Computer Security ProAdministrator'sGuide
F-SecurePSBAdministrator'sGuide |TOC|3
Contents
Chapter1:Introduction...... 5
Chapter2:GettingStarted...... 7
Creatinganewaccount...... 8
DownloadingSoftware...... 9
Recoveringyourpassword...... 10
Addinganewsubscriptionkeyforyourcompany...... 10
Chapter3:InstallingComputer Security Pro - Workstation...... 11
System requirements...... 12
Computer Security Pro - Workstationlocalinstallation...... 13
Computer Security Pro - Workstation remote installation...... 14
Chapter4:InstallingComputer Security Pro - Server...... 17
Systemrequirements...... 18
Computer Security Pro - Serverinstallation...... 18
Chapter5:InstallingComputer Security Pro - Email and Server...21
Systemrequirements...... 22
Beforeinstallingtheproduct...... 24
Computer Security Pro - Email and Serverinstallation...... 24
Chapter6:InstallingComputer Security Pro - Linux...... 27
System requirements...... 28
Chapter7:InstallingMobile Security Pro...... 29
Installationonthedevice...... 30
Activating...... 30
TakingAnti-Theftintouse...... 31
TurningonremoteAnti-Theft...... 31
Chapter8:Upgrade...... 33
UpgradingfromPolicyManager...... 34
Upgradingtothelatestversion...... 36
Chapter9:Administeringtheproduct...... 37
Checkingthesystemstatus...... 38
Ismynetworkprotected?...... 38
Checkingthestatusof agroupof devices...... 40
Checkingthestatusofcomputers...... 41
Checkingthestatusof aworkstationoraserver...... 42
Keepingcomputersinthenetworksafe...... 42
GetupdatesbyRSS...... 42
Managingproductsettings...... 43
Managingtheworkstationsettingslocally...... 43
Managingtheserversettingslocally...... 44
Managingtheproductsettingsremotely...... 44
Managingprofiles...... 45
Creatingaprofile...... 45
Editingaprofile...... 46
Deletingaprofile...... 46
Changingprofilenameordescription...... 47
Settingadefaultprofile...... 47
Resettingdefaultprofiles...... 48
Managingsoftware updates...... 48
Installingsoftwareupdatesautomatically...... 48
Checkingsoftwareupdatestatusforaspecificcomputer...... 48
Checkingthestatusofsoftwareupdatesinyournetwork...... 49
Managingmobiledevices...... 50
Checkingthestatusofmobiledevices...... 50
Addinganewmobiledevice...... 50
Searchingformobiledevices...... 51
Viewingmobiledevicedetails...... 51
Editinguserinformation...... 51
Removingamobiledevice...... 52
Anti-theftmanagement...... 52
Chapter10:Troubleshooting...... 53
Frequentlyaskedquestions...... 54
Thisguideisdividedintochaptersthatgiveyougeneralinformationabout
Computer Security Prosoftware,its deploymentand installation.
This guide contains instructionshow toinstall and administerCentralized Management Consoleand Computer Security Prosoftware.
Topics:
•Creating a new account
•Downloading Software
•Recovering your password
•Addinganewsubscriptionkeyfor your company
ThischapterexplainshowtogetstartedwiththeComputer Security Prosoftware.
Inthis chapter,you find instructionshow tocreate a new account tolog intotheCentralized Management Console,andtodownloadandinstalltheComputer Security Prosoftware.
Youneed tocreate a new account tolog into the Centralized Management Console.
Youcanonlycreateacompany-levelaccountfromtheCentralized Management Consoleloginpage.Ifyouneedadifferent type ofaccount,contactF-Secure.
Tocreate a new account:
Note: Ifyou have created an account,forexample, forComputer Security Pro - Server,do notcreate a new company account,but add a new subscriptiontothe existing account.
1. Inyour browser,go tothe URL thatwas provided toyou togetherwith the subscriptionkey.
YoureceivedtheURLandthesubscriptionkey,forexamplebye-mail,whenyoupurchasedtheproduct. The F-SecureProtectionService login page opens.
2. Click the Create youraccountlink.
The Create account page opens.
3. Enterthe required information:
•Inthe Subscriptionkey field,enter the subscriptionkey thatyou received, forexample by e-mail, when you purchased the product.
•Inthe Accountname field,enter the name ofthe company.
Computer Security ProAdministrator'sGuide |GettingStarted|9
•IntheUsernamefield,enterthee-mailaddressoftheuser.Thee-mailaddressisusedasyourlogin name.
•Inthe Passwordand ConfirmPasswordfields,you mustenter exactly the same passwords.
•Inthe E-mailfield,enter your e-mail address.
4. Click Create youraccount.
Youwill receive an e-mail message thatshows your account information.
5. Click Back tothe loginpage.
The F-SecureProtectionService login page opens.
6. Log in tothe Centralized Management Console.
DownloadingSoftware
YoucandownloadtheComputer Security ProWorkstationSecurity,F-SecureServerSecurity,Computer Security Pro - Email and Server,or Mobile Security Prosoftwarethrough the Centralized Management Console.
Todownload the software:
1. Log in tothe Centralized Management Console.
Enterthe user name and password, which you selected when you created your account. The Protectionstatuspage ofthe new account opens.
2. Click the Downloadsoftwarelink atthe top ofthe page.
The Download softwarepage opens.
3. Inthe Download softwarepage, click the link forthe softwareyou want todownload.
Ifyou have forgottenyour password, you can recover it through the Forgotyourpasswordlink. Torecover your password:
1. Onthe log in page ofthe Centralized Management Console,click Forgotyourpassword?link.
2. Enteryour user name, and click Submit.
Ane-mailmessageissenttothee-mailaddressthatyouprovidedwhenyoucreatedtheaccount.Thee-mail message contains a link tothe Centralized Management Consolewhere you can change your password.
Addinga newsubscriptionkey for yourcompany
Byadding a new subscriptionkey foryour company,you can add more computers tothe portal
Toadd a new subscriptionkey:
1. Click the Subscriptionstab.
The Subscriptionspage opens.
2. Click Adda newsubscriptionkey.
3. Enterthe new subscriptionkey you have purchased, and click Add.
The new subscriptionkey is added toyour company account.
Chapter
3
InstallingComputer Security Pro - Workstation
Topics:
•Systemrequirements
•Computer Security ProWorkstation
Securitylocal installation
•Computer Security ProWorkstation
Securityremote installation
Systemrequirementsand installationinstructionsforPSBWorkstation
Security.
This section describes the systemrequirementsforinstallingand using the product,and gives you instructionson how toinstall the product.
System requirements
Read the followingbefore startingtoinstall and use F-SecureWorkstationSecurity.
Yourcomputer mustmeet the followingminimum requirementsforinstallingand using the product:
Operatingsystemversion:
Processor: Memory: Display: Disk space:
Internetconnection:
MicrosoftWindows XP(32-bit).service pack 2 or newer:
•Home, Professionaland Media Center editions
MicrosoftWindows 7 and Vista(32- and 64-bits).All service packs:
•Starter
•Home Basic
•Home Premium
•Business
•Ultimate
•Enterprise
Windows 8 32-bit and 64-bit
For MicrosoftWindows XP:
•IntelPentiumIII1 GHz or higher
MicrosoftWindows 7 and Vista:
•IntelPentium4 2 GHz or higher
For MicrosoftWindows XP:
•512 MB
For MicrosoftWindows 7 and Vista:
•1 GB
For MicrosoftWindows XP:
•8-bit (256 colors)
For MicrosoftWindows 7 and Vista:
•16-bit or more (65000 colors)
For MicrosoftWindows XP:
•800MB free HD space
For MicrosoftWindows 7 and Vista:
•800MB free HD space
An Internetconnectionis required in order tovalidate your subscriptionand receive updates.
Browser:
For MicrosoftWindows XP:
•InternetExplorer 5.0 or newer is required.
For MicrosoftWindows 7 and Vista:
•InternetExplorer 7.0 or newer is required
Supportedbrowsers forusing the Centralized Management Console:
•InternetExplorer 6.xor newer is required. JavaScriptand cookies must be enabled in the browser
•Firefox2.xornewerisrequired.JavaScriptandcookiesmustbeenabled in the browser
Note: Touse ProfileEditor,you need tohave Java Runtime
Environment1.6 or newer installedon your computer.
Computer Security Pro - Workstationlocalinstallation
This section describes how tolocally install Computer Security Pro - Workstation. Toinstall the program:
1. Locate the downloaded file and double-click the.exefile tostartthe installation.
2. Selectthe installationlanguage,and click Next tocontinue.
3. Read the license agreement.Toaccept the agreement and tocontinue,click Accept.
4. Enteryour subscriptionkey and click Next.
Youmustenter the same subscriptionkey thatyou used when you created the account.
5. Selectthe installationtype,and click Next:
•Automaticinstallation:The product is installedautomatically.Existingsecurity products may be automaticallyreplaced. The product is installedtothe defaultdirectory.
•Stepbystepinstallation:Duringtheinstallation,youcanchangetheinstallationdirectory.However, we recommend using the defaultdirectory.
6. Whentheinstallationiscomplete,thecomputerrestartsautomaticallyafterawhile.Torestartimmediately, click Restart.
Afterthe installation,log into the Portaltoverify thatthe computer shows in the Portal.
Note: Inthe Protectionstatuspage, you may see a green statusicon with the text"Waitingfor connection."Itmay take up totwo hours before the connectionis established.Ifthe computer has not
yetreceived the latestupdates,you may see either a yellow or a red statusicon. For more details on the computer(s),click the Computerstab toopen the Computers page.
Computer Security Pro - Workstationremote installation
This section explains how toremotely install Computer Security Pro - Workstation.
Beforeyou startthe remote installation,make sure thatthe domain controllerexists and thatthe computers onwhichyouwanttoinstallthesoftwarebelongtoadomain.Tobeabletoremotelyinstallthesoftware,you musthave domain administratorrights.
Toinstall the software:
1. Log in tothe Centralized Management Console.
Enterthe user name and password, which you selected when you created your account. The Protectionstatuspage ofthe new account opens.
2. Click the Downloadsoftwarelink atthe top ofthe page.
The Download softwarepage opens.
3. Inthe Download softwarepage, click the Downloadthe Remote InstallationToollink. Ifyou have not downloaded the workstationsoftwareyet,click also theDownloadthe workstationsoftwarelink.
4. Extractthe Remote InstallationToolzip file on a local drive.
5. Double-click the ritool.batfile.
The F-SecureRemote InstallationToolwindow opens.
6. Inthe SoftwaretoInstallpage, click .
The SoftwareInstallerSelectionwindow opens.
7. Locate the downloaded workstationsoftwarefile and click OK.
8. Click Next.
9. Inthe TargetComputers page, do the following:
a)Under DomainName,select the domain towhich the computers belong.
b)Under ComputerName,select the computers on which you want toremote install the software.
10.Click Next.
11.Inthe Accountpage, do the following:
a)SelectAnotheraccount.
b)Enterthe domain administratorname and password. c) Confirm the password.
12.Click Next.
13.Click Install.
The workstationsoftwareis being installedon the selected computers. Inthe Centralized Management Console,verify thatthe computer shows in the portal.
Chapter
4
InstallingComputer Security Pro - Server
Topics:
•Systemrequirements
•Computer Security Pro - Server installation
Systemrequirementsand installationinstructionsforComputer Security Pro - Server.
Thischapterdescribesthesystemrequirementsforinstallingandusing theproduct,andgivesyoustep-by-stepinstructionsonhowtoinstallthe product.
Read the followingbefore startingtoinstall and use the Computer Security Pro - Serversoftware. Yourcomputer mustmeet the followingrequirementsforinstallingand using the product:
OperatingSystem:
Processor: Memory:
Disk space toinstall:
Disk space forprocessing: InternetConnection:
Windows Server 2003 (32-bit and 64-bit) Windows Server 2008 (32-bit and 64-bit) Windows Server 2008 R2
Small Business Server 2003
Small Business Server 2008
IntelPentium4,2GHz or higher
1 GBofRAM
260 MB free hard disk space
10 GBor more free hard disk space
An Internetconnectionis required tovalidate your subscriptionand receive updates.
Computer Security Pro - Serverinstallation
Installthe softwareon a computer and afterthe installationverify thatthe computer shows in the portal. Toinstall the software:
1. Locate the downloaded file and double-click the .exefile tostartthe installation.
2. Selectthe installationlanguage,and click Next tocontinue.
3. Read the license agreement.Toaccept the agreement and tocontinue,click Accept.
4. Enteryour subscriptionkey and click Next.
Youmustenter the same subscriptionkey thatyou used when you created the account.
Computer Security ProAdministrator'sGuide |InstallingComputer Security Pro - Server|19
5. Selectthe installationtype,and click Next:
•Automaticinstallation:The product is installedautomatically.Existingsecurity products may be automaticallyreplaced. The product is installedtothe defaultdirectory.
•Stepbystepinstallation:Duringtheinstallation,youcanchangetheinstallationdirectory.However, we recommend using the defaultdirectory.
6. When the installationis complete,click Finish.
Chapter
5
InstallingComputer Security Pro - Email and Server
Topics:
•Systemrequirements
•Beforeinstallingthe product
•Computer Security ProE-mailandServer
Securityinstallation
Systemrequirementsand installationinstructionsforComputer Security Pro - Email and Server.
Thischapterdescribesthesystemrequirementsforinstallingandusing theproduct,andgivesyoustep-by-stepinstructionsonhowtoinstallthe product.
System requirements
Read the followingbefore installingComputer Security Pro - Email and Server.
Based on the MicrosoftExchange Server version, your computer mustmeet the followingrequirementsfor installingand using the product.
MicrosoftExchangeServer 2003
Toinstall Computer Security Pro - Email and Serveron MicrosoftExchange Server 2003, the following minimum hardware and systemrequirementsare recommended:
OperatingSystem:
Processor: Memory:
Disk space toinstall:
Disk space forprocessing:
Microsoft®Windows Server 2003, StandardEditionwith the latestservice pack
Microsoft®Windows Server 2003, EnterpriseEditionwith the latestservice pack
Microsoft®Windows Server 2003 R2, StandardEdition Microsoft®Windows Server 2003 R2, EnterpriseEdition Microsoft®Small Business Server 2003
Microsoft®Small Business Server 2003 R2
32-bit processor: IntelPentium4 or compatible2GHz or faster
1 GBofRAM
500 MB free hard disk space
10 GBor more free hard disk space
Microsoft®Exchange Server 2003 with the latestservice pack
MicrosoftExchange Server:Note: Clusters are not supported.
InternetConnection:
An Internetconnectionis required tovalidate your subscriptionand receive updates.
MicrosoftExchangeServer 2007
Toinstall Computer Security Pro - Email and Serveron MicrosoftExchange Server 2007, the following minimum hardware and systemrequirementsare recommended:
OperatingSystem:
Processor:
Microsoft®WindowsServer2003,Standardx64Editionwiththelatestservice pack
Microsoft®WindowsServer2003,Enterprisex64Editionwiththelatestservice pack
Microsoft®Windows Server 2003 R2, Standardx64 Edition Microsoft®Windows Server 2003 R2, Enterprisex64 Edition Microsoft®Windows Server 2008, StandardEdition Microsoft®Windows Server 2008, EnterpriseEdition Microsoft®Small Business Server 2008
Intelx64 processor with ExtendedMemory 64 Technology(EM64T)
Memory:
Disk space toinstall:
Disk space forprocessing:
AMD processor thatsupports the AMD64 platform
2 GBofRAM
500 MB free hard disk space
10 GBor more free hard disk space
MicrosoftExchange Server:
Microsoft®ExchangeServer2007(64-bitversion)withthelatestservicepack
Microsoft®Small Business Server 2008
Note:The32-bitevaluationversionofMicrosoftExchangeServer2007 is not supported.
InternetConnection:
An Internetconnectionis required tovalidate your subscriptionand receive updates.
Computer Security Pro - Email and Serversupports the followingroles ofMicrosoftExchange Server 2007:
•Edge Server role
•Hub Server role
•Mailbox Server role
•Combo Server (Mailbox Server and Hub Server roles)
Note: Clusters are not supported.
MicrosoftExchangeServer 2010
Toinstall Computer Security Pro - Email and Serveron MicrosoftExchange Server 2010, the following minimum hardware and systemrequirementsare recommended:
OperatingSystem:
Processor: Memory:
Disk space toinstall:
Disk space forprocessing: MicrosoftExchange Server:
InternetConnection:
Microsoft®Windows Server 2008, StandardEdition Microsoft®Windows Server 2008, EnterpriseEdition Microsoft®Windows Server 2008 R2, StandardEdition Microsoft®Windows Server 2008 R2, EnterpriseEdition
Intelx64 processor with ExtendedMemory 64 Technology(EM64T) AMD processor thatsupports the AMD64 platform
4 GBofRAM
500 MB free hard disk space
10 GBor more free hard disk space
Microsoft®Exchange Server 2010
An Internetconnectionis required tovalidate your subscriptionand receive updates.
Computer Security Pro - Email and Serversupports the followingroles ofMicrosoftExchange Server 2010:
•Edge Server role
•Hub Server role
•Mailbox Server role
•Combo Server (Mailbox Server and Hub Server roles)
Note: Clusters are not supported.
SQLServer requirements
The product requires Microsoft®SQLServer forthe quarantinemanagement.The followingversions of
MicrosoftSQLServer are recommended touse:
•MicrosoftSQLServer 2000 (Enterprise,Standardor WorkgroupEdition)with Service Pack 4
•MicrosoftSQLServer 2000 Desktop Engine (MSDE)with Service Pack 4
•MicrosoftSQLServer 2005 (Enterprise,Standard,Workgroupor Express Edition)with the latestservice pack
•MicrosoftSQLServer 2008 (Enterprise,Standard,Workgroupor Express Edition)
Important:Wedo not recommend using MSDEor MicrosoftSQLServer 2005/2008Express Edition if you are planning touse the centralizedquarantinemanagementor if your organizationsends and
receives a large amount ofe-mails.
Note: Youmustinstall a MicrosoftSQLServer with Mixed Mode authenticationbefore you install the
Computer Security Pro - Email and Serversoftware.Toinstall MicrosoftSQLServer 2005, refer to
.
Before installingthe product
Beforeyou install the Computer Security Pro - Email and Serversoftware,you mustinstall MicrosoftSQL Server.
BeforeinstallingtheComputer Security Pro - Email and Serversoftware,makesurethatyouknowthefollowing:
•the password forthe 'sa'account on the MicrosoftSQLServer,and
•thecorrectinstancenamethatwillbeusedforthequarantine,ifyouhavemultipleinstancesofMicrosoft
SQLServer installedon the same server.
Computer Security Pro - Email and Serverinstallation
Installthe softwareon a computer and afterthe installationverify thatthe databases have been updated. YoumustinstallaMicrosoftSQLServerorMicrosoftSQLServerDesktopEngine(MSDE)withMixedMode
authenticationbeforeyou installtheComputer Security Pro - Email and Serversoftware.ToinstallMicrosoft
SQLServer 2005, refer to. Toinstall the software:
1. Locate the downloaded file and double-click the .exefile tostartthe installation.
2. Selectthe installationlanguage,and click Next tocontinue.
IfyouareinstallingF-SecureAnti-VirusforMicrosoftExchange,selectEnglishastheinstallationlanguage.
3. Read the license agreement.Toaccept the agreement and tocontinue,click Accept.
4. Enteryour subscriptionkey and click Next.
Youmustenter the same subscriptionkey thatyou used when you created the account.
5. Selectthe installationtype,and click Next:
•Automaticinstallation:The product is installedautomatically.Existingsecurity products may be automaticallyreplaced. The product is installedtothe defaultdirectory.
•Stepbystepinstallation:Duringtheinstallation,youcanchangetheinstallationdirectory.However, we recommend using the defaultdirectory.
6. Inthe SQLServer details page, enter the name ofa local or remote SQLserver instance.
Note: Tofind your HOSTNAME,type ipconfig /allata command prompt .The server name is displayed in the command prompt window as "HostName".Youcan also use an IPaddress or
Fully QualifiedDomain Name instead ofhostname.
Note: Tofind your INSTANCE,click Start AllProgramsAdministrativeToolsServices.
ThenfindtheSQLServer(INSTANCENAME)service.Theinstancename is displayedin brackets.
Ifyou find multipleinstance names, select the one thatyou want touse.
7. Enteryour SAuser password.
Note: Ifyou are not sure thatyou remember your correct SApassword, or if the installationfails because ofan SQLserver error,refer tothe Troubleshootingsection.
8. Click Next.
9. When the installationis complete,click Finish.
10.Aftertheinstallation,opentheF-SecureWebConsoleandcheckthatthedatabaseshavebeenupdated:
a)SelectProgramsF-SecureAnti-VirusforMicrosoftExchangeF-SecureAnti-VirusforMicrosoft
ExchangeWebConsole.
b)Inthe AutomaticUpdateAgenttab,in the Summarypage, check thatthe last check result shows thatthere is nothing new available.
c) Under Summary,click Downloadsand check thatthe AvailablePackageslist shows atleast one update with a recent date on it.
11.Inthe Home tab,check thateach component has a green statusicon.
12.Next,configure F-SecureAnti-Virus forMicrosoftExchange.See the AdministrationWithWebConsole
chapter in F-SecureAnti-Virus forMicrosoftExchange Administrator'sGuide fordetailedinstructions.
Topics:
•Systemrequirements
Systemrequirementsand installationinstructionsforLinux Security.
This section describes the systemrequirementsforinstallingand using the product.Detailedinstructionson how toinstall the product are availableintheLinuxSecuritydocumentation,whichyoucanfindonthe F-Secureweb site
().
System requirements
Read the followingbefore startingtoinstall and use Computer Security Pro - Linux.
Yourcomputer mustmeet the followingminimum requirementsforinstallingand using the product:
Operatingsystemversion:
Youcan see the list ofsupported distributionsin the release notes ofthe product,which are available on the F-Secureweb site
().
Processor:
IntelP6 (686) or compatibleor higher
Memory:
Disk space:
Full installation:
•1024 MB RAM or more
Command-line only:
•512 MB RAM (1024 MB recommended)
Note: Having sufficientswap memory is highly recommended.
3 GB
Required components:•Linux kernel 2.6 or later
•Glibc 2.3.4or later
•32-bit compatibilitylibraries on 64-bit distributions
Browser:
Supportedbrowsers forthe WebUser Interface:
•InternetExplorer 6 or 7
•Firefox2.xor newer
Note aboutDazukoversion
TheproductneedstheDazukokernelmoduleforthereal-timevirusprotection,integritycheckingandrootkit protection.Dazuko is an open-source kernel module thatprovides an interfaceforthe file access control. More informationis at.
The product installs the Dazuko driver during the product installation.
TheproducthasbeentestedextensivelywiththeDazukoversionthatisincludedwiththeproduct.Operation with other Dazuko versions or versions provided by Linux distributionsis not supported or recommended.
Topics:
•Installationon the device
•Activating
•TakingAnti-Theftinto use
•Turningon remote Anti-Theft
InstallationinstructionsforPSBMobile Security.
This section gives you instructionson how toinstall the product.
Installationonthe device
Instructionshow toinstall the product directly on the device
Note: Youshould receive an SMSthatcontains links fordownloading and activatingthe software.Ifyou have a valid PSBMobile Securitysubscriptionbut have not received the activationSMS,contact
your administrator.
Youneed tohave the installationfile on your device tostartthe installation.Eitherdownload the installation file toyour computer and move it tothe device, or download the installationdirectly toyour device.
Follow these instructionstoinstall the product using your mobile device.
1. Open SettingsApplicationand check thatUnknownsourcesis turned on.
Skip this step if you are not using an Android device.
When this settingis turned on, you can install applicationsoutside the Android Market.
2. Ifyou downloaded the installationfile directly,the installationstartsautomatically.Otherwise,find and open the installationfile thatyou moved tothe device.
3. Follow the on-screen instructionstoinstall the product.
4. When the installationis ready,restartyour device if the installationasks you todo so.
Aftertheinstallation,you need toactivatetheproduct.Theproductdoes notprotectyour device ifyou have not activatedit.
Activating