User manual F-SECURE CLIENT SECURITY 9.00 ADMINISTRATOR GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE CLIENT SECURITY 9.00. We hope that this F-SECURE CLIENT SECURITY 9.00 user guide will be useful to you.


F-SECURE CLIENT SECURITY 9.00 ADMINISTRATOR GUIDE: Download the complete user guide (806 Ko)

You may also download the following manuals related to this product:

   F-SECURE CLIENT SECURITY 9.00 ADMINISTRATOR GUIDE (1009 ko)
   F-SECURE CLIENT SECURITY 9.00 ADMINISTRATOR GUIDE (1011 ko)
   F-SECURE CLIENT SECURITY 9.00 ADMINISTRATOR GUIDE (925 ko)
   F-SECURE CLIENT SECURITY 9.00 QUICK INSTALLATION (591 ko)

Manual abstract: user guide F-SECURE CLIENT SECURITY 9.00ADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] In this way it is very easy to make sure that the entire domain is protected, and to modify the protection settings when necessary. You can also restrict the users from making changes to the security settings, and be sure that the protection is always up-to-date. 10 | F-Secure Client Security | Introduction System requirements This section provides the system requirements for both Policy Manager Server and Policy Manager Console. Policy Manager Server In order to install Policy Manager Server, your system must meet the minimum requirements given here. Operating system: Microsoft Windows: · Microsoft Windows Server 2003 SP1 or higher (32-bit); Standard, Enterprise, Web Edition or Small Business Server editions Windows Server 2003 SP1 or higher (64-bit); Standard or Enterprise editions Windows Server 2008 SP1 (32-bit); Standard, Enterprise or Web Server editions Windows Server 2008 SP1 (64-bit); Standard, Enterprise, Web Server, Small Business Server or Essential Business Server editions Windows Server 2008 R2; Standard, Enterprise or Web Server editions · · · · Processor: P4 2 GHz processor or faster. Managing more than 5000 hosts or using Web Reporting requires P4 3 GHz level processor or faster. Memory: 512 MB RAM, 1 GB RAM recommended. [. . . ] Report Only ignores the file but reports it to the administrator. Select Scan inside compressed files to scan inside compressed ZIP, ARJ, LZH, RAR, CAB, TAR, BZ2, GZ, JAR and TGZ files. The content of the trusted sites will not be scanned for viruses. Enabling web traffic scanning for the whole domain In this example, HTTP scanning is enabled for the whole domain. Check that the other settings on this page are suitable for your system, and modify them if necessary. Click to save and distribute the policy. Excluding a web site from HTTP scanning You can exclude a web site or certain web pages from HTTP scanning by defining them in the Trusted sites table. Excluding a web site might be a good idea, for example, if the site contains unrecognizable streaming content, which may cause the user to experience unwanted delays (see download time-out setting). 76 | F-Secure Client Security | Configuring virus and spyware protection In this configuration example, one whole domain (www. example. com) and a sub-directory from another domain (www. example2. com/news) are excluded from HTTP scanning. Exclude a domain from HTTP scanning: To exclude an entire domain from HTTP scanning, enter the URL of the domain in the Trusted sites table as follows: a) Click the Add button under the Trusted sites table. b) Click on the line you just created so that it becomes active, and enter http://*. example. com/*. d) Click on the line you just created so that it becomes active, and enter http://example. com/*. Exclude a sub-directory from HTTP scanning: To exclude a sub-directory from HTTP scanning, enter the URL of the domain with the directory path in the Trusted sites table as follows: a) Click the Add button under the Trusted sites table. b) Click on the line you just created so that it becomes active, and enter http://www. example2. com/news/*. Click to save and distribute the policy. F-Secure Client Security | Configuring virus and spyware protection | 77 Configuring spyware scanning Spyware scanning protects the hosts against different types of spyware, such as data miners, monitoring tools and dialers. In centrally managed mode, spyware scanning can be set, for example, to report the spyware items found on hosts to the administrator or to quarantine all found spyware items automatically. It is also possible to allow the use of certain spyware applications by specifying them as allowed spyware on the Spyware Control page. A note about cleaning spyware and riskware Spyware is a gray area between a fully legitimate application and a virus/trojan. Some spyware may be necessary to run ordinary applications, while most spyware is just malware and should not be allowed to run even once. By default, spyware scanning is configured to allow all spyware to run. You can check whether you need to allow some spyware to run on your network before you tighten the security and prevent all new spyware from executing. Riskware is any program that does not intentionally cause harm but can be dangerous if misused, especially if set up incorrectly. Examples of such programs are chat programs (IRC), or file transfer programs. Spyware control settings The settings for spyware scanning are described here. Spyware scanning is included as part of real-time scanning and manual scanning. When Real-time scanning enabled is selected on the Real-time scanning page, spyware scanning is also turned on. Similarly, whenever a manual scan is run, spyware is automatically included in the scan. [. . . ] 1 = Write debug information into the debug log during installation and uninstallation. InstallMode=0 | 1 0 = Do not install this component (default). 1 = Install this component, except if a newer version already exists. InstallDC=0 | 1 0 = Do not install Dial-up Control (default). F-Secure Client Security | Modifying prodsett. ini | 165 [FWINST. DLL] Settings for Client Security - Internet Shield 1 = Install Dial-up Control InstallNetworkQuarantine=0 | 1 0 = Do not install Network Quarantine (default). 1 = Install Network Quarantine. DisableWindowsFirewall=0 | 1 0 = Do not disable Windows Firewall (on XP SP2 or later) (default). 1 = Disable Windows Firewall after Internet Shield installation. [FSBWINST. DLL] RequestInstallMode=1 Settings for Automatic Update Agent 0 = Install this component as defined in the InstallMode setting. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE CLIENT SECURITY 9.00




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE CLIENT SECURITY 9.00 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.