F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 129

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

CHAPTER 4
129
Figure 4-3 An example of a policy domain structure
All domains and hosts must have a unique name in this structure.
Another possibility is to create the different country offices as
subdomains.
Figure 4-4 An example of a policy domain: country offices as sub-domains
A third possibility is to group the hosts into subdomains based on the
installed F-Secure Client Security version. You could, for example, group
hosts that have F-Secure Client Security 6.x installed into one
sub-domain, and hosts that have F-Secure Client Security 7.x installed
into another domain.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents