135
6.6.2
Restrictions
There are two types of restriction:
Access
restrictions and
Value
restrictions.
Access restrictions are
Final
and
Hidden
.
Final
always forces the policy:
the policy variable overrides any local host value, and the end user
cannot change the value as long as the
Final
restriction is set.
Hidden
merely hides the value from the end user. Unlike the
Final
restriction, the
Hidden
restriction may be ignored by the managed application.
Figure 6-23 Embedded restriction editor
Using value restrictions, an administrator can restrict the values of any
policy variable to a list of acceptable values from which the user can
choose. Additionally, the administrator can restrict integer-type variables
(Integer, Counter, and Gauge) to a range of acceptable values. An
additional restriction, the FIXED SIZE restriction, can be applied to tables.
With this restriction, the end user cannot add or delete rows from
fixed-size tables. Because the
Final
restriction cannot be used for empty
tables, the FIXED_SIZE restriction should be used for this purpose
(preventing end users from changing tables' values).
If a variable in the product Management Information Base (MIB) already
contains a range or choice definition, the administrator can further restrict
the range or choices, but not extend them. If the product MIB does not
define value restrictions, the administrator can specify any range or
choice restriction.
Summary of Contents for POLICY MANAGER 7.0 -
Page 1: ...F Secure Policy Manager 7 0 Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 18 Features 19 Policy Based Management 20...
Page 24: ...24 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 25 F Secure Policy Manager Console 27...
Page 45: ...45 Click Next to continue...
Page 47: ...47 Step 11 Setup displays the components that will be installed Click Next...
Page 60: ...60 4 COMMDIR MIGRATION Introduction 61 Instructions 61...
Page 81: ...81 After the key pair is generated F Secure Policy Manager Console will start...
Page 216: ...216 B Ilaunchr Error Codes Overview 217 Error Codes 218...
Page 225: ...225 D Remote Installation Support for Windows 98 ME Enabling Remote Administration 226...
Page 228: ...228 E NSC Notation for Netmasks Overview 229...
Page 235: ...235 GLOSSARY...