APPENDIX A
281
SecurityPolicy=0 | 1 | 2
The files and folders installed to NTFS and the
product’s registry keys are protected with the NT
security permissions according to the defined
"SecurityPolicy":
0 = no special policy applied; files and folders
inherit the security permissions from the parent.
1 = less strict policy; files and folders are
protected with permissions granting full access to
authorized users and administrators, and
read-only access to everyone.
2 = strict policy; files and folders are protected
with permissions granting full access to
administrators, read-write access to power users,
read-only access to users, and no access to
everyone.
Note: When SecurityPolicy = 1 or 2, Setup
overwrites the access control lists (ACLs) of
existing files, folders ,and registry keys. If you
have specifically configured ACLs, for example,
by adding users to them, you need to reconfigure
them after the installation.
[F-Secure common]
Common settings
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...