Protection Service for Business FAQ Version 4.0
Table of Contents 1. Protection Service for Business... 3 What is Protection Service for Business?... 3 What are the key benefits of Protection Service for Business?... 3 Do I really need Protection Service for Business if I m using a free security solution?... 3 Does Protection Service for Business work with other Security Solutions?... 4 What Products does it contain?... 4 What are its notable security features and what do they do?... 4 2. Subscriptions... 5 What is my subscription key and where can I find it?... 5 How can I transfer a subscription to another computer?... 6 What happens when my subscription key expires?... 6 3. Company Account... 6 How can I change the language in my Portal?... 6 4. Protection Service for Business for Workstations... 7 How do I install the Protection Service for Business for Workstations?... 7 How do I configure Protection Service for Business for Workstations?... 8 What are the supported platforms for Protection Service for Business Workstation?... 8 5. Protection Service for Business Mobile Security... 8 How do I add a new mobile device via SMS provisioning?... 8 How do I add a new mobile device which does not support SMS?... 10 How do I configure anti-theft features?... 11 How to use the Anti-Theft features:... 11 What are the supported platforms for Protection Service for Business Mobile Security?... 12 6. PSB Email and Server Security... 12 How do install PSB Email & Server Security?... 12 7. General Troubleshooting... 14 I did what the instructions said in the Mobile installation section but I m still unable to install Protection Service for Business Mobile Security application?... 14 Why Automatic Updates are taking longer to download than usual?... 14 How do I know that Protection Service for Business is running smoothly?... 14 My network printer is not working after installing Protection Service for Business for Workstation. What happened?... 14 My frequently used software is not working after the installation of Protection Service for Business. What happened?... 15 How do I send a sample to F-Secure?... 15 How do I create F-Secure diagnostic File (FS DIAG)? What do I need it for?... 15
1. Protection Service for Business What is Protection Service for Business? Protection Service for Business is a comprehensive turn-key protection suite for challenging and highly-mobile multi-device environments. It specially designed for the needs of small and mediumsized businesses. What are the key benefits of Protection Service for Business? Protection Service for Business has been designed to the specific needs of SMBs, offering considerable benefits from exceptional security to low TCO and minimal IT resource allocation: Low Total Cost of Ownership Protection Service for Business is perfect for SMBs due to its low total cost of ownership. In fact, with the low investment costs and a minimal IT resource allocation requirement, the solution can offer considerable reduction in related costs. Prestigiously Awarded Protection Technologies Our pioneering protection technologies have received numerous prestigious awards from independent expert organizations, such as AV-Test, AV-Comparatives and VB100, ensuring that you are using the very best security solution available at the market! Minimal Administration and Management Protection Service for Business is designed with easy administration in mind. It s powerful and easy-to-use management features ensure efficient operation, while its intuitive technology, smart automation and fast deployment guarantees minimal administration and IT resource allocation. Suitable for mobile Businesses Protection Service for Business offers seamless protection for highly mobile businesses, allowing them to safely use and access any content from any mobile device, be it corporate laptops, smartphones or tablets. The administrator can even manage the whole solution through any mobile device. Do I really need Protection Service for Business if I m using a free security solution? Yes, you do. The protection technology behind Protection Service for Business has been proven countless times by the prestigious awards received from independent expert organizations. Furthermore, its performance, excellent manageability and pioneering security features ensure the outmost security, compatibility and efficiency on your corporate IT environment. The pressure of finding new ways of saving money during challenging economic times makes the idea of free anti-virus a seemingly appealing opportunity. However, by making an objective assessment, businesses can dive deeper into the related costs of free solutions: Consider the detection rate of the solution and whether their claims have been recently validated by independent parties. Additionally, check the compatibility and performance of the solution in order to avoid slowdowns and crashes of your computers. Furthermore, make certain that you are entitled to quality technical support in all cases. And lastly, ensure that the solution has all the features required to protect you against more advanced threats, has an effective management layer and has other required functionalities that enhance productivity and lower operational costs.
Does Protection Service for Business work with other Security Solutions? Generally, you should not run two security programs together at the same time, which are both actively monitoring the system (real-time protection). This is because that the various components may interfere with the operation of the solutions, as both attempt to access the same content at the same time. Often, this leads to various system malfunctions such as slowdown, crashes, freezes and strange system behavior. What Products does it contain? is composed of four main products: Workstation Security, Email & Server Security, Server Security and Mobile Security; and an integrated central management functionality Protection Service for Business Portal. Protection Service for Business Workstation Security Available for Windows, Mac, and Linux. Protection Service for Business Workstation Security provided unparalleled protection to all corporate workstations, ensuring utmost security in the face of increasingly sophisticated malware. Protection Service for Business Server Security Effective protection for Windows and Linux servers. Real-time and scheduled scanning ensures that no malware are stored on your file servers. Windows version also includes enhanced cloudbased protection with DeepGuard. Protection Service for Business Mobile Security The product is available for the Android mobile operating system. Mobile Security contains Anti- Malware, Firewall, Anti-Theft and Browsing Protection, with some differences between operating systems. Please note that Apple IOS and Windows Phone are currently not supported by Protection Service for Business. The closed architecture of these systems are less vulnerable against viruses and malware. At the same, time they do provide the same possibilities for integration of a security solution. Protection Service for Business Portal The Portal is a web-based remote monitoring and management system for administrators. It allows continuous follow-up of the computer network security, and enables administrators to take required actions based on issues detected. Management features, and all issues requiring attention are clearly highlighted, with task links designed to allow direct administration of related parts. Every single feature, device and policy presented can be managed and configured centrally from one unified portal. The web-based management portal can be fully accessed 24/7 through any device, even smartphones in emergency. Task orientation and intuitiveness of the design, coupled with easy configuration makes the management portal extremely efficient to use. What are its notable security features and what do they do?
Protection Service for Business contains numerous pioneering security features and functionalities, such DeepGuard and Software Updaters, which ensures utmost security even against the most advanced threats. Anti-Malware F-Secure Anti-Malware can perform simultaneous scans with multiple scanning engines (including on-demand and real-time scans). This technology enables the integration of different antivirus technologies into a single framework, allowing several scanning engines to scan the files side-by-side for outmost protection against malware threats. What is DeepGuard? Why is it so important? DeepGuard is an intelligent anti-malware engine, which combines behavior, memory and reputation analysis to identify the malicious behavior and prevent it, ensuring unparalleled 0-day detection capability. This makes it a fundamental security component against the increasingly sophisticated malware and the previously unknown threats that cannot be blocked with traditional technologies. What is Software Updater? What are its key benefits? Software Updater is an advanced patch management feature that automatically keeps the operating system and 3rd party applications up-to-date. This prevents the widespread exploitation of existing software vulnerabilities, which are some of the most glaring security risk in corporate systems, reducing the possible malware attacks up-to 85%. What is Real-Time Protection Network? How do I benefit from it? Real-Time Protection Network is an in-the-cloud reputation service, which provides an efficient and rapid response against the new and emerging malware. This is important due to the dramatically changed threat situation where the number of new malware and their variants make traditional heuristics or signature-based solutions too slow or inefficient. Furthermore, Real-time Protection Network improves the overall performance of your devices, as the Protection Service for Business doesn t need to scan any applications that Real-time Protection Network has already analyzed and found clean. What is Browsing Protection? What does it do? Browsing Protection offers ideal proactive protection against web based threats, by automatically preventing end-users from interacting with malicious content - even before it is accessed. This ensures minimum end-user exposure to dangerous online material, significantly reducing the number of possible infection points and greatly enhancing online security while browsing the web. Browsing protection has been designed with user-friendliness and intuitiveness in mind. It uses a simple and intuitive color-coded rating system clearly indicates the websites and contents that are safe to enter and what should be avoided. 2. Subscriptions What is my subscription key and where can I find it?
Each managed client software type has its own subscription key with independent validity period and size. Every SMB-customer gets one or more unique subscription keys - depending of which client applications are purchased. Each subscription key defines how many instances of the client software can be installed and a fixed validity period. Every time the security software connects to check for updates, the corresponding subscription is checked for validity and all updates are provided for the valid client. The Subscription keys can be found in the PSB Admin Portal. You can access the portal via the My Applications Section in the Swisscom Business Marketplace https://businessapps.swisscom.ch/myapps.click on the F-Secure App Icon. Subscriptions are listed in portal under Subscriptions tab. How can I transfer a subscription to another computer? If your subscription allows only one installation, you can transfer the subscription to another computer. To do this, first remove the old computer from the portal and then install the security product on the new computer with the same subscription key. The subscription is then transferred to the new computer. What happens when my subscription key expires? If for some reason the client subscription expires, all security features and functions are disabled, with the exception of firewall that retains limited functionality. PSB Portal offers a combined view to the subscription status of the whole computer base with notifications when some specific subscriptions require a renewal. The renewal needs to be done over the Swisscom Business Marketplace https://businessapps.swisscom.ch/myapps. 3. Company Account How do I create my company account? You create your company account for by ordering the application on the Swisscom Business Marketplace https://businessapps.swisscom.ch/apps/6758. If you need help ordering an application please visit: http://www.swisscom.ch/sme-fsecure-product-support How do I recover my password for the Swisscom Business Marketplace? Any specific question in regards to recovering your Swisscom Login password, please visit: http://www.swisscom.ch/sme-fsecure-product-support How can I change the language in my Portal? To change the language, first log in to the Portal, click your user name at the top right corner. In the Edit account page, from the Language drop-down list, select the language that you want, and click Submit.
4. Protection Service for Business for Workstations How do I install the Protection Service for Business for Workstations? Go to the Protection Service for Business Administration Portal via the My Applications Section in the Swisscom Business Marketplace: https://businessapps.swisscom.ch/myapps. Click on the F-Secure App Icon. When installing for multiple employees you can use email invitation: 1. Go to Computers tab under Protection Service for Business portal 2. Select Add computers write the email addresses and click Send. 3. Employees will receive an email with instructions how to download and install the application. (For installation instructions see the section directly below). 4. Once the employees have successfully installed the application, you will see their computers connecting the service under Computers tab. To install the program locally: 1. Locate the downloaded file and double-click the.exe file to start the installation. 2. Select the installation language, and click Next to continue. 3. Read the license agreement. To accept the agreement and to continue, click Accept. 4. Enter your subscription key and click Next. 5. Select the installation type, and click Next: Automatic installation: The product is installed automatically. Existing security products may be automatically replaced. The product is installed to the default directory. Step by step installation: During the installation, you can change the installation directory. However, we recommend using the default directory. 6. When the installation is complete, the computer restarts automatically after a while. 7. To restart immediately, click Restart. To install the program remotely: This section explains how to remotely install Workstation Security. Before you start the remote installation, make sure that the domain controller exists and that the computers on which you want to install the software belong to a domain. To be able to remotely install the software, you must have domain administrator rights. To install the software: 1. In Protection Service for Business Portal click the Download software link at the top of the page. 2. In the Download software page, click the Download the Remote Installation Tool link. If you have not downloaded the workstation software yet, click also the Download the workstation software link. 3. Extract the Remote Installation Tool zip file on a local drive. 4. Double-click the ritool.bat file. The F-Secure Remote Installation Tool window opens. 5. In the Software to Install page, click the - button. The Software Installer Selection window opens. 6. Locate the downloaded workstation software file and click OK. Click Next. 7. In the Target Computers page, do the following: Under Domain Name, select the domain to which the computers belong. Under Computer Name, select the computers on which you want to remote install the software. 8. Click Next. 9. In the Account page, do the following: Select Another account. Enter the domain administrator name and password.
Confirm the password. 10. Click Next. 11. Click Install. The workstation software begins installing on the selected computers. 12. In the portal, verify that the computer shows in the portal. How do I configure Protection Service for Business for Workstations? Protection Service for Business comes with a pre-set default configuration, which is suitable for the need of vast majority of users and organizations. For more detailed information on configuring the advanced settings and configurations, please refer the Protection Service for Business Admin Guide. What are the supported platforms for Protection Service for Business Workstation? The product can be installed on a computer running one of the following operational systems: Protection Service for Business supports the following Mac OS X versions Mac OS X 10.6 (Snow Leopard, version 10.6.8 or later), Mac OS X 10.7 (Lion) and Mac OS X 10.8 (Mountain Lion) Protection Service for Business supports the following Microsoft Windows versions Microsoft Windows XP with SP3 (32-bit editions only) Microsoft Windows Vista with SP2 or newer (all 32-bit and 64-bit editions) Microsoft Windows 7 with SP1 or newer (all 32-bit and 64-bit editions) Microsoft Windows 8 (all 32-bit and 64-bit editions) http://www.swisscom.ch/sme-fsecure-product-support 5. Protection Service for Business Mobile Security The Protection Service for Business Portal registers mobile devices that you add once they connect to the system by activating the installed software. The product is currently available for the Android mobile operating systems only. When you add a new mobile device, it will appear on the list with the overall status Not connected in Protection Service for Business Portal under Mobile devices tab. If the mobile device is not activated within three days, the status changes to critical (Never connected). How do I add a new mobile device via SMS provisioning? 1. Go to the Protection Service for Business Administration Portal via the My Applications Section in the Swisscom Business Marketplace: https://businessapps.swisscom.ch/myapps. Click on the F-Secure App Icon. 2. In the Portal under Mobile devices select subscription you wish to use, first name, last name and phone number. Check that Send download link and activation SMS messages is selected and click Add device. 3. On the your mobile device the first thing you need to do is allow installation from the Unknown sources Open Settings > Security scroll down the list and check that Unknown sources is turned on. You can locate Settings menu by tapping the bottom left button of your Android device on
home screen. On tablets you can locate the Settings by tapping the bottom right area of your tablet (where clock and WIFI icons are located). On older (2.x) Android devices: Open Settings > Application and check that Unknown sources is turned on. When this setting is turned on, you can install applications outside the Android Market. You can locate Settings menu by tapping the bottom left button on you Android device on home screen. 4. User will receive a download link and activation SMS. Do not remove the activation message, since it is used to activate the application. 5. Tap the download link in the SMS, web browser will open to a download web page. If more than one application versions are available, it is recommended to use the newest available version.
6. Tap download link on the to start the download. If any security questions are presented answer yes to allow the application package to be downloaded. 7. Download will appear on your device s Notifications. Open the Notifications and once the download is complete, tap the downloaded application to start the installation. If presented with a Complete action using dialog, select Package installer and Always. Select Install and once the installation is complete, select Open. 8. Once the application opens, read the License Terms and in order to use the application tap Accept. 9. To complete the service registration you will need to activate the device. Tap Activate. Activation will be in progress and you will be shown Activate device administrator dialog, tap Activate. How do I add a new mobile device which does not support SMS? If you wish to add a device without SMS support here s a two examples how to do it. In both cases you will need to deliver download location and subscription key to the end user. Otherwise the installation instruction are the same (SMS contains download link and activation code). You are adding your own device:
1. In the Protection Service for Business Portal go to Download software (top left corner in the portal), open the link to Download mobile software. Now write this address to the browser of your tablet and open the web page. 2. On your tablet download the security application from the web page by tapping download link. 3. Go to Subscriptions tab to view the mobile subscription code. This will be needed once the application is launched the first time on your tablet. 4. Now you follow the instructions mentioned in the How do I add a new mobile device via SMS provisioning?. During the activation you will be asked to enter the subscription key. You are adding someone else s device: 1. Write the user of the tablet an email, for this email you will need to describe two things: a. In the portal go to Download software (top left corner in the portal), copy the link to Download mobile software location and add it to the email. b. Go to Subscriptions tab and copy the mobile subscription code. This will be needed once the application is launched the first time. Add it to the email. 2. Send this email to the user. 3. Now the user can follow the instructions mentioned in the first How do I add a new mobile device via SMS provisioning? Only difference is that the link is opened from the email instead of the SMS. During the activation user will be asked to enter the subscription key which can be found from the email. How do I configure anti-theft features? In order to utilize Anti-theft features, you will first need to make sure you have set Screen lock on. It is highly recommended to use high security lock, either PIN or Password. You will find the Screen lock under Settings > Lock Screen. To take Anti-Theft into use: 1. Open the mobile application and in the main view, open Anti-Theft. 2. In the Anti-theft menu, select Settings 3. Select Set security code. The Set security code dialog opens. 4. Enter your security code and type it again to make sure you entered it correctly. You will not be able to change Screen lock settings, or remove applications without the code. So you should not forget it. It is possible to reset the setting from the portal. 5. Set the trusted phone number. If someone steals your phone and then changes the SIM card a message will be send to this number. How to use the Anti-Theft features: There are two ways to use the Anti-theft functionality. Via portal or via text message. Via portal: 1. Log in to the portal and open Mobile devices tab. 2. Select you phone from the devices list. 3. Select Anti-theft operations and select the operation. Following operations are available: Lock Device Unlock device and reset anti-theft settings Wipe device data 4. Operation will be performed on your phone. Via text message: 1. It is possible to use the Anti-Theft functionality by sending text message to your phone. 2. The following features are supported: Send text message #lock# <security code> to your phone to lock it. Send text message #locate# <security code> to your phone to locate it. Send text message #wipe# <security code> to wipe it.
Send text message #alarm# <security code> to turn the alarm on. Send text message #alarm# <security code> #0 it again to turn the alarm off. What are the supported platforms for Protection Service for Business Mobile Security? The product is currently available for the Android mobile operating systems only. Mobile Security contains Anti-Malware, Firewall, Anti-Theft and Browsing Protection, with some differences between operating systems. Please note that Apple IOS and Windows Phone are currently not supported by Protection Service for Business. The closed architecture of these systems are less vulnerable against viruses and malware. At the same, time they do provide the same possibilities for integration of a security solution. 6. PSB Email and Server Security How do install PSB Email & Server Security? Install the software on a computer and after the installation verify that the computer shows in the portal. Download the Server Installation File: http://www.swisscom.ch/sme-fsecure-product-support To install the software: 1. Locate the downloaded file and double-click the.exe file to start the installation. 2. Select the installation language, and click Next to continue. 3. Read the license agreement. To accept the agreement and to continue, click Accept. 4. Enter your subscription key and click Next. You must enter the same subscription key that you used when you created the account. What are the supported platforms PSB Email & Server Security? The product can be installed on one of the following operational systems: Microsoft Windows Server 2003 with the latest service pack Microsoft Windows Server 2003 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Small Business Server 2003 Microsoft Small Business Server 2003 R2 Microsoft Small Business Server 2008 Microsoft Small Business Server 2011, Standard edition Microsoft Small Business Server 2011, Essentials Microsoft Windows Server 2012 Microsoft Windows Server 2012 Essentials All Microsoft Windows Server editions are supported except: Windows Server for Itanium processor Windows DataCenter and HPC editions Windows Storage editions
Windows MultiPoint Server Windows Home Server Note: For performance and security reasons, you can install the product only on NTFS partition. F-Secure PSB E-mail and Server Security can be installed on a computer running the following Microsoft Exchange Server versions: Microsoft Exchange Server 2003 with the latest service pack Microsoft Exchange Server 2007 (64-bit version) with the latest service pack Microsoft Exchange Server 2010 service pack 2, service pack 3 Microsoft Exchange Server 2013 Microsoft Small Business Server 2003 Microsoft Small Business Server 2008 Microsoft Small Business Server 2011, Standard edition The product supports the following roles of Microsoft Exchange Server 2007/2010: Edge Server role Hub Server role Mailbox Server role Combo Server (Mailbox Server and Hub Server roles) Note: The 32-bit version of Microsoft Exchange Server 2007 is not supported. Important: The Collaboration Data Objects for Exchange (CDOEX) update is required if you plan to install F-Secure E-mail and Server Security on Microsoft Exchange Server 2007 running on Microsoft Windows Server 2008 R2. The update and installation instructions are available in Microsoft Knowledge Base article 98270. It is important to note that the CDOEX update must be installed before installing Microsoft Exchange Server 2007 SP3. F-Secure PSB E-mail and Server Security 10.00 requires Microsoft SQL Server for the quarantine management. The following versions of Microsoft SQL Server are recommended to use: Microsoft SQL Server 2005 (Enterprise, Standard, Workgroup or Express Edition) with the latest service pack Microsoft SQL Server 2008 (Enterprise, Standard, Workgroup or Express Edition) Microsoft SQL Server 2008 R2 (Enterprise, Standard, Workgroup or Express Edition) Microsoft SQL Server 2012 (Enterprise, Business Intelligence, Standard, or Express Edition) Microsoft SQL Server 2008 R2 SP1 Express Edition is distributed with the product and can be installed during F-Secure E-mail and Server Security 10.00 Setup. Note: Microsoft.NET Framework version 2.0 and Microsoft Windows Installer 4.5 are required to install Microsoft SQL Server 2008 R2 SP1 Express Edition. They can be downloaded from Microsoft Download Center. If you plan to have Microsoft SQL Server on the same server, install these components before installing F-Secure E-mail and Server Security. Important: We do not recommend using MSDE or Microsoft SQL Server 2005/2008/2008R2 Express Edition if you are planning to use the centralized quarantine management or if your organization sends and receives a large amount of e-mails. For more information about the limitations of the Microsoft SQL Server 2005/2008/2008R2 Express Edition or MSDE, see the product manual.
7. General Troubleshooting I did what the instructions said in the Mobile installation section but I m still unable to install Protection Service for Business Mobile Security application? There are numerous Android versions and devices and thus there can be differences in the exact installation flow. The simplest way to get instructions is to use search engine like www.google.com and use search query based on your device model e.g. install from unknown sources Galaxy S2. Most likely someone else have had the same problem and it has been solved giving you the working solution. Why Automatic Updates are taking longer to download than usual? Automatic updates are turned on as soon as you install the F-Secure software. Whenever your computer is connected to the Internet, the F-Secure product checks for the newest updates automatically and downloads them once every two hours. The entire update package is quite large, and the download time depends on the speed of your Internet connection. If your computer has not been turned on in the last seven days, the entire update package will be downloaded and installed, and this takes longer than the normal daily updates. How do I know that Protection Service for Business is running smoothly? The status of Protection Service for Business is easy to check on the front page of the Protection Service for Business client. It clearly and intuitively shows a large icon which shows to the status of the client. Icon Text Description OK Info Warning Error Off Your computer is protected. The feature is turned on, and working properly. The product informs you about a special status of a feature. This icon is shown, for example, when a feature is being updated. Your computer is not fully protected. For example, the product has not received updates is a long time requires attention. Your computer is not protected. For example, your subscription has expired, a critical feature is turned off. A non-critical feature is turned off. The security status of the whole Protection Service for Business environment can be centrally and continuously followed through the Protection Service for Business Portal. All issues that require attention are clearly highlighted, with specific task links designed to allow direct and immediate administration of related parts and functions. My network printer is not working after installing Protection Service for Business for Workstation. What happened? Protection Service for Business default profile does not have the Network and Printer sharing service enabled by default for security reasons. You can correct the issue by changing the default profile in the Protection Service for Business Portal, either by changing to Office LAN pre-set configuration, or by editing the existing default profile to include the Windows Networking service as an allowed rule item.
For more indebt information on configuring Protection Service for Business and its pre-defined security profiles, please consult Admin Guide. My frequently used software is not working after the installation of Protection Service for Business. What happened? Most likely the software has emitted suspicious activity or has been infected with malware, and has been consequently blocked. Protection Service for Business contains highly advanced proactive protection features that monitor the behavior of applications in order to keep your systems protected from previously unknown or advanced threats, which cannot be blocked traditional signature based detection. This means that Protection Service for Business tracks the behavior of the software running in your systems, and if it notices malicious activity, it will block the application. Consequently, this means either two things: 1. Your software is infected by a malware (for example your browser or a plugin in it) and this malware wants to execute malicious activity on your computer. 2. Your software might emit similar behavior as malware, and is consequently recognized as such. This happens for example in cases where the software is penetrating the network (like network scanners) or tracking activity of your keyboard (key loggers). You should always give us a sample of the file that was reported, so that we can examine it personally by analysts. After the examination, you will get a report stating if the file is really malicious (was infected by a malware) or if it is a falsely tagged software. In the latter case, we will immediately add it in our Data Base update and the block will be removed without any action needed from you. How do I send a sample to F-Secure? You can submit a sample to F-Secure through our Sample Analysis Portal that can found here: https://analysis.f-secure.com/portal/login.html Samples can be submitted anonymously without an account. If you want to get feedback on the samples, submit large batches of samples or URLs, then you have to register an account and fill in the submission form. Unused accounts will be removed after 12 months of inactivity. How do I create F-Secure diagnostic File (FS DIAG)? What do I need it for? If you have technical problems with your security product, you should always create an FSDIAG file before contacting technical support. The file contains vital information that can be used for troubleshooting and solving problems specific to your computer. You can create the file by using the Support Tool program. The program gathers vital information about your system and its configuration. The information includes product details, operating system logs and system settings. In some cases, this information might be considered confidential. The data collected by Support Tool is stored locally on your computer. Gathering information may take several minutes. To create FS DIAGadd a new subscription key: 1. Click Start. 2. Select All Programs > F-Secure > Support Tool.
3. In the Support Tool window, click OK. 4. The tool will start gathering information and it create the fsdiag.tar.gz file on your desktop. Also, if possible: Gather and attach as much information as possible about the case from the affected computer, and add screenshots of any GUI notifications or error pop-up s.