
158
However, if you run the setup from a CD, you must transfer a copy of the
Admin.pub
key file manually to the workstations:
The best and most secure method is to copy the
Admin.pub
file to
a diskette and use this diskette for workstation installations.
Alternatively, you can put the
Admin.pub
file in a directory that
can be accessed by all hosts that will be installed with remotely
managed F-Secure products. By default, F-Secure Policy
Manager Console places the public key in the root of the
Communication directory.
The directory where the administrator’s public and private key
files are stored was defined during the installation. For more
information, see
For information on backing up the
admin.pub
key, see chapter
Maintaining F-Secure Policy Manager Server in
F-Secure Policy Manager
Administrator’s Guide
.
4.6
Installing on an Infected Host
If the host on which you are going to install F-Secure Client Security is
infected with some variant of the Klez virus, you should run the Klez
removal tool on the host before starting the installation. This is because
the Ilaunchr.exe installation tool cannot be run on a computer that is
infected with Klez.
You can download the Kleztool from
ftp://ftp.europe.f-secure.com/anti-virus/tools/kleztool.zip
The kleztool.zip contains a kleztool.txt file, in which you can find the
instructions for running Kleztool on the infected computer. Read these
instructions carefully before proceeding.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...