156
/password:secret
(variation:
/password:"secret with spaces
")
— Specifies the password of the user account.
The ilaunchr functionality stays the same if neither of these two
parameters is given. If only one of the parameters is given, ilaunchr
returns an error code. If both parameters are given, Ilaunchr starts the
Setup program.
An example of the command:
ILaunchr <jar file> /user:domain\user_name /
password:secret_word
Non-JAR Approach
1.
Copy the appropriate installation files to an installation directory (the
installation files can be found in the CD-ROM’s
\software\<application>\
directory, e.g. F-Secure Client Security 6.0
files are in the directory
\software\fsavcs\
.
2.
Copy the
admin.pub
file to the same installation directory as above.
3.
Edit the
prodsett.ini
file. This file tells the setup program which
modules it should install and where to install them (the target
directory) on the workstations. For more information on editing the
Prodsett.ini
file, see “
.
4.
Add the following line to the login script:
setup.exe\silent /checkFSMA
If the parameter
/checkFSMA
is not used, the installation will be run
every time
runsetup.exe
is executed.
4.5
Local Installation
This section contains system requirements for F-Secure Client Security
and information on providing a copy of the
Admin.pub
key file to
workstations.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...