126
4.1
Overview
This chapter describes how to plan the managed network and what are
the best ways to deploy F-Secure Client Security in different types of
environments.
F-Secure Policy Manager offers you several ways to deploy F-Secure
Client Security in your company:
In a Windows domain you can use the
Autodiscover
and
Autoregistration
features to automate the creation of the
managed domain.
If there are many computers running Unix or Linux, or if there are
also servers to manage, all of them can still be connected to
F-Secure Policy Manager, and their security applications can be
administered from one single location.
There are also some issues that you should take into consideration, so
that you can profit the most from the centralized management of the
security applications later on. This includes, for example, planning the
structure of the managed domain carefully beforehand.
When planning the structure of the managed domain, you should
consider grouping end users with similar security needs into the same
subdomain, and grouping laptops and desktops in their own subdomains.
In this way you can define the optimal security settings for computers that
can be connected to different LANs or use dialup connections, as well as
computers that are always connected to the company network.
These aspects will be discussed in “
.
4.2
Logging in for the First Time
This section describes how to log in to the F-Secure Policy Manager
Console and how to set up the Connection Properties and
Communication Preferences.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...