EasyManua.ls Logo

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY - Default Chapter; Table of Contents

F-SECURE ANTI-VIRUS LINUX SERVER SECURITY
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
1
Contents
Chapter 1 Introduction 5
1.1 Welcome ......................................................................................................................6
1.2 How the Product Works ...............................................................................................6
1.3 Key Features and Benefits...........................................................................................9
1.4 F-Secure Anti-Virus Server and Gateway Products...................................................11
Chapter 2 Deployment 13
2.1 Deployment on Multiple Stand-alone Linux Workstations..........................................14
2.2 Deployment on Multiple Centrally Managed Linux Workstations...............................14
2.3 Central Deployment Using Image Files......................................................................15
Chapter 3 Installation 16
3.1 System Requirements................................................................................................17
3.2 Installation Instructions...............................................................................................18
3.2.1 Stand-alone Installation..................................................................................19
3.2.2 Centrally Managed Installation .......................................................................21
3.3 Upgrading from a Previous Product Version..............................................................24
3.4 Upgrading the Evaluation Version..............................................................................25
3.5 Replicating Software Using Image Files ....................................................................26
3.6 Preparing for Custom Installation...............................................................................26
3.7 Unattended Installation ..............................................................................................27
3.8 Installing Command Line Scanner Only.....................................................................28
3.9 Creating a Backup......................................................................................................29

Table of Contents

Related product manuals