F-secure POLICY MANAGER PROXY 2.0 ADMINISTRATOR GUIDE

F-Secure Policy Manager Proxy
Administrator's Guide

Contents

Chapter 1: Introduction.......................................................................5
Chapter 2: Installation.........................................................................9
Chapter 3: Configuration...................................................................11
F-Secure Policy Manager Proxy | TOC | 3
System requirements................................................................................................................6
An up-to-date system is a secure system.................................................................................7
When should you use F-Secure Policy Manager Proxy?.........................................................8
Installing the product locally....................................................................................................10
Chapter 4: Using the product on Linux...........................................13
Installing the product...............................................................................................................14
Configuring the product..........................................................................................................15
Upgrading the product............................................................................................................16
Uninstalling the product..........................................................................................................17
Frequently asked questions....................................................................................................18
Chapter 5: Troubleshooting..............................................................19
The error log...........................................................................................................................20
Message structure in the error log...............................................................................20
Message levels............................................................................................................21
Error numbers.........................................................................................................................22
Troubleshooting with the error log..........................................................................................23
4 | F-Secure Policy Manager Proxy | TOC

Introduction

Chapter
1
Topics:
System requirements
An up-to-date system is a secure system
When should you use F-Secure Policy Manager Proxy?
This guide provides an overview of the product concepts, a step-by-step guide to installation as well as other information you need to manage the product.
6 | F-Secure Policy Manager Proxy | Introduction

System requirements

The system requirements for the product are listed here.
To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements:
Windows:Operating system:
Windows Server 2003 SP1 or higher (32-bit); Standard, Enterprise, Small Business Server or Web Server editions
Windows Server 2003 SP1 or higher (64-bit); Standard or Enterprise editions
Windows Server 2008 SP1 (32-bit); Standard, Enterprise, Web Server or Server Core editions
Windows Server 2008 SP1 (64-bit); Standard, Enterprise, Web Server, Small Business Server or Server Core editions
Windows Server 2008 R2; Standard, Enterprise, Web Server, Server Core or Foundation editions
Network:
Supported F-Secure software:
Linux:
Red Hat Linux Enterprise 3 or 4
Suse Linux 9.x or 10.0
Suse Linux Enterprise Server 9
Debian GNU Linux Sarge 3.1
Pentium III 450MHz, 1GHz or faster is recommended.Processor:
256 MB of RAM, 512 MB is recommended.Memory:
500 MB of free hard disk space.Disk space:
10-Mbit connection, 100-Mbit connection recommended.
F-Secure Policy Manager
F-Secure Client Security
F-Secure Anti-Virus for Workstations
F-Secure Anti-Virus for Windows/Citrix Servers
F-Secure Anti-Virus for MS Exchange
F-Secure Linux Security
F-Secure Policy Manager Proxy | Introduction | 7

An up-to-date system is a secure system

To be protected, a workstation must have the latest defence against viruses and other malware that exist on the Internet.
This guide provides an overview of the product concepts, a step-by-step guide to installation as well as other information you need to manage the product.
What is the virus definition database?
Information against known viruses, worms and other malware are compiled into the virus definition database.
This virus definition database is regularly made available to all the workstations with F-Secure products installed. It is this virus definition database that enables F-Secure products to protect a workstation from viruses and malware.
How do the virus definitions get to F-Secure products?
The figure above is an example of the steps the virus definition database takes to get to F-Secure products, in this case to F-Secure Client Security. This is the primary path; there are also fallback paths if one or more of the links is unavailable (for example if the machine running F-Secure Policy Manager has a power cut).
What does F-Secure Policy Manager do?
F-Secure Policy Manager allows you to centrally manage all the F-Secure products in your network. It is the central monitoring and configuration point for your network. See the F-Secure Policy Manager Administrator's Guide, available on the F-Secure web site at http://www.f-secure.com for more details.
What does F-Secure Policy Manager Proxy do?
F-Secure Policy Manager Proxy helps deliver the virus definition databases quickly and efficiently.
8 | F-Secure Policy Manager Proxy | Introduction

When should you use F-Secure Policy Manager Proxy?

You do not have to use F-Secure Policy Manager Proxy to update the virus definitions database, but it does provide certain advantages.
The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example, a large corporation with remote offices in different parts of the globe. The following figure is an example of a situation where F-Secure Policy Manager Proxy is useful:
There are three reasons to use F-Secure Policy Manager Proxy:
To decrease the use of network bandwidth.
You should use F-Secure Policy Manager Proxy when you have a group of workstations far away from your Policy Manager Server.
To decrease the delivery time for virus definition updates.
You should use F-Secure Policy Manager Proxy when you have a group of workstations separated from your Policy Manager Server by a slow connection, for example a dialup connection.
To decrease the hardware load on Policy Manager.
You should use F-Secure Policy Manager Proxy if the server hardware running Policy Manager is unable to cope with the number of requests it receives for virus definition updates.
Loading...
+ 16 hidden pages