F-SECURE POLICY MANAGER PROXY 2.0 - Administrator's Manual

Summary of POLICY MANAGER PROXY 2.0 -

  • Page 1

    F-secure policy manager proxy administrator's guide.

  • Page 3: Contents

    Contents chapter 1: introduction.......................................................................5 system requirements................................................................................................................6 an up-to-date system is a secure system..........................

  • Page 5: Chapter

    Chapter 1 introduction this guide provides an overview of the product concepts, a step-by-step guide to installation as well as other information you need to manage the product. Topics: • system requirements • an up-to-date system is a secure system • when should you use f-secure policy manager prox...

  • Page 6: System Requirements

    System requirements the system requirements for the product are listed here. To install f-secure policy manager proxy, your system must meet the following minimum requirements: windows: operating system: • windows server 2003 sp1 or higher (32-bit); standard, enterprise, small business server or web...

  • Page 7

    An up-to-date system is a secure system to be protected, a workstation must have the latest defence against viruses and other malware that exist on the internet. This guide provides an overview of the product concepts, a step-by-step guide to installation as well as other information you need to man...

  • Page 8

    When should you use f-secure policy manager proxy? You do not have to use f-secure policy manager proxy to update the virus definitions database, but it does provide certain advantages. The effects of f-secure policy manager proxy are most obvious in large, vastly spread networks; for example, a lar...

  • Page 9: Chapter

    Chapter 2 installation there are two methods of installing f-secure policy manager proxy: topics: • locally, for which you will find instructions in this section. • installing the product locally • remotely, for which you will find instructions in the policy manager administrator's guide, which is a...

  • Page 10

    Installing the product locally here you will find steps for installing f-secure policy manager proxy locally. To install the product: 1. Run the setup.Exe file. 2. Click the next button on the first page of the installation wizard. 3. Read through the license agreement and click the i accept this ag...

  • Page 11: Chapter

    Chapter 3 configuration f-secure policy manager proxy is configured remotely through policy manager console. Topics: • configuring the product remotely.

  • Page 12

    Configuring the product remotely you can configure f-secure policy manager proxy remotely in f-secure policy manager console. To configure f-secure policy manager proxy in policy manager console: 1. Select view ➤ advanced mode from the menu. The advanced mode ui opens. 2. Select f-secure policy mana...

  • Page 13: Chapter

    Chapter 4 using the product on linux this section describes how to install and configure f-secure policy manager proxy on linux. Topics: • installing the product • configuring the product • upgrading the product • uninstalling the product • frequently asked questions.

  • Page 14: Installing The Product

    Installing the product this topic describes how to install f-secure policy manager proxy on linux. 1. Log in as root . 2. Open a terminal. 3. Enter the following command to start the installation: • debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2.0._i386.Deb . • rpm-based distrib...

  • Page 15: Configuring The Product

    Configuring the product this topic describes how to configure f-secure policy manager proxy on linux. 1. Configure f-secure policy manager proxy by editing the /opt/etc/f-secure/fspmp/conf/proxy.Cfg file. For example, f you need to configure chained proxies: a) add the host name or ip address of the...

  • Page 16: Upgrading The Product

    Upgrading the product this topic describes how to upgrade f-secure policy manager proxy on linux. 1. Log in as root . 2. Open a terminal. 3. Enter the following command to upgrade the product: • debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2.0._i386.Deb . • rpm-based distributio...

  • Page 17: Uninstalling The Product

    Uninstalling the product this topic describes how to uninstall f-secure policy manager proxy from your linux system. 1. Log in as root . 2. Open a new terminal. 3. Enter the following command to uninstall the product: • debian-based distributions: dpkg -i f-secure-policy-manager-proxy_2.0._i386.Deb ...

  • Page 18: Frequently Asked Questions

    Frequently asked questions here are some answers to frequently asked questions regarding f-secure policy manager proxy on linux. Answer question you can check this by entering the command /etc/init.D/fspmp status . How can i check that f-secure policy manager proxy is running? Enter the command /etc...

  • Page 19: Chapter

    Chapter 5 troubleshooting f-secure policy manager proxy keeps detailed logs of activity and any errors that have occurred. The two time-annotated log files are: topics: • the error log • the error log, which records any errors that have occurred, and • error numbers • the status report log, which is...

  • Page 20: The Error Log

    The error log here you will find information on the error log for f-secure policy manager proxy. The error log file is used to store messages generated by f-secure policy manager proxy. Some of the messages provide information about normal operations (startup, shutdown and daily maintenance, for exa...

  • Page 21

    Files\f-secure\fspmp\data\misc\license.Dat, see errno (reason: 2) if the message was due to an error, it may also include the reason for the error, which can consist of one or both of the following: • if the message reports an error that was a consequence of a previous message (issued by the same th...

  • Page 22: Error Numbers

    Error numbers every error message written to the log contains an error number. This error number uniquely specifies what went wrong. There are two types of errors. Internal error numbers a complete list of all the error numbers is located by default in c:\program files\f-secure\fspmp\doc\log_error_c...

  • Page 23

    Troubleshooting with the error log here you will find some more information on how to use the error log for troubleshooting purposes. Errors in the error log can come from multiple threads; each message in the error log is marked with the number of the thread that generated it. Here are some example...

  • Page 24: The Status Report Log

    The status report log the status report log contains regular summaries of the status of policy manager proxy. Every 10 minutes, policy manager proxy creates a record in the status report log containing the date, time and various counters (packets count, connected clients count, etc.). The status rep...