EasyManua.ls Logo

F-SECURE LINUX SECURITY - Default Chapter; Table of Contents

F-SECURE LINUX SECURITY
219 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
Chapter 1: Welcome ...........................................................................7
How the Product Works ...........................................................................................................8
Protection Against Malware ..........................................................................................8
Host Intrusion Prevention System .................................................................................8
Key Features and Benefits ......................................................................................................9
Superior Protection against Viruses and Worms ..........................................................9
Transparent to End-users ...........................................................................................10
Protection of Critical System Files ..............................................................................10
Easy to Deploy and Administer ...................................................................................10
Extensive Alerting Options ..........................................................................................10
Chapter 2: Deployment ....................................................................11
Deployment on Multiple Stand-alone Linux Workstations .....................................................12
Deployment on Multiple Centrally Managed Linux Workstations ..........................................12
Central Deployment Using Image Files .................................................................................12
Chapter 3: Installation .....................................................................15
System Requirements ...........................................................................................................16
List of Used System Resources ..................................................................................17
Stand-alone Installation .........................................................................................................19
Centrally Managed Installation ..............................................................................................20
Upgrading...............................................................................................................................21
Upgrading from a Previous Product Version ...............................................................21
Upgrading the Evaluation Version ..............................................................................22
Custom Installations...............................................................................................................23
Preparing for Custom Installation.................................................................................23
Unattended Installation ...............................................................................................23
F-Secure Linux Security | TOC | 3

Table of Contents

Related product manuals