background image

 

Getting Started with 

F-Secure Client Security

Summary of Contents for CLIENT SECURITY 7.00

Page 1: ...Getting Started with F Secure Client Security...

Page 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Page 3: ...4 2 2 Installation Options 5 2 2 1 Stand Alone Installation 5 2 2 2 Remote Installation with F Secure Policy Manager 9 2 2 3 Local Installation and F Secure Policy Manager 11 Chapter 3 F Secure Policy...

Page 4: ...applicable F Secure product manuals included on the F Secure CD You can access them from the CD menu by clicking Manuals or you can go to our website for the most recent manuals in PDF format The dir...

Page 5: ...information see the F Secure Client Security Administrator s guide and online help The guide is available on the CD and the online help is installed with the product You can open the online help by p...

Page 6: ...e Installation F Secure Client Security can be installed individually on each workstation This method is recommended for small networks with 2 5 workstations Free hard disk space 150 MB 200 MB recomme...

Page 7: ...Remove Programs b Click the programs you want to remove c Click Remove or Change Remove 2 The programs may have several related components Repeat steps b and c to uninstall all Related components hav...

Page 8: ...the License Agreement text carefully select I accept this agreement and click Next 6 Enter the keycode you received with your product and click Next 7 Select the type of installation If you select Ty...

Page 9: ...em Control to protect your computer against unknown malware and unwanted system changes SNMP Support to enable the protection of your computer to be managed using the Simple Network Management Protoco...

Page 10: ...y Manager Remote installation with F Secure Policy Manager is recommended for networks with more than 5 workstations If you are not familiar with F Secure Policy Manager see the F Secure Policy Manage...

Page 11: ...rograms refer to their user documentation or refer to your operating system user documentation Step 2 Install F Secure Policy Manager 1 Install F Secure Policy Manager 2 Create the policy domain struc...

Page 12: ...he updated policy the next time they connect to the server 2 2 3 Local Installation and F Secure Policy Manager Local installation is recommended if you need to install F Secure Client Security locall...

Page 13: ...r Remove Programs b Click the programs you want to remove c Click Remove or Change Remove 2 The programs may have several related components Repeat steps b and c to uninstall all Related components ha...

Page 14: ...icense Agreement text carefully select I accept this agreement and click Next 6 Enter the keycode you received with your product and click Next 7 Select the type of installation If you select Typical...

Page 15: ...nd unwanted system changes SNMP Support to enable the protection of your computer to be managed using the Simple Network Management Protocol SNMP Cisco NAC Support to enable the integration of Cisco N...

Page 16: ...sh Step 3 Configure the product using F Secure Policy Manager Console 1 Add a new workstation to a suitable policy domain using the Import Autoregistered Hosts operation 2 Configure the F Secure Clien...

Page 17: ...s Guide For information on installing F Secure Policy Manager on Linux see chapter F Secure Policy Manager on Linux in F Secure Policy Manager Administrator s Guide For more information on F Secure P...

Page 18: ...ium III 1 GHz level processor or faster Memory 256 MB of RAM When Web Reporting is enabled 512 MB RAM Disk space Disk space 200 MB of free hard disk space 500 MB or more is recommended The disk space...

Page 19: ...00 hosts requires Pentium III 750 MHz processor or faster Memory 256 MB of RAM Managing more than 5000 hosts requires 512MB of memory Disk space 100 MB of free hard disk space Display resolution Minim...

Page 20: ...You can install F Secure Policy Manager components F Secure Policy Manager Server and F Secure Policy Manager Console on the same computer or on separate dedicated computers In these instructions F Se...

Page 21: ...icy Manager Update Server Agent are installed on the same computer The default ports are used for F Secure Policy Manager Server modules Only the F Secure Policy Manager Console installed on the same...

Page 22: ...installation packages from the CD recommended 7 Accept the default installation directory recommended If you want to install the components in another directory click Browse and enter your desired dir...

Page 23: ...e settings to defaults 10 Select the F Secure Policy Manager Server modules to enable Host module is used for communication with the hosts The default port is 80 Administration module is used for comm...

Page 24: ...ue 12 Select to add product installation package s from the list of available packages if you selected F Secure Installation Packages in step 6 13 Setup displays the components that will be installed...

Page 25: ...here the administrator s public key and private key files will be stored By default key files are stored in the F Secure Policy Manager Console installation directory 4 Move your mouse cursor around i...

Page 26: ...thods of installing and updating managed applications Shortcuts to all the installation related features are gathered in the Properties pane under the Installation tab Please see the F Secure Policy M...

Page 27: ...push installation 7 Review the installation summary To start the Remote Installation Wizard click Start 8 F Secure Policy Manager installs the selected products on the hosts 9 When the Status line dis...

Page 28: ...www f secure com...

Reviews: