CHAPTER 12
261
Hosts running F-Secure Client Security or F-Secure Anti-Virus for
Workstations fetch virus definition updates through F-Secure Policy
Manager Proxy. F-Secure Policy Manager Proxy contacts F-Secure
Policy Manager Server and F-Secure's distribution server when needed.
Workstations in the remote offices communicate also with the Policy
Manager Server in the main office, but this communication is restricted to
remote policy management, status monitoring, and alerting. Since the
heavy database update traffic is redirected through the F-Secure Policy
Manager Proxy in the same local network, the network connection
between managed workstations and F-Secure Policy Manager Server
has a substantially lighter load.
12.4
Configuring Automatic Updates on Hosts from
Policy Manager Proxy
A list of Policy Manager Proxies through which the hosts fetch updates
can be configured on Policy Manager’s
Settings
tab. This is described in
Configuring Policy Manager Proxy
. However, if you need to
configure this from a managed host’s local user interface, you can do it as
follows:
1.
Go to the
Automatic Updates
page and click
Advanced...
2.
Select
Automatic Updates
Æ
Policy Manager Proxy
.
On the Policy Manager Proxy page, you can view and edit the
addresses from which the local F-Secure Client Security gets
automatic updates.
The addresses are used from top to bottom, i.e. the first address on
the list is the one used by default.
3.
Click
Add
to add the proxy on the list.
4.
Enter the name of the first Policy Manager Proxy in the field. The click
OK
.
For more information on installing and configuring Policy Manager
Proxy, see F-Secure Policy Manager Proxy Administrator’s Guide.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...