Troubleshooting with the error log..........................................................................................23
The status report log...............................................................................................................24
4 | F-Secure Policy Manager Proxy | TOC
Introduction
Chapter
1
Topics:
•
System requirements
•
An up-to-date system is a secure
system
•
When should you use F-Secure
Policy Manager Proxy?
This guide provides an overview of the product concepts, a step-by-step
guide to installation as well as other information you need to manage the
product.
6 | F-Secure Policy Manager Proxy | Introduction
System requirements
The system requirements for the product are listed here.
To install F-Secure Policy Manager Proxy, your system must meet the following minimum requirements:
Windows:Operating system:
•Windows Server 2003 SP1 or higher (32-bit);
Standard, Enterprise, Small Business Server or
Web Server editions
•Windows Server 2003 SP1 or higher (64-bit);
Standard or Enterprise editions
•Windows Server 2008 SP1 (32-bit); Standard,
Enterprise, Web Server or Server Core editions
•Windows Server 2008 SP1 (64-bit); Standard,
Enterprise, Web Server, Small Business Server or
Server Core editions
•Windows Server 2008 R2; Standard, Enterprise,
Web Server, Server Core or Foundation editions
Network:
Supported F-Secure software:
Linux:
•Red Hat Linux Enterprise 3 or 4
•Suse Linux 9.x or 10.0
•Suse Linux Enterprise Server 9
•Debian GNU Linux Sarge 3.1
Pentium III 450MHz, 1GHz or faster is recommended.Processor:
To be protected, a workstation must have the latest defence against viruses and other malware that exist on
the Internet.
This guide provides an overview of the product concepts, a step-by-step guide to installation as well as other
information you need to manage the product.
What is the virus definition database?
Information against known viruses, worms and other malware are compiled into the virus definition database.
This virus definition database is regularly made available to all the workstations with F-Secure products
installed. It is this virus definition database that enables F-Secure products to protect a workstation from
viruses and malware.
How do the virus definitions get to F-Secure products?
The figure above is an example of the steps the virus definition database takes to get to F-Secure products,
in this case to F-Secure Client Security. This is the primary path; there are also fallback paths if one or more
of the links is unavailable (for example if the machine running F-Secure Policy Manager has a power cut).
What does F-Secure Policy Manager do?
F-Secure Policy Manager allows you to centrally manage all the F-Secure products in your network. It is the
central monitoring and configuration point for your network. See the F-Secure Policy Manager Administrator's
Guide, available on the F-Secure web site at http://www.f-secure.com for more details.
What does F-Secure Policy Manager Proxy do?
F-Secure Policy Manager Proxy helps deliver the virus definition databases quickly and efficiently.
8 | F-Secure Policy Manager Proxy | Introduction
When should you use F-Secure Policy Manager Proxy?
You do not have to use F-Secure Policy Manager Proxy to update the virus definitions database, but it does
provide certain advantages.
The effects of F-Secure Policy Manager Proxy are most obvious in large, vastly spread networks; for example,
a large corporation with remote offices in different parts of the globe. The following figure is an example of a
situation where F-Secure Policy Manager Proxy is useful:
There are three reasons to use F-Secure Policy Manager Proxy:
•To decrease the use of network bandwidth.
You should use F-Secure Policy Manager Proxy when you have a group of workstations far away from
your Policy Manager Server.
•To decrease the delivery time for virus definition updates.
You should use F-Secure Policy Manager Proxy when you have a group of workstations separated from
your Policy Manager Server by a slow connection, for example a dialup connection.
•To decrease the hardware load on Policy Manager.
You should use F-Secure Policy Manager Proxy if the server hardware running Policy Manager is unable
to cope with the number of requests it receives for virus definition updates.
Loading...
+ 16 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.