Connection properties..................................................................................................46
Changing communication preferences........................................................................46
Managing domains and hosts.................................................................................................48
Adding policy domains.................................................................................................48
Adding hosts...........................................................................................................................49
Adding hosts in Windows domains..............................................................................49
Importing autoregistered hosts....................................................................................49
Push installations.........................................................................................................51
Policy-based installation..............................................................................................53
Local installation and updates with pre-configured packages.....................................55
Local installation and Policy Manager....................................................................................58
System requirements...................................................................................................58
Uninstall other antivirus programs...............................................................................58
Installation steps..........................................................................................................59
Installing on an infected host..................................................................................................60
Checking that the management connections work.................................................................61
Chapter 5: Configuring virus and spyware protection...................63
Configuring automatic updates...............................................................................................64
How do automatic updates work?................................................................................64
Automatic update settings ...........................................................................................64
Configuring automatic updates from Policy Manager Server......................................64
Configuring Policy Manager Proxy..............................................................................65
Configuring clients to download updates from each other...........................................65
Configuring real-time scanning...............................................................................................67
Real-time scanning settings.........................................................................................67
Enabling real-time scanning for the whole domain......................................................68
Forcing all hosts to use real-time scanning.................................................................69
Excluding Microsoft Outlooks's .pst file from real-time scanning.................................69
Configuring DeepGuard..........................................................................................................70
DeepGuard settings.....................................................................................................70
DeepGuard server queries...........................................................................................70
Configuring rootkit scanning (Blacklight)................................................................................72
Rootkit scanning settings.............................................................................................72
Launching a rootkit scan for the whole domain...........................................................72
Configuring e-mail scanning...................................................................................................73
E-mail scanning settings..............................................................................................73
Enabling e-mail scanning for incoming and outgoing e-mails......................................74
Configuring web traffic (HTTP) scanning................................................................................75
Web traffic scanning settings.......................................................................................75
Enabling web traffic scanning for the whole domain....................................................75
Excluding a web site from HTTP scanning..................................................................75
Configuring spyware scanning................................................................................................77
Spyware control settings..............................................................................................77
4 | F-Secure Client Security | TOC