F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Deployment Manual - page 4
2
Chapter 3
Installation
29
3.1
System Requirements................................................................................................30
3.1.1 Installation on Microsoft Exchange Server 2003 ............................................30
3.1.2 Installation on Microsoft Exchange Server 2007 ............................................32
3.1.3 Installation on Microsoft Exchange Server 2010 ............................................34
3.2
Centralized Management Requirements....................................................................35
3.3
Other System Component Requirements ..................................................................35
3.3.1 SQL Server Requirements .............................................................................36
3.3.2 Additional Windows Components...................................................................38
3.3.3 Web Browser Software Requirements ...........................................................38
3.4
Improving Reliability and Performance ......................................................................38
3.5
Centrally Administered or Stand-alone Installation? ..................................................39
3.6
Installation Overview ..................................................................................................40
3.7
Installing F-Secure Anti-Virus for Microsoft Exchange...............................................41
3.8
After the Installation ...................................................................................................54
3.8.1 Importing Product MIB files to F-Secure Policy Manager Console.................54
3.8.2 Configuring the Product..................................................................................55
3.9
Upgrading from Previous Product Versions ...............................................................57
3.10 Upgrading the Evaluation Version..............................................................................59
3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange ..........................................60
Chapter 4
Configuring F-Secure Spam Control
61
4.1
Overview ....................................................................................................................62
4.2
Realtime Blackhole List Configuration .......................................................................63
4.2.1 Configuring Realtime Blackhole Lists .............................................................63
4.2.2 Optimizing F-Secure Spam Control Performance ..........................................65
Appendix A Deploying the Product on a Cluster
67
A.1 Installation Overview ................................................................................................. 68
A.2 Creating Quarantine Storage .....................................................................................70
A.2.1 Quarantine Storage in Active-Passive Cluster ...............................................70
A.2.2 Quarantine Storage in Active-Active Cluster ..................................................75
A.2.3 Creating the Quarantine Storage for a Single Copy Cluster Environment .....78