116
The
Stop All
button is enabled only if the current host or domain has an
installation operation defined. Any subdomain operations do not affect the
button state.
Stop All
only removes the operation from the policy. If a host
has already polled the previous policy file, it may try to carry out the
installation operation even though it is no longer visible in the Installation
Editor.
Remote Uninstallation
Uninstallation can be performed as easily as an update. A distribution
package is created that contains only the software needed to uninstall the
product. If the product does not support remote uninstallation, the
Installation Editor does not display an option for uninstallation.
Choosing
Reinstall
will reinstall the current version. This option should
only be used for troubleshooting. Most of the time, there is no reason to
reinstall a product.
5.4.3
Local Installation and Updates with Pre-Configured
Packages
You can export pre-configured packages in JAR or in MSI (Microsoft
Installer) format. The MSI packages can be distributed, for example,
using Windows Group Policy in Active Directory environment.
The procedure for exporting in both formats is the same, and is explained
below. You can select the file format for the customized package in the
Export Installation Package
dialog (see step 4. below).
Login Script on Windows Platforms
There are two ways of doing this: by using a customized remote
installation JAR package or by using a customized MSI package.
Using the Customized Remote Installation JAR Package
1. Run F-Secure Policy Manager Console.
2. Choose
Installation Packages
from the
Tools
menu. This will open the
Installation Packages
dialog box.
Summary of Contents for POLICY MANAGER 8.0
Page 1: ...F Secure Policy Manager 8 0 Administrator s Guide...
Page 8: ...viii Contact Information 213 Glossary 214 About F Secure Corporation...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 17 Features 18 Policy Based Management 19...
Page 23: ...23 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 24 F Secure Policy Manager Console 25...
Page 41: ...CHAPTER3 41 Installing F Secure Policy Manager Server Click Next to continue...
Page 60: ...60 Step 4 Select F Secure Policy Manager Console Click Next to continue...
Page 64: ...64 Step 8 Click Finish to close the installer...
Page 182: ...182 10 F SECURE POLICY MANAGER PROXY Overview 183...
Page 198: ...198 B Ilaunchr Error Codes Overview 199 Error Codes 200...
Page 207: ...207 D NSC Notation for Netmasks Overview 208...
Page 214: ...214 GLOSSARY...
Page 221: ......