F-secure CLIENT SECURITY 8.00 ADMINISTRATOR GUIDE

Page 1
Getting Started with
F-Secure Client Security
Page 2
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372 GB2368233 GB2374260
Copyright © 2008 F-Secure Corporation. All rights reserved. #12000049-7H31
GB2366691 GB2366692 GB2366693
GB2367933
Page 3
CONTENTS
Chapter 1 Introduction ........................................... 3
Chapter 2 F-Secure Client Security ........................ 4
2.1 System Requirements.........................................................................5
2.2 Installation Options.............................................................................6
2.2.1 Stand-Alone Installation .........................................................6
2.2.2 Remote Installation with F-Secure Policy Manager..............10
2.2.3 Local Installation and F-Secure Policy Manager..................12
Chapter 3 F-Secure Policy Manager ......................17
3.1 System Requirements.......................................................................18
3.2 User Interfaces..................................................................................21
3.3 Installation Instructions.....................................................................21
Page 4

1 INTRODUCTION

This guide describes how to get started with F-Secure Client Security. Installation instructions are included for the following:
F-Secure Client SecurityF-Secure Policy Manager
For detailed installation, use and product instructions, see the applicable F-Secure product manuals included on the F-Secure CD. You can access them from the CD menu by clicking Manuals, or you can go to our website for the most recent manuals in PDF format. The direct link to the manuals is
http://www.f-secure.com/small_businesses/ support_and_services/manuals.html.
For printing any manuals from either the CD or the website, you must have Adobe Acrobat 4® or a later version installed. Adobe Acrobat
®
is available on your CD.
3
Page 5

2 F-SECURE CLIENT SECURITY

This chapter describes how to install F-Secure Client Security on corporate computers. The following are explained:
System Requirements Remote and local installation options for corporate
computers
For more detailed information, see the F-Secure Client Security Administrator’s guide and online help. The guide is available on the CD, and the online help is installed with the product.
You can open the online help by pressing F1 or clicking Help in any window or dialog in F-Secure Client Security.
4
Page 6
5 CHAPTER 2

2.1 System Requirements

Your computer must meet these requirements to run F-Secure Client Security:
Processor: On Windows Vista: Capable of running
Windows Vista 32- or 64-bit (Intel Pentium 4 2 GHz or higher recommended) On Windows XP/2000: Intel Pentium III 600 Mhz or higher (Intel Pentium III 1 GHz or higher recommended)
Operating system:
Memory: On Windows Vista: 512 MB of RAM (1 GB or
Free hard disk space:
Other: Internet connection recommended
Windows Vista RTM editions Windows XP Professional or Home Edition (SP 2 required for full functionality) Windows 2000 Workstation with Service Pack 4
more recommended) On Windows XP/2000: 256 MB of RAM (512 MB of RAM or more recommended)
200 MB (300 MB recommended)
Page 7

2.2 Installation Options

F-Secure Client Security can be installed in the following ways:
Stand-Alone InstallationRemote Installation with F-Secure Policy Manager Local Installation and F-Secure Policy Manager
For detailed instructions, see the F-Secure Client Security Administrator’s Guide available on the CD and on our website at http://www.f-secure.com/small_businesses/
support_and_services/manuals.html.

2.2.1Stand-Alone Installation

F-Secure Client Security can be installed individually on each workstation. This method is recommended for small networks with 2-5 workstations.
6
Page 8
7 CHAPTER 2
Step 1 - Uninstall any other antivirus programs on your computer
1. Uninstall any other antivirus programs on your computer as follows:
a. Click Start
Programs.
b. Click the programs you want to remove. c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat steps b and c to uninstall all. (Related components have the same product name.)
3. Restart your computer. For uninstalling other antivirus programs, refer to their user
documentation, or refer to your operating system user documentation.
ÆSettingsÆControl PanelÆAdd or Remove
Page 9
8
Step 2 - Install F-Secure Client Security:
1. Insert the F-Secure Workstation & Server Security CD in the CD-ROM drive.
2. Select the installation language.
3. Click F-Secure Client Security listed under Anti-Virus.
4. Read the Welcome screen and select the language in which you want to install F-Secure Client Security. Click Next.
5. Read the License Agreement text carefully, select I accept this agreement and click Next.
If you select I reject this agreement, you cannot install the product.
6. Enter the keycode you received with your product, and click Next.
7. Select the type of installation:
If you select Typical, F-Secure Client Security is installed
in the default directory, C:\Program Files\ F-Secure, with Virus & Spy Protection, Automatic Update Agent, Internet Shield, E-mail Scanning and Web Traffic Scanning enabled.
If you select Custom, you can choose what to install and
where.
Page 10
9 CHAPTER 2
8. Click Next.
9. If you selected Typical installation, go to step 11. If you selected Custom installation, select the components to install and then click Next:
Virus & Spy Protection to enable the real-time virus
protection and scanning for spyware
Internet Shield to install the integrated firewallE-mail Scanning to have all your inbound and outbound
e-mails scanned for viruses
Web Traffic Scanning to protect your computer against
viruses in HTTP traffic.
System Control to protect your computer against
unknown malware and unwanted system changes.
SNMP Support to enable the protection of your computer
to be managed using the Simple Network Management Protocol (SNMP).
Cisco NAC Support to enable the integration of Cisco
Network Admission Control (NAC) with the product.
10. Choose the folder where you want to install F-Secure Client Security and click Next.
We recommend choosing the default location, C:\Program Files\F-Secure.
11. Select Locally managed stand-alone installation and click Next.
12. Verify the list of components, and click Start to start the installation. When the installation is finished, click Next to continue.
Page 11
13.Restart your computer, if you are prompted to do that, by selecting Restart now and click Finish.
14. After restarting the computer, if prompted, update the virus definition databases as soon as you are connected to the network.

2.2.2Remote Installation with F-Secure Policy Manager

Remote installation with F-Secure Policy Manager is recommended for networks with more than 5 workstations. If you are not familiar with F-Secure Policy Manager, see the F-Secure Policy Manager Administrator’s Guide available on the CD.
F-Secure Policy Manager has two user interfaces: Advanced Mode and Anti-Virus Mode. You should use Anti-Virus Mode with F-Secure Client Security. After you have installed F-Secure Policy Manager, open the View menu and select Anti-Virus Mode.
10
Page 12
11 CHAPTER 2
Step 1 - Uninstall any other antivirus programs on the workstation where F-Secure Client Security is installed
1. Uninstall any other antivirus programs on the workstation as
follows: a. Click Start
Programs.
b. Click the programs you want to remove. c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat
steps b and c to uninstall all. (Related components have the same product name.)
3. Restart your computer.
For uninstalling other antivirus programs, refer to their user documentation, or refer to your operating system user documentation.
Step 2 - Install F-Secure Policy Manager
1. Install F-Secure Policy Manager.
ÆSettingsÆControl PanelÆAdd or Remove
For installation instructions, see chapter Installing F-Secure Policy Manager in F-Secure Client Security Administrator’s Guide.
2. Create the policy domain structure.
For instructions, see chapter Creating the Domain Structure in F-Secure Client Security Administrator’s Guide.
Step 3 - Install F-Secure Client Security remotely
The following steps are a general guideline for remote installation:
1. Use ‘Autodiscover Windows Hosts’ operation to install
F-Secure Client Security to the workstations. F-Secure Policy
Page 13
Manager Console will use a Remote Installation Wizard to configure the F-Secure Client Security installation.
For instructions, see chapter Adding Hosts in F-Secure Client Security Administrator’s Guide.
2. Add new workstations to a suitable policy domain when the
installation is complete.
3. Configure the F-Secure Client Security settings for the
workstations. The domain level settings are shared by all workstations in the policy domain.
For instructions, see chapters Configuring Virus & Spy Protection and Configuring Internet Shield in F-Secure Client Security Administrator’s Guide.
4. Distribute the policies. The managed workstations will receive
the updated policy the next time they connect to the server.

2.2.3Local Installation and F-Secure Policy Manager

Local installation is recommended if you need to install F-Secure Client Security locally on a workstation that is otherwise centrally managed by F-Secure Policy Manager. You must have F-Secure Policy Manager already installed before you can continue with the installation.
12
Page 14
13 CHAPTER 2
Step 1 - Uninstall any other antivirus programs on your computer
1. Uninstall any other antivirus programs on your computer as
follows: a. Click Start
Programs.
b. Click the programs you want to remove. c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat
steps b and c to uninstall all. (Related components have the same product name.)
3. Restart your computer.
For uninstalling other antivirus programs, refer to their user documentation, or refer to your operating system user documentation.
ÆSettingsÆControl PanelÆAdd or Remove
Page 15
14
Step 2 - Install F-Secure Client Security
1. Insert the F-Secure Workstation & Server Security CD in the
CD-ROM drive.
2. Select the installation language.
3. Click F-Secure Client Security listed under Anti-Virus.
4. Read the Welcome screen and select the language in which
you want to install F-Secure Client Security. Click Next.
5. Read the License Agreement text carefully, select I accept
this agreement and click Next.
If you select I reject this agreement, you cannot install the product.
6. Enter the keycode you received with your product, and click
Next.
7. Select the type of installation:
If you select Typical, F-Secure Client Security is installed
in the default directory, C:\Program Files\ F-Secure, with Virus & Spy Protection, Automatic Update Agent, Internet Shield, E-mail Scanning and Web Traffic Scanning enabled.
If you select Custom, you can choose what to install and
where.
8. Click Next.
Page 16
15 CHAPTER 2
9. If you selected Typical installation, go to step 11. If you
selected Custom installation, select the components to install and then click Next:
Virus & Spy Protection to enable the real-time virus
protection and scanning for spyware
Internet Shield to install the integrated firewallE-mail Scanning to have all your inbound and outbound
e-mails scanned for viruses
Web Traffic Scanning to protect your computer against
viruses in HTTP traffic.
System Control to protect your computer against
unknown malware and unwanted system changes.
SNMP Support to enable the protection of your computer
to be managed using the Simple Network Management Protocol (SNMP).
Cisco NAC Support to enable the integration of Cisco
Network Admission Control (NAC) with the product.
10. Choose the folder where you want to install F-Secure Client
Security and click Next.
We recommend choosing the default location, C:\Program Files\F-Secure.
11. Select Central management with F-Secure Policy
Manager, and click Next.
12. Enter the path to the public Management Key that you created
during the F-Secure Policy Manager Console setup. Click the Browse button to search for the key.
13. Enter the http address of the F-Secure Policy Manager Server.
Click Next.
Page 17
16
14. Verify the list of components, and click Start to start the
installation. When the installation is finished, click Next to continue.
15.Restart your computer, if you are prompted to do that, by
selecting Restart now and click Finish.
Step 3 - Configure the product using F-Secure Policy Manager Console:
1. Add a new workstation to a suitable policy domain using the
‘Import Autoregistered Hosts’ operation.
2. Configure the F-Secure Client Security settings for the
workstation. The domain level settings are shared by all workstations in the policy domain.
3. Distribute the policies. The managed workstation will receive
the updated policy the next time it connects to the server.
Page 18

3 F-SECURE POLICY MANAGER

This chapter is a quick reference for installing F-Secure Policy Manager from the F-Secure Workstation & Server Security CD. The following are explained:
System requirementsUser interface modesInstallation steps for installing all F-Secure Policy Manager
components on a single computer.
Remote deployment of F-Secure products to corporate
computers.
For more detailed information and alternate set-ups, see the F-Secure Policy Manager Administrator’s Guide.
For information on installing F-Secure Policy Manager on Linux, see chapter F-Secure Policy Manager on Linux in F-Secure Policy Manager Administrator’s Guide.
For more information on F-Secure Policy Manager Web Reporting, see chapter Web Reporting in F-Secure Policy Manager Administrator’s Guide.
17
For more information on F-Secure Client Security, see the F-Secure Client Security Administrator’s guide.
These guides are available on your F-Secure product CD, or from http://www.f-secure.com/small_businesses/
support_and_services/manuals.html.
Page 19

3.1 System Requirements

F-Secure Policy Manager Server
Operating System:
Processor: Intel Pentium 4, 2 GHz processor or faster.
Memory: 256 MB of RAM. 512 MB is recommended.
Microsoft Windows: Microsoft Windows 2000 Server (SP 4 or higher) Windows 2003 Server (32- and 64-bit, SP1 or higher) Windows 2008 Server (32- and 64-bit) Linux: Red Hat Enterprise Linux 3, 4 and 5 openSUSE Linux 10.3 SUSE Linux Enterprise Server 9 and 10 SUSE Linux Enterprise Desktop 10 Debian GNU Linux Etch 4.0 Ubuntu 8.04 Hardy
Managing more than 5000 hosts or using Web Reporting requires Intel Pentium 4, 3 GHz level processor or faster.
Managing more than 5000 hosts or using Web Reporting requires 1 GB of RAM.
18
Disk space: 1 GB of free hard disk space; 5 GB or more is
recommended. The disk space requirements depend on the size of the installation. Allocate about 1 MB per host for alerts and policies. The actual disk space consumption per host depends on how the policies are used and how many installation packages are stored.
Network: 10 Mbit network. Managing more than 5000 hosts
requires a 100 Mbit network.
Page 20
19 CHAPTER 3
For information on installing F-Secure Policy Manager on Linux, see chapter F-Secure Policy Manager on Linux in F-Secure Policy Manager Administrator’s Guide.
F-Secure Policy Manager Console
Operating system:
Processor: Intel Pentium 4, 2 GHz processor or faster.
Microsoft Windows: Microsoft Windows 2000 Professional (SP4 or higher) Windows XP Professional (SP2 or higher) Windows Vista (32- and 64-bit) Windows 2000 Server SP4 Windows 2003 Server (32- and 64-bit, SP1 or higher). Windows 2008 Server (32- and 64-bit). Linux: Red Hat Enterprise Linux 3, 4 and 5 openSUSE Linux 10.3 SUSE Linux Enterprise Server 9 and 10 SUSE Linux Enterprise Desktop 10 Debian GNU Linux Etch 4.0 Ubuntu 8.04 Hardy
Managing more than 5000 hosts requires Pentium 4, 3 GHz processor or faster
Memory: 512 MB of RAM. Managing more than 5000 hosts
requires 1 GB of memory
Disk space: 100 MB of free hard disk space
Page 21
F-Secure Policy Manager Console
Display resolution:
Other: Ethernet network interface or equivalent. 10 Mbit
Minimum 256-color display with resolution of 1024x768, (32-bit color with 1280x960 or higher resolution recommended).
network between console and server is recommended. Managing more than 5000 hosts requires 100Mbit connection between console and server.
20
Page 22
21 CHAPTER 3

3.2 User Interfaces

F-Secure Policy Manager has two user interfaces:
Anti-Virus ModeAdvanced Mode
Use the Anti-Virus Mode user interface for managing F-Secure Client Security, and Advanced Mode for managing all other F-Secure products.You can select the user interface from the View menu in F-Secure Policy Manager Cons ole.

3.3 Installation Instructions

You can install F-Secure Policy Manager components, F-Secure Policy Manager Server and F-Secure Policy Manager Console, on the same computer, or on separate dedicated computers. In these instructions, F-Secure Policy Manager Server and F-Secure Policy Manager Console will be installed on the same computer.
For instructions on installing F-Secure Policy Manager Server and F-Secure Policy Manager Console on separate computers, see the F-Secure Policy Manager Administrator’s Guide.
To install F-Secure Policy Manager Server, you need physical access to the server machine.
Page 23
22
T o install F-Secure Policy Manager:
1. Insert the F-Secure CD in your CD-ROM drive.
2. From the Management menu, select F-Secure Policy
Manager to start the setup.
3. Read the welcome screen, and select the installation
language. Click Next.
4. Read the License Agreement text. Select I accept this
agreement, and click Next.
5. If there is no previous F-Secure Policy Manager installation on
the computer, select the components to be installed:
F-Secure Policy Manager ConsoleF-Secure Policy Manager Server
6. Accept the default installation directory (recommended). If you
want to install the components in another directory, click Browse and enter your desired directory.
7. If Setup does not detect a previous F-Secure Policy Manager
installation, you are requested to confirm if a previous installation of F-Secure Policy Manager exists.
If Yes, select I have existing an F-Secure Policy
Manager installation. Enter the communication directory
path of the installed F-Secure Policy Manager.
If No, select I do not have an existing F-Secure Policy
Manager.
Page 24
23 CHAPTER 3
8. Select whether you want to keep the existing settings or
change them.
By default the setup keeps the existing settings. Select this
option if you have manually updated the F-Secure Policy Manager Server configuration file (HTTPD.conf). This option automatically keeps the existing administration, host and web reporting ports.
If you want to change the ports from the previous
installation, select the Change settings option. This option overwrites the HTTPD.conf file, and restores the settings to defaults.
9. Select the F-Secure Policy Manager Server modules to
enable:
Host module is used for communication with the hosts.
The default port is 80.
Administration module is used for communication with
F-Secure Policy Manager Console. The default HTTP port is 8080.
This dialog is displayed only if a previous installation of F-Secure Policy Manager Server was detected on the computer.
If you want to change the default port for communication, you will also need to change the HTTP Port Number setting in F-Secure Policy Manager Console.
By default the access to the Administration module is restricted to the local machine. This is the most secure way to use the product.
Page 25
24
When using a connection over a network, please consider using a program that uses tunneling to secure the connection, such as Secure Shell (SSH) or a Virtual Private Network (VPN).
For environments requiring maximum security, see section Installing F-Secure Policy Manager in High Security Environments in F-Secure Policy Manager Administrator’s Guide
Web Reporting module is used for communication with
F-Secure Policy Manager Web Reporting. Web Reporting uses a local socket connection to the Admin module to fetch server data. The default port is 8081.
By default access to Web Reports is allowed also from other computers. If you want to allow access only from this computer, select Restrict access to the local machine.
10. Specify the F-Secure Policy Manager Server address, and
Administration port number. Click Next to continue.
Depending on the installation method, the server address and port number are not always required.
11. Select to add product installation package(s) from the list of
available packages (if you selected F-Secure Installation Packages in step 5 ).
12. Setup displays the components that will be installed. Click
Next to start the installation.
13. After setup has copied the files to your computer, click Finish
to complete the setup.
To determine if your server-side installation was
successful, open a web browser in the machine where F-Secure Policy Manager Server was installed, enter
http://localhost
and press Enter. If the server installation
Page 26
25 CHAPTER 3
was successful, a page will be displayed stating that F-Secure Policy Manager Server installation was successful.
Run F-Secure Policy Manager Console Setup Wizard.
14. The setup wizard creates the user group FSPM users. The
user who was logged in and ran the installer is automatically added to this group. To allow another user to run F-Secure Policy Manager you must manually add this user to the user group FSPM users
Continue to the
Wizard”
F-Secure Policy Manager Console Setup Wizard
1. Read the setup wizard overview that summarizes the
installation process.
2. Select Administrator mode to enable all administrator
features.
3. Enter the path where the administrator’s public key and private
key files will be stored. By default, key files are stored in the
F-Secure Policy Manager Console installation directory.
“F-Secure Policy Manager Console Setup
section.
If the key-pair does not exist already, it will be created later in the setup process.
4. Move your mouse cursor around in the window to initialize the
random seed used by the management key-pair generator.
Page 27
26
When the progress indicator has reached 100%, the Passphrase dialog box opens automatically.
5. Enter a passphrase for F-Secure Policy Manager Console
(this will be needed for logging into F-Secure Policy Manager Console).
6. Click Finish to complete the setup process. Your key-pair will
now be created.
Remote Deployment of Other F-Secure Products
F-Secure Policy Manager can install software to new hosts that are not yet centrally managed. These hosts can be browsed from Windows NT domains using the Autodiscover Windows Hosts feature. The software is then push installed to the managed hosts.
F-Secure Policy Manager offers other methods of installing and updating managed applications. Shortcuts to all the installation-related features are gathered in the Properties pane under the Installation tab. Please see the F-Secure Policy Manager Administrator’s Guide for details.
The following steps are for both the Advanced Mode and Anti-Virus Mode user interface:
1. In F-Secure Policy Manager, select the policy domain
containing the hosts to which you will install.
2. Open the Edit menu and select Autodiscover Windows
Hosts (alternatively , click the button). From the NT
Page 28
27 CHAPTER 3
Domains list that opens, select one of the domains and click Refresh. Select the hosts to be imported and click Install.
3. After you have selected the target hosts, select the installation
package.
4. Select the products to install. You can choose to force
reinstallation if applications with the same version number already exist.
5. Choose to accept the default policy, or specify which host or
domain policy should be used as an anonymous policy.
6. Choose the user account and password used to perform the
push installation.
7. Review the installation summary. To start the Remote
Installation Wizard, click Start.
8. F-Secure Policy Manager installs the selected products on the
hosts.
9. When the Status line displays finished, the process is
complete. You can select in which domain th e new hosts should be placed using the import settings. Click Finish.
10. When the installation is finished;
In Advanced Mode, open the F-Secure Policy Manager
Console Properties pane to view the list of products that were installed. To see this list, you must first select the top domain in the Policy Domain pane.
In Anti-Virus Mode, click the F-Secure Policy Manager
Console Status tab to view the list of products that were installed.
Page 29
www.f-secure.com
Loading...