"F-Secure" and the triangle symbol are registered trademarks of F-Secure
Corporation and F-Secure product names and symbols/logos are either
trademarks or registered trademarks of F-Secure Corporation. All product names
referenced herein are trademarks or registered trademarks of their respective
companies. F-Secure Corporation disclaims proprietary interest in the marks and
names of others. Although F-Secure Corporation makes every effort to ensure that
this information is accurate, F-Secure Corporation will not be liable for any errors
or omission of facts contained herein. F-Secure Corporation reserves the right to
modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless
otherwise noted. No part of this document may be reproduced or transmitted in
any form or by any means, electronic or mechanical, for any purpose, without the
express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the
following:
For detailed installation, use and product instructions, see the
applicable F-Secure product manuals included on the
F-Secure CD. You can access them from the CD menu by clicking
Manuals, or you can go to our website for the most recent
manuals in PDF format. The direct link to the manuals is
For printing any manuals from either the CD or the website, you
must have Adobe Acrobat 4® or a later version installed. Adobe
Acrobat
®
is available on your CD.
3
Page 5
2F-SECURE CLIENT SECURITY
This chapter describes how to install F-Secure Client Security on
corporate computers. The following are explained:
System Requirements
Remote and local installation options for corporate
computers
For more detailed information, see the F-Secure Client
Security Administrator’s guide and online help. The guide
is available on the CD, and the online help is installed with
the product.
You can open the online help by pressing F1 or clicking
Help in any window or dialog in F-Secure Client Security.
4
Page 6
5CHAPTER 2
2.1 System Requirements
Your computer must meet these requirements to run F-Secure
Client Security:
Processor:On Windows Vista: Capable of running
Windows Vista 32- or 64-bit (Intel Pentium 4 2
GHz or higher recommended)
On Windows XP/2000: Intel Pentium III
600 Mhz or higher (Intel Pentium III 1 GHz or
higher recommended)
Operating
system:
Memory:On Windows Vista: 512 MB of RAM (1 GB or
Free hard disk
space:
Other:Internet connection recommended
Windows Vista RTM editions
Windows XP Professional or Home Edition
(SP 2 required for full functionality)
Windows 2000 Workstation with Service
Pack 4
more recommended)
On Windows XP/2000: 256 MB of RAM
(512 MB of RAM or more recommended)
200 MB (300 MB recommended)
Page 7
2.2 Installation Options
F-Secure Client Security can be installed in the following ways:
Stand-Alone Installation
Remote Installation with F-Secure Policy Manager
Local Installation and F-Secure Policy Manager
For detailed instructions, see the F-Secure Client Security
Administrator’s Guide available on the CD and on our
website at http://www.f-secure.com/small_businesses/
support_and_services/manuals.html.
2.2.1Stand-Alone Installation
F-Secure Client Security can be installed individually on each
workstation. This method is recommended for small networks with
2-5 workstations.
6
Page 8
7CHAPTER 2
Step 1 - Uninstall any other antivirus programs on your
computer
1. Uninstall any other antivirus programs on your computer as
follows:
a. Click Start
Programs.
b. Click the programs you want to remove.
c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat
steps b and c to uninstall all. (Related components have the
same product name.)
3. Restart your computer.
For uninstalling other antivirus programs, refer to their user
documentation, or refer to your operating system user
documentation.
ÆSettingsÆControl PanelÆAdd or Remove
Page 9
8
Step 2 - Install F-Secure Client Security:
1. Insert the F-Secure Workstation & Server Security CD in the
CD-ROM drive.
2. Select the installation language.
3. Click F-Secure Client Security listed under Anti-Virus.
4. Read the Welcome screen and select the language in which
you want to install F-Secure Client Security. Click Next.
5. Read the License Agreement text carefully, select I accept this agreement and click Next.
If you select I reject this agreement, you cannot
install the product.
6. Enter the keycode you received with your product, and click
Next.
7. Select the type of installation:
If you select Typical, F-Secure Client Security is installed
in the default directory, C:\Program Files\ F-Secure, with
Virus & Spy Protection, Automatic Update Agent, Internet
Shield, E-mail Scanning and Web Traffic Scanning
enabled.
If you select Custom, you can choose what to install and
where.
Page 10
9CHAPTER 2
8. Click Next.
9. If you selected Typical installation, go to step 11. If you
selected Custom installation, select the components to install
and then click Next:
Virus & Spy Protection to enable the real-time virus
protection and scanning for spyware
Internet Shield to install the integrated firewall
E-mail Scanning to have all your inbound and outbound
e-mails scanned for viruses
Web Traffic Scanning to protect your computer against
viruses in HTTP traffic.
System Control to protect your computer against
unknown malware and unwanted system changes.
SNMP Support to enable the protection of your computer
to be managed using the Simple Network Management
Protocol (SNMP).
Cisco NAC Support to enable the integration of Cisco
Network Admission Control (NAC) with the product.
10. Choose the folder where you want to install F-Secure Client
Security and click Next.
We recommend choosing the default location,
C:\Program Files\F-Secure.
11. Select Locally managed stand-alone installation and click
Next.
12. Verify the list of components, and click Start to start the
installation. When the installation is finished, click Next to
continue.
Page 11
13.Restart your computer, if you are prompted to do that, by
selecting Restart now and click Finish.
14. After restarting the computer, if prompted, update the virus
definition databases as soon as you are connected to the
network.
2.2.2Remote Installation with F-Secure Policy
Manager
Remote installation with F-Secure Policy Manager is
recommended for networks with more than 5 workstations.
If you are not familiar with F-Secure Policy Manager, see the
F-Secure Policy Manager Administrator’s Guide available on the
CD.
F-Secure Policy Manager has two user interfaces:
Advanced Mode and Anti-Virus Mode. You should use
Anti-Virus Mode with F-Secure Client Security. After you
have installed F-Secure Policy Manager, open the View
menu and select Anti-Virus Mode.
10
Page 12
11CHAPTER 2
Step 1 - Uninstall any other antivirus programs on the
workstation where F-Secure Client Security is installed
1. Uninstall any other antivirus programs on the workstation as
follows:
a. Click Start
Programs.
b. Click the programs you want to remove.
c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat
steps b and c to uninstall all. (Related components have the
same product name.)
3. Restart your computer.
For uninstalling other antivirus programs, refer to their user
documentation, or refer to your operating system user
documentation.
Step 2 - Install F-Secure Policy Manager
1. Install F-Secure Policy Manager.
ÆSettingsÆControl PanelÆAdd or Remove
For installation instructions, see chapter Installing
F-Secure Policy Manager in F-Secure Client Security
Administrator’s Guide.
2. Create the policy domain structure.
For instructions, see chapter Creating the Domain
Structure in F-Secure Client Security Administrator’s
Guide.
The following steps are a general guideline for remote installation:
1. Use ‘Autodiscover Windows Hosts’ operation to install
F-Secure Client Security to the workstations. F-Secure Policy
Page 13
Manager Console will use a Remote Installation Wizard to
configure the F-Secure Client Security installation.
For instructions, see chapter Adding Hosts in
F-Secure Client Security Administrator’s Guide.
2. Add new workstations to a suitable policy domain when the
installation is complete.
3. Configure the F-Secure Client Security settings for the
workstations. The domain level settings are shared by all
workstations in the policy domain.
For instructions, see chapters Configuring Virus &
Spy Protection and Configuring Internet Shield in
F-Secure Client Security Administrator’s Guide.
4. Distribute the policies. The managed workstations will receive
the updated policy the next time they connect to the server.
2.2.3Local Installation and F-Secure Policy Manager
Local installation is recommended if you need to install F-Secure
Client Security locally on a workstation that is otherwise centrally
managed by F-Secure Policy Manager. You must have F-Secure
Policy Manager already installed before you can continue with the
installation.
12
Page 14
13CHAPTER 2
Step 1 - Uninstall any other antivirus programs on your
computer
1. Uninstall any other antivirus programs on your computer as
follows:
a. Click Start
Programs.
b. Click the programs you want to remove.
c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat
steps b and c to uninstall all. (Related components have the
same product name.)
3. Restart your computer.
For uninstalling other antivirus programs, refer to their user
documentation, or refer to your operating system user
documentation.
ÆSettingsÆControl PanelÆAdd or Remove
Page 15
14
Step 2 - Install F-Secure Client Security
1. Insert the F-Secure Workstation & Server Security CD in the
CD-ROM drive.
2. Select the installation language.
3. Click F-Secure Client Security listed under Anti-Virus.
4. Read the Welcome screen and select the language in which
you want to install F-Secure Client Security. Click Next.
5. Read the License Agreement text carefully, select I accept
this agreement and click Next.
If you select I reject this agreement, you cannot
install the product.
6. Enter the keycode you received with your product, and click
Next.
7. Select the type of installation:
If you select Typical, F-Secure Client Security is installed
in the default directory, C:\Program Files\ F-Secure, with
Virus & Spy Protection, Automatic Update Agent, Internet
Shield, E-mail Scanning and Web Traffic Scanning
enabled.
If you select Custom, you can choose what to install and
where.
8. Click Next.
Page 16
15CHAPTER 2
9. If you selected Typical installation, go to step 11. If you
selected Custom installation, select the components to install
and then click Next:
Virus & Spy Protection to enable the real-time virus
protection and scanning for spyware
Internet Shield to install the integrated firewall
E-mail Scanning to have all your inbound and outbound
e-mails scanned for viruses
Web Traffic Scanning to protect your computer against
viruses in HTTP traffic.
System Control to protect your computer against
unknown malware and unwanted system changes.
SNMP Support to enable the protection of your computer
to be managed using the Simple Network Management
Protocol (SNMP).
Cisco NAC Support to enable the integration of Cisco
Network Admission Control (NAC) with the product.
10. Choose the folder where you want to install F-Secure Client
Security and click Next.
We recommend choosing the default location,
C:\Program Files\F-Secure.
11. Select Central management with F-Secure Policy
Manager, and click Next.
12. Enter the path to the public Management Key that you created
during the F-Secure Policy Manager Console setup. Click the
Browse button to search for the key.
13. Enter the http address of the F-Secure Policy Manager Server.
Click Next.
Page 17
16
14. Verify the list of components, and click Start to start the
installation. When the installation is finished, click Next to
continue.
15.Restart your computer, if you are prompted to do that, by
selecting Restart now and click Finish.
Step 3 - Configure the product using F-Secure Policy
Manager Console:
1. Add a new workstation to a suitable policy domain using the
‘Import Autoregistered Hosts’ operation.
2. Configure the F-Secure Client Security settings for the
workstation. The domain level settings are shared by all
workstations in the policy domain.
3. Distribute the policies. The managed workstation will receive
the updated policy the next time it connects to the server.
Page 18
3F-SECURE POLICY MANAGER
This chapter is a quick reference for installing F-Secure Policy
Manager from the F-Secure Workstation & Server Security CD.
The following are explained:
System requirements
User interface modes
Installation steps for installing all F-Secure Policy Manager
components on a single computer.
Remote deployment of F-Secure products to corporate
computers.
For more detailed information and alternate set-ups, see
the F-Secure Policy Manager Administrator’s Guide.
For information on installing F-Secure Policy Manager on
Linux, see chapter F-Secure Policy Manager on Linux in
F-Secure Policy Manager Administrator’s Guide.
For more information on F-Secure Policy Manager Web
Reporting, see chapter Web Reporting in F-Secure Policy
Manager Administrator’s Guide.
17
For more information on F-Secure Client Security, see the
F-Secure Client Security Administrator’s guide.
These guides are available on your F-Secure product CD,
or from http://www.f-secure.com/small_businesses/
support_and_services/manuals.html.
Page 19
3.1 System Requirements
F-Secure Policy Manager Server
Operating
System:
Processor:Intel Pentium 4, 2 GHz processor or faster.
Memory:256 MB of RAM. 512 MB is recommended.
Microsoft Windows:
Microsoft Windows 2000 Server (SP 4 or higher)
Windows 2003 Server (32- and 64-bit, SP1 or
higher)
Windows 2008 Server (32- and 64-bit)
Linux:
Red Hat Enterprise Linux 3, 4 and 5
openSUSE Linux 10.3
SUSE Linux Enterprise Server 9 and 10
SUSE Linux Enterprise Desktop 10
Debian GNU Linux Etch 4.0
Ubuntu 8.04 Hardy
Managing more than 5000 hosts or using Web
Reporting requires Intel Pentium 4, 3 GHz level
processor or faster.
Managing more than 5000 hosts or using Web
Reporting requires 1 GB of RAM.
18
Disk space:1 GB of free hard disk space; 5 GB or more is
recommended. The disk space requirements
depend on the size of the installation. Allocate
about 1 MB per host for alerts and policies. The
actual disk space consumption per host depends
on how the policies are used and how many
installation packages are stored.
Network:10 Mbit network. Managing more than 5000 hosts
requires a 100 Mbit network.
Page 20
19CHAPTER 3
For information on installing F-Secure Policy Manager on
Linux, see chapter F-Secure Policy Manager on Linux in
F-Secure Policy Manager Administrator’s Guide.
F-Secure Policy Manager Console
Operating
system:
Processor:Intel Pentium 4, 2 GHz processor or faster.
Microsoft Windows:
Microsoft Windows 2000 Professional (SP4 or
higher)
Windows XP Professional (SP2 or higher)
Windows Vista (32- and 64-bit)
Windows 2000 Server SP4
Windows 2003 Server (32- and 64-bit, SP1 or
higher).
Windows 2008 Server (32- and 64-bit).
Linux:
Red Hat Enterprise Linux 3, 4 and 5
openSUSE Linux 10.3
SUSE Linux Enterprise Server 9 and 10
SUSE Linux Enterprise Desktop 10
Debian GNU Linux Etch 4.0
Ubuntu 8.04 Hardy
Managing more than 5000 hosts requires Pentium
4, 3 GHz processor or faster
Memory:512 MB of RAM. Managing more than 5000 hosts
requires 1 GB of memory
Disk space:100 MB of free hard disk space
Page 21
F-Secure Policy Manager Console
Display
resolution:
Other:Ethernet network interface or equivalent. 10 Mbit
Minimum 256-color display with resolution of
1024x768, (32-bit color with 1280x960 or higher
resolution recommended).
network between console and server is
recommended.
Managing more than 5000 hosts requires 100Mbit
connection between console and server.
20
Page 22
21CHAPTER 3
3.2 User Interfaces
F-Secure Policy Manager has two user interfaces:
Anti-Virus Mode
Advanced Mode
Use the Anti-Virus Mode user interface for managing F-Secure
Client Security, and Advanced Mode for managing all other
F-Secure products.You can select the user interface from the
View menu in F-Secure Policy Manager Cons ole.
3.3 Installation Instructions
You can install F-Secure Policy Manager components, F-Secure
Policy Manager Server and F-Secure Policy Manager Console, on
the same computer, or on separate dedicated computers. In these
instructions, F-Secure Policy Manager Server and F-Secure
Policy Manager Console will be installed on the same computer.
For instructions on installing F-Secure Policy Manager
Server and F-Secure Policy Manager Console on separate
computers, see the F-Secure Policy Manager
Administrator’s Guide.
To install F-Secure Policy Manager Server, you need physical
access to the server machine.
Page 23
22
T o install F-Secure Policy Manager:
1. Insert the F-Secure CD in your CD-ROM drive.
2. From the Management menu, select F-Secure Policy
Manager to start the setup.
3. Read the welcome screen, and select the installation
language. Click Next.
4. Read the License Agreement text. Select I accept this
agreement, and click Next.
5. If there is no previous F-Secure Policy Manager installation on
the computer, select the components to be installed:
F-Secure Policy Manager Console
F-Secure Policy Manager Server
6. Accept the default installation directory (recommended). If you
want to install the components in another directory, click
Browse and enter your desired directory.
7. If Setup does not detect a previous F-Secure Policy Manager
installation, you are requested to confirm if a previous
installation of F-Secure Policy Manager exists.
If Yes, select I have existing an F-Secure Policy
Manager installation. Enter the communication directory
path of the installed F-Secure Policy Manager.
If No, select I do not have an existing F-Secure Policy
Manager.
Page 24
23CHAPTER 3
8. Select whether you want to keep the existing settings or
change them.
By default the setup keeps the existing settings. Select this
option if you have manually updated the F-Secure Policy
Manager Server configuration file (HTTPD.conf). This
option automatically keeps the existing administration, host
and web reporting ports.
If you want to change the ports from the previous
installation, select the Change settings option. This option
overwrites the HTTPD.conf file, and restores the settings
to defaults.
9. Select the F-Secure Policy Manager Server modules to
enable:
Host module is used for communication with the hosts.
The default port is 80.
Administration module is used for communication with
F-Secure Policy Manager Console. The default HTTP port
is 8080.
This dialog is displayed only if a previous installation
of F-Secure Policy Manager Server was detected on
the computer.
If you want to change the default port for
communication, you will also need to change the
HTTP Port Number setting in F-Secure Policy
Manager Console.
By default the access to the Administration module is
restricted to the local machine. This is the most secure
way to use the product.
Page 25
24
When using a connection over a network, please consider
using a program that uses tunneling to secure the
connection, such as Secure Shell (SSH) or a Virtual
Private Network (VPN).
For environments requiring maximum security, see
section Installing F-Secure Policy Manager in High
Security Environments in F-Secure Policy Manager
Administrator’s Guide
Web Reporting module is used for communication with
F-Secure Policy Manager Web Reporting. Web Reporting
uses a local socket connection to the Admin module to
fetch server data. The default port is 8081.
By default access to Web Reports is allowed also from
other computers. If you want to allow access only from this
computer, select Restrict access to the local machine.
10. Specify the F-Secure Policy Manager Server address, and
Administration port number. Click Nextto continue.
Depending on the installation method, the server
address and port number are not always required.
11. Select to add product installation package(s) from the list of
available packages (if you selected F-Secure Installation
Packages in step 5 ).
12. Setup displays the components that will be installed. Click
Next to start the installation.
13. After setup has copied the files to your computer, click Finish
to complete the setup.
To determine if your server-side installation was
successful, open a web browser in the machine where
F-Secure Policy Manager Server was installed, enter
http://localhost
and press Enter. If the server installation
Page 26
25CHAPTER 3
was successful, a page will be displayed stating that
F-Secure Policy Manager Server installation was
successful.
Run F-Secure Policy Manager Console Setup Wizard.
14. The setup wizard creates the user group FSPM users. The
user who was logged in and ran the installer is automatically
added to this group. To allow another user to run F-Secure
Policy Manager you must manually add this user to the user
group FSPM users
Continue to the
Wizard”
F-Secure Policy Manager Console Setup Wizard
1. Read the setup wizard overview that summarizes the
installation process.
2. Select Administrator mode to enable all administrator
features.
3. Enter the path where the administrator’s public key and private
key files will be stored. By default, key files are stored in the
If the key-pair does not exist already, it will be created
later in the setup process.
4. Move your mouse cursor around in the window to initialize the
random seed used by the management key-pair generator.
Page 27
26
When the progress indicator has reached 100%, the
Passphrase dialog box opens automatically.
5. Enter a passphrase for F-Secure Policy Manager Console
(this will be needed for logging into F-Secure Policy Manager
Console).
6. Click Finish to complete the setup process. Your key-pair will
now be created.
Remote Deployment of Other F-Secure Products
F-Secure Policy Manager can install software to new hosts that
are not yet centrally managed. These hosts can be browsed from
Windows NT domains using the Autodiscover Windows Hosts
feature. The software is then push installed to the managed hosts.
F-Secure Policy Manager offers other methods of installing and
updating managed applications. Shortcuts to all the
installation-related features are gathered in the Properties pane
under the Installation tab. Please see the F-Secure Policy Manager Administrator’s Guide for details.
The following steps are for both the Advanced Mode and
Anti-Virus Mode user interface:
1. In F-Secure Policy Manager, select the policy domain
containing the hosts to which you will install.
2. Open the Edit menu and select Autodiscover Windows
Hosts (alternatively , click the button). From the NT
Page 28
27CHAPTER 3
Domains list that opens, select one of the domains and click
Refresh. Select the hosts to be imported and click Install.
3. After you have selected the target hosts, select the installation
package.
4. Select the products to install. You can choose to force
reinstallation if applications with the same version number
already exist.
5. Choose to accept the default policy, or specify which host or
domain policy should be used as an anonymous policy.
6. Choose the user account and password used to perform the
push installation.
7. Review the installation summary. To start the Remote
Installation Wizard, click Start.
8. F-Secure Policy Manager installs the selected products on the
hosts.
9. When the Status line displays finished, the process is
complete. You can select in which domain th e new hosts
should be placed using the import settings. Click Finish.
10. When the installation is finished;
In Advanced Mode, open the F-Secure Policy Manager
Console Properties pane to view the list of products that
were installed. To see this list, you must first select the top
domain in the Policy Domain pane.
In Anti-Virus Mode, click the F-Secure Policy Manager
Console Status tab to view the list of products that were
installed.
Page 29
www.f-secure.com
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.