CHAPTER 1
20
Introduction
P
erformance Management
Statistics and performance data handling and reporting.
T
ask Management
Management of virus scanning tasks and other operations.
1.4
P
olicy-Based Management
A security policy is a set of well-defined rules that regulate how sensitive
information and other resources are managed, protected, and distributed.
The management architecture of F-Secure software uses policies that are
centrally configured by the administrator for optimum control of security in
a corporate environment. Policy-based management implements many
functions:
Remotely controlling and monitoring the behavior of the products
Monitoring statistics provided by the products and the
Management Agent
Remotely starting predefined operations
Transmission of alerts and notifications from the products to the
system administrator
The information flow between F-Secure Policy Manager Console and the
hosts is accomplished by transferring policy files. There are three kinds of
policy files:
Default Policy files (
.dpf
)
Base Policy files (
.bpf
)
Incremental Policy files (
.ipf
)
The current settings of a product consist of all three policy file types:
Summary of Contents for POLICY MANAGER 7.0 -
Page 1: ...F Secure Policy Manager 7 0 Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 18 Features 19 Policy Based Management 20...
Page 24: ...24 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 25 F Secure Policy Manager Console 27...
Page 45: ...45 Click Next to continue...
Page 47: ...47 Step 11 Setup displays the components that will be installed Click Next...
Page 60: ...60 4 COMMDIR MIGRATION Introduction 61 Instructions 61...
Page 81: ...81 After the key pair is generated F Secure Policy Manager Console will start...
Page 216: ...216 B Ilaunchr Error Codes Overview 217 Error Codes 218...
Page 225: ...225 D Remote Installation Support for Windows 98 ME Enabling Remote Administration 226...
Page 228: ...228 E NSC Notation for Netmasks Overview 229...
Page 235: ...235 GLOSSARY...