198
6.2
Configuring Internet Shield Security Levels and
Rules
This section explains how you can set and select the security levels
based on the users' needs. In the practical configuration examples it is
assumed that the managed hosts have been imported into the domain
structure that was created in chapter 4, which means that, for example,
laptops and desktops are located in their own subdomains.
When enabling a certain security levels for a domain, you should check
that the security level is appropriate for that domain. Different domains
can have different security levels enabled.
6.2.1
Selecting an Active Security Level for a Workstation
In this example the security level
Office
is set as the active security level
for the workstations in
Desktops/Eng.
subdomain.
To change the Internet Shield Security level for the
Desktops/Eng.
subdomain, do as follows:
1.
Select the
Desktops/Eng.
subdomain in the
Policy Domains
tab.
2.
Go to the
Settings
tab and select the
Firewall Security Levels
window.
You see the default security level that is currently included the policy
in the
Internet Shield Security level at host
drop-down list.
3.
Select the
Office
security level from the
Internet
Shield Security level
at host
drop-down list.
4.
To restrict users from changing the setting, click the lock symbol
beside it.
5.
Click
to save the policy data.
6.
Click
to distribute the policy.
IMPORTANT:
When you change a security level on a host, click
the lock symbol next to the setting to make sure that the new
security level will be taken into use.
Содержание CLIENT SECURITY 7.00
Страница 1: ...F Secure Client Security Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Страница 41: ...CHAPTER2 41 Click Next to continue...
Страница 44: ...44 Step 12 Review the changes that setup is about to make Click Start to start the installation...
Страница 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Страница 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Страница 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Страница 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Страница 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Страница 135: ...CHAPTER4 135 Autoregistration Import Rules Figure 4 6 Import Autoregistered Hosts dialog Import Rules tab...
Страница 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Страница 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Страница 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Страница 297: ...297 GLOSSARY...
Страница 310: ...310 Worm A computer program capable of replication by inserting copies of itself in networked computers...
Страница 311: ...311 Technical Support Overview 312 Web Club 312 Advanced Technical Support 312 F Secure Technical Product Training 313...