Server Security is our product for bigger companies with their own IT resources who wish to manage server security centrally.
IP ranges for Browsing protection - You can use the Trusted Hosts table to specify hosts (internal servers) that are considered trusted and safe to visit without consulting Security Cloud (previously known as Real-time Protection Network). The Trusted Hosts table has been added to Browsing Protection policies and table supports both IPv4 and IPv6 IP addresses and ranges.
Application whitelist for F-Secure Network filter - You can use the application whitelist to define commonly used applications as safe. F-Secure Network Filter will not monitor these applications. The whitelist supports full path and SHA-1 hash methods.
- Proactive Virus Threat Detection
- Heuristic Spam Analysis
- Spam Assassin