F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 146

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

146
Because the installation operation uses policy-based triggering, you must
distribute new policy files. The policy file will contain an entry that tells the
host to fetch the installation package and perform the installation.
Note that it may take a considerable length of time to carry out an
installation operation. This may happen if an affected host is not currently
connected to the network, or if the active installation operation requires a
user to restart his host before the installation is completed. If the hosts are
connected to the network and they send and receive policy files correctly,
then there could be a real problem. The host may not be correctly
acknowledging the installation operation. In any case, it is possible to
remove the installation operation from the policy by clicking
Stop
All. This
will cancel the installation operations defined for the selected policy
domain or host. It is possible to stop all installation tasks in the selected
domain and all subdomains by selecting the Recursively cancel
installation for subdomains and hosts option in the confirmation dialog.
Figure 4-7 Cancel Installation confirmation dialog
The
Stop All
button is enabled only if the current host or domain has an
installation operation defined. Any subdomain operations do not affect the
button state.
Stop All
only removes the operation from the policy. If a host
has already polled the previous policy file, it may try to carry out the
installation operation even though it is no longer visible in the Installation
Editor.
Remote Uninstallation
Uninstallation can be performed as easily as an update. A distribution
package is created that contains only the software needed to uninstall the
product. If the product does not support remote uninstallation, the
Installation Editor does not display an option for uninstallation.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents