F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 4
iv
Chapter 3
Introduction to F-Secure Policy Manager Anti-Virus Mode
User Interface
56
3.1
Overview ....................................................................................................................57
3.2
Policy Domains Tab ...................................................................................................58
3.3
Management Tabs .....................................................................................................58
3.3.1 Summary Tab .................................................................................................59
3.3.2 Outbreak Tab..................................................................................................66
3.3.3 Settings Tab ...................................................................................................68
3.3.4 Status Tab ....................................................................................................100
3.3.5 Alerts Tab .....................................................................................................108
3.3.6 Reports Tab..................................................................................................110
3.3.7 Installation Tab .............................................................................................111
3.3.8 Operations Tab.............................................................................................113
3.4
Toolbar .....................................................................................................................114
3.5
Menu Commands.....................................................................................................115
3.6
Settings Inheritance .................................................................................................118
3.6.1 How Settings Inheritance is Displayed on the User Interface.......................120
3.6.2 Locking and Unlocking all Settings on a Page at Once................................121
3.6.3 Settings Inheritance in Tables ......................................................................122
Chapter 4
Setting up the Managed Network
123
4.1
Overview ..................................................................................................................124
4.2
Logging in for the First Time ....................................................................................124
4.2.1 Logging In.....................................................................................................125
4.3
Creating the Domain Structure.................................................................................128
4.3.1 Adding Policy Domains and Subdomains.....................................................130
4.4
Adding Hosts............................................................................................................130
4.4.1 Windows Domains........................................................................................131
4.4.2 Autoregistered Hosts ....................................................................................131
4.4.3 F-Secure Push Installations..........................................................................136
4.4.4 Policy-Based Installation ..............................................................................143
4.4.5 Local Installation and Updates with Pre-Configured Packages....................147
4.5
Local Installation ......................................................................................................152
4.5.1 Local Installation System Requirements ......................................................152