Installing the product...............................................................................................................19
Download and run the installation package.................................................................19
Select components to install........................................................................................20
Complete installation of the product............................................................................24
Run Policy Manager Console......................................................................................25
Remote deployment of other F-Secure products....................................................................32
4 | F-Secure Client Security | TOC
Introduction
Chapter
1
This guide describes how to get started with F-Secure Client Security
and includes installation instructions for:
•Client Security
•Policy Manager
For detailed instructions on the installation and use of the products, refer
to the applicable product manuals included on the installation CD. The
most recent versions of the manuals are also available in PDF format
on our web site at www.f-secure.com/webclub.
Installing Client Security
Chapter
2
Topics:
•
System requirements
•
Stand-alone installation
•
Remote installation
•
Local installation and Policy
Manager
The following information is provided here:
•System requirements
•Remote and local installation options for corporate computers
Client Security can be installed individually on each workstation, which is the recommended method for small
networks with 2 - 5 workstations.
Note: When installing Client Security for a stand-alone installation, select Locally managed stand-alone
installation when the management selection step is displayed during setup.
Before you install
Read the following before installing the product.
•If you are using a previous version of F-Secure Internet Security or F-Secure Anti-Virus, you can install
this product directly. Follow the instructions in “Installation Steps”.
•If you have an evaluation version of F-Secure Internet Security 2010 or F-Secure Anti-Virus 2010 on your
computer, and you have purchased the licensed version, you can start using it after you enter the
subscription key.
To enter the subscription key:
1. On the main page, click Tasks.
2. Click My subscription.
3. Select Enter new subscription key....
4. In the dialog box that opens, enter your new subscription key and click Register.
If you received your subscription key by e-mail, you can copy the key from the e-mail message and paste
it into the field.
Installation steps
You need the product CD, a valid subscription key and an Internet connection. If multiple users share and
use the computer, log on with administrator privileges to install this product.
To install the software:
1. Insert the Installation CD.
The installation should start automatically. If it does not, go to Windows Explorer, double-click on the
CD-ROM icon and double-click the setup.exe file to start the installation.
The first installation dialog box appears.
2. Select the installation language and click Next to continue.
3. Read the license agreement. To accept the agreement and to continue, click Accept.
4. Enter your subscription key and click Next to continue.
Note: If you want to evaluate the product, leave the My subscription key is field empty and click
Next. In the Evaluation Options dialog box, select the service to evaluate.
•If you purchased the product on a CD from a shop, you can find the subscription key on the cover of
the Quick Installation Guide.
•If you downloaded the product from the F-Secure eStore, the subscription key is included in the
confirmation e-mail of the purchase order.
Note: Use only the subscription key delivered with the product. You can use the subscription key for
the number of installations your license is for (see the ‘F-Secure License’ note in this guide). If you
have problems in registering, please contact F-Secure Technical Support.
•Automatic installation: The product is installed automatically. Existing security products may be
automatically replaced. The product is installed to the default directory.
•Step by step installation: You can make selections during the installation. You can for example, change
the installation directory. However, we recommend using the default directory.
6. Click Next.
7. After the installation is complete, remove the Installation CD.
8. The computer restarts automatically. To restart immediately, select Restart now.
9. After the restart, the product tries to connect to the Internet to validate your subscription and download
updates. Make sure that you are connected to the Internet. Downloading these major updates may take
some time. When the updates have been downloaded, the protection is up to date. The latest updates
ensure the best protection.
Tip: To learn more about the product, you can access the online help by clicking the Help button in
the product. You can find the online help also on the Installation CD.
Remote installation with Policy Manager is recommended for networks with more than 5 workstations.
If you are not familiar with Policy Manager, refer to the Policy Manager Administrator's Guide included on
www.f-secure.com/webclub.
Note: Policy Manager has two user interfaces; Advanced mode and Anti-virus mode. You should use
Anti-virus mode with Client Security.
Uninstall other antivirus programs
Before you begin installing Client Security, you should remove any other antivirus programs currently installed
on the workstations.
To uninstall other antivirus programs:
1. Select the currently installed programs in the Start ➤ Settings ➤Control Panel ➤ Add/Remove Programs
dialog.
2. Remove any related components.
Some programs may have several related components, which may need to be uninstalled separately. If
you encounter problems, refer to the user documentation for the currently installed antivirus program.
3. Restart your computer.
Install Policy Manager
The steps given here are general guidelines for installing Policy Manager and preparing the domain structure.
1. Install Policy Manager.
2. Create the policy domain structure.
Install Client Security remotely
The following steps are a general guideline for remote installation of Client Security.
1. Use the Autodiscover Windows hosts operation to install Client Security to the workstations.
Policy Manager Console will use a remote installation wizard to configure the Client Security installation.
2. Add new workstations to a suitable policy domain when the installation is complete.
3. Configure the Client Security settings for the workstations.
The domain-level settings are shared by all workstations in the policy domain.
4. Distribute the policies.
The managed workstations will receive the updated policy the next time they connect to the server.
Local installation is recommended if you need to install Client Security locally on a workstation that is otherwise
centrally managed by Policy Manager.
You must have Policy Manager already installed before you can continue with the installation.
Note: When installing Client Security to be managed by Policy Manager, select Central management
with F-Secure Policy Manager when the management selection step is displayed during setup. You
will also be asked to provide the location of the Policy Manager public key (admin.pub, created when
installing Policy Manager Console) and the network address of the Policy Manager Server in use. These
details are required to ensure secure communication with Policy Manager.
Uninstall other antivirus programs
Before you begin installing Client Security, you should remove any other antivirus programs currently installed
on the workstations.
To uninstall other antivirus programs:
1. Select the currently installed programs in the Start ➤ Settings ➤Control Panel ➤ Add/Remove Programs
dialog.
2. Remove any related components.
Some programs may have several related components, which may need to be uninstalled separately. If
you encounter problems, refer to the user documentation for the currently installed antivirus program.
3. Restart your computer.
Installation steps
You need the product CD, a valid subscription key and an Internet connection. If multiple users share and
use the computer, log on with administrator privileges to install this product.
To install the software:
1. Insert the Installation CD.
The installation should start automatically. If it does not, go to Windows Explorer, double-click on the
CD-ROM icon and double-click the setup.exe file to start the installation.
The first installation dialog box appears.
2. Select the installation language and click Next to continue.
3. Read the license agreement. To accept the agreement and to continue, click Accept.
4. Enter your subscription key and click Next to continue.
Note: If you want to evaluate the product, leave the My subscription key is field empty and click
Next. In the Evaluation Options dialog box, select the service to evaluate.
•If you purchased the product on a CD from a shop, you can find the subscription key on the cover of
the Quick Installation Guide.
•If you downloaded the product from the F-Secure eStore, the subscription key is included in the
confirmation e-mail of the purchase order.
Note: Use only the subscription key delivered with the product. You can use the subscription key for
the number of installations your license is for (see the ‘F-Secure License’ note in this guide). If you
have problems in registering, please contact F-Secure Technical Support.
•Automatic installation: The product is installed automatically. Existing security products may be
automatically replaced. The product is installed to the default directory.
•Step by step installation: You can make selections during the installation. You can for example, change
the installation directory. However, we recommend using the default directory.
6. Click Next.
7. After the installation is complete, remove the Installation CD.
8. The computer restarts automatically. To restart immediately, select Restart now.
9. After the restart, the product tries to connect to the Internet to validate your subscription and download
updates. Make sure that you are connected to the Internet. Downloading these major updates may take
some time. When the updates have been downloaded, the protection is up to date. The latest updates
ensure the best protection.
Tip: To learn more about the product, you can access the online help by clicking the Help button in
the product. You can find the online help also on the Installation CD.
Configure the product using Policy Manager
The steps given here are general guidelines for configuring Client Security with Policy Manager.
1. Add new workstations to a suitable policy domain when the installation is complete.
2. Configure the Client Security settings for the workstations.
The domain-level settings are shared by all workstations in the policy domain.
3. Distribute the policies.
The managed workstations will receive the updated policy the next time they connect to the server.
Installing Policy Manager
Chapter
3
Topics:
•
System requirements
•
Product registration
•
Installing the product
•
Remote deployment of other
F-Secure products
This section is a quick reference for installing Policy Manager from the
installation package. The following information is provided:
•System requirements.
•User interface modes.
•Steps for installing Policy Manager components on a single computer.
•Remote deployment of F-Secure products to corporate computers.
This section provides the system requirements for both Policy Manager Server and Policy Manager Console.
Policy Manager Server
In order to install Policy Manager Server, your system must meet the minimum requirements given here.
Microsoft Windows:Operating system:
•Microsoft Windows Server 2003 SP1 or higher
(32-bit); Standard, Enterprise, Web Edition or Small
Business Server editions
•Windows Server 2003 SP1 or higher (64-bit);
Standard or Enterprise editions
•Windows Server 2008 SP1 (32-bit); Standard,
Enterprise or Web Server editions
•Windows Server 2008 SP1 (64-bit); Standard,
Enterprise, Web Server, Small Business Server or
Essential Business Server editions
•Windows Server 2008 R2; Standard, Enterprise or
Web Server editions
Disk space:
P4 2 GHz processor or faster.Processor:
Managing more than 5000 hosts or using Web
Reporting requires P4 3 GHz level processor or faster.
512 MB RAM, 1 GB RAM recommended.Memory:
Managing more than 5000 hosts or using Web
Reporting requires 1 GB RAM.
5 GB of free hard disk space; 8 GB or more is
recommended. The disk space requirements depend
on the size of the installation.
In addition to this it is recommended to allocate about
1 MB per host for alerts and policies. The actual disk
space consumption per host is hard to anticipate, since
it depends on how the policies are used and how many
installation packages are stored.
10 Mbit network.Network:
Managing more than 5000 hosts requires a 100 Mbit
network.
Policy Manager Console
In order to install Policy Manager Console, your system must meet the minimum requirements given here.
You have the option of providing F-Secure with information regarding the use of Policy Manager by registering
your product.
The following questions and answers provide some more information about registering your installation of
Policy Manager. You should also view the F-Secure license terms
(http://www.f-secure.com/en_EMEA/estore/license-terms/) and privacy policy
(http://www.f-secure.com/en_EMEA/privacy.html).
Why does F-Secure collect data?
In order to improve our service, we collect statistical information regarding the use of F-Secure products. To
help F-Secure provide better service and support, you can allow us to link this information to your contact
information. To allow this, please enter the customer number from your license certificate during the installation
of Policy Manager.
What information is sent?
We collect information that cannot be linked to the end user or the use of the computer. The collected
information includes F-Secure product versions, operating system versions, the number of managed hosts
and the number of disconnected hosts. The information is transferred in a secure and encrypted format.
What do I benefit from submitting information to F-Secure?
When you contact our support, we can provide a solution to your problem more quickly based on the information
collected. In addition, with this information we can further develop our product and services to match the
needs of our customers even better.
Where is the information stored and who can access it?
The data is stored in F-Secure's highly secured data center, and only F-Secure's assigned employees can
access the data.
•Select both Policy Manager Server and Policy Manager Console to install both components on the
same machine.
•Select Policy Manager Server if you want to install Policy Manager Console on a separate machine.
2. Choose the destination folder and then click Next.
It is recommended to use the default installation directory. If you want to install the product in a different
directory, you can click Browse and select a new directory.
Note: If you have Management Agent installed on the same machine, this window will not be shown.
3. Enter your customer number and then click Next.
You can find your customer number in the license certificate provided with the product.
4. If setup does not detect any previous installation of Policy Manager, it asks you to confirm if a previous
installation of the product exists:
•If a previous version has been installed, select I have an existing F-Secure Policy Manager
installation. Enter the communication directory path of the installed Policy Manager. The contents of
this directory will be copied under <server installation directory>\commdir\ (communication
directory under the Policy Manager Server installation directory), and this will be the directory that
Policy Manager Server will use as a repository. You can use the previous commdir as a backup, or
you can delete it once you have verified that Policy Manager Server is correctly installed.
•If no previous version has been installed, select I do not have an existing F-Secure Policy Manager.
This will not require an existing commdir, and will create an empty commdir in the default location
(under <F-Secure Policy Manager 5 installation directory>\commdir).
5. Click Next to continue.
6. Click Next to continue.
7. Select the Policy Manager Server modules to enable:
•The Host module is used for communication with the hosts. The default port is 80.
•The Administration module is used for communication with Policy Manager Console. The default
HTTP port is 8080.
Note: If you want to change the default port for communication, you will also need to change the
HTTP Port Number setting in Policy Manager Console.
By default, access to the Administration module is restricted to the local machine. This is the most
secure way to use the product. When using a connection over a network, please consider securing the
communication with F-Secure SSH.
•The Web Reporting module is used for communication with Web Reporting. Select whether it should
be enabled. Web Reporting uses a local socket connection to the Administration module to fetch
server data. The default port is 8081.
By default, access to Web Reporting is allowed also from other computers. If you want to allow access
only from this computer, select Restrict access to the local machine.
8. Click Next to continue.
9. Select the product installation package(s) to install from the list of available packages, then click Next to
1. Run Policy Manager Console by selecting Start ➤ Programs ➤ F-Secure Policy Manager Console ➤
F-Secure Policy Manager Console.
When Policy Manager Console is run for the first time, the Console Setup Wizard collects the information
needed to create an initial connection to the server. The first page of the Policy Manager Console setup
wizard summarizes the installation process.
Policy Manager Console will generate the management key-pair. After the key-pair is generated, Policy
Manager Console will start.
The setup wizard creates the user group FSPM users. The user who was logged in and ran the installer
is automatically added to this group. To allow another user to run Policy Manager you must manually add
this user to the FSPM users user group.
Policy Manager Console starts in Anti-virus mode, which is an optimized user interface for managing Client
Security, Anti-virus for Workstations and Anti-virus for Windows Servers. If you are going to use Policy Manager
Console for managing any other F-Secure product, you should use the Advanced mode user interface. You
can access it by selecting View ➤ Advanced mode from the menu.
When setting up workstations, you must provide them with a copy of the admin.pub key file (or access to
it). If you install the F-Secure products on the workstations remotely with Policy Manager, a copy of the
admin.pub key file is installed automatically on them. However, if you run the setup from a CD, you must
transfer a copy of the admin.pub key file manually to the workstations. The best and most secure method
is to copy the admin.pub file to a diskette and use this diskette for workstation installations. Alternatively,
you can put the admin.pub file in a directory that can be accessed by all hosts that will be installed with
remotely managed F-Secure products.
The steps given here are general guidelines for deploying other F-Secure products with Policy Manager.
Policy Manager can install software to new hosts that are not yet centrally managed. These hosts can be
browsed from Windows NT domains using the Autodiscover Windows hosts feature. The software is then
push installed to the managed hosts.
Policy Manager offers other methods of installing and updating managed applications. Shortcuts to all the
installation-related features are gathered under the Installation tab.
The following steps are used for both the Advanced mode and Anti-virus mode user interface:
1. In Policy Manager, select the policy domain containing the hosts to which you will install.
2. Open the Edit menu and select Autodiscover Windows hosts.
a) From the NT domains list that opens, select one of the domains and click Refresh.
b) Select the hosts to be imported and click Install.
3. Select the installation package for the selected hosts.
4. Select the products to install.
You can choose to force reinstallation if applications with the same version number already exist.
5. Choose to accept the default policy, or specify which host or domain policy should be used as an anonymous
policy.
6. Choose the user account and password used to perform the push installation.
7. Review the installation summary and then click Start to start the remote installation wizard.
Policy Manager will install the selected products on the hosts. The Status line displays when the process
is complete. You can select in which domain the new hosts should be placed using the import settings.
8. Click Finish.
9. When the installation is finished, go to the Status tab to view the list of products that were installed.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.