F-SECURE CLIENT SECURITY 8.00 Administrator's Manual page 4

Hide thumbs Also See for CLIENT SECURITY 8.00:
Table of Contents

Advertisement

Chapter 3
3.1
Overview ....................................................................................................................57
3.2
Policy Domains Tab ................................................................................................... 58
3.3
Management Tabs ..................................................................................................... 58
3.3.1 Summary Tab ................................................................................................. 59
3.3.2 Outbreak Tab.................................................................................................. 66
3.3.3 Settings Tab ................................................................................................... 68
3.3.4 Status Tab ....................................................................................................100
3.3.5 Alerts Tab .....................................................................................................108
3.3.6 Reports Tab..................................................................................................110
3.3.7 Installation Tab .............................................................................................111
3.3.8 Operations Tab.............................................................................................113
3.4
Toolbar .....................................................................................................................114
3.5
Menu Commands.....................................................................................................115
3.6
Settings Inheritance .................................................................................................118
3.6.3 Settings Inheritance in Tables ......................................................................122
4.1
Overview ..................................................................................................................124
4.2
Logging in for the First Time ....................................................................................124
4.2.1 Logging In.....................................................................................................125
4.3
Creating the Domain Structure.................................................................................128
4.3.1 Adding Policy Domains and Subdomains.....................................................130
4.4
Adding Hosts............................................................................................................130
4.4.1 Windows Domains........................................................................................131
4.4.2 Autoregistered Hosts ....................................................................................131
4.4.3 F-Secure Push Installations..........................................................................136
4.4.4 Policy-Based Installation ..............................................................................143
4.5
Local Installation ......................................................................................................152
4.5.1 Local Installation System Requirements ......................................................152
iv
56
123

Advertisement

Table of Contents
loading

This manual is also suitable for:

Client security

Table of Contents