4 | F-Secure Policy Manager | TOC
Menu commands.........................................................................................................36
Adding policy domains.................................................................................................38
Adding hosts................................................................................................................38
Software distribution...............................................................................................................42
Push installations.........................................................................................................42
Information delivery......................................................................................................48
Managing policies...................................................................................................................49
Settings........................................................................................................................49
Restrictions..................................................................................................................49
Configuring settings.....................................................................................................50
Policy inheritance.........................................................................................................50
Alerts.......................................................................................................................................53
Reporting tool.........................................................................................................................55
Report pane.................................................................................................................56
Bottom pane.................................................................................................................56
Preferences............................................................................................................................58
Shared preferences.....................................................................................................59
Creating the backup................................................................................................................63
Restoring the backup..............................................................................................................64
How to read the log file................................................................................................70
Troubleshooting......................................................................................................................74