User manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 ADMINISTRATOR GUIDE

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62. We hope that this F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 user guide will be useful to you.


F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 ADMINISTRATOR GUIDE: Download the complete user guide (4500 Ko)

Manual abstract: user guide F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62ADMINISTRATOR GUIDE

Detailed instructions for use are in the User's Guide.

[. . . ] F-Secure Anti-Virus for Microsoft Exchange Administrator's Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. [. . . ] Displays the number attachments that have been stripped from messages. Displays the date and time when the last infection was found. Stripped Attachments Last Infection Found Last Time Infection Found 192 Currently Processed Mailbox Displays the name of the mailbox that was the last one to be processed during manual scan. (This setting exists under the Mailboxes branch only. ) Displays the name of the public folder that was the last one to be processed during manual scan. (This setting exists under the Public Folders branch only. ) Currently Processed Public Folder 5. 3. 4 Quarantine Quarantine statistics displays the details of the items in Quarantine and statistics by Quarantine categories. Total Number of Quarantined Items Displays the total number of items in the Quarantine. E-mail messages and infected, suspicious and disallowed attachments are stored as separate items in the Quarantine storage. For example, if a message has 3 attachments and only one attachment is infected, 2 items will be created in the Quarantine storage, and both items have the same Quarantine ID in the Quarantine database. Total Size of Quarantine Storage Displays the total size (in megabytes) of the Quarantine storage. Statistics by Category Displays the number and total size of quarantined messages by category. CHAPTER 5 Centrally Managed Administration 193 5. 4 F-Secure Content Scanner Server Settings Use the variables under the F-Secure Content Scanner Server / Settings branch to define the settings for content providers and to change the general content scanning options. Figure 5-25 F-Secure Content Scanner Server Settings categories Interface Virus Scanning Specify how the server will interact with clients. Specify the scanning engines to be used when F-Secure Content Scanner Server scans files for viruses, and the files that should be scanned. Specify how you want to keep the virus definition databases up-to-date. Specify the number of Spam Scanner instances to be created and used for spam analysis. For more information, see "Spam Filtering", 202. Virus Statistics Database Updates Spam Filtering 194 Threat Detection Engine Configure the virus outbreak and spam threat detection. Specify proxy server parameters that Content Scanner Server uses when it connects to the threat detection center. For more information, see "Advanced", 206 Proxy Configuration Advanced CHAPTER 5 Centrally Managed Administration 195 5. 4. 1 Interface Specify how the server will interact with clients. Figure 5-26 Interface settings IP Address Specifies the service listen address in case of multiple network interface cards or multiple IP addresses. If you do not assign an IP address (0. 0. 0. 0), the server responds to all IP addresses assigned to the host. If you change this port number, you must modify the connection settings of the client accordingly, so that the client sends requests to the same port. Specifies a comma-separated list of IP addresses the server accepts incoming requests from. If the list is empty, the server accepts connections from any host. TCP Port Accept Connections 196 Max Connections Specifies the maximum number of simultaneous connections the server can accept. Specifies the maximum number of simultaneous connections the server can accept from a particular host. Specifies how long the server should wait before it timeouts on sending data to the client. Max Connections Per Host Send Content Timeout Receive Content Timeout Specifies how long the server should wait before it timeouts when receiving data from the client. Keep Alive Timeout Specifies the length of time before the server closes an inactive/idle connection. This ensures that all connections are closed if the protocol fails to close a connection. 5. 4. 2 Virus Scanning Select the scanning engines to be used and the files that should be excluded from the Scan Engines table. CHAPTER 5 Centrally Managed Administration 197 Figure 5-27 Virus Scanning settings Scan Engines Scan engines can be enabled or disabled. [. . . ] You can run the F-Secure Diagnostics tool from the F-Secure Anti-Virus for Microsoft Exchange Web Console as follows: 1. Type https://127. 0. 0. 1:25023/fsdiag/ in the browser's address field. The F-Secure Diagnostics tool starts and the dialog window displays the progress of the data collection. 394 4. When the tool has finished collecting the data, click Get Report to download and save the collected data. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.