F-Secure Internet Security 2012



Similar documents
F-Secure Anti-Virus for Mac 2015

Server Internet Veiligheidspakket Administrator s guide. Administrator s Guide Internet Veiligheidspakket voor Server s

F-Secure Anti-Virus for Windows Servers. Administrator's Guide

F-Secure Anti-Virus for Mac. User's Guide

F-Secure and Server Security. Administrator's Guide

Chapter 1: Installation...5

Internet Security 2015

F-Secure and Server Security. Administrator s Guide

Frequently Asked Questions: Xplornet Internet Security Suite

F-Secure Client Security. Administrator's Guide

Contents. McAfee Internet Security 3

Get Started Guide - PC Tools Internet Security

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

Airtel PC Secure Trouble Shooting Guide

Sophos Endpoint Security and Control Help. Product version: 11

ESET Mobile Security Business Edition for Windows Mobile

Configuring, Customizing, and Troubleshooting Outlook Express

F-Secure Mobile Security. Android

PC Security and Maintenance

Sophos Endpoint Security and Control Help

Basic Administration Guide

Installation Guide. NOD32 Typical. Proactive protection against Viruses, Spyware, Worms, Trojans, Rootkits, Adware and Phishing

ViRobot Desktop 5.5. User s Guide

FortKnox Personal Firewall

Sophos for Microsoft SharePoint startup guide

Cox Business Premium Security Service FAQs

Configuring your client to connect to your Exchange mailbox

1 Accessing accounts on the Axxess Mail Server

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Ans.: Spam Monitor support all popular programs such as Outlook, Outlook Express, Netscape Mail, Mozilla Mail, Eudora or Opera

AVG File Server. User Manual. Document revision ( )

Sophos for Microsoft SharePoint Help

Safe internet for business use: Getting Started Guide

Bitdefender Internet Security 2015 User's Guide

Frequent Smart Updates: Used to detect and guard against new infections as well as adding enhancements to Spyware Doctor.

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

AVG File Server User Manual. Document revision (8/19/2011)

Ad-Aware Antivirus Overview

Configuration Information

ANTIVIRUS AND SECURITY SOFTWARE

Product Guide. McAfee Endpoint Security 10

Sophos Anti-Virus for Windows, version 7 user manual. For Windows 2000 and later

AND SERVER SECURITY


Best Practice Configurations for OfficeScan 10.0

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Release Notes for Websense Security v7.2

2. Installation and System requirements

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

AND SERVER SECURITY

Microsoft Security Essentials Installation and Configuration Guide

How To Use Secureanything On A Mac Or Ipad (For A Mac)

SecuraLive ULTIMATE SECURITY

System Administrator Guide

Sophos for Microsoft SharePoint Help. Product version: 2.0

Net Protector Admin Console

Configuring Trend Micro Content Security

Best Practice Configurations for OfficeScan (OSCE) 10.6

Symantec Mail Security for Domino

Outpost Network Security

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

Web DLP Quick Start. To get started with your Web DLP policy

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

Getting Started Copyright 2010 Agnitum Ltd. All rights reserved.

MS Outlook 2002/2003. V1.0 BullsEye Telecom

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Configuration Information

BULLGUARD BAckUp GUIDE

Sophos Anti-Virus for Mac OS X Help

AVG File Server User Manual. Document revision (11/13/2012)

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Trend Micro OfficeScan Best Practice Guide for Malware

Comodo Antivirus for Linux Software Version 1.0

If you encounter difficulty or need further assistance the Archdiocesan help desk can be reached at (410) , option 1. Access Methods:

BULLGUARD SPAMFILTER

High Speed Internet - User Guide. Welcome to. your world.

Regain Your Privacy on the Internet

Sophos Enterprise Console Help

Product Guide. McAfee SaaS Endpoint Protection (October, 2012 release)

FAQ. Safe Anywhere PC. Disclaimer:

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Migration Manual (For Outlook 2010)

Printed Documentation

McAfee.com Personal Firewall

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my ? Q. How do I change or reset a password for an account?

Installing GFI MailSecurity

K7 Business Lite User Manual

Webmail Instruction Guide

Sophos Anti-Virus for Mac OS X: Home Edition Help

escan SBS 2008 Installation Guide

WhatsUp Gold v16.3 Installation and Configuration Guide

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

avast! Internet Security 7.0 Quick Start Guide avast! Internet Security 7.0 Quick Start Guide

ESET Mobile Security Windows Mobile

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Windows Operating Systems. Basic Security

Kaspersky Anti-Virus 2012 User Guide

User Guide Online Backup

e- storage Mail Archive

Transcription:

F-Secure Internet Security 2012

F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection settings...8 Check the status of Real-time Protection Network...9 How to see what the product has done...9 View notification history...9 Change the notification settings...9 Real-time Protection Network...10 What is Real-time Protection Network...10 Real-time Protection Network benefits...10 What data you contribute...11 How we protect your privacy...12 Becoming a Real-time Protection Network contributor...12 Questions about Real-time Protection Network...12 How do I know that my subscription is valid...13 Activate a subscription...13 Chapter 2: Protecting the computer against malware...15 What are viruses and other malware...16 Viruses...16 Spyware...16 Rootkits...16 Riskware...17 How to scan my computer...17 Scan for malware...17 Scan at set times...19 Scan manually...20 Select files that are scanned...22 Select the action when something is found...25 View virus and spyware history...28 What is DeepGuard...28 How does DeepGuard work...28 How to turn DeepGuard on...29 Allow programs that DeepGuard has blocked...29 How to turn off advanced process monitoring...29 Protect against harmful system changes...30 How to see what DeepGuard has done...31 How to use the quarantine...31

4 F-Secure Internet Security 2012 TOC View quarantined items...31 Restore quarantined items...32 Change the mobile broadband settings...32 Suspended security updates...33 Chapter 3: Securing network connections...35 What is a firewall...36 What are firewall profiles...36 What are firewall rules and services...37 How to allow or block network traffic through the firewall...41 What to do if a firewall alert appears...41 How to create firewall services and rules...42 How to open a port through the firewall...46 Examples of creating firewall rules...46 Turn a firewall rule on or off...48 Change a firewall rule...49 Firewall settings...49 How to control network applications...51 What to do if an application control pop-up appears...51 Allow or deny connections for programs...52 Turn application control pop-ups on or off...53 What to do if a program stops working...53 How to prevent intruders...54 Select how intrusion attempts are handled...54 How to control dial-up connections...55 What to do if a dial-up control pop-up appears...55 Edit allowed phone numbers...56 View programs that are allowed to close dial-up connections...57 View dial-up connection attempts...57 What to do if you cannot access the Internet...57 Where to find firewall alerts and log files...58 View firewall alerts...58 View the action log...59 Chapter 4: Block spam...63 Set up my e-mail programs to filter spam...64 Microsoft e-mail programs...64 Netscape and Mozilla Thunderbird e-mail programs...65 Opera e-mail program...66 Eudora e-mail program...67 What if I receive a lot of spam...69 What are spam and phishing filtering levels...69 Change spam and phishing filtering level...70

F-Secure Internet Security 2012 TOC 5 Reset spam and phishing learning system...70 Set the port for e-mail protocols...70 Allow and block messages from specific e-mail addresses...71 Edit e-mail addresses I trust...71 Block messages from specific e-mail addresses...72 Protect against phishing attempts...73 Chapter 5: Using the Internet safely...75 How to run common tasks...76 How to protect your family members...76 Creating and editing Windows user accounts...76 What is browsing protection...76 How to turn browsing protection on or off...76 Browsing protection safety ratings...77 Protect against harmful content...78 What to do when a web site is blocked...78 Security summary for a web site...78 Making browsing safe for children...79 Limit access to web content...79 How to schedule browsing time...80 Restrict daily Internet browsing time...80 Viewing statistics...81

6 F-Secure Internet Security 2012 TOC

Chapter 1 Getting started Topics: How to use automatic updates How to see what the product has done Real-time Protection Network How do I know that my subscription is valid Information about how to get started with the product. This section describes how to change common settings and manage your subscriptions through the launch pad. The launch pad's common settings are settings that apply to all of the programs installed on the launch pad. Instead of changing the settings separately in each program, you can simply edit the common settings, which are then used by all of the installed programs. The launch pad's common settings include: Downloads, where you can view information about what updates have been downloaded and manually check if new updates are available. Connection settings, where you can change how your computer connects to the Internet. Notifications, where you can view past notifications and set what kind of notifications you want to see. Privacy settings, where you can select whether or not your computer is allowed to connect to the Real-time Protection Network. You can also manage your subscriptions for installed programs through the launch pad.

8 F-Secure Internet Security 2012 Getting started How to use automatic updates Automatic updates keeps the protection on your computer updated. The product retrieves the latest updates to your computer when you are connected to the Internet. It detects the network traffic and does not disturb other Internet use even with a slow network connection. Check the update status View the date and time of the latest update. When automatic updates are turned on, the product receives the latest updates automatically when you are connected to the Internet. To make sure that you have the latest updates: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Downloads. 4. Click Check now. The product connects to the Internet and checks for the latest updates. If the protection is not up-to-date, it retrieves the latest updates. Note: If you are using a modem, or have an ISDN connection to the Internet, the connection must be active to check for updates. Change the Internet connection settings Usually there is no need to change the default settings, but you can configure how the server is connected to the Internet so that you can receive updates automatically. To change the Internet connection settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Connection. 4. On the Internet connection list, select how your computer is connected to the Internet. Select Assume always connected if you have a permanent network connection. Note: If your computer does not actually have the permanent network connection and is set up for dial-on-demand, selecting Assume always connected can result in multiple dial-ups. Select Detect connection to retrieve updates only when the product detects an active network connection. Select Detect traffic to retrieve updates only when the product detects other network traffic. Tip: If you have an uncommon hardware configuration that causes the Detect connection setting to detect an active network connection even when there is none, select Detect traffic instead. 5. On the HTTP proxy list, select whether or not your computer uses a proxy server to connect to the Internet. Select No HTTP proxy if your computer is connected to the Internet directly.

F-Secure Internet Security 2012 Getting started 9 Select Manually configure HTTP proxy to configure the HTTP proxy settings. Select Use my browser's HTTP proxy to use the same HTTP proxy settings that you have configured in your web browser. Check the status of Real-time Protection Network To function properly, many product features depend on the Real-time Protection Network connectivity. If there are network problems or if your firewall blocks Real-time Protection Network traffic, the status is 'disconnected'. If no product features are installed that require access to Real-time Protection Network, the status is 'not in use'. To check the status: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Automatic updates > Connection. Under Real-time Protection Network, you can see the current status of Real-time Protection Network. How to see what the product has done You can see what actions the product has taken to protect your computer on the Notifications page. The product will show a notification when it takes an action, for example when it finds a virus that it blocks. Some notifications may also be sent by your service provider, for example to let you know about new services that are available. View notification history You can see what notifications have been displayed in the notification history To view the notification history: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Notifications. 4. Click Show notification history. The notification history list opens. Change the notification settings You can select what type of notifications you want the product to display. To change the notification settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Notifications. 4. Select or clear Allow program messages to turn program messages on or off. When this setting is turned on, the product will show notifications from the installed programs.

10 F-Secure Internet Security 2012 Getting started 5. Select or clear Allow promotional messages to turn promotional messages on or off. 6. Click OK. Real-time Protection Network This document describes Real-time Protection Network, an online service from F-Secure Corporation that identifies clean applications and web sites while providing protection against malware and web site exploits. What is Real-time Protection Network Real-time Protection Network is an online service which provides rapid response against the latest Internet-based threats. As a contributor to Real-time Protection Network, you can help us to strengthen the protection against new and emerging threats. Real-time Protection Network collects statistics of certain unknown, malicious or suspicious applications and what they do on your device. This information is anonymous and sent to F-Secure Corporation for combined data analysis. We use the analyzed information to improve the security on your device against the latest threats and malicious files. How Real-time Protection Network works As a contributor to Real-time Protection Network, you can provide information on unknown applications and web sites and on malicious applications and exploits on web sites. Real-time Protection Network does not track your web activity or collect information on web sites that have been analyzed already, and it does not collect information on clean applications that are installed on your computer. If you do not want to contribute this data, Real-time Protection Network does not collect information of installed applications or visited web sites. However, the product needs to query F-Secure servers for the reputation of applications, web sites, messages and other objects. The query is done using a cryptographic checksum where the queried object itself is not sent to F-Secure. We do not track data per user; only the hit counter of the file or web site is increased. It is not possible to completely stop all network traffic to Real-time Protection Network, as it is integral part of the protection provided by the product. Real-time Protection Network benefits With Real-time Protection Network, you will have faster and more accurate protection against the latest threats and you will not receive unnecessary alerts for suspicious applications which are not malicious. As a contributor to Real-time Protection Network, you can help us to find new and undetected malware and remove possible false positives from our virus definition database. All participants in Real-time Protection Network help each other. When Real-time Protection Network finds a suspicious application on your device, you benefit from the analysis results when the same application has been found on other devices already. Real-time Protection Network improves the overall performance of your device, as the installed security product does not need to scan any applications that Real-time Protection Network has already analyzed and found clean. Similarly, information about malicious websites and unsolicited bulk messages is shared through Real-time Protection Network, and we are able to provide you with more accurate protection against web site exploits and spam messages. The more people that contribute to Real-time Protection Network, the better individual participants are protected.

F-Secure Internet Security 2012 Getting started 11 What data you contribute As a contributor to Real-time Protection Network, you provide information on applications stored on your device and the web sites that you visit so that Real-time Protection Network can provide the protection against the latest malicious applications and suspicious web sites. Analyzing the file reputation Real-time Protection Network collects information only on applications that do not have a known reputation and on files that are suspicious or known to be malware. Real-time Protection Network collects anonymous information of clean and suspicious applications on your device. Real-time Protection Network collects information of executable files only (such as Portable Executable files on the Windows platform, which have.cpl,.exe,.dll,.ocx,.sys,.scr, and.drv file extensions). Collected information includes: the file path where the application is in your device, the size of the file and when it was created or modified, file attributes and privileges, file signature information, the current version of the file and the company that created it, the file origin or its download URL, F-Secure DeepGuard and anti-virus analysis results of scanned files, and other similar information. Real-time Protection Network never collects any information of your personal documents, unless they have found to be infected. For any type of malicious file, it collects the name of the infection and the disinfection status of the file. With Real-time Protection Network, you can also submit suspicious applications for analysis. Applications that you submit include Portable Executable files only. Real-time Protection Network never collects any information of your personal documents and they are never automatically uploaded for analysis. Submitting files for analysis With Real-time Protection Network, you can also submit suspicious applications for analysis. You can submit individual suspicious applications manually when the product prompts you to do so. You can only submit Portable Executable files. Real-time Protection Network never uploads your personal documents. Analyzing the web site reputation Real-time Protection Network does not track your web activity or collect information on web sites that have been analyzed already. It makes sure that visited web sites are safe as you browse the web. When you visit a web site, Real-time Protection Network checks its safety and notifies you if the site is rated as suspicious or harmful. If the web site that you visit contains malicious or suspicious content or a known exploit, Real-time Protection Network collects the whole URL of the site so that the web page content can be analyzed. If you visit a site that has not been rated yet, Real-time Protection Network collects domain and subdomain names, and in some cases the path to the visited page, so that the site can be analyzed and rated. All the URL parameters that are likely to contain information that can be linked to you in a personally identifiable format are removed to protect your privacy. Note: Real-time Protection Network does not rate or analyze web pages in private networks, so it never collects any information on private IP network addresses (for example, corporate intranets).

12 F-Secure Internet Security 2012 Getting started Analyzing the system information Real-time Protection Network collects the name and version of your operating system, information about the Internet connection and the Real-time Protection Network usage statistics (for example, the number of times web site reputation has been queried and the average time for the query to return a result) so that we can monitor and improve the service. How we protect your privacy We transfer the information securely and automatically remove any personal information that the data may contain. Real-time Protection Network removes identifying data before sending it to F-Secure and it encrypts all collected information during the transfer to protect it from unauthorized access. The collected information is not processed individually; it is grouped with information from other Real-time Protection Network contributors. All data is analyzed statistically and anonymously, which means that no data will be connected to you in any way. Any information that might identify you personally is not included in the collected data. Real-time Protection Network does not collect IP addresses or other private information, such as e-mail addresses, user names and passwords. While we make every effort to remove all personally identifiable data, it is possible that some identifying data remains in the collected information. In such cases, we will not seek to use such unintentionally collected data to identify you. We apply strict security measures and physical, administrative and technical safeguards to protect the collected information when it is transferred, stored and processed. Information is stored in secured locations and on servers that are controlled by us, located either at our offices or at the offices of our subcontractors. Only authorized personnel can access the collected information. F-Secure may share the collected data with its affiliates, sub-contractors, distributors and partners, but always in a non-identifiable, anonymous format. Becoming a Real-time Protection Network contributor You help us to improve the Real-time Protection Network protection by contributing information of malicious programs and web sites. You can choose to be participate in Real-time Protection Network during the installation. With the default installation settings, you contribute data to Real-time Protection Network. You can change this setting later in the product. Follow these instructions to change Real-time Protection Network settings: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select Open common settings. 3. Select Other > Privacy. 4. Check the participation check box to become a Real-time Protection Network contributor. Questions about Real-time Protection Network Contact information for any questions about Real-time Protection Network. If you have any further questions about Real-time Protection Network, please contact: F-Secure Corporation Tammasaarenkatu 7 PL 24

F-Secure Internet Security 2012 Getting started 13 00181 Helsinki Finland http://www.f-secure.com/en/web/home_global/support/contact The latest version of this policy is always available on our web site. How do I know that my subscription is valid Your subscription type and status are shown on the Subscription status page. When the subscription is about to expire or if your subscription has expired, the overall protection status of the program on the corresponding launchpad icon changes. To check your subscription validity: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select View my subscriptions. 3. Select Subscription status to view information about your subscriptions for installed programs. 4. Select Installation status to see what programs are available to be installed. Your subscription status and expiry date are also shown on the program's Statistics page. If your subscription has expired, you need to renew your subscription to continue receiving updates and using the product. Note: When your subscription has expired, the product status icon is blinking on your system tray. Activate a subscription When you have a new subscription key or campaign code for a product, you need to activate it. To activate a subscription: 1. On the launch pad, right-click the right-most icon. A pop-up menu appears. 2. Select View my subscriptions. 3. Choose one of the following: Click Activate subscription. Click Activate campaign code. 4. In the dialog box that opens, enter your new subscription key or campaign code and click OK. Tip: If you received your subscription key by e-mail, you can copy the key from the e-mail message and paste it into the field. After you have entered the new subscription key, the new subscription validity date is shown on the Subscription status page.

Chapter 2 Protecting the computer against malware Topics: What are viruses and other malware How to scan my computer What is DeepGuard How to use the quarantine Change the mobile broadband settings Virus and spyware scanning protects the computer from programs that may steal personal information, damage the server, or use it for illegal purposes. By default, all malware types are immediately handled when they are found, so that they can cause no harm. By default, Virus and spyware scanning scans your local hard drives, any removable media (such as portable drives or compact disks) and downloaded content automatically. You can set it to scan your e-mails automatically as well. Virus and spyware scanning also watches your computer for any changes that may indicate malware. If any dangerous system changes, for example system settings or attempts to change important system processes are found, DeepGuard stops this program from running as it is likely to be malware.

16 F-Secure Internet Security 2012 Protecting the computer against malware What are viruses and other malware Malware are programs specifically designed to damage your computer, use your computer for illegal purposes without your knowledge, or steal information from your computer. Malware can: take control over your web browser, redirect your search attempts, show unwanted advertising, keep track on the web sites you visit, steal personal information such as your banking information, use your computer to send spam, and use your computer to attack other computers. Malware can also cause your computer to become slow and unstable. You may suspect that you have some malware on your computer if it suddenly becomes very slow and crashes often. Viruses Viruses are usually programs that can attach themselves to files and replicate themselves repeatedly; they can alter and replace the contents of other files in a way that may damage your computer. A virus is a program that is normally installed without your knowledge on your computer. Once there, the virus tries to replicate itself. The virus: uses some of your computer's system resources, may alter or damage files on your computer, probably tries to use your computer to infect other computers, may allow your computer to be used for illegal purposes. Spyware Spyware are programs that collect your personal information. Spyware may collect personal information including: Internet sites you have browsed, e-mail addresses from your computer, passwords, or credit card numbers. Spyware almost always installs itself without your explicit permission. Spyware may get installed together with a useful program or by tricking you into clicking an option in a misleading pop-up window. Rootkits Rootkits are programs that make other malware difficult to find. Rootkits hide files and processes. In general, they do this to hide malicious activity on your computer. When a rootkit is hiding malware, you cannot easily discover that your computer has malware. This product has a rootkit scanner that scans specifically for rootkits, so malware cannot easily hide itself.

F-Secure Internet Security 2012 Protecting the computer against malware 17 Riskware Riskware is not designed specifically to harm your computer, but it may harm your computer if it is misused. Riskware is not strictly speaking malware. Riskware programs perform some useful but potentially dangerous functions. Examples of riskware programs are: programs for instant messaging, such as IRC (Internet Relay Chat), programs for transferring files over the Internet from one computer to another, Internet phone programs, such as VoIP ( Voice over Internet Protocol), Remote Access Software, such as VNC, scareware, which may try to scare or scam individuals into buying fake security software, or software designed to bypass CD checks or copy protections. If you have explicitly installed the program and correctly set it up, it is less likely to be harmful. If the riskware is installed without your knowledge, it is most likely installed with malicious intent and should be removed. How to scan my computer You can scan your computer for malware in real time, manually, or you can schedule a scan at set times. Deciding which method to use depends on how powerful your computer is and how high a level of protection you want. Turning on all the virus and spyware scanning features can have a noticeable effort on your computer's speed if you have an older computer. Scan for malware Real-time scanning protects the computer by scanning all files when they are accessed and by blocking access to those files that contain malware. Real-time scanning works as follows: 1. Your computer tries to access a file. 2. The file is immediately scanned for malware before access to the file is allowed. 3. If malware is found in the file, real-time scanning removes the malware automatically before it can cause any harm. Does real-time scanning affect the performance of my computer Normally, you do not notice the scanning process because it takes a small amount of time and system resources. The amount of time and system resources that real-time scanning takes depend on, for example, the contents, location and type of the file. Files that take a longer time to scan: Compressed files, such as.zip files. Note: Compressed files are not scanned by default. Files on removable drives such as CDs, DVDs, and portable USB drives. Real-time scanning may slow down your computer if: you have a computer that is quite old, or

18 F-Secure Internet Security 2012 Protecting the computer against malware you access a lot of files at the same time. An example of this is opening a directory that contains many files. Turn real-time scanning on or off You can turn real-time scanning on to stop malware before it can harm your computer. To turn real-time scanning on: 2. Select Computer > Virus and spyware scanning. 3. Select Turn on real-time scanning. 4. Click OK. Scan my e-mail for malware E-mail scanning protects you against getting or sending viruses through your e-mail. E-mail scanning protects your computer against: getting a virus in a file attached to an e-mail sent to you, or accidentally sending a virus to someone else, when sending an e-mail with a file attached. When are e-mail messages and attachments scanned E-mail messages and attachments are scanned every time your e-mail program sends or receives e-mail messages from the mail server. The following e-mail messages are scanned by e-mail scanning: E-mail messages that are sent and received by e-mail programs, such as Microsoft Outlook and Outlook Express, Microsoft Mail, or Mozilla Thunderbird, that run as programs independent of your web browser. The following e-mail messages are not scanned by e-mail scanning: E-mail messages in webmail, which include e-mail applications that run in your web browser, such as Hotmail, Yahoo! mail or Gmail. Note: You must make sure that the ports used for different e-mail protocols (POP3, IMAP4, SMTP) are set up correctly. E-mail messages that are received and sent through other ports are not scanned. You are still protected against viruses even when the ports are not set correctly or you are using webmail. When you open the e-mail attachment, real-time scanning will detect that it has a virus and block the virus before it can cause harm. Note: Real-time scanning protects only your computer, but not your friends. Real-time scanning cannot scan attached files unless you open the attachment. This means that if you forward a message before opening the attachment, you may forward an infected e-mail to your friends if your e-mail scanning is not set up properly. Turn e-mail scanning on or off You can turn e-mail scanning on to scan your e-mail messages and attachments for viruses. To turn e-mail scanning on: 2. Select Internet > E-mail filtering. 3. Select Turn on e-mail filtering. 4. Click OK.

F-Secure Internet Security 2012 Protecting the computer against malware 19 Set the ports used for different e-mail protocols If your e-mail program uses a non-standard port, you must change the port that is scanned for e-mail viruses. Otherwise those e-mail messages will not be scanned for viruses. To set the ports: 1. Open your e-mail program and check which ports are being used to send and receive e-mail. Note these port numbers down. 2. Open the product. 3. On the main page, click Settings. 4. Select Internet > E-mail filtering. 5. Click Show protocols. 6. Enter the port number used for the POP3 e-mail protocol. 7. Click OK. Block tracking cookies By blocking tracking cookies, you stop web sites from being able to track the sites you visit on the Internet. Tracking cookies are small files that allow web sites to record what web sites you visit. To block tracking cookies from being installed: 2. Select Computer > Virus and spyware scanning. 3. Select Block tracking cookies. 4. Click OK. Scan at set times You can scan your computer for malware at regular intervals, for example daily, weekly or monthly. Scanning for malware is an intensive process. It requires the full power of your computer and takes some time to complete. For this reason, you might want to set the program to scan your computer when you are not using it. Schedule a scan Set the program to scan your computer at regular times. To schedule a scan: 2. Select Computer > Scheduled scanning. 3. Select Turn on scheduled scanning. 4. Select which days you would like to regularly scan for viruses and spyware. Option Description Daily Weekly Monthly To scan every day. To scan on selected days during the week. Select on which days to scan from the list to the right. To scan on up to three days a month. To select which days: 1. Select one of the Day options. 2. Select the day of the month from the list next to the selected day. 3. Repeat if you want to scan on another day.

20 F-Secure Internet Security 2012 Protecting the computer against malware 5. Select when you want to start the scan on the selected days. Option Description Start time After computer is not used for The time when the scan will start. You should select a time when you expect to not be using the computer. Select a period of idle time after which the scanning starts if the computer is not used. Cancel a scheduled scan You can cancel a scheduled scan locally if it starts when you do not want to run it. The scheduled scan will run at the next scheduled time. Scheduled scanning may have a noticeable effect of your computers performance. To cancel the scheduled scan: 1. Click Scheduled scan has started link on the Virus and spyware scanning flyer. The flyer stays for about 15 seconds, after which it disappears. If you do not click the link on the flyer, you cannot cancel the scheduled scanning any more. 2. Click Cancel on the Virus and spyware scanning window. 3. Click Close. The scheduled scan is canceled. The next scheduled scan will start as usual. View the results of scheduled scan When a scheduled scan finishes you can check if malware were found. To check the results of a scheduled scan: 1. Click the Scheduled scan has finished on the Virus and spyware scanning flyer. 2. Click Show report to see what happened during the scan. Note: If you opened the dialog from the Flyer history dialog, the Show report button is disabled. You cannot see the results of previous scheduled scans. 3. Click Close to close the dialog. Tip: You can view the results of the last scan also by clicking Settings > Computer > Scheduled scanning. Click View last scanning report. Scan manually You can scan your computer manually, if you suspect that you have malware on your computer. How to select the type of manual scan You can scan your whole computer or scan for a specific type of malware or a specific location. If you are suspicious of a certain type of malware, you can scan only for this type. If you are suspicious of a certain location on your computer, you can scan only that section. These scans will finish a lot quicker than a scan of your whole computer. To start manually scanning your computer: 1. On the main page, click the arrow under Scan. The scanning options are shown. 2. Select the type of scan.

F-Secure Internet Security 2012 Protecting the computer against malware 21 If you want to change the scanning settings, select Change scanning settings. 3. If you selected Choose what to scan, a window opens in which you can select which location to scan. The Scan Wizard opens. Types of scan You can scan your whole computer or scan for a specific type of malware or a specific location. The following lists the different types of scan: Scan type Full computer scan Choose what to scan Virus and spyware scan Rootkit scan What is scanned Your entire computer (internal and external hard drives) for viruses, spyware and riskware A specific file, folder or drive for viruses, spyware and riskware Parts of your computer for viruses, spyware and riskware Important system locations where a suspicious item may mean a security problem. Scans for hidden files, folders, drives or processes When to use this type When you want to be completely sure that there is no malware or riskware on your computer. This type of scan takes the longest time to complete. It combines the quick malware scan and the hard drive scan. It also checks for items that are possible hidden by a rootkit. When you suspect that a specific location on your computer may have malware, for example, the location contains downloads from potentially dangerous sources, such as peer-to-peer file sharing networks. Time the scan will take depends of the size of the target that you scan. The scan completes quickly if, for example, you scan a folder that contains only a few small files. This type of scan is much quicker than a full scan. It searches only the parts of your system that contain installed program files.this scan type is recommended if you want to quickly check whether your computer is clean, because it is able to efficiently find and remove any active malware on your computer. When you suspect that a rootkit may be installed on your computer. For example, if malware was recently detected in your computer and you want to make sure that it did not install a rootkit. Clean malware automatically If malware is found during the scan, you can either let the program automatically decide how to clean your computer or you can decide yourself for each item. 1. Select either of: Option Handle automatically (recommended) I want to decide item by item What will happen The program decides what to do to each malware item to automatically clean your computer. The program asks what you want to do to each malware item. 2. Click Next. If you selected Handle automatically (recommended), a window with the results of automatic malware handling opens. Note: Some malware items may have a "Not processed" status, which means that the infected file is inside an archive (for example, a zip file) and cannot be handled automatically. You can

22 F-Secure Internet Security 2012 Protecting the computer against malware delete the infected file by opening the archive and deleting the file manually. If the content of the archive is not important, you can delete the whole archive. If you selected I want to decide item by item, you must specify action for each detected malware. 3. Click Finish to close the Scan Wizard. View the results of manual scan You can view a report of the scanning results after the scan is complete. Note: You might want to view this report because the action you selected may not always be the action that was performed. For example, if you chose to clean an infected file, but the virus could not be removed from the file, the product may have performed some other action to the file. To view the report: 1. Click Show report. The report includes: The number of malware found. The type of malware found and links to descriptions of the malware on the Internet. The actions applied to each malware item. Any items that were excluded from the scan. The scanning engines that were used to scan for malware. Note: The number of scanned files can differ depending on whether files are scanned inside archives during the scan. If archived files have been scanned earlier, the scan results may be saved in the cache memory. 2. Click Finish to close the Scan Wizard. Tip: You can view the results of the last scan also by clicking Settings > Computer > Manual scanning. Click View last scanning report. Select files that are scanned You can select the types of file and parts of your computer to scan in manual and scheduled scans. Note: Edit manual scanning settings to select files and folders you want to scan during the scheduled scan. Two types of lists determine which files are scanned for viruses in manual and scheduled scans: Scanned file types list contains either all files or a defined list of file types. Lists of files excluded from scanning define exceptions to the list of scanned file types. File types or locations that are on the lists of excluded files are not scanned even if they are included in the list of scanned file types. The lists of scanned file types and excluded files let you define which parts of your computer will be scanned in different ways: You can include all files, and then optionally use the exclude list to exclude drives, directories, or files that you know are safe and do not want to be scanned. You can define a list of file types that you want to scan, so that only these file types are scanned.

F-Secure Internet Security 2012 Protecting the computer against malware 23 Include files You can select the file types that you want to be scanned for viruses and spyware in manual and scheduled scans. 2. Select Computer > Manual scanning. 3. Under Scanning options, select from the following settings: Scan only known file types (faster) Scan inside compressed files (zip, arj, lzh,...) Use advanced heuristics (slower) To scan only those file types that are most likely to have infections, for example, executable files. Selecting this option also makes the scanning faster. The files with the following extensions are scanned:.ani,.asp,.ax,.bat,.bin,.boo,.chm,.cmd,.com,.cpl,.dll,.doc,.dot,.drv,.eml,.exe,.hlp,.hta,.htm,.html,.htt,.inf,.ini,.job,.js,.jse,.lnk,.lsp,.mdb,.mht,.mpp,.mpt,.msg,.ocx,.pdf,.php,.pif,.pot,.ppt,.rtf,.scr,.shs,.swf,.sys,.td0,.vbe,.vbs,.vxd,.wbk,.wma,.wmv,.wmf,.wsc,.wsf,.wsh,.wri,.xls,.xlt,.xml,.zip,.jar,.arj,.lzh,.tar,.tgz,.gz,.cab,.rar,.bz2, and.hqx. To scan archive files and folders. To use all available heuristics during the scan to better find new or unknown malware. Note: If you select this option, the scanning takes longer, and can result in more false positives (harmless files reported as suspicious). 4. Click OK. The options you selected under Scanning options determine which files are included in future manual and scheduled scans. Note: All file types or locations on the excluded items list will override the settings that you defined here. File types on the excluded items list will not be scanned even if you selected them to be scanned here. Exclude file types You can exclude files from manual and scheduled scans by their file type. 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file type: a) Select the File Types tab. b) Select Exclude files with these extensions. c) Type a file extension that identifies the type of files that you want to exclude, in the field next to the Add button. To specify files that have no extension, type '.'. You can use the wildcard '?' to represent any single character, or '*' to represent any number of characters.

24 F-Secure Internet Security 2012 Protecting the computer against malware For example, to exclude executable files, type exe in the field. d) Click Add. 5. Repeat the previous step for any other extension you want to be excluded from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings. The selected file types are excluded from future manual and scheduled scans. Exclude files by location You can define a list of excluded folders or drives that you do not want to be scanned for viruses in manual and scheduled scanning. Note: Files in folders or drives that are excluded from scanning are not scanned even though they might be of a type that is included in scanned file types. To define a list of files, folders, or drives excluded by location: 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. To exclude a file, drive, or folder: a) Select the Objects tab. b) Select Exclude objects (files, folders,...). c) Click Add. d) Select the file, drive, or folder that you want to exclude from virus scanning. e) Click OK. Note: Some drives may be removable drives, such as CD, DVD or network drives. Network drives and empty removable drives cannot be excluded. 5. Repeat the previous step to exclude other files, drives, or folders from being scanned for viruses. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to apply the new settings. The selected files, drives or folders are excluded from future manual and scheduled scans. View excluded applications You can view applications that you have excluded from future manual and scheduled scans, and remove them from the exclude list so they will be found in future scans. To view the applications that are excluded from scanning: 2. Do one of the following: Select Computer > Virus and spyware scanning. Select Computer > Manual scanning. 3. Click Open excluded items list. 4. Select the Applications tab.

F-Secure Internet Security 2012 Protecting the computer against malware 25 Note: Only spyware and riskware applications can be excluded, not viruses. 5. To restore an application so that it will be found in future manual or scheduled scans: a) Select the application that you want to include in the scan again. b) Click Remove. 6. Click OK to close the Exclude from scanning dialog box. 7. Click OK to exit. Scan inside compressed files and folders You can scan for viruses that hide inside compressed files. 2. Select Computer > Manual scanning. 3. If you want to scan archive files and folders, such as.zip files, select Scan inside compressed files (zip, arj, lzh,...). Compressed files take slightly longer to scan. 4. Click OK. Select the action when something is found If viruses are found and you have set the program not to automatically handle viruses, you can now select whether to clean, delete, quarantine or only block the files in which a virus was found. Note: This step of the Scan Wizard will be skipped if you have set the program to always handle viruses automatically during a manual or scheduled scan or if you have set the program to automatically process malware found during this scan. You are shown a list of infected files and the viruses that were found in these files. To handle these viruses from your computer: 1. Select the action to take for infected files. If you want to view the additional details of the infection, click the link in the Infection column. 2. Click Next to apply the actions. 3. Click Next to finish. If spyware was found during the manual or scheduled scan, the Scan Wizard continues to the spyware cleaning step. Actions you can take in real-time scanning The Action to take column shows you what actions you can take for the infected files in real-time scanning. Note: In addition to files, the infection can be found also in a registry entry or a process. The following actions can be taken for viruses: Action to take Disinfect automatically Quarantine automatically (default) Rename automatically Delete automatically What happens to the infected files The product tries to disinfect the viruses in any infected files that were found during real-time scanning. The product moves any infected files found during real-time scanning to the quarantine where it cannot harm your computer. The product renames any infected files found during real-time scanning. The product deletes any infected files found during real-time scanning.

26 F-Secure Internet Security 2012 Protecting the computer against malware Action to take Report only What happens to the infected files The product leaves any infected files found during real-time scanning as they are and only reports them. The following actions can be taken for spyware: Action to take Quarantine automatically Remove automatically Report only (default) What happens to the infected files The product moves any spyware found during real-time scanning to the quarantine where it cannot harm your computer. The product removes any spyware found during real-time scanning. The product leaves any spyware found during real-time scanning as they are and only reports them. Actions you can take in manual or scheduled scanning The Action to take column shows you what actions you can take for the infected files in manual or scheduled scanning. Note: In addition to files, the infection can be found also in a registry entry or a process. The following actions can be taken for viruses: Action to take Ask what to do (default) Disinfect automatically Quarantine automatically Rename automatically Delete automatically Report only What happens to the infected files The product asks you what to do if viruses are found during manual scanning. The product tries to automatically disinfect the viruses in any infected files that were found during manual or scheduled scanning. Note: It is not always possible to disinfect a virus in a file. If this is not possible, the file is quarantined (except when found on network or removable drives), so the virus cannot harm the computer. The product moves any infected files that were found during manual or scheduled scanning to the quarantine where they cannot harm the computer. The product renames any infected files that were found during manual or scheduled scanning. The product deletes any infected files that were found during manual or scheduled scanning. The product leaves any infected files that was found during during manual or scheduled scanning as they are and records the detection in the scan report. Note: If real-time scanning is turned off, any malware is still able to harm the computer if you select this option. The following actions can be taken for spyware: Action to take Ask what to do (default) Quarantine automatically What happens to the infected files The product asks you what to do if spyware is found during manual scanning. The product moves any spyware that was found during manual or scheduled scanning to the quarantine where it cannot harm the computer.

F-Secure Internet Security 2012 Protecting the computer against malware 27 Action to take Remove automatically Report only What happens to the infected files The product removes any spyware that was found during manual or scheduled scanning. The product leaves any spyware that was found during during manual or scheduled scanning as it is and records the detection in the scan report. Note: If real-time scanning is turned off, any malware is still able to harm the computer if you select this option. Default actions in real-time scanning The Default action column shows you what default actions you can select for infected files in real-time scanning. You can select one of the following default actions if malware is found: Default action Always ask me If unclear, ask me What happens if malware is found The program asks you what to do if malware is found during real-time scanning. When the program cannot identify the malware, it asks you what do you want to do with it. Default actions in manual and scheduled scanning The Default action column shows you what default actions you can select for infected files in manual and scheduled scanning. You can select one of the following default actions if malware is found: Default action Ask what to do Disinfect automatically Quarantine automatically Rename automatically Delete automatically Report only What happens if malware is found The program asks you what to do if malware is found during a manual scan. The program tries to automatically disinfect the viruses in any infected files that were found during a manual or scheduled scan. Note: It is not always possible to disinfect a virus in a file. If this is not possible, the file is quarantined (except when found on network or removable drives), so the virus cannot harm your computer. The program automatically moves any infected files found during a manual or scheduled scan to the quarantine where it cannot harm your computer. The program automatically renames any infected files found during a manual or scheduled scan. The program automatically deletes any infected files found during a manual or scheduled scan. The program leaves any infected files that were found during a manual or scheduled scan as they are and records the virus and spyware detection in the scan report. Note: If Real-time scanning is not on, any malware is still able to harm your computer if you select this option.