Glossary
236
Authentication
The act of proving one’s identity.
Authorization
The right to perform an action on an object. Also the act of proving
this right.
Bit
The smallest unit of memory size, sets of which make up bytes,
arranged in a sequential pattern to express text, numbers, or other
detailed information, recognizable by the computer’s processing
system.
Byte
A set of bits that represent a single character. There are 8 bits in a
byte.
Certificate
See Public Key.
Client
A program that is used to contact and obtain data from a Server
program on another computer.
Corrupted
Data that has been modified without the user’s authorization or
approval.
Domain Name
A unique name that identifies an Internet site (for example,
F-Secure.com)
DNS
Domain Name System. A service that converts symbolic node names
to IP addresses. DNS uses a distributed database.
Firewall
A combination of hardware and software that separates a network
into two or more parts for security purposes.
Summary of Contents for POLICY MANAGER 7.0 -
Page 1: ...F Secure Policy Manager 7 0 Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 18 Features 19 Policy Based Management 20...
Page 24: ...24 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 25 F Secure Policy Manager Console 27...
Page 45: ...45 Click Next to continue...
Page 47: ...47 Step 11 Setup displays the components that will be installed Click Next...
Page 60: ...60 4 COMMDIR MIGRATION Introduction 61 Instructions 61...
Page 81: ...81 After the key pair is generated F Secure Policy Manager Console will start...
Page 216: ...216 B Ilaunchr Error Codes Overview 217 Error Codes 218...
Page 225: ...225 D Remote Installation Support for Windows 98 ME Enabling Remote Administration 226...
Page 228: ...228 E NSC Notation for Netmasks Overview 229...
Page 235: ...235 GLOSSARY...