for dial-up control, you can view the dial-up connection attempts that the product has detected. By default, the dial-up control logging is off. To turn the logging on: 2. Select Internet > Dial-up control. 3. Click the Settings tab. 4. To turn logging on, select Enable Dial-up control log. 5. To view the log that has been created, click Show log. You can view the following information: Attempts to open or close dial-up connections. Whether the attempts were allowed or denied. Dialed phone numbers. What to do if you cannot access the Internet If the dial-up connection to your Internet Service Provider (or to some other phone number) stops working, check that you have not accidentally denied connections to that number. To do this: 2. Select Internet > Dial-up control. 3. Click the Number list tab. 4. Check whether the number that you tried to dial to is on the list. If it is, and it is denied (the shown in front of it), do the following: icon is
58 58 F-Secure Internet Security 2012 Securing network connections a) Select the number. b) Click Edit. c) Select Allowed. d) Click OK. The icon in front of the number has changed to. Test if the connection to the number works now. Where to find firewall alerts and log files By viewing the firewall alerts and log files, you can find out how network connections are protected on your computer. View firewall alerts You can view a list of all generated firewall alerts. The list contains alerts that the firewall and intrusion prevention have caused. To view the list: 2. Select Internet > Firewall. 3. Click the Settings tab. 4. Click Show alert log. The Firewall alerts dialog box opens and shows the following information: Field Time Remote address Hits Description Description Time of the alert. IP address of the computer from which you have received traffic, or sent traffic to. Shows how many times a similar alert has been generated. An alert text that has been added for the firewall rule. If an intrusion attempt has caused the alert, the field shows information on the intrusion attempt pattern. 5. To view alert details, select the alert and click Details. 6. To move to the next or previous alert, click the Prev or Next button. 7. After viewing the details, click Close to close the Firewall alerts details dialog box. 8. Click Close to close the Firewall alerts list dialog box. Firewall alert information A firewall alert contains information on the traffic that caused the alert. A firewall alert contains the following information:
59 F-Secure Internet Security 2012 Securing network connections 59 Field Description Action Time Direction Protocol Services Remote address Remote port Local address Local port Description An alert text that has been added for the firewall rule. If the alert is caused by an intrusion attempt, the alert shows information on the intrusion attempt pattern. Shows what happened, for example that the firewall blocked or allowed the traffic. The date and time when the alert was generated. Shows whether the traffic is inbound or outbound (from a remote computer to your own computer or vice versa). The used IP protocol. Shows the firewall services to which this traffic matched. The IP address of the remote computer. The port on the remote computer. The IP address of your own computer. The port on your own computer. View the action log If a program, such as a network game, does not work, you can check in the action log if application control has denied the program from connecting to the Internet. The action log is a text file ( action.log ) that automatically collects information about the network connections. The maximum size of the file is 10 MB. After the file becomes full, the old log entries are deleted. To view the action log : 2. Select Internet > Logging. 3. Click Show action log. The action log opens in a default text editor or viewer, for example, Notepad. Action log examples The action log shows information about opened connections and firewall rule changes. Opening a connection The following is an example of a log entry, which is created when you open your Internet Explorer and a connection is created to an HTTP server : T17:16:10+02:00, info, appl control, C:\PROGRA~1\INTERN~1\iexplore.exe, allow, connect out, 6, , 80 The log entry displays the following information: date, time, type, internal reason, program, control action, network action, protocol number, remote IP address, remote port. Receiving a connection The following is an example of a log entry, which is created when a program on your computer is acting as a server for other computers. These other computers can connect to this server program through the port that application control has opened on your computer (dynamic firewall rule) :
60 60 F-Secure Internet Security 2012 Securing network connections T17:16:10+02:00, info, appl control, unknown, allow, receive, 17, , 138 The log entry displays the following information: date, time, type, internal reason, program, control action, network action, protocol number, remote IP address, local port. Adding and removing a dynamic firewall rule The following is an example of two firewall rule log entries: The first entry shows that application control has added a dynamic firewall rule. The rule allows a temporary inbound connection for a program. The second entry shows that application control has removed the dynamic firewall rule, and the connection has been closed T17:16:10+02:00, info, dynamic rule, added, , , 0, 65535, 371, 371, allow The log entry displays the following information: date, time, alert type, rule type, action, remote IP address range minimum, remote IP address range maximum, remote port range from, remote port range to, local port range from, local port range to, rule action. Monitor network traffic with packet logging You can start packet logging if you want to gather information about the IP network traffic. How does packet logging work The packet log collects information about the IP network traffic. By default, the packet logging is turned off. Packet logging is mainly aimed at experienced users who are familiar with computer networks. You can turn the packet logging on if you have created your own set of firewall rules, and want to check how they block traffic. You can also do this if you suspect malicious network activity. Information is gathered into 10 files ( packetlog.0-packetlog.9 ). Each time you turn on the logging, the packet log is collected into a new file. After the tenth file becomes full, the next log is collected again to the first file. In this way, you can view the previous logs while a new log is generated. In addition to the IP traffic, the packet log also collects information about other types of network traffic, for example, about the protocols needed by your Local Area Network (LAN). This information includes, for example, routing information. The packet log is in hexadecimal format and supports tcpdump format. This allows you to open the log files also in a packet logging program other than the default packet log viewer. You can also use a network protocol analyzer program to analyze the contents further. Start packet logging You can start packet logging if you suspect malicious network activity, or for example, a network game stops working. To start logging: 2. Select Internet > Logging. 3. Use the recommended logging time and file size that are shown in the Logging time and Max log file size fields. You can also change them if you want to. 4. Click Start logging. A new file is added to the log files list. The size of the file increases as information is gathered in the file. If the list already contains 10 log files, the next log is gathered into an existing file. 5. To stop the logging manually, click Stop logging. The logging stops automatically after the defined logging time period has elapsed, or the defined maximum log file size has been reached.
61 F-Secure Internet Security 2012 Securing network connections 61 A new log file is generated and added to the log files list. View the packet log After you have generated a packet log, you can open it for viewing. To view the packet log : 2. Select Internet > Logging. 3. Select the packet log you want to view and click Details. The default packet log viewer opens. The upper pane of the window shows all the logged connections. You can view the following information: Field Time Drop (dir) Protocol Source Destination ID TTL Len Description Description Time in seconds from the moment when logging was started. If the defined logging time is 60 seconds, the starting time for the first packet is close to 0 seconds, and the starting time for the last packet is close to 60 seconds. Shows whether the firewall let through or dropped the packet, and shows the direction of the packet : No : Allowed the packet. Yes : Dropped the packet. in : Inbound packet. out : Outbound packet. This information is not available if you view the file in a packet logging program other than the default packet log viewer. The used IP protocol. Source IP address of the packet. Destination IP address of the packet. IP packet header information: Identifier of the packet. IP packet header information: Time To Live value of the packet defines the number of network devices through which the packet can travel before it is discarded. IP packet header information: Total length of the packet. Description of the packet. The pane on the right shows you the traffic types and their information. The lower pane of the window shows the information in hexadecimal and ASCII format. If you want to view all types of network traffic (and not only IP traffic), clear the Filter non IP checkbox.
62
63 Chapter 4 Block spam Topics: Set up my programs to filter spam What if I receive a lot of spam Allow and block messages from specific addresses Protect against phishing attempts filtering protects your computer against spam and phishing messages. An message is considered spam if it is sent as a part of a larger collection of messages, all having mostly identical content, and if the recipients have not granted verifiable permission for the message to be sent. Spam and phishing messages often tend to swamp desirable messages. You can keep your inbox free of spam in the following ways: use filtering to catch spam and phishing messages and to move them to spam and phishing folders; block messages from specific addresses by adding them to the blocked senders list; allow messages from trusted addresses by adding them to the allowed senders list. If you use an allowed senders list, you create a list of contacts from whom you want to receive messages. By adding your contacts to an allowed senders list, you make sure that their messages are not moved to the spam or phishing folders. If you use a blocked senders list, you create a list of senders from whom you do not want to receive messages. By adding senders to a blocked senders list, you make sure that their messages are moved to the spam or phishing folders. Note: If the address is also on the allowed senders list, the message will not be moved to spam or phishing folder because the allowed senders list has priority over the blocked senders list.
64 64 F-Secure Internet Security 2012 Block spam Set up my programs to filter spam You can create a spam and a phishing folder and filtering rules in your program to filter spam. filtering creates a spam and a phishing folder and filtering rules automatically in Microsoft Outlook, Microsoft Outlook Express, and Windows Mail (in Windows Vista). If you use some other program, you have to create the folders and filtering rules manually. If you have multiple accounts, you have to create the filtering rules for each account separately. Note: Spam and phishing filtering supports only the POP3 protocol. Web-based programs or other protocols are not supported. How do my own and filtering rules work together? filtering filters messages based on its own filtering rules. It does not filter messages that match a rule that you have created. If you have created, for example, a rule that filters all messages from a webstore to the Webstore folder, both your order confirmation messages and advertising material from that webstore are moved out of your inbox and filtered to the Webstore folder. This section contains instructions on how you can create the spam folder and the filtering rule for Microsoft programs, Netscape, Mozilla Thunderbird, and Eudora. You can also use these instructions to create similar filtering rules in other programs. Microsoft programs filtering creates folders for spam and phishing messages, and filtering rules automatically in Microsoft Outlook, Microsoft Outlook Express, and Windows Mail. Note: Automatic filtering may not work with accounts that have been created using the Mail applet found in Windows Control Panel. If you receive spam and phishing messages after turning on filtering, use X-Spam-Flag and X-FS-Classification-phishing message headers to filter spam and phishing messages. Clear junk and phishing folders You can set spam and phishing messages, which are older than the defined number of days, to be automatically deleted in Microsoft Outlook, Microsoft Outlook Express, and Windows Mail (in Windows Vista). If you are waiting for an and cannot find it in your inbox, check your junk and phishing folders to make sure the message was not moved to those folders. To set the junk and phishing folders to be automatically cleared: 2. Select Internet > filtering. 3. Under Outlook integration, do the following: a) Select Clear the junk folders after. b) Select or enter a number that determines which messages are deleted from the junk and phishing folders. For example, if you set the messages to be cleared from the folders after seven days, the system automatically deletes messages that have a send date (in their message header) older than seven days. 4. Click OK.
65 F-Secure Internet Security 2012 Block spam 65 Netscape and Mozilla Thunderbird programs Follow these instructions to create folders for spam and phishing messages, and filtering rules in the Netscape and Mozilla Thunderbird programs. Create folders for spam and phishing messages Search title: Creating Spam and Phishing Folders in Netscape and Mozilla Thunderbird You need to create folders for spam and phishing messages manually in the Netscape and Mozilla Thunderbird programs. To create the folders: 1. Select File > New > Folder to create a new folder for spam messages. 2. Do the following: a) Enter spam as the new folder name. b) From the Create as a subfolder of list, select the directory under which your inbox is located. 3. Click OK to create the new spam folder. 4. Repeat steps 1-3 to create a folder to which phishing messages can be filtered. 5. Check that the new folders were created and are shown under your account. After you have created the folders, create spam and phishing filtering rules. Create spam filtering rule Search title: Creating Spam Filtering Rule in Netscape and Mozilla Thunderbird To filter spam messages to the spam folder, you need to create a filtering rule in the Netscape and Mozilla Thunderbird programs. Before you create a spam filtering rule, make sure the spam folder exists. To create the spam filtering rule: 1. Select Tools > Message Filters. 2. Click New. The Filter Rules dialog box opens. 3. Enter spam as the new filter name. 4. Create a new header entry, which is used to filter spam messages: a) Select Customize from the first list. b) In the Customize Headers dialog box, enter X-Spam-Flag as the new message header and click Add. c) Click OK. 5. Create a rule for moving an message to the spam folder: a) From the first list, select X-Spam-Flag. b) From the second list, select contains. c) In the text box, enter Yes as the text you want to match. 6. Under Perform these actions, do the following: a) From the first list, select Move message to. b) From the second list, select the spam folder you created earlier. 7. Click OK to confirm your new spam filtering rule and to close the Filter Rules dialog box. 8. Close the Message Filters dialog box. You have now created the spam filtering rule. From now on, spam messages are filtered to the spam folder.
66 66 F-Secure Internet Security 2012 Block spam Create phishing filtering rule Search title: Creating Phishing Filtering Rule in Netscape and Mozilla Thunderbird To filter phishing messages, you need to create a filtering rule in the Netscape and Mozilla Thunderbird programs. Before you create a phishing filtering rule, make sure the folder to which phishing messages can be filtered exists. To create the phishing filtering rule: 1. Select Tools > Message Filters. 2. Click New. The Filter Rules dialog box opens. 3. Enter phishing as the new filter name. 4. Create a new header entry, which is used to filter phishing messages: a) Select Customize from the first list. b) In the Customize Headers dialog box, enter X-FS-Classification-phishing as the new message header and click Add. c) Click OK. 5. Create a rule for moving an message to the phishing folder: a) From the first list, select X-FS-Classification-phishing. b) From the second list, select contains. c) In the text box, enter 9 as the text you want to match. 6. Under Perform these actions, do the following: a) From the first list, select Move message to. b) From the second list, select the phishing folder you created earlier. 7. Click OK to confirm your new phishing filtering rule and to close the Filter Rules dialog box. 8. Close the Message Filters dialog box. You have now created the phishing filtering rule. From now on, phishing messages are filtered to the phishing folder. Opera program Follow these instructions to create folders for spam and phishing messages, and filtering rules in the Opera program. Create filters for spam and phishing messages Search title: Creating spam and phishing filters in Opera filtering creates the spam filter automatically in the Opera program. You need to create a phishing filter manually. Note: Spam and phishing filters in Opera are equivalent to folders created for spam and phishing messages in other programs. To create a phishing filter: 1. Open the Opera Mail view. 2. On the Mail pane, right-click All Messages and select New Filter. 3. Enter a name for the phishing filter. The new filter is shown under Filters on the mail pane. 4. Check that the new spam and phishing filters were created and are shown under Filters.
67 F-Secure Internet Security 2012 Block spam 67 After you have created the filter for phishing messages, create spam and phishing filtering rules. Create spam filtering rule Search title: Creating Spam Filtering Rule in Opera To filter spam messages, you need to create a filtering rule in the Opera program. Before you create a spam filtering rule, make sure the spam filter exists. Note: The steps given here apply to Opera version 9.6. The steps for other versions may vary slightly. To create a spam filtering rule: 1. Open the Opera Mail view. 2. Right-click your spam filter and select Properties. 3. Select the default rule displayed on the list. If the list does not contain any rules, click Add Rule. 4. Create a rule for moving an message to the spam filter: a) From the first list, select any header. b) From the second list, select contains. c) In the text box, enter X-Spam-Flag: Yes as the text you want to match. Make sure that you leave a space between the colon and Yes. 5. Click OK to confirm your new spam filtering rule. Create phishing filtering rule Search title: Creating Phishing Filtering Rule in Opera To filter phishing messages, you need to create a filtering rule in the Opera program. Before you create a phishing filtering rule, make sure the filter to which phishing messages can be filtered exists. Note: The steps given here apply to Opera version 9.6. The steps for other versions may vary slightly. To create a phishing filtering rule: 1. Open the Opera Mail view. 2. Right-click your phishing filter and select Properties. 3. Select the default rule displayed on the list. If the list does not contain any rules, click Add Rule. 4. Create a rule for moving an message to the phishing filter: a) From the first list, select any header. b) From the second list, select contains. c) In the text box, enter X-FS-Classification-phishing: 9 as the text you want to match. Make sure that you leave a space between the colon and '9'. 5. Click OK to confirm your new phishing filtering rule. Eudora program Follow these instructions to create folders for spam and phishing messages, and filtering rules in the Eudora program. Create folders for spam and phishing messages Search title: Creating Spam and Phishing Folders in Eudora
68 68 F-Secure Internet Security 2012 Block spam You need to create a spam folder manually in the Eudora program. To create a spam folder: 1. Select Mailbox > New. 2. Enter spam as the new mailbox name. 3. Repeat steps 1-2 to create a folder to which phishing messages can be filtered. 4. Check that the new folders were created and are shown under the Eudora mailboxes. After you have created the folders, create spam and phishing filtering rules. Create spam filtering rule Search title: Creating Spam Filtering Rule in Eudora To filter spam messages, you need to create a filtering rule in the Eudora program. Before you create a filtering rule, make sure a spam folder exists. To create a spam filtering rule: 1. Select Tools > Filters. 2. Click New. 3. Under Match, select Incoming to filter incoming messages. 4. Create a rule for moving an message to the spam folder: a) In the Header list, enter X-Spam-Flag in the Header field. b) From the second list, select contains. c) Enter Yes in the contains field. 5. Under Action, do the following: a) From the first list, select Transfer to. b) Click In and from the list, select the spam mailbox. 6. Close the Filters dialog box. 7. Click Yes to save the changes. Create phishing filtering rule Search title: Creating Phishing Filtering Rule in Eudora To filter phishing messages, you need to create a filtering rule in the Eudora program. Before you create a phishing filtering rule, make sure the folder to which phishing messages can be filtered exists. To create a phishing filtering rule: 1. Select Tools > Filters. 2. Click New. 3. Under Match, select Incoming to filter incoming messages. 4. Create a rule for moving an message to the phishing folder: a) In the Header list, enter X-FS-Classification-phishing in the Header field. b) From the second list, select contains. c) Enter 9 in the contains field. 5. Under Action, do the following: a) From the first list, select Transfer to. b) Click In and from the list, select the phishing mailbox. 6. Close the Filters dialog box.
69 F-Secure Internet Security 2012 Block spam Click Yes to save the changes. What if I receive a lot of spam If you receive a lot of spam messages in your inbox, there are a number of settings you should check. To reduce the amount of spam messages you receive, do the following: 1. Check that filtering is turned on: a) On the main page, click Settings. b) Select Internet > filtering. c) Select Turn on filtering if not selected. 2. Make sure you have created spam and phishing folders and filtering rules in your program. 3. In your program, check that the POP3 protocol is selected. filtering supports only the POP3 protocol. For advice on checking the protocol, consult your Internet Service Provider. 4. Check that filtering listens to the same port as your program. You only have to change the port, if your program uses a non-standard port. a) On the main page, click Settings. b) Select Internet > Virus and spyware scanning. c) Click Protocols. d) Under Port numbers, check that the port number used for the POP3 protocol is the same as the port used in your program. For information on the port used for the POP3 protocol, consult your Internet Service Provider. e) Click OK. 5. Check that your filtering level is strict enough: a) On the main page, click Settings. b) Select Internet > filtering. c) Under Spam and phishing filter mode, select Aggressive, if not selected. d) Click OK. What are spam and phishing filtering levels Spam filtering levels determine how aggressively filtering blocks spam and phishing messages. When filtering detects spam or phishing messages, it moves them to a special spam or phishing folder according to the selected filtering level. If you feel that you receive too much spam messages in your inbox, select a filtering level that is more strict. If you feel that too many legitimate messages are being filtered, select a level that is less strict. You can select from the following pre-defined levels: Aggressive - select this level if you receive a lot of spam messages and you want to block as many of them as possible. Medium - (default setting) select this level if you do not receive a lot of spam messages or if the legitimate messages sent to you are not filtered as spam.
70 70 F-Secure Internet Security 2012 Block spam Change spam and phishing filtering level By selecting a more aggressive filtering level, you can reduce the amount of spam messages you receive in your inbox. To change the filtering level: 2. Select Internet > filtering. 3. Under Spam and phishing filter mode, select one of the pre-defined filtering levels. 4. Click OK. Reset spam and phishing learning system When filtering scans messages, it automatically learns to recognize spam and phishing messages more accurately. Note: Reset the learning system only if you are instructed to do so. Sometimes there are problems in the learning process. As a result, legitimate mail might be detected as spam or phishing. You can reset the learning system to clear the learned rules. To restore the default settings: 2. Select Internet > filtering. 3. Click Reset filters. 4. In the confirmation message, click OK. The learning system is reset and the system uses the default settings. Set the port for protocols If your program uses a non-standard port, you must change the port that is scanned for spam. To set the port: 1. Open your application and check which port is being used to receive POP3 . Note this port number down. Note: protocols other than POP3 are not supported. 2. Open the product. 3. On the main page, click Settings. 4. Select Internet > filtering. 5. Click Show protocols. 6. Enter the port number used for the POP3 protocol. 7. Click OK.
71 F-Secure Internet Security 2012 Block spam 71 Allow and block messages from specific addresses You can use allowed and blocked senders lists to allow and block messages from specific addresses. Allowed and blocked senders lists help you block unwanted messages and allow other messages to get through. An allowed senders list reduces the number of legitimate messages that are incorrectly identified as spam or phishing messages. Edit addresses I trust By adding addresses to your allowed senders list, you make sure messages from those addresses are let through and never treated as spam or phishing messages. You can add, edit or remove individual addresses or whole domains to your allowed senders list. For example, if you add *@example.com to your allowed senders list, all messages from the example.com domain are allowed. To edit your list of trusted addresses: 2. Select Internet > filtering. 3. Click Allow senders. The Allow senders settings page opens. 4. Choose one of the following actions: To add a new address: a) Click Add. The Add sender/domain dialog box opens. b) In the Address field, enter the address or domain name from which you want to allow messages. You can add a short description for the new address in the Description field. c) Click OK. The new address is now shown on your allowed senders list. To edit an address: a) In the list, select the address you want to edit, and click Edit. The Edit sender/domain dialog box opens. b) Edit the selected address, and click OK. To remove an address from the allowed senders list: a) In the list, select the address you want to remove, and click Remove. The address is removed from the list. Import contacts to my allowed senders list You can import contacts from your Microsoft Outlook, Microsoft Outlook Express and Windows Mail (in Windows Vista) address books to the allowed senders list. By importing contacts to your allowed senders list, you make sure that messages coming from those addresses are not incorrectly filtered as spam or phishing messages. To import contacts:
72 72 F-Secure Internet Security 2012 Block spam 2. Select Internet > filtering. 3. Click Allow senders. The Allow senders settings page opens. 4. Click Import contacts from Outlook or Windows Mail. A message is shown telling you whether the contacts were successfully imported or not. Note: If importing the contacts failed, the message shows the reason. 5. Click OK to close the message. 6. Click OK. The imported contacts are now shown on your allowed senders list. Block messages from specific addresses messages from the addresses or domains on your blocked senders list are treated as spam or phishing messages and filtered to the spam or phishing folder. You can add, edit or remove individual addresses or whole domains to your blocked senders list. For example, if you add *@example.com to your blocked senders list, all messages from the example.com domain are blocked. To edit your list of blocked addresses: 2. Select Internet > filtering. 3. Click Block senders. 4. Choose one of the following actions: To add a new address: a) Click Add. The Add sender/domain dialog box opens. b) In the Address field, enter the address or domain name from which you want to block messages. You can add a short description for the new address in the Description field. c) Click OK. The new address is now shown on your blocked senders list. To edit an address: a) In the list, select the address you want to edit, and click Edit. The Edit sender/domain dialog box opens. b) Edit the selected address, and click OK. To remove an address from the blocked senders list: a) In the list, select the address you want to remove, and click Remove. The address is removed from the list.
73 F-Secure Internet Security 2012 Block spam 73 Protect against phishing attempts filtering protects your computer against phishing attempts that use fake messages, which appear to come from legitimate businesses, to steal your personal information. These authentic-looking messages are designed to fool you into giving away your personal data, such as bank account numbers, passwords, and credit card and social security numbers. Do not trust any messages marked as Phishing. When you get a new message that is identified as a phishing attempt, it is automatically moved to the phishing folder. In Microsoft Outlook, Outlook Express, and Windows Mail (in Windows Vista), the phishing folder and rule are created automatically. If you use another program, you must create the phishing folder and filtering rule manually. In this product, Anti-Phishing is part of filtering.
74
75 Chapter 5 Using the Internet safely Topics: How to run common tasks How to protect your family members What is browsing protection Making browsing safe for children How to schedule browsing time Information about how to get started with the product. This product helps you and your family to browse the web safely. In addition to protecting you against malicious software and web sites, you can also restrict the type of content that can be viewed by your children. The product uses Windows user accounts to control the settings for each member of your family. Only someone with administrative access rights is allowed to change the product settings for the various Windows user Viewing statistics accounts. We recommend that you set up a separate Windows user account for each family member. For example, parents can have administrative access rights, and children can have normal access rights for their Windows user accounts.
76 76 F-Secure Internet Security 2012 Using the Internet safely How to run common tasks You can see what you can do with the product and run common tasks in the Tasks page. To open Tasks page: On the main page, click Tasks. The Tasks page opens. How to protect your family members You should use separate Windows user accounts for each of your family members to provide the best protection against online threats. The product allows you to use different settings for each Windows user account that you have set up on your computer. For example, you can give your teenagers more freedom to browse the Internet while having tighter restrictions on your small children's online activities. Only users who have administrator access can change the product settings for other user accounts. In a family, parents should have administrator accounts and children should have normal user accounts, so that your children cannot change the settings that you have defined for them. Creating and editing Windows user accounts You can access the settings Windows user accounts through the product. To create or edit Windows user accounts: 1. On the main page, click Tasks. 2. Click Create new account or Edit user accounts. This opens the user account settings in Windows. 3. Complete the necessary details to create or edit the user account. What is browsing protection Browsing protection helps you evaluate the safety of web sites you visit and prevents you from unintentionally accessing harmful web sites. Browsing protection is a browser plug-in that shows you safety ratings for web sites listed on search engine results and in web mail content. By helping you avoid web sites that contain security threats, such as malware (viruses, worms, trojans) and phishing, browsing protection's safety ratings help you avoid the latest Internet threats that are not yet recognized by traditional antivirus programs. There are four possible safety ratings for web sites; safe, suspicious, harmful and unknown. These safety ratings are based on information from several sources, such as F-Secure malware analysts and F-Secure partners, as well as ratings given by other users of browsing protection. How to turn browsing protection on or off You will be blocked from accessing harmful websites when browsing protection is turned on. To turn browsing protection on or off:
77 F-Secure Internet Security 2012 Using the Internet safely On the main page, click Users. 2. Select the Windows user account that you want to edit, then click the switch next to Browsing protection. Browsing protection is now switched on or off for this user, depending on the previous setting. 3. If your browser is open, restart your browser to apply the changed settings. Browsing protection safety ratings Browsing protection shows safety ratings for web sites on search engine results and in web mail content. Color-coded icons show the safety rating of the current site (on the toolbar). The safety rating of each link on search engine results and in web mail messages is also shown with the same icons. Four different color-coded icons are used: Green shows that the page is safe. Amber shows that the page is suspicious. Security analysis of the page indicates that it is safe, but many users have given it a low safety rating. Red shows that the page is harmful. Gray indicates that the page has not been analyzed and no information is currently available for it. Safety ratings are available on the following search sites: Google MSN Live Yahoo You can view safety ratings for web links in the s that you send and receive. Safety ratings are available in the following programs: Google MSN Hotmail Classic Yahoo Mail Depending on your browsing protection settings, you may visit web sites that have been rated as unsafe. The web sites are either automatically blocked, or you are only notified of a possible risk. Show ratings for web links Browsing protection ratings can be shown for search engine results, links in web mail content, or both. To define where browsing protection ratings are shown: 1. On the main page, click Users. 2. Select the Windows user account that you want to edit, then click Settings next to Browsing protection. The Browsing protection setttings dialog box opens. 3. Under Show ratings, select or clear Search engine results (Google, Yahoo). When selected, browsing protection ratings will be displayed for the sites listed on search engines (Google, Yahoo, etc.). 4. Select or clear Links in web mail (Gmail, Yahoo Mail). When selected, browsing protection ratings will be displayed for links in the content of web mail messages (Gmail, Yahoo, Hotmail, etc.). 5. Click OK. Safety ratings will be displayed according to the settings you selected. Tip: You can click Security summary for this web site on the safety rating pop-up to go to the Browsing Protection portal, where you will find more details about the web site and what its safety rating is based on.
78 78 F-Secure Internet Security 2012 Using the Internet safely How to rate web sites You can rate any web site you access as safe or harmful. To rate a web site: 1. Select Notify us from the browsing protection menu in your browser. This opens the Notify us dialog box. 2. Select a rating to give your opinion of the web site's safety (It is safe to use, It is harmful to use or I have no opinion). 3. Click OK. This will open the rating confirmation dialog box. 4. Click OK. Tip: Select Do not show this message again if you do not want to see the confirmation dialog box when rating web sites in future. Your rating is now submitted to the analysis and rating information gathered for this web site. Protect against harmful content Browsing protection blocks access to unsafe web sites based on the selected settings. To select when to block access to a web site: 1. On the main page, click Users. 2. Select the Windows user account that you want to edit, then click Settings next to Browsing protection. The Browsing protection settings dialog box opens. 3. Select Web sites that are rated harmful to block access to any web site that has been rated harmful. 4. Click OK. Browsing protection will now block access to web sites according to the selected settings. What to do when a web site is blocked A browsing protection block page appears when you try to access a site that has been rated harmful. When a browsing protection block page appears: 1. Click Home page to go to your home page without accessing the harmful site. We strongly recommend this action. Tip: You can click Security summary for this web site to go the Browsing Protection portal, where you will find more details about the web site and what its safety rating is based on. 2. If you want to enter the web site anyway, click Enter web site. Security summary for a web site A summary of the rating information for any rated web site is available on the Browsing Protection portal. The security summary for a web site gives you more details about what the safety rating is based on. For example, the security summary can show whether the safety rating is based on malware found on the site, low ratings from other users, or both. The security summary can be accessed from different places: From the safety rating menu on the toolbar, From the safety rating pop-up for web site links, and From the security summary link on browsing protection blocked site pages.
79 F-Secure Internet Security 2012 Using the Internet safely 79 Clicking on any of these links will bring you to the Browsing Protection portal, where you will see the details of the safety rating for the web site. Making browsing safe for children You can keep your children safe from the many threats of the Internet by monitoring their browsing. The Internet is full of interesting web sites, but there are also many risks for children who use the Internet. Many web sites contain material that you might consider inappropriate for your children. Children can get exposed to inappropriate material, or they may receive harassing messages via or chat. They can accidentally download files that contain viruses that could damage the computer. Teenagers are at risk as they are online, often unsupervised, and as they participate in online discussions. Note: Restricting access to online content protects your children from chat and programs that run in your web browser. You can block your children's access to other chat or programs using the Application Control security component. You can restrict what web pages your children can view, and schedule the time you allow them to spend online. These restrictions are applied to Windows user accounts, so whenever your children log in with their own user account, the restrictions are in place. Limit access to web content You can select the type of filtering that you want to have when your children are online. For your children, web page filtering blocks access either to any web pages that you have not allowed, or to any web pages that contain content that you have decided to block. Allow web pages You can allow your children to only access web sites and pages that you trust by adding them to the list of allowed web sites. To allow your children to access web pages: 1. On the main page, click Users. 2. Select the Windows user account you want to edit, then click Settings next to Web page filter. The web filtering wizard opens. 3. Click Next on the first page. 4. Select Allow only selected web sites, then click Next. 5. Click Add to add web sites to the Allowed web sites list. 6. When you have added all the web sites you want your child to access, click Next. 7. Click Finish to close the web filtering wizard. When they are logged in to your computer with their own Windows user account, your children can now only access the web sites that you added to the list of allowed web sites. Block web pages by their content type Web filtering lets you allow, block, or just log access to web sites and pages. To select the types of web content to allow your children to access: 1. On the main page, click Users. 2. Select the Windows user account you want to edit, then click Settings next to Web page filter. The web filtering wizard opens. 3. Click Next on the first page.
80 80 F-Secure Internet Security 2012 Using the Internet safely 4. Select Limit web browsing by content, then click Next. 5. On the Restrict web content page, select the types of content that you want to block for your children. 6. When you have selected all of the content types that you want to block, click Next. 7. Click Finish to close the web filtering wizard. When they are logged in to your computer with their own Windows user account, your children will not be able to access web sites that contain a type of content that you have blocked. Editing allowed and blocked web sites You can choose to allow specific web sites that are blocked by web filtering, and also block individual web sites that are not included in any web filtering content type. For example, you may consider a web site safe for your children, even though you want to block other web sites of that content type. You may also want to block a specific web site, even though other web sites of that content type are allowed. To allow or block a web site: 1. On the main page, click Users. 2. Select the Windows user account you want to edit, then click Open web site list. If the web site you want to edit is already listed as allowed or denied, and you want to move it from one list to the other: a) Depending on which web site list you want to edit, click the Allowed or Denied tab. b) Right-click the web site on the list and select Allow or Deny. If the web site is not included in either list: a) Click the Allowed tab if you want to allow a web site, or the Denied tab if you want to block a web site. b) Click Add to add the new web site to the list. c) In the Add web site dialog, enter the address of the web site you want to add, then click OK. 3. Click Close to return to the main page. To change the address of an allowed or blocked web site, right-click the web site on the list and select Edit. To remove an allowed or blocked web site from the list, select the web site and click Remove. How to schedule browsing time You can control the time that your children spend browsing the Internet. You can set different restrictions for each Windows user account on your computer. You can control: When your children are allowed to browse the Internet. For example, you can allow your teenagers to browse the Internet only before 8 o'clock in the evening. Note: If you remove the time restrictions, your children can browse the Internet without any time limits. When the browsing time restrictions block the connection to the Internet, a block page in the web browser shows when your children can access the Internet again. You can extend the browsing time by entering your Windows user account password and scheduling more time. Restrict daily Internet browsing time You can limit when your children can browse the Internet per day. You can set different daily time limits for each Windows user account on your computer.
81 F-Secure Internet Security 2012 Using the Internet safely 81 To set the time limits: 1. On the main page, click Users. 2. Select the Windows user account you want to edit, then click Settings next to Time limits. The Restrict browsing times wizard opens. 3. Click Next on the first page. 4. On the Allow web browsing during these hours table, select the times when your child is allowed to browse the web on each day of the week. 5. When you have set the allowed browsing times, click Next. 6. Click Finish to close the browsing times wizard. When they are logged in to your computer with their own Windows user account, your children cannot browse the Internet outside of the allowed times. Viewing statistics You can see what web pages have been viewed and blocked on the Statistics page. The product collects information on visited and blocked web sites, as well as how much time is spent browsing the Internet. This information is user-specific for each Windows user account. Blocked web sites are divided into sites that are blocked by web page filtering and those blocked by browsing protection. This shows you whether a blocked site has content that you have intentionally blocked or if the product has identified it as a potentially harmful site.
82
F-Secure Anti-Virus for Mac 2015
F-Secure Anti-Virus for Mac 2015 TOC F-Secure Anti-Virus for Mac 2015 Contents Chapter 1: Getting started...3 1.1 Manage subscription...4 1.2 How to make sure that my computer is protected...4 1.2.1 Protection
F-Secure Anti-Virus for Windows Servers. Administrator's Guide
F-Secure Anti-Virus for Windows Servers Administrator's Guide F-Secure Anti-Virus for Windows Servers TOC 3 Contents Chapter 1: Introduction...5 Product license...6 Disclaimer...6 Installation...7 System
F-Secure Anti-Virus for Mac. User's Guide
F-Secure Anti-Virus for Mac User's Guide F-Secure Anti-Virus for Mac TOC 3 Contents Chapter 1: Getting started...5 What to do after installation...6 Manage subscription...6 Open the product...6 How to
F-Secure E-mail and Server Security. Administrator's Guide
F-Secure E-mail and Server Security Administrator's Guide TOC F-Secure E-mail and Server Security Contents Preface: Disclaimer...vi Chapter 1: About This Guide...7 1.1 Introduction...8 1.1.1 Product contents...8
Chapter 1: Installation...5
F-Secure Internet Security 2014 F-Secure Internet Security 2014 TOC 2 Contents Chapter 1: Installation...5 1.1 Before you install for the first time...6 1.2 Installing the product for the first time...7
Internet Security 2015
Internet Security 2015 TOC Internet Security 2015 Contents Chapter 1: Installation...5 1.1 Before you install for the first time...6 1.2 Installing the product for the first time...6 1.3 Installing and
F-Secure E-mail and Server Security. Administrator s Guide
F-Secure E-mail and Server Security Administrator s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks
Frequently Asked Questions: Xplornet Internet Security Suite
Frequently Asked Questions: Xplornet Internet Security Suite Before Installation: Does the Xplornet Internet Security Suite (XISS), product work with other antivirus or firewall products installed on my
F-Secure Client Security. Administrator's Guide
F-Secure Client Security Administrator's Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...9 System requirements...10 Policy Manager Server...10 Policy Manager Console...10 Main
Contents. McAfee Internet Security 3
User Guide i Contents McAfee Internet Security 3 McAfee SecurityCenter... 5 SecurityCenter features... 6 Using SecurityCenter... 7 Fixing or ignoring protection problems... 16 Working with alerts... 21
Get Started Guide - PC Tools Internet Security
Get Started Guide - PC Tools Internet Security Table of Contents PC Tools Internet Security... 1 Getting Started with PC Tools Internet Security... 1 Installing... 1 Getting Started... 2 iii PC Tools
Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0
Quick Start for Webroot Internet Security Complete, Version 7.0 This Quick Start describes how to install and begin using the Webroot Internet Security Complete 2011 software. This integrated suite delivers
Airtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Configuring, Customizing, and Troubleshooting Outlook Express
3 Configuring, Customizing, and Troubleshooting Outlook Express............................................... Terms you ll need to understand: Outlook Express Newsgroups Address book Email Preview pane
F-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Basic Administration Guide
*Formerly Panda Managed Office Protection Copyright notice Trademarks Panda Security 2010. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated
Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing
NOD32 Typical Installation Guide Version 2.7 Includes Windows Vista and 64-bit protection Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing Best Detection Fastest
ViRobot Desktop 5.5. User s Guide
ViRobot Desktop 5.5 User s Guide ViRobot Desktop 5.5 User s Guide Copyright Notice Copyright 2007 by HAURI Inc. All rights reserved worldwide. No part of this publication or software may be reproduced,
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
Cox Business Premium Security Service FAQs
FAQ s Content Cox Business Premium Security Service FAQs Questions before installing the software Q: Does Cox Business Premium Security Service work with other antivirus or firewall software installed
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
1 Accessing E-mail accounts on the Axxess Mail Server
1 Accessing E-mail accounts on the Axxess Mail Server The Axxess Mail Server provides users with access to their e-mail folders through POP3, and IMAP protocols, or OpenWebMail browser interface. The server
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
AVG File Server. User Manual. Document revision 2015.08 (23.3.2015)
AVG File Server User Manual Document revision 2015.08 (23.3.2015) C opyright AVG Technologies C Z, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. Contents
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Bitdefender Internet Security 2015 User's Guide
USER'S GUIDE Bitdefender Internet Security 2015 User's Guide Publication date 10/16/2014 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced or transmitted
Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.
Faqs > Spyware Doctor Q1. What is Spyware Doctor? Ans.: Spyware Doctor is an easy-to-use, award winning, comprehensive software suite designed to protect your computer against stealthy spyware, aggressive
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
AVG File Server 2012. User Manual. Document revision 2012.03 (8/19/2011)
AVG File Server 2012 User Manual Document revision 2012.03 (8/19/2011) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
Ad-Aware Antivirus Overview
Contents Ad-Aware Antivirus Overview... 3 What is Ad-Aware Antivirus?... 3 Ad-Aware Antivirus Features... 4 System Requirements... 6 Getting Started... 7 Ad-Aware Install... 7 Using Ad-Aware Free 30 day
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
Product Guide. McAfee Endpoint Security 10
Product Guide McAfee Endpoint Security 10 COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee DeepSAFE,
Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later
Sophos Anti-Virus for Windows, version 7 user manual For Windows 2000 and later Document date: August 2008 Contents 1 About Sophos Anti-Virus...3 2 Introduction to Sophos Anti-Virus...5 3 Checking the
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 2. Deployment scenarios 5 2.1 Stand-alone server 5 2.2 Deploying the product with F-Secure
http://downloadcenter.trendmicro.com/
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Best Practice Configurations for OfficeScan 10.0
Best Practice Configurations for OfficeScan 10.0 Applying Latest Patch(es) for OSCE 10.0 To find out the latest patches, refer to http://www.trendmicro.com/download/product.asp?productid=5 NOTE : There
Kaspersky Endpoint Security 10 for Windows Administrator's Guide
Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product! We hope that you will find this documentation
Release Notes for Websense Email Security v7.2
Release Notes for Websense Email Security v7.2 Websense Email Security version 7.2 is a feature release that includes support for Windows Server 2008 as well as support for Microsoft SQL Server 2008. Version
2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses
Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses 2004 Microsoft Corporation. All rights reserved. This document is for informational purposes only.
E-MAIL AND SERVER SECURITY
E-MAIL AND SERVER SECURITY DEPLOYMENT GUIDE 1 E-MAIL AND SERVER SECURITY Deployment Guide 2 CONTENTS 1. Overview 3 1.1 How the product works 3 1.2 Product contents 4 2. Deployment scenarios 5 2.1 Stand-alone
Microsoft Security Essentials Installation and Configuration Guide
Microsoft Security Essentials Installation and Configuration Guide This installation guide is for users who are intending to download the software from Microsoft s web site. If you are not intending on
How To Use Secureanything On A Mac Or Ipad (For A Mac)
User Guide for Mac OS X Copyright Webroot SecureAnywhere User Guide for Mac OS X March, 2013 2012-2013 Webroot Software, Inc. All rights reserved. Webroot is a registered trademark and SecureAnywhere is
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
System Administrator Guide
System Administrator Guide Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 3.5 Webroot AntiSpyware Corporate Edition System Administrator Guide Version 3.5 2007 Webroot Software,
Sophos for Microsoft SharePoint Help. Product version: 2.0
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: September 2015 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 3.1 On-access scan...5 3.2
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Outpost Network Security
Administrator Guide Reference Outpost Network Security Office Firewall Software from Agnitum Abstract This document provides information on deploying Outpost Network Security in a corporate network. It
Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.
Using Webmail Technical Manual: User Guide The Webmail Window To save an attachment: 1. Click once on the attachment name. Or, if there are multiple attachments, click the Save icon to save all attachments
Web DLP Quick Start. To get started with your Web DLP policy
1 Web DLP Quick Start Websense Data Security enables you to control how and where users upload or post sensitive data over HTTP or HTTPS connections. The Web Security manager is automatically configured
Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com. Version 6.
Webroot Software User Guide for Spy Sweeper Webroot Software, Inc. PO Box 19816 Boulder, CO 80308 www.webroot.com Version 6.1 Webroot Software User Guide Version 6.1 2003 2009 Webroot Software, Inc. All
www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.
www.agnitum.com Getting Started Copyright 2010 Agnitum Ltd. All rights reserved. Abstract This document provides a quick start reference to orientate a first time user in the basic concepts and operations
MS Outlook 2002/2003. V1.0 BullsEye Telecom Email
IMAP Settings Manual Our application allows you to access your email in many different ways. For those of you who do not wish to use the Webmail interface, you may also manage your email and custom folder
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before using this service, please review the latest version of the applicable
Configuration Information
Configuration Information Email Security Gateway Version 7.7 This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard.
BULLGUARD BAckUp GUIDE
BULLGUARD backup GUIDE CONTENTS BullGuard Backup introduction page 3 Installing BullGuard Backup page 6 Uninstalling BullGuard Backup page 11 Registering BullGuard Backup: creating an account page 12 Running
Sophos Anti-Virus for Mac OS X Help
Sophos Anti-Virus for Mac OS X Help For networked and standalone Macs running Mac OS X Product version: 9 Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
AVG File Server 2013. User Manual. Document revision 2013.03 (11/13/2012)
AVG File Server 2013 User Manual Document revision 2013.03 (11/13/2012) Copyright AVG Technologies CZ, s.r.o. All rights reserved. All other trademarks are the property of their respective owners. This
ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document
ESET CYBER SECURITY PRO for Mac Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Comodo Antivirus for Linux Software Version 1.0
Comodo Antivirus for Linux Software Version 1.0 User Guide Guide Version 1.0.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo Antivirus for
If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) 547-5305, option 1. Email Access Methods:
ArchMail (www.archbalt.org/archmail) is a centrally hosted email system for the employees of the Archdiocese. To simplify employee access multiple methods for accessing email have been established. This
BULLGUARD SPAMFILTER
BULLGUARD SPAMFILTER GUIDE Introduction 1.1 Spam emails annoyance and security risk If you are a user of web-based email addresses, then you probably do not need antispam protection as that is already
High Speed Internet - User Guide. Welcome to. your world.
High Speed Internet - User Guide Welcome to your world. 1 Welcome to your world :) Thank you for choosing Cogeco High Speed Internet. Welcome to your new High Speed Internet service. When it comes to a
Regain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
Sophos Enterprise Console Help
Sophos Enterprise Console Help Product version: 5.2.1, 5.2.2 Document date: September 2014 Contents 1 About Enterprise Console...6 2 Guide to the Enterprise Console interface...7 2.1 User interface layout...7
Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)
Product Guide McAfee SaaS Endpoint Protection (October, 2012 release) COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active
FAQ. Safe Anywhere PC. Disclaimer:
FAQ Safe Anywhere PC Version: 1.0 Disclaimer: You can freely use (copy and edit) the information in this document for your own purposes. You may want to replace all references to F-Secure, F-Secure launch
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
Email Migration Manual (For Outlook 2010)
Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
K7 Business Lite User Manual
K7 Business Lite User Manual About the Admin Console The Admin Console is a centralized web-based management console. The web console is accessible through any modern web browser from any computer on the
Webmail Instruction Guide
Webmail Instruction Guide This document is setup to guide your through the use of the many features of our Webmail system. You may either visit www.safeaccess.com or webmail.safeaccess.com to login with
Sophos Anti-Virus for Mac OS X: Home Edition Help
Sophos Anti-Virus for Mac OS X: Home Edition Help For standalone Macs running Mac OS X Product version: 9C Document date: June 2013 Sophos TOC 3 Contents About Sophos Anti-Virus...5 About the Scans window...5
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Kaspersky Endpoint Security 10 for Windows Administrator's Guide
Kaspersky Endpoint Security 10 for Windows Administrator's Guide APPLICATION VERSION: 10.0 Dear User, Thank you for choosing our product! We hope that you will find this documentation useful and that it
avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide
avast! Internet Security 7.0 Quick Start Guide 1 Welcome to avast! Internet Security 7.0 The new avast! Antivirus 7.0 brings a range of new features and improvements which make it even faster and even
ESET Mobile Security Windows Mobile
ESET Mobile Security Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security 1.1 Minimum...3
Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum
Maintenance Guide Outpost Firewall 4.0 Personal Firewall Software from Agnitum Abstract This document is intended to assist Outpost Firewall users in installing and maintaining Outpost Firewall and gets
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Kaspersky Anti-Virus 2012 User Guide
Kaspersky Anti-Virus 2012 User Guide APPLICATION VERSION: 12.0 Dear User! Thank you for choosing our product. We hope that you will find this documentation useful and that it will provide answers to most
User Guide Online Backup
User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Adding the Online Backup Service to your Account... 2 Getting Started with the Online Backup Software... 4 Downloading
e- storage Mail Archive
e- storage Mail Archive 1 TABLE OF CONTENTS 1.0 OVERVIEW 3 1.1 INTRODUCTION... 3 1.2 REQUIREMENT. 4 2.0 SETUP AND CONFIGURATION. 6 2.1 CREATE NEW ARCHIVE PROFILE. 6 2.1.1 Gmail Account.. 8 2.1.2 Hotmail
