Introduction To F-Secure Policy Manager - F-SECURE CLIENT SECURITY 8.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

1.3

Introduction to F-Secure Policy Manager

F-Secure Management Agent
The F-Secure Management Agent enforces the security policies set by
the administrator on the managed hosts. It acts as a central configuration
component on the hosts, and for example, interprets the policy files,
sends autoregistration requests and host status information to F-Secure
Policy Manager, and performs policy-based installations.
Cisco Network Admission Control
F-Secure Corporation participates in the Network Admission Control
(NAC) collaboration led by Cisco Systems®. The Cisco NAC can be used
to restrict the network access of hosts that have too old virus definition
databases, or the antivirus or firewall module disabled. For more
information, see
"Setting Up the Cisco NAC
This section contains a brief introduction to F-Secure Policy Manager. For
more information, see F-Secure Policy Manager Administrator's Guide.
F-Secure Policy Manager provides a scalable way to manage the security
of numerous applications on multiple operating systems from one central
location. It can be used to keep security software up-to-date, manage
configurations, and scaled to handle even the largest, most mobile
workforce.
F-Secure Policy Manager can be used for:
defining security policies
distributing security policies
installing application software to local and remote systems
monitoring the activities of all systems in the enterprise to ensure
compliance with corporate policies and centralized control.
When the system has been set up, you can see status information from
the entire managed domain in one single location. In this way it is very
easy to make sure that the entire domain is protected, and to modify the
CHAPTER 1
NAC) Support
(
Plugin", 250.
23

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 8.00 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Client security

Table of Contents