Contents
Chapter 1: Introduction.......................................................................5
System requirements................................................................................................................6
An up-to-date system is a secure system.................................................................................7
When should you use F-Secure Policy Manager Proxy?.........................................................8
Chapter 2: Installation.........................................................................9
Installing the product locally....................................................................................................10
Chapter 3: Configuration...................................................................11
Configuring the product remotely............................................................................................12
Chapter 4: Using the product on Linux...........................................13
Installing the product...............................................................................................................14
Configuring the product..........................................................................................................15
Upgrading the product............................................................................................................16
Uninstalling the product..........................................................................................................17
Frequently asked questions....................................................................................................18
Chapter 5: Troubleshooting..............................................................19
The error log...........................................................................................................................20
Message structure in the error log...............................................................................20
Message levels............................................................................................................21
Error numbers.........................................................................................................................22
Troubleshooting with the error log..........................................................................................23
The status report log...............................................................................................................24
F-Secure Policy Manager Proxy | TOC |
3
Summary of Contents for POLICY MANAGER PROXY 2.0 -
Page 1: ...F Secure Policy Manager Proxy Administrator s Guide...
Page 2: ......