![F-SECURE POLICY MANAGER 8.0 Administrator'S Manual Download Page 75](http://html1.mh-extra.com/html/f-secure/policy-manager-8-0/policy-manager-8-0_administrators-manual_3108771075.webp)
CHAPTER 5
75
Using F-Secure Policy Manager Console
5.1
Overview
F-Secure Policy Manager Console is a remote management console for
the most commonly used F-Secure security products, designed to provide
a common platform for all of the security management functions required
in a corporate network.
An administrator can create different security policies for each host, or
create a single policy for many hosts. The policy can be distributed over a
network to the workstations, servers, and security gateways.
With F-Secure Policy Manager Console, you can:
Set the attribute values of managed products,
Determine rights for users to view or modify attribute values that
were remotely set by the administrator.
Group the managed hosts under policy domains sharing common
attribute values.
Manage host and domain hierarchies easily.
Generate signed policy definitions, which include attribute values
and restrictions.
Display status.
Handle alerts.
Handle F-Secure Anti-Virus scanning reports.
Handle remote installations.
View reports in HTML format, or export reports to various exports
formats.
F-Secure Policy Manager Console generates the policy definition, and
displays status and alerts. Each managed host has a module (F-Secure
Management Agent) enforcing the policy on the host.
The conceptual world of F-Secure Policy Manager Console consists of
hosts that can be grouped within policy domains. Policies are
host-oriented. Even in multi-user environments, all users of a specific host
share common settings.
F-Secure Policy Manager Console recognizes two types of users:
administrators and read-only mode users.
Summary of Contents for POLICY MANAGER 8.0
Page 1: ...F Secure Policy Manager 8 0 Administrator s Guide...
Page 8: ...viii Contact Information 213 Glossary 214 About F Secure Corporation...
Page 9: ...9 ABOUT THIS GUIDE Overview 10 How This Guide is Organized 11...
Page 15: ...15 1 INTRODUCTION Overview 16 Installation Order 17 Features 18 Policy Based Management 19...
Page 23: ...23 2 SYSTEM REQUIREMENTS F Secure Policy Manager Server 24 F Secure Policy Manager Console 25...
Page 41: ...CHAPTER3 41 Installing F Secure Policy Manager Server Click Next to continue...
Page 60: ...60 Step 4 Select F Secure Policy Manager Console Click Next to continue...
Page 64: ...64 Step 8 Click Finish to close the installer...
Page 182: ...182 10 F SECURE POLICY MANAGER PROXY Overview 183...
Page 198: ...198 B Ilaunchr Error Codes Overview 199 Error Codes 200...
Page 207: ...207 D NSC Notation for Netmasks Overview 208...
Page 214: ...214 GLOSSARY...
Page 221: ......