F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 - Administrator's Manual - page 205
of
397
CHAPTER 5
205
Centrally Managed Administration
5.4.7
Proxy Configuration
Figure 5-32 Proxy configuration
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Trusted Networks
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use ‘*’
wildcard to match any number and ‘-’ to define a
range of numbers (172.16.*.1, 172.16.4.10-110).