0
(0)

Copyright © 1997-2018 F-Secure Corporation. All rights reserved.

‘F-Secure’ and F -logo are wp-signup.phped trademarks of F-Secure Corporation. F-Secure product and technology names and F-Secure logos are either trademarks or wp-signup.phped trademarks of F-Secure Corporation. Other product names and logos referenced herein are trademarks or wp-signup.phped trademarks of their respective companies.

This product may be covered by one or more F-Secure patents, including the following:
GB2353372, GB2366691, GB2366692, GB2366693, GB2367933, GB2368233

Portions Copyright © 2004 BackWeb Technologies Inc.

This product includes Java™ Runtime Environment (JRE).
Copyright © 1993, 2018, Oracle and/or its affiliates.

This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
Copyright © 2010 The Apache Software Foundation.

This product includes software developed by the Eclipse Foundation (http://www.eclipse.org/).
Copyright © 2010 The Eclipse Foundation.

This product includes H2 Database developed by H2 Group (http://www.h2database.com).

This product includes software developed by INRIA, France Telecom.
Copyright © 2000-2005 INRIA, France Telecom. All rights reserved.

This product includes SLF4J software developed by QOS.ch.
Copyright © 2004-2008 QOS.ch.

The license terms for third-party open source components are linked or in full below in this document.

General

This document contains the latest information about the F-Secure Policy Manager 14.01 release. We recommend that you read the entire document before installing the product.

What’s new in this version

This section describes the new features, enhancements and most important issues that have been solved since the previous release.

Fixed issues compared to version 14.00
  • Exporting Client Security MSI package from the Console does not require local administrator rights.
  • Subdomain administrators can export installation packages and start policy-based upgrades.
  • Active Directory rules and user authentication might fail due to LDAPS certificate validation issues.
  • Device control generates alerts when blocking devices
    • The alerts now contain the name of the currently logged-in user if available, or ‘System’ otherwise.
    • Device Control block alert’s severity is not configurable; Security type is always applied.
  • The Console’s Policy and Inheritance reports now contain all policy settings.
  • Trailing backslashes are not added for real-time folder exclusions ending with the wildcard.
  • Firewall rules are properly deleted and edited when custom sorting is applied.
  • Web Reporting table sorting works in localized versions.
  • The Web traffic scanning > Trusted sites table is marked with the ‘CS13.x hosts only’ tag. 14.x clients’ trusted sites for Web traffic scanning are combined with the Web Content Control > Trusted sites configuration.
New features and improvements
  • New Dashboard
    • The new Dashboard view highlights the overall Server health, status of main features, hosts in the managed environment, and network activity.
    • Server-related sections do not depend on selection in the policy domain tree and are shown only for admins who have full access rights.
    • The links representing data flows in the environment are animated and highlight potential networking issues, e.g. long inactivity from managed hosts and heavy traffic.
    • Host issues that require the administrator’s attention are listed at the bottom of the Dashboard. The administrator can choose which issues to see and what severity to assign. Discovered issues are analyzed for a possible resolution, which is suggested for each affected host.
    • Important Server events are shown on the Dashboard and can be searched to monitor server activities and to investigate issues.
  • Support for Client Security 14
    • Client Security 14.00 introduces significant changes in the architecture, which include communication with Policy Manager. This includes changes in all data formats, incremental status from the endpoints, the new set of alerts, and server notifications when policies change.
    • The new Firewall and Application control features are managed only from the Standard view.
    • Client Security Standard and Premium editions are now distributed as a single JAR file that contains both editions. The product edition is selected when you configure the package with Remote Installation Wizards based on the entered keycode. Keycodes are validated at this stage. The product edition defines the set of features to install. The full feature set for the edition is always installed and can be disabled using policies if necessary.
    • Trial keycodes are no longer needed for evaluating the product. The evaluation logic is enforced on the Policy Manager side, which blocks centralized configuration from the Console after the evaluation period expires. Remote Installation Wizards detect when Policy Manager runs in evaluation mode and do not ask for a keycode in this case.
    • Communication settings are now taken from the predefined policies if included in the package.
    • The Restart options page was previously hidden when exporting an MSI package, because MSI installation always restarted the computer. Now the Restart options page is shown.
    • It is now possible to turn off sidegrade completely when configuring the Client Security installer.
    • The Offload scanning agent is now activated using the policies included in the installation package instead of selecting the corresponding feature in the Remote Installation Wizard. Also, the agent can be activated at any time from the Console > Settings > Real-time scanning > Virtualization support policies instead of reinstalling the product.
  • Support for the new firewall engine
    • F-Secure firewall is replaced with the Windows firewall engine. It is automatically turned on after installing Client Security 14.00, unless explicitly disabled in the policies.
    • Centralized configuration experience remains unchanged as much as possible. The main difference in the configuration logic is the introduction of profiles, which compared to Security levels do not use a policy inheritance model but use a copy-on-modify approach instead. In addition to a set of firewall rules, the profiles contain a number of related settings.
    • Network services list is now treated as a global dictionary, which is the same for all Policy Manager administrators.
    • Internet Shield’s Application control feature is no longer supported in Client Security 14.00 and is superseded by a new version of Application control. To better reflect the nature of the old Application control, it is renamed to Network access control.
  • New Application control
    • The new Application control allows you to restrict virtually any application from starting based on powerful rules defined by the administrator.
    • Application control management employs the same concept of profiles as the firewall.
  • Other changes and improvements
    • Alerts view now features a text search field.
    • The quarantine management table now links to hosts that report a certain quarantined item.
    • Virus definitions are not downloaded when there is less that 2GB of free disk space.
    • The ‘Virus definitions are old’ alert is not sent by Policy Manager if hosts do not request updates from this instance.
    • Instead of having multiple settings to configure real-time scanning exclusions, there is now a single editor: Console > Settings > Real-time scanning > Files and applications excluded from scanning.
    • ‘Disallow user changes’ toggles in the Standard view are shown only for the settings that can be modified from the host local user interface.
    • It is now possible to configure multiple recipients with a different set of reports generated in Web Reporting.
    • Scanning reports with detected infections now produce a number of corresponding security alerts which are visible in the Console and Web Reporting reports.
    • Policy Manager visuals are aligned with the current F-Secure brand.
    • The default DataGuard trusted applications are now enabled with the “Discover trusted applications automatically” option instead of the predefined entries in the trusted applications list.
Known issues
  • You can safely ignore the error ‘The installation of some components failed…’ that is shown when installing Server Security 12.x on top of Policy Manager 14.00.
  • Policy-based repair operation and shifting between Premium and Standard editions are not supported. Use uninstallation and installation operations instead.
  • If F-Secure Client Security or F-Secure Server Security for Windows Servers is installed on the same computer where you install F-Secure Policy Manager, setup may ask you to restart the system. You can safely ignore this request.
  • MSI support: the correct F-Secure setup errors are not reported (CTS-38931). Instead, only the following error is reported: “There is a problem with this Windows Installer package. A program run as part of the setup did not finish as expected. Contact your support personnel or package vendor.”
  • Policy Manager cannot be installed to directories that contain double-byte characters in the path. This includes national characters in non-ISO-latin character schemes, for example, Japanese and Chinese versions of the supported platforms. We recommend that you use the default installation path.

Installation

Key codes for installation
The installation does not require a key code.
System requirements for Policy Manager Server
Dual core CPU 2 GHz or higher, 2GB RAM.

Minimum of 10 GB of free hard disk space. When managing Premium clients, an additional 10 GB is needed for serving software updates.

One of the following 64-bit Windows platforms:

  • Microsoft Windows Server 2008 SP1, editions: Standard, Enterprise, Web Server, Small Business Server, Essential Business Server
  • Microsoft Windows Server 2008 R2 with or without SP1, editions: Standard, Enterprise, Web Server
  • Microsoft Windows Server 2012, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2012 R2, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2016, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2019, editions: Essentials, Standard, Datacenter (Server Core is supported)

One of the following browsers:

  • Firefox
  • Microsoft Edge
  • Google Chrome
System requirements for Policy Manager Console
CPU 2 GHz or higher, 1GB RAM.

300 MB of free hard disk space.

One of the following 64-bit Windows platforms:

  • Microsoft Windows 7 with or without SP1, editions: Professional, Enterprise, Ultimate.
  • Microsoft Windows 8, all editions
  • Microsoft Windows 8.1, all editions
  • Microsoft Windows 10
  • Microsoft Windows Server 2008 SP1, editions: Standard, Enterprise, Web Server, Small Business Server, Essential Business Server
  • Microsoft Windows Server 2008 R2 with or without SP1, editions: Standard, Enterprise, Web Server
  • Microsoft Windows Server 2012, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2012 R2, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2016, editions: Essentials, Standard, Datacenter
  • Microsoft Windows Server 2019, editions: Essentials, Standard, Datacenter

Note: Server Core installation option is not supported.

Compatibility with other F-Secure products
If F-Secure Server Security for Windows Servers is installed on the same computer, you may need to restart the computer when you install or uninstall F-Secure Policy Manager.
Installation
The following single computer installation is the quickest way to set up a Policy Manager environment. Consult the F-Secure Client Security Administrator’s Guide or Policy Manager Administrator’s Guide for the full step-by-step instructions.

Install all F-Secure Policy Manager components on the same computer.

Note: If you install Policy Manager Server on a computer that has Windows Firewall turned on, open the necessary ports in the firewall.

Run F-Secure Policy Manager Console from the Start menu and log in with the password that you created for the ‘admin’ user during installation.

When Policy Manager Console opens, you need to define the policy domain structure. You can create policy domains based on your company structure or products that you want to manage. Select the domain pane and choose New Domain from the Edit menu.

To add hosts to the policy domain tree:

  1. Install F-Secure Client Security to hosts and choose Import New Hosts from the Edit menu to import the hosts into the domain,
  2. Choose Autodiscover Windows Hosts from the Edit menu to browse the Windows domain and to install Client Security to the selected hosts, or
  3. Choose New Host from the Edit menu. Note that this is mainly for testing Policy Manager Console. If you have no actual hosts, the status information, alerts, and reports are not available.

Choose Distribute from the File menu to generate policy files and to wp-signup.php the hosts with Policy Manager.

Upgrade
To upgrade from a previous version of Policy Manager:

Create a full backup of Policy Manager data (h2db, preferences, and other files). Consult Policy Manager Administrator’s Guide, “Backing up & restoring Policy Manager data” section for instructions on how to create a full backup.

Run the F-Secure Policy Manager setup on a computer that has Policy Manager components installed.

Policy Manager setup recommends that you upgrade the components that are installed on the computer. Continue with the default options to upgrade the installed components while keeping the existing configuration.

Uninstallation
To uninstall F-Secure Policy Manager Server, follow these instructions:

Use Add/Remove Programs in the Windows Control Panel to Uninstall F-Secure Policy Manager Server.

The Policy Manager Server database is not removed automatically. Remove it manually.

To uninstall F-Secure Policy Manager Console, follow these instructions:

Use Add/Remove Programs in the Windows Control panel to uninstall F-Secure Policy Manager Console.

Policy Manager Console preferences, log files and some other files are not removed automatically. Remove them manually.

IMPORTANT: Make sure that you do not destroy keys that you may need in the future.

Product documentation

After you have installed the product, you can find the product documentation in the installation folder. The product documentation is also located on our web site (https://www.f-secure.com/en/web/business_global/downloads/policy-manager).

Contact information and feedback

You can report any technical issues through the F-Secure support web site: http://support.f-secure.com/. You can also discuss and give feedback about the product at F-Secure Community: http://community.f-secure.com/.

If you are reporting a technical problem, please attach F-Secure system summary report (FSDiag.tar.gz) to the feedback message.

F-Secure license terms

F-Secure license terms are included in the software setup and available at F-Secure site (http://www.f-secure.com/en/web/home_global/license-terms). You must read and accept them before you can install and use the software.

Third-party license terms

This software includes and uses third-party code licensed under the following licenses.

Oracle Binary Code License Agreement for the Java SE Platform Products and JavaFX
ORACLE AMERICA, INC. (“ORACLE”), FOR AND ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES UNDER COMMON CONTROL, IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS BINARY CODE LICENSE AGREEMENT AND SUPPLEMENTAL LICENSE TERMS (COLLECTIVELY “AGREEMENT”). PLEASE READ THE AGREEMENT CAREFULLY. BY SELECTING THE “ACCEPT LICENSE AGREEMENT” (OR THE EQUIVALENT) BUTTON AND/OR BY USING THE SOFTWARE YOU ACKNOWLEDGE THAT YOU HAVE READ THE TERMS AND AGREE TO THEM. IF YOU ARE AGREEING TO THESE TERMS ON BEHALF OF A COMPANY OR OTHER LEGAL ENTITY, YOU REPRESENT THAT YOU HAVE THE LEGAL AUTHORITY TO BIND THE LEGAL ENTITY TO THESE TERMS. IF YOU DO NOT HAVE SUCH AUTHORITY, OR IF YOU DO NOT WISH TO BE BOUND BY THE TERMS, THEN SELECT THE “DECLINE LICENSE AGREEMENT” (OR THE EQUIVALENT) BUTTON AND YOU MUST NOT USE THE SOFTWARE ON THIS SITE OR ANY OTHER MEDIA ON WHICH THE SOFTWARE IS CONTAINED.

1. DEFINITIONS. “Software” means the software identified above in binary form that you selected for download, install or use (in the version You selected for download, install or use) from Oracle or its authorized licensees and/or those portions of such software produced by jlink as output using a Program’s code, when such output is in unmodified form in combination, and for sole use with, that Program, as well as any other machine readable materials (including, but not limited to, libraries, source files, header files, and data files), any updates or error corrections provided by Oracle, and any user manuals, programming guides and other documentation provided to you by Oracle under this Agreement. The Java Linker (jlink) is available with Java 9 and later versions.  “General Purpose Desktop Computers and Servers” means computers, including desktop and laptop computers, or servers, used for general computing functions under end user control (such as but not specifically limited to email, general purpose Internet browsing, and office suite productivity tools). The use of Software in systems and solutions that provide dedicated functionality (other than as mentioned above) or designed for use in embedded or function-specific software applications, for example but not limited to: Software embedded in or bundled with industrial control systems, wireless mobile telephones, wireless handheld devices, kiosks, TV/STB, Blu-ray Disc devices, telematics and network control switching equipment, printers and storage management systems, and other related systems are excluded from this definition and not licensed under this Agreement. “Programs” means (a) Java technology applets and applications intended to run on the Java Platform, Standard Edition platform on Java-enabled General Purpose Desktop Computers and Servers; and (b) JavaFX technology applications intended to run on the JavaFX Runtime on JavaFX-enabled General Purpose Desktop Computers and Servers. “Java SE LIUM” means the Licensing Information User Manual – Oracle Java SE and Oracle Java Embedded Products Document accessible at http://www.oracle.com/technetwork/java/javase/documentation/index.html. “Commercial Features” means those features that are identified as such in the Java SE LIUM under the “Description of Product Editions and Permitted Features” section.

2. LICENSE TO USE. Subject to the terms and conditions of this Agreement including, but not limited to, the Java Technology Restrictions of the Supplemental License Terms, Oracle grants you a non-exclusive, non-transferable, limited license without license fees to reproduce and use internally the Software complete and unmodified for the sole purpose of running Programs. THE LICENSE SET FORTH IN THIS SECTION 2 DOES NOT EXTEND TO THE COMMERCIAL FEATURES. YOUR RIGHTS AND OBLIGATIONS RELATED TO THE COMMERCIAL FEATURES ARE AS SET FORTH IN THE SUPPLEMENTAL TERMS ALONG WITH ADDITIONAL LICENSES FOR DEVELOPERS AND PUBLISHERS.

3. RESTRICTIONS. Software is copyrighted. Title to Software and all associated intellectual property rights is retained by Oracle and/or its licensors. Unless enforcement is prohibited by applicable law, you may not modify, decompile, or reverse engineer Software. You acknowledge that the Software is developed for general use in a variety of information management applications; it is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use the Software in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle disclaims any express or implied warranty of fitness for such uses. No right, title or interest in or to any trademark, service mark, logo or trade name of Oracle or its licensors is granted under this Agreement. Additional restrictions for developers and/or publishers licenses are set forth in the Supplemental License Terms.

4. DISCLAIMER OF WARRANTY. THE SOFTWARE IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ORACLE FURTHER DISCLAIMS ALL WARRANTIES, EXPRESS AND IMPLIED, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.

5. LIMITATION OF LIABILITY. IN NO EVENT SHALL ORACLE BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR DATA USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, EVEN IF ORACLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ORACLE’S ENTIRE LIABILITY FOR DAMAGES HEREUNDER SHALL IN NO EVENT EXCEED ONE THOUSAND DOLLARS (U. S. $1,000).

6. TERMINATION. This Agreement is effective until terminated. You may terminate this Agreement at any time by destroying all copies of Software. This Agreement will terminate immediately without notice from Oracle if you fail to comply with any provision of this Agreement. Either party may terminate this Agreement immediately should any Software become, or in either party’s opinion be likely to become, the subject of a claim of infringement of any intellectual property right. Upon termination, you must destroy all copies of Software.

7. EXPORT REGULATIONS. You agree that U.S. export control laws and other applicable export and import laws govern your use of the Software, including technical data; additional information can be found on Oracle’s Global Trade Compliance web site (http://www.oracle.com/us/products/export). You agree that neither the Software nor any direct product thereof will be exported, directly, or indirectly, in violation of these laws, or will be used for any purpose prohibited by these laws including, without limitation, nuclear, chemical, or biological weapons proliferation.

8. TRADEMARKS AND LOGOS. You acknowledge and agree as between you and Oracle that Oracle owns the ORACLE and JAVA trademarks and all ORACLE- and JAVA-related trademarks, service marks, logos and other brand designations (“Oracle Marks”), and you agree to comply with the Third Party Usage Guidelines for Oracle Trademarks currently located at http://www.oracle.com/us/legal/third-party-trademarks/index.html. Any use you make of the Oracle Marks inures to Oracle’s benefit.

9. U.S. GOVERNMENT LICENSE RIGHTS. If Software is being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), then the Government’s rights in Software and accompanying documentation shall be only those set forth in this Agreement.

10. GOVERNING LAW. This agreement is governed by the substantive and procedural laws of California. You and Oracle agree to submit to the exclusive jurisdiction of, and venue in, the courts of San Francisco, or Santa Clara counties in California in any dispute arising out of or relating to this agreement.

11. SEVERABILITY. If any provision of this Agreement is held to be unenforceable, this Agreement will remain in effect with the provision omitted, unless omission would frustrate the intent of the parties, in which case this Agreement will immediately terminate.

12. INTEGRATION. This Agreement is the entire agreement between you and Oracle relating to its subject matter. It supersedes all prior or contemporaneous oral or written communications, proposals, representations and warranties and prevails over any conflicting or additional terms of any quote, order, acknowledgment, or other communication between the parties relating to its subject matter during the term of this Agreement. No modification of this Agreement will be binding, unless in writing and signed by an authorized representative of each party.

SUPPLEMENTAL LICENSE TERMS

These Supplemental License Terms add to or modify the terms of the Binary Code License Agreement. Capitalized terms not defined in these Supplemental Terms shall have the same meanings ascribed to them in the Binary Code License Agreement. These Supplemental Terms shall supersede any inconsistent or conflicting terms in the Binary Code License Agreement, or in any license contained within the Software.

A. COMMERCIAL FEATURES. You may not use the Commercial Features for running Programs, Java applets or applications in your internal business operations or for any commercial or production purpose, or for any purpose other than as set forth in Sections B, C, D and E of these Supplemental Terms. If You want to use the Commercial Features for any purpose other than as permitted in this Agreement, You must obtain a separate license from Oracle.

B. SOFTWARE INTERNAL USE FOR DEVELOPMENT LICENSE GRANT. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Java SE LIUM incorporated herein by reference, including, but not limited to the Java Technology Restrictions of these Supplemental Terms, Oracle grants you a non-exclusive, non-transferable, limited license without fees to reproduce internally and use internally the Software complete and unmodified for the purpose of designing, developing, and testing your Programs.

C. LICENSE TO DISTRIBUTE SOFTWARE. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Java SE LIUM, including, but not limited to the Java Technology Restrictions and Limitations on Redistribution of these Supplemental Terms, Oracle grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute the Software, provided that (i) you distribute the Software complete and unmodified and only bundled as part of, and for the sole purpose of running, your Programs, (ii) the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software, (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that: (a) is a complete, unmodified reproduction of this Agreement; or (b) protects Oracle’s interests consistent with the terms contained in this Agreement and that includes the notice set forth in Section H, and (vi) you agree to defend and indemnify Oracle and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys’ fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software. The license set forth in this Section C does not extend to the Software identified in Section G.

D. LICENSE TO DISTRIBUTE REDISTRIBUTABLES. Subject to the terms and conditions of this Agreement and restrictions and exceptions set forth in the Java SE LIUM, including but not limited to the Java Technology Restrictions and Limitations on Redistribution of these Supplemental Terms, Oracle grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute those files specifically identified as redistributable in the Java SE LIUM (“Redistributables”) provided that: (i) you distribute the Redistributables complete and unmodified, and only bundled as part of Programs, (ii) the Programs add significant and primary functionality to the Redistributables, (iii) you do not distribute additional software intended to supersede any component(s) of the Redistributables (unless otherwise specified in the applicable Java SE LIUM), (iv) you do not remove or alter any proprietary legends or notices contained in or on the Redistributables, (v) you only distribute the Redistributables pursuant to a license agreement that: (a) is a complete, unmodified reproduction of this Agreement; or (b) protects Oracle’s interests consistent with the terms contained in the Agreement and includes the notice set forth in Section H, (vi) you agree to defend and indemnify Oracle and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys’ fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software. The license set forth in this Section D does not extend to the Software identified in Section G.

E. DISTRIBUTION BY PUBLISHERS. This section pertains to your distribution of the JavaTM SE Development Kit Software (“JDK”) with your printed book or magazine (as those terms are commonly used in the industry) relating to Java technology (“Publication”). Subject to and conditioned upon your compliance with the restrictions and obligations contained in the Agreement, Oracle hereby grants to you a non-exclusive, nontransferable limited right to reproduce complete and unmodified copies of the JDK on electronic media (the “Media”) for the sole purpose of inclusion and distribution with your Publication(s), subject to the following terms: (i) You may not distribute the JDK on a stand-alone basis; it must be distributed with your Publication(s); (ii) You are responsible for downloading the JDK from the applicable Oracle web site; (iii) You must refer to the JDK as JavaTM SE Development Kit; (iv) The JDK must be reproduced in its entirety and without any modification whatsoever (including with respect to all proprietary notices) and distributed with your Publication subject to a license agreement that is a complete, unmodified reproduction of this Agreement; (v) The Media label shall include the following information: “Copyright [YEAR], Oracle America, Inc. All rights reserved. Use is subject to license terms. ORACLE and JAVA trademarks and all ORACLE- and JAVA-related trademarks, service marks, logos and other brand designations are trademarks or wp-signup.phped trademarks of Oracle in the U.S. and other countries.” [YEAR] is the year of Oracle’s release of the Software; the year information can typically be found in the Software’s “About” box or screen. This information must be placed on the Media label in such a manner as to only apply to the JDK; (vi) You must clearly identify the JDK as Oracle’s product on the Media holder or Media label, and you may not state or imply that Oracle is responsible for any third-party software contained on the Media; (vii) You may not include any third party software on the Media which is intended to be a replacement or substitute for the JDK; (viii) You agree to defend and indemnify Oracle and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys’ fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of the JDK and/or the Publication; ; and (ix) You shall provide Oracle with a written notice for each Publication; such notice shall include the following information: (1) title of Publication, (2) author(s), (3) date of Publication, and (4) ISBN or ISSN numbers. Such notice shall be sent to Oracle America, Inc., 500 Oracle Parkway, Redwood Shores, California 94065 U.S.A , Attention: General Counsel.

F. JAVA TECHNOLOGY RESTRICTIONS. You may not create, modify, or change the behavior of, or authorize your licensees to create, modify, or change the behavior of, classes, interfaces, or subpackages that are in any way identified as “java”, “javax”, “sun”, “oracle” or similar convention as specified by Oracle in any naming convention designation.

G. LIMITATIONS ON REDISTRIBUTION. You may not redistribute or otherwise transfer patches, bug fixes or updates made available by Oracle through Oracle Premier Support, including those made available under Oracle’s Java SE Support program.

H. COMMERCIAL FEATURES NOTICE. For purpose of complying with Supplemental Term Section C.(v)(b) and D.(v)(b), your license agreement shall include the following notice, where the notice is displayed in a manner that anyone using the Software will see the notice:

Use of the Commercial Features for any commercial or production purpose requires a separate license from Oracle. “Commercial Features” means those features that are identified as such in the Licensing Information User Manual – Oracle Java SE and Oracle Java Embedded Products Document, accessible at http://www.oracle.com/technetwork/java/javase/documentation/index.html, under the “Description of Product Editions and Permitted Features” section.

I. SOURCE CODE. Software may contain source code that, unless expressly licensed for other purposes, is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement.

J. THIRD PARTY CODE. Additional copyright notices and license terms applicable to portions of the Software are set forth in the Java SE LIUM accessible at http://www.oracle.com/technetwork/java/javase/documentation/index.html. In addition to any terms and conditions of any third party opensource/freeware license identified in the Java SE LIUM, the disclaimer of warranty and limitation of liability provisions in paragraphs 4 and 5 of the Binary Code License Agreement shall apply to all Software in this distribution.

K. TERMINATION FOR INFRINGEMENT. Either party may terminate this Agreement immediately should any Software become, or in either party’s opinion be likely to become, the subject of a claim of infringement of any intellectual property right.

L. INSTALLATION AND AUTO-UPDATE. The Software’s installation and auto-update processes transmit a limited amount of data to Oracle (or its service provider) about those specific processes to help Oracle understand and optimize them. Oracle does not associate the data with personally identifiable information. You can find more information about the data Oracle collects as a result of your Software download at http://www.oracle.com/technetwork/java/javase/documentation/index.html.

For inquiries please contact: Oracle America, Inc., 500 Oracle Parkway, Redwood Shores, California 94065, USA.

Apache Software License – Version 2.0
See https://www.apache.org/licenses/LICENSE-2.0
Eclipse Public License – v 1.0
See https://www.eclipse.org/legal/epl-v10.html
H2 License – Version 1.0
See http://www.h2database.com/html/license.html
Common Development and Distribution License (CDDL) Version 1.0
See https://opensource.org/licenses/CDDL-1.0
spring-asm Copyright Notice and Permissions
See https://asm.ow2.io/license.html
SLF4J Copyright Notice and Permissions
See https://www.slf4j.org/license.html

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

(Visited 22 times, 1 visits today)