126
4.1
Overview
This chapter describes how to plan the managed network and what are
the best ways to deploy F-Secure Client Security in different types of
environments.
F-Secure Policy Manager offers you several ways to deploy F-Secure
Client Security in your company:
In a Windows domain you can use the
Autodiscover
and
Autoregistration
features to automate the creation of the
managed domain.
If there are many computers running Unix or Linux, or if there are
also servers to manage, all of them can still be connected to
F-Secure Policy Manager, and their security applications can be
administered from one single location.
There are also some issues that you should take into consideration, so
that you can profit the most from the centralized management of the
security applications later on. This includes, for example, planning the
structure of the managed domain carefully beforehand.
When planning the structure of the managed domain, you should
consider grouping end users with similar security needs into the same
subdomain, and grouping laptops and desktops in their own subdomains.
In this way you can define the optimal security settings for computers that
can be connected to different LANs or use dialup connections, as well as
computers that are always connected to the company network.
These aspects will be discussed in “
.
4.2
Logging in for the First Time
This section describes how to log in to the F-Secure Policy Manager
Console and how to set up the Connection Properties and
Communication Preferences.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...