DL manuals F-SECURE Other ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00 Administrator's Manual F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00 Administrator's Manual - page 4 Other manuals for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00: Deployment Manual, Administrator's Manual 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253 Page of 253 Go Download Print this page Bookmark us 2 2.3.4 Quarantine...................................................................................................... 85 2.4 F-Secure Content Scanner Server Settings............................................................... 86 2.4.1 Interface.......................................................................................................... 86 2.4.2 Virus Scanning ............................................................................................... 87 2.4.3 Virus Statistics ................................................................................................ 90 2.4.4 Database Updates.......................................................................................... 91 2.4.5 Spam Filtering ................................................................................................ 92 2.4.6 Threat Detection Engine................................................................................. 93 2.4.7 Proxy Configuration ........................................................................................ 94 2.4.8 Advanced........................................................................................................ 95 2.5 F-Secure Content Scanner Server Statistics ............................................................. 96 2.5.1 Server ............................................................................................................. 96 2.5.2 Scan Engines ................................................................................................. 97 2.5.3 Common ......................................................................................................... 98 2.5.4 Spam Control.................................................................................................. 98 2.5.5 Virus Statistics ................................................................................................ 99 2.6 F-Secure Management Agent Settings ...................................................................... 99 2.7 F-Secure Automatic Update Agent Settings ............................................................ 101 Chapter 3 Administration with Web Console 103 3.1 Overview .................................................................................................................. 104 3.2 Home........................................................................................................................104 3.3 Transport Protection................................................................................................. 109 3.3.1 Attachment Filtering...................................................................................... 111 3.3.2 Virus Scanning ............................................................................................. 114 3.3.3 Grayware Scanning ...................................................................................... 117 3.3.4 Archive Processing....................................................................................... 120 3.3.5 Content Filtering .......................................................................................... 123 3.3.6 Other Options ............................................................................................... 126 3.4 Spam Control ........................................................................................................... 129 3.4.1 Status ........................................................................................................... 130 3.4.2 Settings.........................................................................................................131 3.5 Storage Protection ................................................................................................... 135 3.5.1 Real-Time Scanning ..................................................................................... 137 3.5.2 Manual Scanning ......................................................................................... 146 3.5.3 Scheduled Scanning .................................................................................... 159 « ‹ Prev1234567Next › »