CHAPTER 4
155
10. You can install the exported JAR to the hosts by running the
ilaunchr.exe
tool. The
ilaunchr.exe
tool is located in Policy Manager
Console installation directory under
...\Administrator\Bin
directory. To
do this:
a.
Copy
ilaunchr.exe
and the exported JAR to a location where the
login script can access them.
b.
Enter the command:
ilaunchr <package name>.jar
where
<package name>
is replaced by the actual name of the
JAR package being installed.
When the installation runs, the user will see a dialog displaying
the installation progress. If a restart is required after the
installation, the user is prompted to restart the computer as
defined when the installation package was exported.
If you want the installation to run in silent mode, enter the
command in format:
ilaunchr <package name>.jar /Q
Also in this case the user may be prompted to restart the
computer after the installation, and if a fatal error occurs during
the installation, a message is displayed.
ILAUNCHR has the following command line parameters:
/U
— Unattended. No messages are displayed, even when a fatal
error occurs.
/F
— Forced installation. Completes the installation even if F-Secure
Management Agent is already installed.
Enter
ILAUNCHR /?
at the command line to display complete help.
Providing Username and Password for a Login Script
Installation
When installing on Windows 2000 and newer you can also use the
following parameters:
/user:domain\username
(variation:
/user:username
) — Specifies
the user account and the domain name. The domain name can be
optionally left out.
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...