F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator's Manual - page 8
viii
10.2.3 How to Send the Virus Sample.....................................................................247
10.2.4 In What Language ........................................................................................247
10.2.5 Response Times...........................................................................................247
10.3 What to Do in Case of a Virus Outbreak? ................................................................248
Chapter 11 Setting Up the Cisco NAC Plugin
250
11.1 Introduction ..............................................................................................................251
11.2 Installing the Cisco NAC Plugin ...............................................................................251
11.2.1 Importing Posture Validation Attribute Definitions ........................................252
11.3 Attributes to be Used for Application Posture Token ...............................................252
Chapter 12 Advanced Features: Virus and Spyware Protection
254
12.1 Overview ..................................................................................................................255
12.2 Configuring Scheduled Scanning.............................................................................255
12.3 Advanced System Control Settings..........................................................................257
12.3.1 Notify User on a Deny Event ........................................................................257
12.3.2 Let an Administrator Allow or Deny Events from Other Users Programs .....258
12.3.3 Automatically Allow or Deny Events Requested by a Specific Application...258
12.4 Configuring Policy Manager Proxy...........................................................................260
12.5 Configuring Automatic Updates on Hosts from Policy Manager Proxy ....................260
12.6 Configuring a Host for SNMP Management.............................................................261
12.7 Excluding an Application from the Web Traffic Scanner ..........................................262
Chapter 13 Advanced Features: Internet Shield
263
13.1 Overview ..................................................................................................................264
13.2 Managing Internet Shield Properties Remotely........................................................264
13.2.1 Packet Logging.............................................................................................264
13.2.2 Trusted Interface ..........................................................................................265
13.2.3 Packet Filtering.............................................................................................266
13.3 Configuring Security Level Autoselection.................................................................266
13.4 Troubleshooting Connection Problems ....................................................................268
13.5 Adding New Services ...............................................................................................269
13.5.1 Creating a New Internet Service based on the Default HTTP ......................270
13.6 Setting up Dialup Control .........................................................................................278