24
protection settings when necessary. You can also restrict the users from
making changes to the security settings, and be sure that the protection is
always up-to-date.
1.3.1
Main Components of F-Secure Policy Manager
The power of the F-Secure Policy Manager lays in the F-Secure
management architecture, which provides high scalability for a
distributed, mobile workforce.
F-Secure Policy Manager Console
provides a centralized management
console for the security of the managed hosts in the network. It enables
the administrator to organize the network into logical units for sharing
policies. These policies are defined in F-Secure Policy Manager Console
and then distributed to the workstations through the F-Secure Policy
Manager Server. It can be used to remotely install F-Secure products on
other workstations without the need for any intervention by the end user.
F-Secure Policy Manager Console includes two different user interfaces:
Anti-Virus Mode
user interface that is optimized for managing
F-Secure Client Security and F-Secure Anti-Virus for
Workstations. The Anti-Virus mode user interface is described in
this manual.
Advanced Mode
user interface that can be used for managing
other F-Secure products. The Advance Mode user interface is
described in the Policy Manager Administrator’s Guide.
F-Secure Policy Manager Server
is the repository for policies and
software packages distributed by the administrator, and status information
and alerts sent by the managed hosts. Communication between F-Secure
Policy Manager Server and the managed hosts is accomplished through
the standard HTTP protocol, which ensures trouble-free performance on
the LAN and WAN.
F-Secure Policy Manager Web Reporting
is an enterprise-wide web
based graphical reporting system included in F-Secure Policy Manager
Server. With F-Secure Policy Manager Web Reporting you can quickly
Summary of Contents for CLIENT SECURITY 7.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE Overview 11 Additional Documentation 13...
Page 41: ...CHAPTER2 41 Click Next to continue...
Page 75: ...CHAPTER3 75 Real Time Scanning Figure 3 10 Settings Real Time Scanning page...
Page 78: ...78 Manual Scanning Figure 3 11 Settings Manual Scanning...
Page 82: ...82 Spyware Control Figure 3 12 Settings Spyware Control...
Page 88: ...88 Firewall Security Levels Figure 3 15 Settings Firewall Security Levels...
Page 91: ...CHAPTER3 91 Firewall Rules Figure 3 16 Settings Firewall Rules...
Page 229: ...229 8 UPGRADING SOFTWARE Overview Upgrading Software 230...
Page 278: ...278 A APPENDIX Modifying PRODSETT INI Overview 279 Configurable Prodsett ini Settings 279...
Page 292: ...292 B APPENDIX E mail Scanning Alert and Error Messages Overview 293...
Page 297: ...297 GLOSSARY...