User manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE ADMINISTRATOR GUIDE
DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE. We hope that this F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE user guide will be useful to you.
Manual abstract: user guide F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGEADMINISTRATOR GUIDE
Detailed instructions for use are in the User's Guide.
[. . . ] F-Secure Anti-Virus for Microsoft Exchange
Administrator's Guide
"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. [. . . ] Click Show Report to view the report of the last manual processing task. Progress Estimated time Elapsed time Processed number mailboxes Last processed mailbox Processed number public folders Last processed public folder Messages in Mailboxes Messages in Public Folders Displays the estimated time that is left of the manual processing. Displays the time that has elapsed since the manual processing was started. Displays the number of mailboxes that have been processed out of the total number of mailboxes. Displays the number of public folders that have been processed out of the total number of public folders. Displays the number of processed, infected and suspicious messages in mailboxes. Displays the number of processed, infected and suspicious messages in Public Folders.
110
Scheduled Scan Tasks
Figure 4-16 Scheduled Processing page
Editing Scheduled Tasks
The Scheduled tasks table displays all scheduled tasks and the date and time when the next scheduled task occurs for the next time.
CHAPTER 4 Administration with Web Console Clear the checkbox in front of the task to deactivate a scheduled. When the scheduled scanning task is complete, column reports completed scheduled scanning tasks. link displayed in task column to edit a scanning
111
Click Show Latest Report to display a report of performed scheduled tasks. For more information, see "Creating Scheduled Operation", 50. To delete a scheduled tasks from the list, click on column to select scheduled tasks that you want to delete. Click Clear to delete the currently marked scheduled tasks from the list.
4. 2. 6
Quarantine
Quarantine in F-Secure Anti-Virus for Microsoft Exchange is handled through a SQL database. The product is able to quarantine e-mails and attachments which contain malicious or otherwise unwanted content, such as spam messages. The Quarantine management is divided into two different parts: Quarantine-related configuration, and the management of the quarantined content, for example searching for and deleting quarantined content. In stand-alone installations, quarantine-related settings are configured and the quarantined files managed through the Web Console. The Quarantine Query page in Web Console is used for searching the quarantined content. When the product places content to the Quarantine, it saves the content as separate files into the Quarantine Storage (a directory specified in the Quarantine settings) and inserts an entry to the Quarantine Database with information about the quarantined content. For more information, see "Quarantine Management", 248.
112
Quarantine Thresholds
Figure 4-17 Quarantine thresholds settings
CHAPTER 4 Administration with Web Console
113
Quarantine thresholds Quarantined items threshold Specify the critical number of items in the Quarantine storage. If the specified value is reached or exceeded, the product sends an alert. If zero (0) is specified, the number of items in the Quarantine storage is not checked. E-mail messages and infected, suspicious and disallowed attachments are stored and counted as separate items in the Quarantine storage. For example, if a message has three attachments and only one of them has been found infected, two items will be created in the Quarantine storage. [. . . ] This utility gathers basic information about hardware, operating system, network configuration and installed F-Secure and third-party software. You can run the F-Secure Diagnostics tool from the F-Secure Anti-Virus for Microsoft Exchange Web Console as follows:
1. Type https://127. 0. 0. 1:25023/fsdiag/ in the browser's address field. The F-Secure Diagnostics tool starts and the dialog window displays
the progress of the data collection.
220
4. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE
Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE will begin.