Table of Contents

Advertisement

Quick Links

F-Secure Policy Manager
Administrator's Guide

Advertisement

Table of Contents
loading

Summary of Contents for F-SECURE POLICY MANAGER 9.0

  • Page 1 F-Secure Policy Manager Administrator's Guide...
  • Page 3: Table Of Contents

    F-Secure Policy Manager | TOC | 3 Contents Chapter 1: Introduction...............7 System requirements........................8 Policy Manager Server....................8 Policy Manager Console....................8 Main components........................10 Features..........................11 Product registration.........................12 Policy-based management.....................13 Management Information Base..................13 Chapter 2: Installing the product............15 Security issues........................16 Installing Policy Manager in high-security environments............17 Installation order........................18...
  • Page 4 4 | F-Secure Policy Manager | TOC Menu commands......................36 Managing domains and hosts....................38 Adding policy domains....................38 Adding hosts........................38 Software distribution.......................42 Push installations......................42 Policy-based installation....................44 Local installation and updates with pre-configured packages........46 Information delivery......................48 Managing policies........................49 Settings........................49 Restrictions........................49 Configuring settings.....................50 Policy inheritance......................50 Managing operations and tasks....................52...
  • Page 5 F-Secure Policy Manager | TOC | 5 Chapter 6: Web Reporting..............75 Generating and viewing reports....................76 Generating a report......................76 Creating a printable report...................76 Automated report generation..................76 Maintaining Web Reporting....................78 Creating a backup copy of the Web Reporting database..........78 Restoring the Web Reporting database from a backup copy........78 Web Reporting error messages and troubleshooting.............79...
  • Page 6 6 | F-Secure Policy Manager | TOC...
  • Page 7: Chapter 1: Introduction

    Chapter Introduction Topics: Policy Manager can be used for: • defining security policies, • System requirements • distributing security policies, • Main components • installing application software to local and remote systems, • Features • monitoring the activities of all systems in the enterprise to ensure •...
  • Page 8: System Requirements

    8 | F-Secure Policy Manager | Introduction System requirements This section provides the system requirements for both Policy Manager Server and Policy Manager Console. Policy Manager Server In order to install Policy Manager Server, your system must meet the minimum requirements given here.
  • Page 9 F-Secure Policy Manager | Introduction | 9 Operating system: Microsoft Windows: • Windows XP Professional (SP2 or higher) • Windows Vista (32-bit or 64-bit) with or without SP1; Business, Enterprise or Ultimate editions • Windows 7 (32-bit or 64-bit); Professional, Enterprise or Ultimate editions •...
  • Page 10: Main Components

    10 | F-Secure Policy Manager | Introduction Main components The power of Policy Manager lies in the F-Secure management architecture, which provides high scalability for a distributed, mobile workforce. Policy Manager Policy Manager Console provides a centralized management console for the security of Console the managed hosts in the network.
  • Page 11: Features

    Updates can be provided in several ways: • From an F-Secure CD. • From the F-Secure web site to the customer. These can be automatically ‘pushed’ by Automatic Update Agent, or voluntarily ‘pulled’ from the F-Secure web site. • Policy Manager Console can be used to export pre-configured installation packages, which can also be delivered using third-party software, such as SMS and similar tools.
  • Page 12: Product Registration

    In order to improve our service, we collect statistical information regarding the use of F-Secure products. To help F-Secure provide better service and support, you can allow us to link this information to your contact information. To allow this, please enter the customer number from your license certificate during the installation of Policy Manager.
  • Page 13: Policy-Based Management

    Base policy files contain the administrative settings and restrictions for all the variables for all F-Secure products on a specific host (with domain level policies, a group of hosts may share the same file). A base policy file is signed by Policy Manager Console, protecting the file against changes while it is passing through the network and while it is stored in the host’s file system.
  • Page 14 Traps are the messages (including alerts and events) that are sent to the local console, log file, remote administration process, etc. The following types of traps are sent by most F-Secure products: Info. Normal operating information from a host. Warning. A warning from the host.
  • Page 15: Chapter 2: Installing The Product

    Chapter Installing the product Topics: Here you will find instructions for installing the main product components; Policy Manager Server and Policy Manager Console. • Security issues • Installing Policy Manager in high-security environments • Installation order • Installing Policy Manager Server •...
  • Page 16: Security Issues

    16 | F-Secure Policy Manager | Installing the product Security issues Policy Manager Server utilizes Apache Web Server and Jetty Web Server technology, and even though we do the utmost to deliver secure and up-to-date technology we advise you to regularly consult the following sites for information on Apache and Jetty technology and security.
  • Page 17: Installing Policy Manager In High-Security Environments

    F-Secure Policy Manager | Installing the product | 17 Installing Policy Manager in high-security environments Policy Manager is designed to be used in internal corporate networks mainly for managing F-Secure anti-virus products, and should not be used over public networks such as the Internet.
  • Page 18: Installation Order

    18 | F-Secure Policy Manager | Installing the product Installation order You should install Policy Manager components in a specific order when installing them on separate machines. To install Policy Manager, please follow this installation order (unless you are installing Policy Manager Server...
  • Page 19: Installing Policy Manager Server

    F-Secure Policy Manager | Installing the product | 19 Installing Policy Manager Server This section contains instructions for installing Policy Manager Server. To install Policy Manager Server, you need physical access to the server machine. Policy Manager Server is the link between Policy Manager Console and the managed hosts and acts as the repository for policies and software packages distributed by the administrator, as well as status information and alerts sent by the managed hosts.
  • Page 20: Complete Installation Of The Product

    20 | F-Secure Policy Manager | Installing the product 4. If setup does not detect any previous installation of Policy Manager, it asks you to confirm if a previous installation of the product exists: • If a previous version has been installed, select I have an existing F-Secure Policy Manager installation.
  • Page 21: Check That The Installation Was Successful

    F-Secure Policy Manager | Installing the product | 21 3. Restart your computer if you are prompted to do so. Check that the installation was successful The next stage is to check that the product was installed correctly. To determine if your installation was successful: 1.
  • Page 22: Changing The Communication Directory Path

    22 | F-Secure Policy Manager | Installing the product Changing the communication directory path If the existing network drive on which the communication directory is located is getting full, you can change its location by using these instructions. To change the communication directory path: 1.
  • Page 23: Installing Policy Manager Console

    F-Secure Policy Manager | Installing the product | 23 Installing Policy Manager Console This section contains instructions for installing Policy Manager Console. Policy Manager Console can operate in two modes: • Administrator mode - you can use Policy Manager Console to its full extent.
  • Page 24: Run Policy Manager Console

    When setting up workstations, you must provide them with a copy of the admin.pub key file (or access to it). If you install the F-Secure products on the workstations remotely with Policy Manager, a copy of the admin.pub key file is installed automatically on them. However, if you run the setup from a CD, you must transfer a copy of the admin.pub key file manually to the workstations.
  • Page 25 F-Secure Policy Manager | Installing the product | 25 you can put the admin.pub file in a directory that can be accessed by all hosts that will be installed with remotely managed F-Secure products.
  • Page 26: Changing The Web Browser Path

    26 | F-Secure Policy Manager | Installing the product Changing the web browser path Policy Manager Console acquires the file path to the default web browser during setup. If you want to change the web browser path: 1. Select Tools Preferences from the menu.
  • Page 27: Uninstalling The Product

    F-Secure Policy Manager | Installing the product | 27 Uninstalling the product Follow these steps to uninstall Policy Manager components. To uninstall any Policy Manager components: 1. Open the Windows Start menu and go to Control Panel. 2. Select Add/Remove Programs.
  • Page 29: Chapter 3: Using Policy Manager Console

    Chapter Using Policy Manager Console Topics: Policy Manager Console is a remote management console for the most commonly used F-Secure security products, designed to provide a • Overview common platform for all of the security management functions required • Basic information and tasks in a corporate network.
  • Page 30: Overview

    30 | F-Secure Policy Manager | Using Policy Manager Console Overview This section provides some general information about Policy Manager Console. The conceptual world of Policy Manager Console consists of hosts that can be grouped within policy domains. Policies are host-oriented. Even in multi-user environments, all users of a specific host share common settings.
  • Page 31: Basic Information And Tasks

    F-Secure Policy Manager | Using Policy Manager Console | 31 Basic information and tasks The following sections describe the Policy Manager Console logon procedure, menu commands and basic tasks. Logging in When you start Policy Manager Console, the Login dialog box will open.
  • Page 32: Client Security Management

    32 | F-Secure Policy Manager | Using Policy Manager Console only for trouble shooting purposes, because in a typical environment some hosts are naturally disconnected from the server every now and then. For example, laptop computers may not be able to access the server daily, but in most cases this is perfectly acceptable behavior.
  • Page 33: Contents Of The Advanced Mode User Interface

    F-Secure Policy Manager | Using Policy Manager Console | 33 Contents of the Advanced mode user interface The function of the main application area in the Advanced mode user interface changes according to which tab is open. • Policy tab: you can set the value of a policy variable. All modifications affect the selected policy domain or host.
  • Page 34 This way it is possible to investigate if the disconnected host managed to send some alerts or useful statistics before the disconnection. This information may help to investigate why the host was disconnected. If the reason is clear, for example, if the host's F-Secure software has been uninstalled, the host can be deleted normally.
  • Page 35: Messages Pane

    F-Secure Policy Manager | Using Policy Manager Console | 35 Messages pane Policy Manager Console logs messages in the Messages pane about different events. Unlike the Alerts Reports tabs, Messages pane events are generated only by Policy Manager Console. There are three categories of messages: Information, Warnings, and Errors. Each...
  • Page 36: Menu Commands

    36 | F-Secure Policy Manager | Using Policy Manager Console Menu commands This section provides a reference of the available menu commands in Policy Manager Console. Menu Command Action File New policy Creates a new policy data instance with the Management Information Base (MIB) defaults.
  • Page 37 F-Secure Policy Manager | Using Policy Manager Console | 37 Menu Command Action Refresh <Item> Manually refreshes the status, alert, or report view. The menu item changes according to the selected page or tab. Refresh All Manually refreshes all data affecting the interface: policy, status, alerts, reports, installation packages, and autoregistration requests.
  • Page 38: Managing Domains And Hosts

    38 | F-Secure Policy Manager | Using Policy Manager Console Managing domains and hosts If you want to use different security policies for different types of hosts (laptops, desktops, servers), for users in different parts of the organization or users with different levels of computer knowledge, it is a good idea to plan the domain structure based on these criteria.
  • Page 39 F-Secure Policy Manager | Using Policy Manager Console | 39 You can do this only after Management Agent has been installed on the hosts and after the hosts have sent an autoregistration request. Management Agent will have to be installed from a CD-ROM, from a login script, or some other way.
  • Page 40 For example, it is possible to generate base policy files for a computer that does not access the F-Secure Policy Manager Server. The base policy file must be transferred either manually or by using another external transport mechanism. To do this, select...
  • Page 41 F-Secure Policy Manager | Using Policy Manager Console | 41 Host properties This section provides an overview of the host properties that can be viewed and edited in Policy Manager Console. Host names for the network can be IP addresses, domain names, or WINS names. To view host properties,...
  • Page 42: Software Distribution

    After the target hosts are selected, both push installation operations proceed the same way. Note: Before you start to install F-Secure products on hosts, you should make sure there are no conflicting antivirus or firewall programs installed on them.
  • Page 43 F-Secure Policy Manager | Using Policy Manager Console | 43 3. From the NT domains list, select one of the domains and click Refresh. The host list is updated only when you click Refresh. Otherwise cached information is displayed for performance reasons.
  • Page 44: Policy-Based Installation

    44 | F-Secure Policy Manager | Using Policy Manager Console 4. Choose the user account and password for the push installation by selecting either This account (the current account) or Another user. Note: Push Installation requires administrator rights for the target machine during the installation. If...
  • Page 45 F-Secure Policy Manager | Using Policy Manager Console | 45 When installation is complete, Management Agent sends the result of the installation operation in an incremental policy file to the server. Policy Manager Console discovers the new status information and shows the results.
  • Page 46: Local Installation And Updates With Pre-Configured Packages

    46 | F-Secure Policy Manager | Using Policy Manager Console (Empty field) No operations are active. The Installed version field displays all currently installed product versions. 3. When all required version numbers are selected, click Start. Installation editor launches the...
  • Page 47 F-Secure Policy Manager | Using Policy Manager Console | 47 The procedure for exporting in both formats is the same, and is explained below. You can select the file format for the customized package in the Export installation package dialog.
  • Page 48: Information Delivery

    Alternatively, the installation package can be copied manually to the /Install/Entry subdirectory under the server root directory. Policy Manager Console will verify that the new installation package is signed with the F-Secure private key before allowing the package to be used.
  • Page 49: Managing Policies

    F-Secure Policy Manager | Using Policy Manager Console | 49 Managing policies This section describes how to configure and distribute policies. Settings To configure settings, browse the policy tree and change the values of the policy variables. There are two types of policy variables: •...
  • Page 50: Configuring Settings

    Press CTRL + D. Policy Manager Console saves the current policy data and then generates the base policy. Policy files are copied to the Communication directory, where the F-Secure software on the hosts will check for it periodically. Note: No changes will take effect before you have distributed the policy and the host has fetched the policy file.
  • Page 51 MIB defaults are obtained based on the product version installed on hosts. For a domain, the values from the newest product version are used. Certain F-Secure products override the default table implementation, and as such they do not implement the normal table inheritance as stated above.
  • Page 52: Managing Operations And Tasks

    52 | F-Secure Policy Manager | Using Policy Manager Console Managing operations and tasks You can perform various product-specific operations through Policy Manager Console. To launch an operation from Policy Manager Console: 1. Select one of the actions from the selected product’s...
  • Page 53: Alerts

    Product The F-Secure product that sent the alert. When an alert is selected from the list, more specific information about the alert will be displayed. F-Secure anti-virus scanning alerts may have an attached report, which will also be displayed. 2. To view reports, click on the...
  • Page 54 54 | F-Secure Policy Manager | Using Policy Manager Console Information alerts and warning-level alerts are, by default, not sent to Policy Manager Console or displayed to the user. These lower-priority alerts and notifications can provide very useful information for troubleshooting, but if these alerts are enabled, the number of transmitted alerts will increase substantially.
  • Page 55: Reporting Tool

    F-Secure Policy Manager | Using Policy Manager Console | 55 Reporting tool Reporting tool allows users to view and export reports of Policy Manager Console managed data. The viewing and exporting functionality provides a way to examine the data of several hosts/domains at the same time.
  • Page 56: Report Pane

    56 | F-Secure Policy Manager | Using Policy Manager Console Report type Description Configuration Export/view reports containing information of installed products of the selected products from the selected domains. Anti-Virus Export/view reports containing values of domain status of product versions and virus definition database updates.
  • Page 57 F-Secure Policy Manager | Using Policy Manager Console | 57 4. Select the products to include in the report, if necessary. 5. Select report type-dependent configurations for the currently selected report, if necessary. 6. View or export the report: •...
  • Page 58: Preferences

    58 | F-Secure Policy Manager | Using Policy Manager Console Preferences Preference settings are either shared or applied to the specific connection. Connection-specific preferences To edit these, select Preferences from the Tools menu; only the current connection object is affected.
  • Page 59: Shared Preferences

    F-Secure Policy Manager | Using Policy Manager Console | 59 Setting Meaning Skipping the initial status loading option does not affect manual status refreshment or periodic status polling. If necessary, you can disable the automatic status polling. To do this: 1.
  • Page 60 60 | F-Secure Policy Manager | Using Policy Manager Console Setting Meaning Appearance Language Language selection. You can select the local language of your General options operating system or the default English setting. All objects that do not support the system’s local language will be displayed in English.
  • Page 61: Chapter 4: Maintaining Policy Manager Server

    Chapter Maintaining Policy Manager Server Topics: Here you will find details on how to backup and restore console data in Policy Manager Server. • Backing up & restoring Policy Manager Console data • Creating the backup • Restoring the backup •...
  • Page 62: Backing Up & Restoring Policy Manager Console Data

    62 | F-Secure Policy Manager | Maintaining Policy Manager Server Backing up & restoring Policy Manager Console data Policy Manager Server can be maintained by routinely backing up the console data on the server in case it needs to be restored.
  • Page 63: Creating The Backup

    F-Secure Policy Manager | Maintaining Policy Manager Server | 63 Creating the backup You can choose to create a full backup or a backup of the policy data and domain structure only. • Full backup includes the policy domain structure as well as the alerts, host statistics, and installation operations.
  • Page 64: Restoring The Backup

    Delete the communication directory. c) Copy the backup of the communication directory to its correct location. d) Copy the backup of the <F-Secure installation folder>\Management Server 5\data\db directory to its correct location. e) Copy the admin.pub key to the root of the Policy Manager Console installation directory.
  • Page 65: Replicating Software Using Image Files

    3. Run the fsmautil resetuid command from the command prompt. This utility is typically located in the C:\Program Files\F-Secure\Common directory (the directory may be different if you are using a localized version of Windows or if you have specified a non-default installation path).
  • Page 67: Chapter 5: Updating Virus Definition Databases

    Chapter Updating virus definition databases Topics: Virus definition databases must be kept up to date to ensure proper protection against the latest threats. • Automatic updates with Automatic Update Agent • Using Automatic Update Agent • Forcing Automatic Update Agent to check for new updates immediately •...
  • Page 68: Automatic Updates With Automatic Update Agent

    If Automatic Update Agent is always connected to the Internet, it will automatically receive new automatic updates within about two hours after they have been published by F-Secure. Any possible delays will depend on when a connection to the Internet is available.
  • Page 69 Update Agent saves what was downloaded and continues to download the rest of the file next time you connect. Automated updates You don't have to look for the updates and manually download them. With Automatic Update Agent, you will automatically get the virus definition updates when they have been published by F-Secure.
  • Page 70: Using Automatic Update Agent

    1800 seconds, which is half an hour. poll_interval=1800 Note: If the minimum polling interval defined on the F-Secure update server is, for example, 2 hours, the settings in Automatic Update Agent configuration file cannot override that limitation. 4. Save and close the file.
  • Page 71 F-Secure Policy Manager | Updating virus definition databases | 71 • The date and time the message was generated. [ 3988]Thu Oct 26 12:40:39 2006(3): Downloaded 'F-Secure Anti-Virus Update 2006-10-26_04' - 'DFUpdates' version '1161851933' from fsbwserver.f-secure.com, 12445450 bytes (download size 3853577) •...
  • Page 72: Forcing Automatic Update Agent To Check For New Updates Immediately

    72 | F-Secure Policy Manager | Updating virus definition databases Forcing Automatic Update Agent to check for new updates immediately If you need to force Automatic Update Agent to check for new updates immediately, you can do so in the Automatic Update Agent interface.
  • Page 73: Updating The Databases Manually

    F-Secure Policy Manager | Updating virus definition databases | 73 Updating the databases manually If your computer is not connected to the Internet, you can update the databases manually. 1. Connect to http://support.f-secure.com/ from another computer. 2. Download the fsdbupdate.exe tool.
  • Page 74: Troubleshooting

    74 | F-Secure Policy Manager | Updating virus definition databases Troubleshooting Below are some examples of problems that may be logged as error messages in the fsaua.log file. Problem Reason Solution There was a DNS lookup failure, or Network problems...
  • Page 75: Chapter 6: Web Reporting

    Chapter Web Reporting Topics: The detailed graphical reports in Web Reporting allow you to identify computers that are unprotected or vulnerable to virus outbreaks. With • Generating and viewing reports Web Reporting, you can quickly create graphical reports based on •...
  • Page 76: Generating And Viewing Reports

    76 | F-Secure Policy Manager | Web Reporting Generating and viewing reports The general types of reports you can generate include, for example, bar and pie graphs of the current security situation, trend reports and detailed list reports. To view the exact reports and report templates available, select one of the pages...
  • Page 77 F-Secure Policy Manager | Web Reporting | 77 When using automated report generation, you do not have to select the report category, report type or policy domain which you want to monitor separately the next time you want to generate the same report, because this information is already included in the report-specific URL address.
  • Page 78: Maintaining Web Reporting

    78 | F-Secure Policy Manager | Web Reporting Maintaining Web Reporting This section covers the most common Web Reporting maintenance tasks. Note: Web Reporting is turned on and off during the installation of Policy Manager Server. To turn Web Reporting on or off, you need to reinstall Policy Manager Server. Restricting access to the local machine is also set during installation.
  • Page 79: Web Reporting Error Messages And Troubleshooting

    F-Secure Policy Manager | Web Reporting | 79 Web Reporting error messages and troubleshooting This section covers Web Reporting error messages and Web Reporting database troubleshooting. Error messages Common error messages that you may encounter when using Web Reporting are listed here.
  • Page 80 80 | F-Secure Policy Manager | Web Reporting You can also change the Web Reporting port by editing the HKEY_LOCAL_MACHINE\SOFTWARE\Data Fellows\F-Secure\Management Server 5 registry key: 1. Stop Policy Manager Server. 2. Open the HKEY_LOCAL_MACHINE\SOFTWARE\Data Fellows\F-Secure\Management Server 5 registry key. 3. Edit the WRPortNum value and enter the new port number.
  • Page 81: Chapter 7: Policy Manager Proxy

    Chapter Policy Manager Proxy Topics: In this section, you will find some basic information regarding Policy Manager Proxy. • Overview...
  • Page 82: Overview

    Policy Manager Proxy caches virus definition database updates retrieved from Policy Manager Server or F-Secure Update Server, and resides in the same remote network as the hosts that use it as a database distribution point. There should be one Policy Manager Proxy in every network that is behind slow network lines.
  • Page 83: Chapter 8: Troubleshooting

    Chapter Troubleshooting Topics: If you encounter problems when using the product, you can find possible solutions in this section. • Policy Manager Server and Policy Manager Console • Policy Manager Web Reporting • Policy distribution...
  • Page 84: Policy Manager Server And Policy Manager Console

    84 | F-Secure Policy Manager | Troubleshooting Policy Manager Server and Policy Manager Console Issues regarding Policy Manager Server and Policy Manager Console are described here. Question Answer Why doesn't Policy Manager Server start? Runtime errors, warnings and other information can be found in the file: <F-Secure>\Management Server...
  • Page 85 F-Secure Policy Manager | Troubleshooting | 85 Question Answer How can the server role change stop Policy Manager The Domain Controller server and Member/Standalone Server from working? server use different types of accounts: domain accounts on Domain Controller and local accounts on Member server.
  • Page 86 86 | F-Secure Policy Manager | Troubleshooting Question Answer problems are fixed by updating the network drivers to the latest version in the affected machines or by reconfiguring the new switch and the network cards on the Policy Manager Console and Policy Manager Server machines.
  • Page 87 F-Secure Policy Manager | Troubleshooting | 87 Question Answer Make sure Decimal is selected as the Base option when entering the new port number. 4. Start Policy Manager Server. Caution: If you have workstations already configured to access Policy Manager Server...
  • Page 88: Policy Manager Web Reporting

    88 | F-Secure Policy Manager | Troubleshooting Policy Manager Web Reporting The locations of log and configuration files are given here. Question Answer Where are the log files and configuration files located The log files are located in: for Web Reporting? <F-Secure>\Management Server 5\Web...
  • Page 89: Policy Distribution

    F-Secure Policy Manager | Troubleshooting | 89 Policy distribution You will find information on common error messages relating to policy distribution here. Question Answer When distributing a policy, Policy Manager Console See below for information on error messages you may shows an error message about an invalid policy value.
  • Page 91: Chapter 9: Ilaunchr Error Codes

    Chapter Ilaunchr error codes Topics: This section provides information on error codes related to the Ilaunchr component. • Error codes...
  • Page 92: Error Codes

    92 | F-Secure Policy Manager | Ilaunchr error codes Error codes When Ilaunchr.exe is completed silently, it reports installation results with the standard exit codes. With the login script, you can test for the cause of the problem. Here is one example, which you can insert into your login script: Start /Wait ILaunchr.exe \\server\share\mysuite.jar /U...
  • Page 93 F-Secure Policy Manager | Ilaunchr error codes | 93 Error code Description Setup was unable to copy non-packed files to the target directory. Setup was unable to copy uninstallation plug-in to the product target directory. Setup was unable to copy product.ini file to the temp directory.
  • Page 95: Chapter 10: Fsii Remote Installation Error Codes

    Chapter FSII remote installation error codes Topics: This section describes the most common error codes and messages that can occur during the Autodiscover Windows Hosts operation. • Error codes...
  • Page 96: Error Codes

    96 | F-Secure Policy Manager | FSII remote installation error codes Error codes Here you will find descriptions for the most common error codes and messages appearing in remote installation operations. Windows error codes Error code Description 1057 The user account name is invalid or does not exist.
  • Page 97 F-Secure Policy Manager | FSII remote installation error codes | 97 Error message Description Management Agent installation failed to fatal Fatal installation error occurred during Management FSMAINST error, see host log files for details. Agent installation. It is recommended that Management Agent be installed manually to the host.
  • Page 99: Chapter 11: Nsc Notation For Netmasks

    Chapter NSC notation for netmasks Topics: You will find information on combining a network address with its associated netmask in this section. • NSC notation details...
  • Page 100: Nsc Notation Details

    100 | F-Secure Policy Manager | NSC notation for netmasks NSC notation details NSC notation is a standard shorthand notation, which combines a network address with its associated netmask. NSC notation defines the number of contiguous one-bits in the netmask with a slash and a number following the network address.
  • Page 101 F-Secure Policy Manager | NSC notation for netmasks | 101 Netmask Bits 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.254 255.255.255.255...

Table of Contents