F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 213
CHAPTER 6
213
Step 4. Select the Rule Target
1. Select the domain or host that the rule affects from the domains and
hosts displayed in the window.
If the target host or domain already has a rule defined for any of
the applications affected by the rule, you are prompted to select
whether to proceed and overwrite the existing rule at the host.
In this example select Root.
2. When the rule is ready, click
Finish
. The new rule is now displayed in
the Application Rules for Known Applications table. The Unknown
Application Reported by Hosts table has been refreshed.
Step 5. Take the New Rule into Use
1. Click
to save the policy data.
2. Click
to distribute the policy.
6.5.4
Editing an Existing Application Control Rule
In this example the rule created above is edited to allow the use of
Internet Explorer 4 temporarily for testing purposes in a subdomain called
Engineering/Testing subdomain.
Step 1. Select the Rule to be Edited
1. Go to the Settings tab and select the Application Control page.
2. Select the rule which you want to edit in Application Rules for Known
Applications.
3. Click
Edit
to start the application control rule wizard.