CHAPTER 5
165
5.2.4
Configuring Policy Manager Proxy
If the different offices of a company have their own Policy Manager
Proxies, it is often a good idea to configure the laptops that the user takes
from one office to another to use a Policy Manager Proxy as the updates
source. In this configuration example it is assumed that the laptops have
been imported to one subdomain on the
Policy Domains
tab, and that the
different offices of the company have their own Policy Manager Proxies,
and all of them will be included on the list of Policy Manager Proxy
Servers.
1.
Select the subdomain where you want to use the Policy Manager
Proxy in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Automatic Updates
page.
3.
Make sure that
Enable automatic updates
is selected.
4.
In
Policy Manager Proxies
there is a list of the proxy servers
available. Click
Add
to add new servers on the list. This opens the
F-Secure Policy Manager Proxy Server Properties
window.
5.
Enter a priority number in the
Priority
text box for the Policy Manager
Proxy. The priority numbers are used to define the order in which the
hosts try to connect the Policy Manager Proxies. Use, for example, 10
for the Policy Manager Proxy in the office where the host is normally
located, and 20, 30 and so on for the other Proxies.
6.
Enter the URL of the F-Secure Policy Manager Proxy in the
Server
address
text box. Then click
OK
.
7.
Repeat steps 5 and 6 to add the other servers on the list.
8.
When you have added all Policy Manager Proxies on the list, check
that they are in correct order. If necessary, you can modify their order
by altering the priority numbers.
9.
If you want to restrict users from changing these settings, click the
lock symbols beside the settings.
F-Secure Policy Manager Proxy is a new product, and not to be
confused with F-Secure Anti-Virus Proxy. For more information
about F-Secure Policy Manager Proxy, see F-Secure Policy
Manager Proxy Administrator’s Guide.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...