![F-SECURE POLICY MANAGER 8.0 Administrator'S Manual Download Page 218](http://html1.mh-extra.com/html/f-secure/policy-manager-8-0/policy-manager-8-0_administrators-manual_3108771218.webp)
218
Policy
The set of conditions under which users of a system can access the
system’s resources.
Policy-based management
Controlling the actions and configurations of a system using policy
statements.
Private Key
The part of the key in a public key system which is kept secret and is
used only by its owner. This is the key used for decrypting messages,
and for making digital signatures.
Protocol
A protocol is an algorithm, or step by step procedure, carried out by
more than one party.
Public Key
The part of the key in a public key system which is widely distributed
(and not kept secure). This key is used for encryption (not decryption)
or for verifying signatures. A public key also contains other
information about the subject, issuer, lifetimes, etc.
Random Seed
The seed value for the cryptographically strong random number
generator, which is updated each time an F-Secure application
closes.
Server
A computer, or a piece of software, that provides a specific kind of
service to client software.
Service
An application that is running on a host regardless of who is logged in
and which provides some service to other applications.
Summary of Contents for POLICY MANAGER 8.0
Page 1: ...F Secure Policy Manager 8 0 Administrator s Guide...
Page 8: ...viii Contact Information 213 Glossary 214 About F Secure Corporation...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 17 Features 18 Policy Based Management 19...
Page 23: ...23 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 24 F Secure Policy Manager Console 25...
Page 41: ...CHAPTER3 41 Installing F Secure Policy Manager Server Click Next to continue...
Page 60: ...60 Step 4 Select F Secure Policy Manager Console Click Next to continue...
Page 64: ...64 Step 8 Click Finish to close the installer...
Page 182: ...182 10 F SECURE POLICY MANAGER PROXY Overview 183...
Page 198: ...198 B Ilaunchr Error Codes Overview 199 Error Codes 200...
Page 207: ...207 D NSC Notation for Netmasks Overview 208...
Page 214: ...214 GLOSSARY...
Page 221: ......