User manual F-SECURE PSB ADMINISTRATOR GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE PSB. We hope that this F-SECURE PSB user guide will be useful to you.


F-SECURE PSB ADMINISTRATOR GUIDE: Download the complete user guide (725 Ko)

You may also download the following manuals related to this product:

   F-SECURE PSB GETTING STARTED (375 ko)
   F-SECURE PSB GETTING STARTED (375 ko)
   F-SECURE PSB GETTING STARTED (372 ko)
   F-SECURE PSB GETTING STARTED (426 ko)
   F-SECURE PSB GETTING STARTED (364 ko)
   F-SECURE PSB GETTING STARTED (373 ko)
   F-SECURE PSB GETTING STARTED (369 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (731 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (735 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (731 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (975 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (715 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (731 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE (722 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (631 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (636 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (626 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (682 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (608 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (770 ko)
   F-SECURE PSB ADMINISTRATORS GUIDE (616 ko)
   F-SECURE PSB GETTING STARTED GUIDE (280 ko)
   F-SECURE PSB GETTING STARTED GUIDE (282 ko)
   F-SECURE PSB GETTING STARTED GUIDE (275 ko)
   F-SECURE PSB GETTING STARTED GUIDE (319 ko)
   F-SECURE PSB GETTING STARTED GUIDE (286 ko)
   F-SECURE PSB GETTING STARTED GUIDE (267 ko)
   F-SECURE PSB GETTING STARTED GUIDE (386 ko)
   F-SECURE PSB GETTING STARTED GUIDE (273 ko)
   F-SECURE PSB ADMINISTRATOR GUIDE FOR RESELLERS (1131 ko)

Manual abstract: user guide F-SECURE PSBADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] F-Secure PSB Administrator's Guide F-Secure PSB Administrator's Guide | TOC | 3 Contents Chapter 1: Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Chapter 2: Getting Started. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Creating a new account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Downloading Software. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Recovering your password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Adding a new subscription key for your company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Chapter 3: Installing F-Secure PSB Workstation Security. . . . . . . . . . . . . 13 System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 F-Secure PSB Workstation Security local installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 F-Secure PSB Workstation Security remote installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Chapter 4: Installing F-Secure PSB Server Security. . . . . . . . . . . . . . . . . . . . . . 19 System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 F-Secure PSB Server Security installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Chapter 5: Installing F-Secure PSB E-mail and Server Security. . . 23 System requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Before installing the product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 F-Secure PSB E-mail and Server Security installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 Chapter 6: Upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Upgrading from Policy Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 Upgrading to the latest version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Chapter 7: Administering the product. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35 Checking the system status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Is my network protected?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Checking the status of a group of computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Checking the status of computers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Checking the status of a workstation or a server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Keeping computers in the network safe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Get updates by RSS. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 Managing product settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Managing the workstation settings locally. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 4 | F-Secure PSB Administrator's Guide | TOC Managing the server settings locally. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Managing the product settings remotely. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Managing profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Creating a profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Editing a profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 Deleting a profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Changing profile name or description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43 Setting a default profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Resetting default profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Chapter 8: Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 Frequently asked questions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Chapter 1 Introduction This guide contains instructions how to install and administer F-Secure PSB Portal and F-Secure PSB software. Chapter 2 Getting Started Topics: · · · · Creating a new account Downloading Software Recovering your password Adding a new subscription key for your company In this chapter, you find instructions how to create a new account to log into the F-Secure PSB Portal, and to download and install the F-Secure PSB software. 8 | F-Secure PSB Administrator's Guide | Getting Started Creating a new account You need to create a new account to log into the F-Secure PSB Portal. To create a new account: Note: If you have created an account, for example, for F-Secure PSB Server Security, do not create a new company account, but add a new subscription to the existing account. In your browser, go to the URL that was provided to you together with the subscription key. You received the URL and the subscription key, for example by e-mail, when you purchased the product. [. . . ] For example, "virus definitions are very old in 3 computers". You can view the computers that have the same problem. Viewing computers that belong to the same group You can view all the computers that belong to the same group. In the Central Management view, do one of the following: · · Click the Group column title to sort the computers by their group name. Enter the name of a group in the Search box at the top right corner of the computer list, and click Search. Click the link to view all the computers in the group. View computers with the same subscription key You can view all computers with the same subscription key. To view computers: F-Secure PSB Administrator's Guide | Administering the product | 37 1. In the Installed software view, click the Subscription key column title to sort the computers by their subscription key. You can view the computers with the same subscription key also by first selecting the company the subscriptions of which you want to see. Then, click the View subscriptions for this account link to see all the subscription keys of that company. On a Subscription key line, under Active computers, click the Show computers link to see all the computers with the same subscription key. Checking the status of computers On the Computers page, you can check the overall protection status of computers. The Computers page shows you detailed information about the computers that are registered to the F-Secure PSB Portal. By clicking the different tabs, you can view the following: · · · · the protection status of computers by a security component, computer information, such as DNS names and IP addresses, information about software installed on the computers, and account information, including information about the company, Solution Provider and Service Partner associated with a computer. The Computers page may show different computers depending on how you opened the page. The Computers page may show: · · · all the computers in the network that are registered to the portal, all the computers that have the same problem, and all the computers that have the same subscription key. Note: If there are more computers that can fit on one page, click Next to see the rest of the computers. Checking the status of a workstation or a server You can view detailed status information of a workstation or a server on the Computers page. To view detailed information about a workstation or a server, click the name of the workstation under Computers. The information includes: · · recently assigned operations recent alerts 38 | F-Secure PSB Administrator's Guide | Administering the product · · · · · overall protection status of each security component protection status of each feature in a security component computer information, including the WINS- and DNS-name, IP address, and operating system software installed on the workstation, including the product name, subscription key, version, and security components account information, including information about the company, Service Partner, and Solution Provider associated with the account Keeping computers in the network safe You keep all the computers in the network safe. Check whether any of the computers that are registered to the portal have security problems. Some of these problems you can fix directly from the portal; some of these problems you may have to fix locally. Check which users need a more strict security profile. Get updates by RSS You can subscribe to an RSS feed. These include: · · · Web based readers, such as Google reader (www. google. com/reader), Bloglines (www. bloglines. com), or built-in RSS readers in web-browsers, such as Mozilla Firefox 3 or Internet Explorer 8. An RSS feed shows you the security status of the network without you having to log into the F-Secure PSB portal. From the drop-down menu, select the application which you want to use to subscribe to the RSS feed. Copy the web address into you RSS reader. F-Secure PSB Administrator's Guide | Administering the product | 39 Managing product settings Instructions how to change the product settings either locally or remotely. This chapter explains how you can set up the product locally through the program installed on your computer, or remotely using the F-Secure PSB portal. Managing the workstation settings locally This section explains how you can locally manage the workstation settings. [. . . ] Select whether you want to set the profile as a default profile for servers or workstations. To do this, select one of the following options: · · Default profile for workstations Default profile for servers 4. In the Default profiles column, you can view the profiles that you selected as the default profiles. They are applied to new computers that you add to the system. Resetting default profiles If you have set your own default profiles for remote computers, but you want to restore the system default profiles, reset the default profiles. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE PSB




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE PSB will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.