26
3.5
Replicating Software Using Image Files
If you are going to install the product on several computers, you can
create a disk image file that includes the product and use this image to
replicate the software on the computers. Make sure that each computer
on which the software is installed will create a new unique identification
code.
Follow these steps to make sure that each computer uses a personalized
Unique ID when a disk imaging software is used:
1.
Install the system and all the software that should be in the image file,
including the product.
2.
Configure the product to use the correct F-Secure Policy Manager
Server. However, do not import the host to F-Secure Policy Manager
Console if the host has sent an autoregistration request to the
F-Secure Policy Manager Server. Only hosts on which the image file
will be installed should be imported.
3.
Run the command following command:
/etc/init.d/fsma clearuid
The utility program resets the Unique ID in the product installation.
4.
Shut down the computer and do not restart the computer before the
image file has been created.
5.
Create the disk image file.
A new Unique ID is created automatically when the system is restarted.
This will happen individually on each machine where the image file is
installed. These machines will send autoregistration requests to F-Secure
Policy Manager and the request can be processed normally.
3.6
Preparing for Custom Installation
The product installation package is a self extracting package, which
contains the software as RPMs. If there is a need to create a custom
installation package, the RPMs can be extracted from the package as
follows:
Содержание ANTI-VIRUS LINUX CLIENT SECURITY -
Страница 1: ...F Secure Anti Virus Linux Server Security Administrator s Guide...
Страница 36: ...34 5 USER INTERFACE BASIC MODE Summary 35 Common Tasks 36...
Страница 88: ...86 C Riskware Types Riskware Categories and Platforms 87...
Страница 91: ...CHAPTERC 89 Riskware Types...
Страница 92: ...90 D List of Used System Resources Overview 91 Installed Files 91 Network Resources 91 Memory 92 CPU 92...
Страница 104: ...102 F Man Pages fsav 103 fsavd 137 dbupdate 155 fsfwc 159 fsic 162...
Страница 160: ...158 SEE ALSO fsav 1 and fsavd 8 For more information see F Secure home page...
Страница 172: ...170 Copyright c 1999 2006 F Secure Corporation All Rights Reserved SEE ALSO For more information see F Secure home page...
Страница 173: ...171 G APPENDIX Config Files fsaua_config 172 fssp conf 177...
Страница 206: ...204...
Страница 207: ......
Страница 208: ...www f secure com...