Note:
Push Installation requires administrator rights for the target machine during the installation. If
the account you entered does not have administrator rights on one of the remote hosts, an
Access
denied
error message will be indicated for that host, while installation will continue on the other hosts.
When you select
This account
, you will use the security rights of the account currently logged on. Use
this option in the following cases:
•
You are already logged in as domain administrator; or
•
You are logged in as the local administrator with a password that matches the local administrator’s
password on the target host.
Another user
: enter account and password. The administrator can enter any proper domain administrator
account and password to easily complete the remote installation on selected hosts.
•
When completing the installation to the trusted and non-trusted domains with a domain account, make
sure you enter the account in the format
DOMAIN\ACCOUNT
.
•
When using a local administrator account, use the format
ACCOUNT
. (Do not enter the host name as
part of the account, otherwise the account is accepted only by the host in question.
Note:
When installing, if the administrator machine has open network connections to the target
machine with another user account, the NT credential conflict error message
1219
appears. The
solution in this case is to close the active connections before using the
Push installation
feature.
5.
Review the installation summary.
6.
To start the
Remote installation wizard
, click
Start
.
The
Remote installation wizard
will guide you through a series of dialog boxes in which you must answer
some questions for the installation to take place. In the final dialog box, click
Finish
, and go to the next
step.
Policy Manager installs Management Agent and the selected products on the hosts. During this process,
the
Status
line will display the procedure in process. You can click
Cancel
at any time to stop the
installation.
7.
When the
Status
line displays finished, the process has finished and you can select in which domain the
new hosts should be placed using the import settings.
8.
Click
Finish
.
Policy Manager Console will place the new hosts in the domain that you selected, unless you specified
another domain in this dialog. You can also choose not to place the hosts to any domain automatically.
The new hosts will send autoregs and the hosts can be imported that way.
After a few minutes, the products that were installed will be listed.
9.
To see this list, select the
Installation
tab (alternatively select the top domain on the
Policy domain
tree).
Policy-based installation
Base policy files are used to start installations on hosts that have Management Agent installed.
Policy Manager Console creates an operation-specific installation package, which it stores on Policy Manager
Server, and writes an installation task to the base policy files (thus, policy distribution is required to start
installations). Both base policy files and the installation package are signed by the management key-pair so
that only genuine information is accepted by the hosts.
Management Agent on the hosts fetches the new policies from Policy Manager Server and discovers the
installation task. Management Agent fetches the installation package specified in the task parameters from
the server and starts the installation program.
When installation is complete, Management Agent sends the result of the installation operation in an incremental
policy file to the server. Policy Manager Console discovers the new status information and shows the results.
Uninstallation uses these same delivery mechanisms. The results of the uninstallation will not be reported.
F-Secure Client Security | Setting up the managed network |
53
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 2: ......
Page 8: ...8 F Secure Client Security TOC...
Page 44: ......
Page 62: ......
Page 86: ......
Page 114: ......
Page 118: ......
Page 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Page 148: ......
Page 158: ......