EasyManuals Logo

F-SECURE LINUX SECURITY User Manual

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #3 background imageLoading...
Page #3 background image
Table of Contents
Chapter 1: Welcome ...........................................................................7
How the Product Works ...........................................................................................................8
Protection Against Malware ..........................................................................................8
Host Intrusion Prevention System .................................................................................8
Key Features and Benefits ......................................................................................................9
Superior Protection against Viruses and Worms ..........................................................9
Transparent to End-users ...........................................................................................10
Protection of Critical System Files ..............................................................................10
Easy to Deploy and Administer ...................................................................................10
Extensive Alerting Options ..........................................................................................10
Chapter 2: Deployment ....................................................................11
Deployment on Multiple Stand-alone Linux Workstations .....................................................12
Deployment on Multiple Centrally Managed Linux Workstations ..........................................12
Central Deployment Using Image Files .................................................................................12
Chapter 3: Installation .....................................................................15
System Requirements ...........................................................................................................16
List of Used System Resources ..................................................................................17
Stand-alone Installation .........................................................................................................19
Centrally Managed Installation ..............................................................................................20
Upgrading...............................................................................................................................21
Upgrading from a Previous Product Version ...............................................................21
Upgrading the Evaluation Version ..............................................................................22
Custom Installations...............................................................................................................23
Preparing for Custom Installation.................................................................................23
Unattended Installation ...............................................................................................23
F-Secure Linux Security | TOC | 3

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the F-SECURE LINUX SECURITY and is the answer not in the manual?

F-SECURE LINUX SECURITY Specifications

General IconGeneral
BrandF-SECURE
ModelLINUX SECURITY
CategorySoftware
LanguageEnglish

Related product manuals