One Sweet Security Suite

It's a security suite called Internet Security 2006. Offered by Finnish company F-Secure, this suite offers not only all the functionality of products from the Big Three, but also rootkit detection—and for $10 less than the Big Three Charge.

Like the Big Three, F-Secure offers anti-virus and anti-spyware capabilities, a firewall, mail screening, and content filtering. But F-Secure's rootkit detection is the most significant feature. According to our best guesstimate, this will be the only security suite on the market to offer rootkit detection for at least the next six months, possibly even for the next year.

For those living under a rock, rootkit detection is tremendously important these days, because this new breed of highly undetectable (or "stealth") malware is prevalent in the wild. A rootkit plays havoc with any system on which it takes up residence. (For more information on rootkit detection, see our recent TechBuilder Recipe, Rooting Out Rootkits.)

F-Secure's Internet Security 2006 retails for $59, roughly $10 cheaper than comparable security suites from other top players in the market. (Norton Internet Security, for example, lists for $69.) While $10 may not sound like a big deal, if you're installing a security suite onto dozens of machines—perhaps even hundreds—then your savings on a volume license will add up significantly.

id
unit-1659132512259
type
Sponsored post

The Many Benefits of F-Secure Internet Security 2006

Let's start off by taking a look at how F-Secure Internet Security stacks up against Norton Internet Security and Trend Micro Internet Security. For starters, here's what all three suites offer:

Where F-Secure's Internet Security 2006 goes beyond the suite offerings from the major players in functionality is in rootkit detection. Using the company's rootkit-detection engine, called Blacklight, the software detects and even eliminates active rootkits on a computer. The tool also does a great job of cutting extraneous chatter out of its results, so system builders will no longer be confused by the kinds of false positives that most other tools routinely report.

Pros (and a Few Cons) of Using F-Secure Internet Security 2006

Security suites—like other kinds of "do-it-all" software packages—do their best to tackle everything users expect and want them to do. But they do some things better than others. F-Secure's suite is no exception.

On the plus side, F-Secure Internet Security 2006 gets top marks for its anti-virus software (and fast signature update), firewall, and rootkit detector. Its content-filtering capabilities are adequate for most SOHO situations.

But its anti-spyware and anti-spam capabilities lag behind those of the Big Three's products. This doesn't mean F-Secure isn't a terrific product at a great value. Nor does it mean you'll be exposing your customers to unnecessary risks. And this deficit is easy to address: Simply install the freeware version of Microsoft's Windows Defender, which consistently does well in ratings and rankings for this kind of software.

Further, recent comparison reviews note that F-Secure Internet Security 2006 does a fine job of protecting clean machines from new spyware, they give the product lower marks for its ability to clean up existing infestations and detecting the presence of certain insidious types of spyware, most notably keyloggers. (Keyloggers store all the keystrokes that users make in a file, then periodically ship it off to a presumably malicious third party for harvesting of account and password info, credit-card data, and other sensitive information.) But we won't jump down F-Secure's throat on this function: No suite-based spyware detection software currently matches best-of-breed standalone implementations when dealing with keyloggers.

Omnibus security packages also tend to have sizable system footprints; the smallest of the suites we know is BitDefender. This security suite comes in at a relatively svelte 50 MB. Most other suites consume up to 70 MB at runtime, and even more when actively scanning for malware. In the case of F-Secure Internet Security 2006, a complete install on our test system consumed an average of 92 MB while actively scanning for spyware and viruses, and about 56 MB otherwise. As such packages go, this makes it bit less resource-consumptive than most. Ingredients

To start working with F-Secure Internet Security 2006, all you need is a PC running Windows (Win98 or above) and access to the Internet. Our test system ran Windows XP SP2 with all current security updates installed. (Note: The F-Secure software does not work with Windows Server operating systems.

If the test machine on which you intend to install this software is already running a security suite—or a collection of anti-virus, anti-spyware, personal firewall, or other security related software—you should either create a restore point (on Windows XP), or back up the system first. Next, uninstall any or all of the aforementioned components. While F-Secure Internet Security 2006 will detect and remove most other components of its kind, the operation will go more smoothly if you first get these other components out of the way.

How to Download and Install F-Secure Internet Security 2006

Unless you're on a slow Internet link, the entire process of downloading and installing this security suite should take no more than 15 minutes. The download itself is 60.4 MB, and for us, it only took two minutes to download over our relatively fast cable-modem Internet link. OK, let's get started!

How to Configure F-Secure Internet Security 2006 and Complete the Install

In the next series of steps, the real fun begins as you configure and tweak the F-Secure security suite you've just installed.

The next phase of F-Secure Internet Security activity occurs after you restart the PC. So, if you haven't already, reboot the system. At that point, the Startup Wizard will pop up to inform you that it will connect to the Internet for new updates, as seen here:

Earlier, during installation, the Tasks screen instructed the software to launch the main user interface for F-Secure Internet Security 2006 (once you finished with the Start-up Wizard). So of course, that's what splashes up on your screen next, as seen here:

This is your control center for the security suite, where its underlying capabilities map to the left-hand buttons as follows:

How to Work with F-Secure's Rootkit Detection

Let's now look at F-Secure Internet Security's anti-virus and rootkit-detection capabilities, as well as its firewall operation. They'll provide a clear view into how the program works and operates, and they also show off what we think are the suite's best capabilities.

The program will launch a complete system scan soon after you exit the Wizard, just as you instructed it to in the Tasks screen a few steps back. It's probably a good idea to wait until this completes before trying anything else. You will probably need to wait a while: our relatively modest scan (about 100 GB of on-disk materials) took roughly 30 minutes to complete. Once it's done, here are your next steps:

How to Work with F-Secure's Firewall Rules

F-Secure's firewall rule-building approach is one of the best-guided and most intelligible we've seen in the dozen or so personal and small-scale firewalls we've worked with over the last seven years. Once you get the hang of it, you'll probably feel the same way.

The application-control capabilities in the Internet Shield sub-menu are worth exploring. They provide more granularity and more controls than we've seen in programs like Norton's Personal Firewall and Sygate's Personal Firewall.

To begin, the Application Control and Intrusion Prevention settings are pretty straightforward. Application Control may be set to either Prompt (the default) or Allow and Log. With Prompt, no application can access the Internet without obtaining the user's permission. With Allow and Log, by contrast, any application can access the Net, but all accesses are logged.

Intrusion Prevention has two settings, too: Block and Log (the default) and Log Only. Block and Log means possible intrusion attempts are blocked as well as recorded. Log Only means they're not blocked at all, but are still recorded. Note: Dial-up control applies only to PCs with telephone modems installed; this control may only be enabled or disabled. If enabled, it imposes additional security checks during dial-up connection attempts.

That said, the real action here is on the firewall. That's where the creation and expression of rules define its run-time behavior. The following steps will take you through defining such a rule, and show you how things work in this environment.

F-Secure Internet Security 2006 is a worthwhile software component for the systems you build and maintain. Even though the suite's anti-spam and anti-spyware capabilities are somewhat lacking, the rest of F-Secure's suite is as good as or better than its competitors in all the other categories we covered. Plus, you'll have a rootkit detector, a capability not even offered at this time by any other suite on the market.

If you're looking for yet more information on this suite, check out the F-Secure Internet Security 2006 page. Here you'll find pointers to white papers, case studies, evaluations, and reviewer's guides, as well as a complete manual.

ED TITTEL is a freelance writer and trainer in Austin, TX, who specializes in Windows topics and tools, especially networking and security related matters. JUSTIN KORELC is a long-time Linux hacker and Windows maven who concentrates on hardware and software security topics. Ed and Justin are also co-authors of Build the Ultimate Home Theater PC (John Wiley, 2005).