CHAPTER 5
185
The Spyware Reported by Hosts will be cleaned if you run a manual
spyware scan on the hosts, as well as when quarantined spyware is
removed periodically on the hosts.
Default Spyware Handling
If the
Change spyware control to automatically quarantine all new
spyware
setting is selected, all new spyware that is not explicitly allowed
by the administrator is quarantined automatically. This applies to both
real-time and manual spyware scanning. This changes the following
settings:
In the
Spyware Scanning on File Access
section the
Action on
spyware
setting is set to
Remove automatically and quarantine
.
In the
Manual Spyware Scanning
section the
Action on spyware
setting is changed to
Remove automatically and quarantine
.
On
Spyware Control
page the
Deny access to spyware
setting is
enabled.
5.8.2
Setting up Spyware Control for the Whole Domain
This example explains how to set up spyware control in such a way that it
is transparent to the end-users and that it protects them against spyware
and tracking cookies.
When you are setting up spyware control for the first time, you should first
use a small test environment that consists of hosts that have the
applications normally used in your company installed on them. At this
phase you can also allow certain applications, if that is necessary. After
the testing phase you can distribute the policy to the whole managed
domain.
Click the
Change spyware scanning to automatically
quarantine all new spyware
link when you are sure that
preventing spyware from running does not interfere with ordinary,
legitimate applications in your company.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...