Table Of Contents - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

Table of Contents

Chapter 1: Welcome ...........................................................................7
How the Product Works ...........................................................................................................8
Key Features and Benefits ......................................................................................................9
Chapter 2: Deployment ....................................................................11
Deployment on Multiple Stand-alone Linux Workstations .....................................................12
Deployment on Multiple Centrally Managed Linux Workstations ..........................................12
Central Deployment Using Image Files .................................................................................12
Chapter 3: Installation .....................................................................15
System Requirements ...........................................................................................................16
Stand-alone Installation .........................................................................................................19
Centrally Managed Installation ..............................................................................................20
Upgrading...............................................................................................................................21
Custom Installations...............................................................................................................23
Protection Against Malware ..........................................................................................8
Host Intrusion Prevention System .................................................................................8
Superior Protection against Viruses and Worms ..........................................................9
Transparent to End-users ...........................................................................................10
Protection of Critical System Files ..............................................................................10
Easy to Deploy and Administer ...................................................................................10
Extensive Alerting Options ..........................................................................................10
List of Used System Resources ..................................................................................17
Upgrading from a Previous Product Version ...............................................................21
Upgrading the Evaluation Version ..............................................................................22
Preparing for Custom Installation.................................................................................23
Unattended Installation ...............................................................................................23
F-Secure Linux Security | TOC | 3

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

This manual is also suitable for:

Linux security 7.02

Table of Contents