F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Administrator's Manual - page 3
3
Contents
About This Guide
7
How This Guide Is Organized .............................................................................................. 8
Conventions Used in F-Secure Guides.............................................................................. 10
Symbols .................................................................................................................... 10
Chapter 1
Using F-Secure Anti-Virus for Microsoft Exchange
12
1.1
Administering F-Secure Anti-Virus for Microsoft Exchange .......................................13
1.2
Using Web Console ...................................................................................................14
1.2.1 Logging in for the First Time...........................................................................14
1.2.2 Modifying Settings and Viewing Statistics with Web Console ........................16
1.2.3 Checking the Product Status .........................................................................17
1.3
Using F-Secure Policy Manager Console ..................................................................17
1.3.1 Modifying Settings and Viewing Statistics in Centrally Administered Mode ...17
Chapter 2
Centrally Managed Administration
20
2.1
Overview ....................................................................................................................21
2.2
F-Secure Anti-Virus for Microsoft Exchange Settings ................................................21
2.2.1 General Settings.............................................................................................21
2.2.2 Transport Protection .......................................................................................31
2.2.3 Storage Protection..........................................................................................50
2.3
F-Secure Anti-Virus for Microsoft Exchange Statistics...............................................84
2.3.1 Common .........................................................................................................85
2.3.2 Transport Protection .......................................................................................86
2.3.3 Storage Protection..........................................................................................87
2.3.4 Quarantine......................................................................................................89
2.4
F-Secure Content Scanner Server Settings...............................................................90
2.4.1 Interface..........................................................................................................90
2.4.2 Virus Scanning ...............................................................................................91
2.4.3 Virus Statistics ................................................................................................94
2.4.4 Database Updates..........................................................................................95
2.4.5 Spam Filtering ................................................................................................96
2.4.6 Threat Detection Engine.................................................................................97