F-secure CLIENT SECURITY 8.00 ADMINISTRATOR GUIDE

Getting Started with
F-Secure Client Security
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation.
This product may be covered by one or more F-Secure patents, including the following:
GB2353372 GB2368233 GB2374260
Copyright © 2008 F-Secure Corporation. All rights reserved. #12000049-7H31
GB2366691 GB2366692 GB2366693
GB2367933
CONTENTS
Chapter 1 Introduction ........................................... 3
Chapter 2 F-Secure Client Security ........................ 4
2.1 System Requirements.........................................................................5
2.2 Installation Options.............................................................................6
2.2.1 Stand-Alone Installation .........................................................6
2.2.2 Remote Installation with F-Secure Policy Manager..............10
2.2.3 Local Installation and F-Secure Policy Manager..................12
Chapter 3 F-Secure Policy Manager ......................17
3.1 System Requirements.......................................................................18
3.2 User Interfaces..................................................................................21
3.3 Installation Instructions.....................................................................21

1 INTRODUCTION

This guide describes how to get started with F-Secure Client Security. Installation instructions are included for the following:
F-Secure Client SecurityF-Secure Policy Manager
For detailed installation, use and product instructions, see the applicable F-Secure product manuals included on the F-Secure CD. You can access them from the CD menu by clicking Manuals, or you can go to our website for the most recent manuals in PDF format. The direct link to the manuals is
http://www.f-secure.com/small_businesses/ support_and_services/manuals.html.
For printing any manuals from either the CD or the website, you must have Adobe Acrobat 4® or a later version installed. Adobe Acrobat
®
is available on your CD.
3

2 F-SECURE CLIENT SECURITY

This chapter describes how to install F-Secure Client Security on corporate computers. The following are explained:
System Requirements Remote and local installation options for corporate
computers
For more detailed information, see the F-Secure Client Security Administrator’s guide and online help. The guide is available on the CD, and the online help is installed with the product.
You can open the online help by pressing F1 or clicking Help in any window or dialog in F-Secure Client Security.
4
5 CHAPTER 2

2.1 System Requirements

Your computer must meet these requirements to run F-Secure Client Security:
Processor: On Windows Vista: Capable of running
Windows Vista 32- or 64-bit (Intel Pentium 4 2 GHz or higher recommended) On Windows XP/2000: Intel Pentium III 600 Mhz or higher (Intel Pentium III 1 GHz or higher recommended)
Operating system:
Memory: On Windows Vista: 512 MB of RAM (1 GB or
Free hard disk space:
Other: Internet connection recommended
Windows Vista RTM editions Windows XP Professional or Home Edition (SP 2 required for full functionality) Windows 2000 Workstation with Service Pack 4
more recommended) On Windows XP/2000: 256 MB of RAM (512 MB of RAM or more recommended)
200 MB (300 MB recommended)

2.2 Installation Options

F-Secure Client Security can be installed in the following ways:
Stand-Alone InstallationRemote Installation with F-Secure Policy Manager Local Installation and F-Secure Policy Manager
For detailed instructions, see the F-Secure Client Security Administrator’s Guide available on the CD and on our website at http://www.f-secure.com/small_businesses/
support_and_services/manuals.html.

2.2.1Stand-Alone Installation

F-Secure Client Security can be installed individually on each workstation. This method is recommended for small networks with 2-5 workstations.
6
7 CHAPTER 2
Step 1 - Uninstall any other antivirus programs on your computer
1. Uninstall any other antivirus programs on your computer as follows:
a. Click Start
Programs.
b. Click the programs you want to remove. c. Click Remove (or Change/Remove).
2. The programs may have several related components. Repeat steps b and c to uninstall all. (Related components have the same product name.)
3. Restart your computer. For uninstalling other antivirus programs, refer to their user
documentation, or refer to your operating system user documentation.
ÆSettingsÆControl PanelÆAdd or Remove
8
Step 2 - Install F-Secure Client Security:
1. Insert the F-Secure Workstation & Server Security CD in the CD-ROM drive.
2. Select the installation language.
3. Click F-Secure Client Security listed under Anti-Virus.
4. Read the Welcome screen and select the language in which you want to install F-Secure Client Security. Click Next.
5. Read the License Agreement text carefully, select I accept this agreement and click Next.
If you select I reject this agreement, you cannot install the product.
6. Enter the keycode you received with your product, and click Next.
7. Select the type of installation:
If you select Typical, F-Secure Client Security is installed
in the default directory, C:\Program Files\ F-Secure, with Virus & Spy Protection, Automatic Update Agent, Internet Shield, E-mail Scanning and Web Traffic Scanning enabled.
If you select Custom, you can choose what to install and
where.
Loading...
+ 20 hidden pages