F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 6
vi
5.9
Preventing Users from Changing Settings ...............................................................187
5.9.1 Setting all Virus Protection Settings Final.....................................................187
5.10 Configuring F-Secure Client Security Alert Sending ................................................188
5.10.1 Setting F-Secure Client Security to Send Virus Alerts to an E-mail Address188
5.10.2 Disabling F-Secure Client Security Alert Pop-ups ........................................190
5.11 Monitoring Viruses on the Network ..........................................................................190
5.12 Testing your Antivirus Protection .............................................................................190
Chapter 6
Configuring Internet Shield
192
6.1
Overview: What can Internet Shield be Used for? ...................................................193
6.1.1 Global Firewall Security Levels ....................................................................193
6.1.2 Security Level Design Principles ..................................................................195
6.2
Configuring Internet Shield Security Levels and Rules ............................................196
6.2.1 Selecting an Active Security Level for a Workstation ...................................196
6.2.2 Configuring a Default Security Level for the Managed Hosts.......................197
6.2.3 Adding a New Security Level for a Certain Domain Only .............................198
6.3
Configuring Network Quarantine..............................................................................201
6.3.1 Network Quarantine Settings........................................................................201
6.3.2 Enabling Network Quarantine in the Whole Domain ....................................201
6.3.3 Fine-Tuning Network Quarantine .................................................................202
6.4
Configuring Internet Shield Rule Alerts ....................................................................203
6.4.1 Adding a New Internet Shield Rule with Alerting ..........................................203
6.5
Configuring Application Control................................................................................207
6.5.1 Application Control Configuration Settings ...................................................209
6.5.2 Setting up Application Control for the First Time ..........................................210
6.5.3 Creating a Rule for an Unknown Application on Root Level.........................212
6.5.4 Editing an Existing Application Control Rule ................................................213
6.5.5 Disabling Application Control Pop-ups .........................................................214
6.6
How to use Alerts for Checking that Internet Shield Works? ...................................215
6.7
Configuring the Intrusion Prevention........................................................................216
6.7.1 Intrusion Prevention Configuration Settings .................................................217
6.7.2 Configuring IPS for Desktops and Laptops ..................................................218
Chapter 7
How to Check that the Environment is Protected
220
7.1
Overview ..................................................................................................................221