CHAPTER 4
79
Basics of Using F-Secure Internet Gatekeeper
4.1
Introduction
This chapter contains a brief introduction into using F-Secure Policy
Manager for administering F-Secure Internet Gatekeeper in centrally
managed installations. In addition, it describes how to monitor the status
of F-Secure Internet Gatekeeper components with the F-Secure Internet
Gatekeeper Web Console.
Chapters 5-7 contain more detailed information on how you can configure
and administer F-Secure Internet Gatekeeper with F-Secure Policy
Manager.
4.2
Using F-Secure Policy Manager
If your corporate network utilizes F-Secure Policy Manager to configure
and manage F-Secure products, you can add F-Secure Internet
Gatekeeper to the existing F-Secure Policy Manager environment. In the
centralized administration mode, F-Secure Policy Manager Console is
used to change settings and view statistics of the F-Secure Internet
Gatekeeper.
In the centralized administration mode you can open F-Secure Internet
Gatekeeper components from the
Windows Start menu > Programs >
F-Secure Policy Manager Console.
When the Policy Manager Console
opens, go to the Advanced Mode user interface by selecting
View >
Advanced Mode
(this step is required in F-Secure Policy Manager version
5.50 and later). Then select the Policy tab to view the F-Secure Internet
Gatekeeper components.
F-Secure Policy Manager Console is used to create policies for F-Secure
Anti-Virus for Internet Gateways, F-Secure Anti-Virus for Internet Mail and
F-Secure Content Scanner Server which are running on selected hosts or
groups of hosts. Policies are created by assigning values to variables
shown on the
Policy
tab of the
Properties
pane in F-Secure Policy
Manager Console. To assign a value, select a variable – marked by the
leaf icon – in the
Properties
pane (the middle pane) and enter the value in
the
Editor
pane (the right pane).
Summary of Contents for Internet Gatekeeper
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide ...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13 ...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29 ...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue ...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page ...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298 ...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305 ...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310 ...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361 ...
Page 414: ...414 ...