F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 7
vii
7.2
How to Check the Protection Status from Outbreak Tab .........................................221
7.3
How to Check that all the Hosts Have the Latest Policy ..........................................221
7.4
How to Check that the Server has the Latest Virus Definitions................................222
7.5
How to Check that the Hosts have the Latest Virus Definitions ...............................222
7.6
How to Check that there are no Disconnected Hosts ..............................................223
7.7
Viewing Scanning Reports .......................................................................................223
7.8
Viewing Alerts ..........................................................................................................224
7.9
Creating a Weekly Infection Report .........................................................................225
7.10 Monitoring a Possible Network Attack......................................................................225
Chapter 8
Upgrading Software
227
8.1
Overview: Upgrading Software ................................................................................228
8.1.1 Using the Installation Editor..........................................................................228
Chapter 9
Local Host Operations
232
9.1
Overview ..................................................................................................................233
9.2
Scanning File Viruses Manually ...............................................................................233
9.3
Viewing the Latest Scanning Report on a Local Host ..............................................234
9.4
Adding a Scheduled Scan from a Local Host...........................................................234
9.5
Logging and Log File Locations on Local Hosts ......................................................235
9.5.1 The LogFile.log file .......................................................................................235
9.5.2 Packet Logging.............................................................................................236
9.5.3 The Action.log file .........................................................................................237
9.5.4 Other Log Files .............................................................................................239
9.6
Connecting to F-Secure Policy Manager and Importing a Policy File Manually.......239
9.7
Suspending Downloads and Updates ......................................................................240
9.8
Allowing Users to Unload F-Secure Products ..........................................................240
Chapter 10 Virus Information
242
10.1 Malware Information and Tools on the F-Secure Web Pages .................................243
10.2 How to Send a Virus Sample to F-Secure ...............................................................244
10.2.1 How to Package a Virus Sample ..................................................................244
10.2.2 What Should Be Sent ...................................................................................244