F-SECURE CLIENT SECURITY 7.00 Скачать руководство пользователя страница 16

15

CHAPTER  2  

14. Verify the list of components, and click 

Start

 to start the 

installation. When the installation is finished, click 

Next

 to 

continue.

15. Restart your computer, if you are prompted to do that, by 

selecting 

Restart now

 and click 

Finish

.

Step 3 - Configure the product using F-Secure Policy 
Manager Console:

1. Add a new workstation to a suitable policy domain using the  

‘Import Autoregistered Hosts’ operation.

2. Configure the F-Secure Client Security settings for the 

workstation. The domain level settings are shared by all 
workstations in the policy domain.

3. Distribute the policies. The managed workstation will receive 

the updated policy the next time it connects to the server.

Содержание CLIENT SECURITY 7.00

Страница 1: ...Getting Started with F Secure Client Security...

Страница 2: ...Corporation will not be liable for any errors or omission of facts contained herein F Secure Corporation reserves the right to modify specifications cited in this document without prior notice Compani...

Страница 3: ...4 2 2 Installation Options 5 2 2 1 Stand Alone Installation 5 2 2 2 Remote Installation with F Secure Policy Manager 9 2 2 3 Local Installation and F Secure Policy Manager 11 Chapter 3 F Secure Policy...

Страница 4: ...applicable F Secure product manuals included on the F Secure CD You can access them from the CD menu by clicking Manuals or you can go to our website for the most recent manuals in PDF format The dir...

Страница 5: ...information see the F Secure Client Security Administrator s guide and online help The guide is available on the CD and the online help is installed with the product You can open the online help by p...

Страница 6: ...e Installation F Secure Client Security can be installed individually on each workstation This method is recommended for small networks with 2 5 workstations Free hard disk space 150 MB 200 MB recomme...

Страница 7: ...Remove Programs b Click the programs you want to remove c Click Remove or Change Remove 2 The programs may have several related components Repeat steps b and c to uninstall all Related components hav...

Страница 8: ...the License Agreement text carefully select I accept this agreement and click Next 6 Enter the keycode you received with your product and click Next 7 Select the type of installation If you select Ty...

Страница 9: ...em Control to protect your computer against unknown malware and unwanted system changes SNMP Support to enable the protection of your computer to be managed using the Simple Network Management Protoco...

Страница 10: ...y Manager Remote installation with F Secure Policy Manager is recommended for networks with more than 5 workstations If you are not familiar with F Secure Policy Manager see the F Secure Policy Manage...

Страница 11: ...rograms refer to their user documentation or refer to your operating system user documentation Step 2 Install F Secure Policy Manager 1 Install F Secure Policy Manager 2 Create the policy domain struc...

Страница 12: ...he updated policy the next time they connect to the server 2 2 3 Local Installation and F Secure Policy Manager Local installation is recommended if you need to install F Secure Client Security locall...

Страница 13: ...r Remove Programs b Click the programs you want to remove c Click Remove or Change Remove 2 The programs may have several related components Repeat steps b and c to uninstall all Related components ha...

Страница 14: ...icense Agreement text carefully select I accept this agreement and click Next 6 Enter the keycode you received with your product and click Next 7 Select the type of installation If you select Typical...

Страница 15: ...nd unwanted system changes SNMP Support to enable the protection of your computer to be managed using the Simple Network Management Protocol SNMP Cisco NAC Support to enable the integration of Cisco N...

Страница 16: ...sh Step 3 Configure the product using F Secure Policy Manager Console 1 Add a new workstation to a suitable policy domain using the Import Autoregistered Hosts operation 2 Configure the F Secure Clien...

Страница 17: ...s Guide For information on installing F Secure Policy Manager on Linux see chapter F Secure Policy Manager on Linux in F Secure Policy Manager Administrator s Guide For more information on F Secure P...

Страница 18: ...ium III 1 GHz level processor or faster Memory 256 MB of RAM When Web Reporting is enabled 512 MB RAM Disk space Disk space 200 MB of free hard disk space 500 MB or more is recommended The disk space...

Страница 19: ...00 hosts requires Pentium III 750 MHz processor or faster Memory 256 MB of RAM Managing more than 5000 hosts requires 512MB of memory Disk space 100 MB of free hard disk space Display resolution Minim...

Страница 20: ...You can install F Secure Policy Manager components F Secure Policy Manager Server and F Secure Policy Manager Console on the same computer or on separate dedicated computers In these instructions F Se...

Страница 21: ...icy Manager Update Server Agent are installed on the same computer The default ports are used for F Secure Policy Manager Server modules Only the F Secure Policy Manager Console installed on the same...

Страница 22: ...installation packages from the CD recommended 7 Accept the default installation directory recommended If you want to install the components in another directory click Browse and enter your desired dir...

Страница 23: ...e settings to defaults 10 Select the F Secure Policy Manager Server modules to enable Host module is used for communication with the hosts The default port is 80 Administration module is used for comm...

Страница 24: ...ue 12 Select to add product installation package s from the list of available packages if you selected F Secure Installation Packages in step 6 13 Setup displays the components that will be installed...

Страница 25: ...here the administrator s public key and private key files will be stored By default key files are stored in the F Secure Policy Manager Console installation directory 4 Move your mouse cursor around i...

Страница 26: ...thods of installing and updating managed applications Shortcuts to all the installation related features are gathered in the Properties pane under the Installation tab Please see the F Secure Policy M...

Страница 27: ...push installation 7 Review the installation summary To start the Remote Installation Wizard click Start 8 F Secure Policy Manager installs the selected products on the hosts 9 When the Status line dis...

Страница 28: ...www f secure com...

Отзывы: