12 | F-Secure Linux Security | Deployment
Deployment on Multiple Stand-alone Linux Workstations
Deployment on Multiple Centrally Managed Linux
Workstations
Central Deployment Using Image Files
Centrally Managed installation with F-Secure Policy Manager installed on a separate computer
is recommended.
In centrally managed installation mode, F-Secure Policy Manager is used to manage Linux
computers. The recommended deployment method is to delegate the installation responsibility
to each user and then monitor the installation progress via F-Secure Policy Manager Console.
After the installation on a host has completed, the host sends an autoregistration request to
F-Secure Policy Manager. You can monitor with F-Secure Policy Manager Console which of
the hosts have sent an autoregistration request.
When the company has multiple Linux computers deployed, but they are not managed centrally,
users can install the software themselves.
In organizations with few Linux computers, the web user interface can be used to manage Linux
workstations instead of F-Secure Policy Manager.
If computers are managed through an existing management framework, it can be used to push
the product to computers.
When the company has multiple Linux computers deployed and they are managed through Red
Hat network, Ximian Red Carpet, or similar, the software can be pushed to workstations using
the existing management framework.
When the company has a centralized IT department that install and maintains computers, the
software can be installed centrally to all computers.
If you are going to install the product on several computers, you can create a disk image file that
includes the product and use this image to replicate the software on the computers. Make sure
that each computer on which the software is installed will create a new unique identification
code.
Need help?
Do you have a question about the LINUX SECURITY and is the answer not in the manual?
Questions and answers