
CHAPTER 3
47
Installation
3.2
Centrally Administered or Stand-alone
Installation?
F-Secure Internet Gatekeeper can be managed either locally with
F-Secure Internet Gatekeeper Web Console or centrally with F-Secure
Policy Manager Console. You can select the management method when
you install the product.
If you already use F-Secure Policy Manager to administer other F-Secure
products, it is recommended to install F-Secure Internet Gatekeeper in
centralized administration mode. The installation instructions in this
manual are for centrally managed installations. For more information
about centrally managed administration, see “
Before you start to install F-Secure Internet Gatekeeper, uninstall any
potentially conflicting products, such as anti-virus, file encryption, and disk
encryption software that employ low-level device drivers. Close all
Windows applications before starting the installation.
3.2.1
Installation Overview for Centrally Administered
Installation
If you want to administer F- Secure Internet Gatekeeper centrally, start by
installing F- Secure Policy Manager (if it is not already installed) and then
install F- Secure Internet Gatekeeper.
The quarantined mails are managed using the F-Secure Internet
Gatekeeper Web Console in both centrally administered and
stand-alone installations. In centrally managed environments all
other features are managed with F-Secure Policy Manager.
The release notes document contains the latest information about
the product and might have changes to system requirements and
the installation procedure. It is highly recommended to read the
release notes before you proceed with the installation.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...