Restrictions can be edited within the main application area or in a separate dialog box. To toggle between
these two choices, choose
Embedded restriction editors
from the
View
menu. If embedded editors are
switched off, the main application area displays buttons for launching the dialog editors.
Configuring settings
Settings are changed by modifying the policy variables.
To configure settings:
1.
Browse the policy tree.
2.
Change the values of the policy variables.
3.
Edit policy variable restrictions if necessary.
Restrictions can be edited within the main application area or in a separate dialog box. To toggle between
these two choices:
a) Select
View
➤
Embedded restriction editors
from the menu.
If embedded editors are switched off, the main application area displays buttons for launching the
dialog editors.
4.
Save the policy:
•
Select
File
➤
Save
from the menu.
•
Select
File
➤
Save as
from the menu.
Save as
is recommended as you save the policy data with a new name, thus allowing you to revert to an
older policy configuration if needed.
5.
Distribute the policy files:
After you have finished configuring the domains and hosts, you must distribute the new configurations to
the hosts. To do this:
•
Click
in the toolbar.
•
Select
File
➤
Distribute
from the menu.
•
Press CTRL + D.
Policy Manager Console saves the current policy data and then generates the base policy. Policy files are
copied to the
Communication
directory, where the F-Secure software on the hosts will check for it
periodically.
Note:
No changes will take effect before you have distributed the policy and the host has fetched
the policy file. This also applies to operations, because they are implemented using the policy-based
mechanism.
Policy inheritance
In Policy Manager Console, each policy domain automatically inherits the settings of its parent domain,
allowing for easy and efficient management of large networks.
The inherited settings may be overridden for individual hosts or domains. When a domain's inherited settings
are changed, the changes are inherited by all of the domain’s hosts and subdomains. Any overridden setting
can be made inherited again by using the
Clear
operation. Because the setting is deleted from the currently
selected policy domain or host, the setting is replaced by the setting in the parent domain.
Policy inheritance simplifies the defining of a common policy. The policy can be further refined for subdomains
or even individual hosts. The granularity of policy definitions can vary considerably among installations. Some
administrators might want to define only a few different policies for large domains. Other administrators might
attach policies directly to each host, achieving the finest granularity.
50
| F-Secure Policy Manager | Using Policy Manager Console
Summary of Contents for POLICY MANAGER 9.0
Page 1: ...F Secure Policy Manager Administrator s Guide ...
Page 2: ......
Page 6: ...6 F Secure Policy Manager TOC ...
Page 28: ......
Page 66: ......
Page 90: ......
Page 94: ......
Page 98: ......
Page 102: ......