F-Secure Policy Manager Proxies; About - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

66 | F-Secure Linux Security | Using the Product

F-Secure Policy Manager Proxies

About

d) Select whether a virus scan should be launched automatically after the virus definitions
have been updated. The virus scan scans all local files and directories and it can take a
long time. The scan uses the manual scanning settings. By default, the scan is not launched
automatically.
5. Configure reminders.
a) If the virus definition databases have not been updated in a while, the product can be set
to send a reminder. To enable reminders, check the
The severity of the reminder is security alert.
The database age field appears.
b) Specify the age of the virus definition databases when they are considered old (3-30 days,
the default value is 7 days). An alert is sent as a reminder when the database is older
than the specified age.
F-Secure Policy Manager Proxy offers a solution to bandwidth problems in distributed installations
of the product by significantly reducing load on networks with slow connections.
When you use F-Secure Policy Manager Proxy as an updates source, F-Secure products can
be configured to retrieve virus definition database updates from a local update repository rather
than from the central F-Secure Policy Manager Server.
Note: For information about how to install and configure F-Secure Policy Manager Proxy,
see F-Secure Policy Manager Administrator's Guide.
The About page in the Web User Interface displays the license terms, the product version number
and the database version.
If you are using the evaluation version of the product, you can enter the keycode in the About
page to upgrade the product to the fully licensed version.
Note: If the evaluation period has expired before you upgrade to the full version, you have
to restart the product after entering the keycode.
Send reminders
check box.

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents