F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Deployment Manual

Hide thumbs Also See for ANTI-VIRUS - FOR MICROSOFT EXCHANGE:
Table of Contents

Advertisement

F-Secure Anti-Virus for

Microsoft Exchange

Deployment Guide

Advertisement

Table of Contents
loading

Summary of Contents for F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE

  • Page 1: Microsoft Exchange

    F-Secure Anti-Virus for Microsoft Exchange Deployment Guide...
  • Page 2 Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
  • Page 3: Table Of Contents

    Introduction Overview ........................9 How F-Secure Anti-Virus for Microsoft Exchange Works........... 10 Key Features......................13 Scanning Methods ..................... 15 F-Secure Anti-Virus Mail Server and Gateway Products ........... 16 Chapter 2 Deployment Installation Modes ...................... 18 Network Requirements....................19 Deployment Scenarios ....................20 2.3.1 Single Exchange Server (2003/2007/2010)............21...
  • Page 4 Installation Overview ....................40 Installing F-Secure Anti-Virus for Microsoft Exchange..........41 After the Installation ....................54 3.8.1 Importing Product MIB files to F-Secure Policy Manager Console....54 3.8.2 Configuring the Product.................. 55 Upgrading from Previous Product Versions ............... 57 3.10 Upgrading the Evaluation Version................59 3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange ..........
  • Page 5 A.3.1 Installing on Clusters with Quarantine as Cluster Resource ......93 A.3.2 Installing on Clusters with Quarantine on a Dedicated Computer ....96 A.4 Administering the Cluster Installation with F-Secure Policy Manager......98 A.5 Using the Quarantine in the Cluster Installation............99 A.6 Using the Product with High Availability...
  • Page 6: About This Guide

    BOUT UIDE How This Guide Is Organized............5 Conventions Used in F-Secure Guides ........6...
  • Page 7: How This Guide Is Organized

    F-Secure Spam Control. Appendix A. Deploying the Product on a Cluster. Instructions how to deploy and use F-Secure Anti-Virus for Microsoft Exchange on a cluster. Appendix B. Services and Processes. Describes services, devices and processes of F-Secure Anti-Virus for Microsoft Exchange.
  • Page 8: Conventions Used In F-Secure Guides

    Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
  • Page 9: For More Information

    In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
  • Page 10: Introduction

    NTRODUCTION Overview..................9 How F-Secure Anti-Virus for Microsoft Exchange Works ... 10 Key Features ................13 Scanning Methods..............15 F-Secure Anti-Virus Mail Server and Gateway Products.... 16...
  • Page 11: Overview

    Sober, Netsky and Bagle, have caused a lot of damage around the world. F-Secure Anti-Virus Mail Server and Gateway products are designed to protect your company's mail and groupware servers and to shield the company network from any malicious code that travels in HTTP or SMTP traffic.
  • Page 12: How F-Secure Anti-Virus For Microsoft Exchange Works

    How F-Secure Anti-Virus for Microsoft Exchange Works F-Secure Anti-Virus for Microsoft Exchange is designed to detect and disinfect viruses and other malicious code from e-mail transmissions through Microsoft Exchange Server. Scanning is done in real time as the mail passes through Microsoft Exchange Server. On-demand scanning of user mailboxes and public folders is also available.
  • Page 13 Our team of dedicated virus researchers is on call 24-hours a day responding to new and emerging threats. In fact, F-Secure is one of the only companies to release tested virus definition updates continuously, to make sure our customers are receiving the highest quality service and protection.
  • Page 14 F-Secure Policy Manager Console and all managed systems. Figure 1-1 (1) E-mail arrives from the Internet to F-Secure Anti-Virus for Microsoft Exchange, which (2) filters malicious content from mails and attachments, and (3) delivers cleaned files forward.
  • Page 15: Key Features

    CHAPTER 1 Introduction Key Features F-Secure Anti-Virus for Microsoft Exchange provides the following features and capabilities. Superior Protection Superior detection rate with multiple scanning engines.  Scanning engines updated automatically with the latest versions.  Automatic malicious code detection and disinfection.
  • Page 16 You can manage and search quarantined content with the  F-Secure Anti-Virus for Microsoft Exchange Web Console. When F-Secure Anti-Virus for Windows Servers is installed on  the same computer, both products can be administered with the common web-based user interface.
  • Page 17: Scanning Methods

    CHAPTER 1 Introduction Scanning Methods Virus Scanning The virus scan uses virus definition databases to detect and disinfect viruses. Virus definition databases are updated typically multiple times a day and they provide an always up-to-date protection capability. Heuristic Scanning The heuristic scan analyzes files for suspicious code behavior so that the product can detect unknown malware.
  • Page 18: F-Secure Anti-Virus Mail Server And Gateway Products

    F-Secure Anti-Virus Mail Server and Gateway Products The F-Secure Anti-Virus product line consists of workstation, file server, mail server, gateway and mobile products. F-Secure Anti-Virus for Microsoft Exchange™ protects your  Microsoft Exchange users from malicious code contained within files they receive in mail messages and documents they open from shared databases.
  • Page 19: Chapter 2 Deployment

    EPLOYMENT Installation Modes............... 18 Network Requirements............... 19 Deployment Scenarios ............... 20...
  • Page 20: Installation Modes

    Installation Modes F-Secure Anti-Virus for Microsoft Exchange can be installed either in stand-alone or centrally administered mode. In stand-alone installation, F-Secure Anti-Virus for Microsoft Exchange is managed with Web Console. In centrally administered mode, it is managed centrally with F-Secure Policy Manager components: F-Secure Policy Manager Server and F-Secure Policy Manager Console.
  • Page 21: Network Requirements

    This network configuration is valid for all scenarios described in this chapter. Make sure that the following network traffic can pass through: Service Process Inbound ports Outbound ports F-Secure Content Scanner %ProgramFiles%\F-Secure\Cont 18971 (TCP) (on DNS (53, UDP/TCP), Server ent Scanner Server\fsavsd.exe...
  • Page 22: Deployment Scenarios

    Depending on how the Microsoft Exchange Server roles are deployed in your environment, you might consider various scenarios of deploying F-Secure Anti-Virus for Microsoft Exchange. There are various ways to deploy F-Secure Anti-Virus for Microsoft Exchange that are suitable to...
  • Page 23: Single Exchange Server (2003/2007/2010)

    SMTP. Usually, the server is located behind the firewall or router. Installing F-Secure Anti-Virus for Microsoft Exchange Install F-Secure Anti-Virus for Microsoft Exchange to the server running Microsoft Exchange Server or Microsoft Small Business Server. Administration Modes You can install the product in stand-alone mode and administer it with the Web Console.
  • Page 24: Multiple Exchange 2003 Servers

    Exchange servers. In addition, the front-end server can be protected with F-Secure Spam Control. Administration Modes Install F-Secure Policy Manager Server on a dedicated server or on the same server with one of Exchange servers. You can administer the product with F-Secure Policy Manager Console.
  • Page 25: Multiple Exchange Server 2007/2010 Roles

    Exchange servers. Installing F-Secure Anti-Virus for Microsoft Exchange Install F-Secure Anti-Virus for Microsoft Exchange to all servers where Exchange Edge, Hub and Mailbox Server roles are deployed. In addition, the Edge server can be protected with F-Secure Spam Control.
  • Page 26: Large Organization Using Exchange 2007/2010

    Administration Modes Install F-Secure Policy Manager Server on a dedicated server or on the same server with one of Exchange servers. You can administer the product with F-Secure Policy Manager Console. When you install the product, configure each installation to connect to the same F-Secure Policy Manager Server.
  • Page 27 F-Secure Spam Control can be installed on the Edge server. Administration Modes Install F-Secure Policy Manager Server on a dedicated server. You can administer the product with F-Secure Policy Manager Console. When you install the product, configure each installation to connect to the same F-Secure Policy Manager Server.
  • Page 28: Centralized Quarantine Management

    For example, you have front-end and back-end servers running Exchange Server 2003, or a network configuration with Edge and Mailbox roles running Exchange Server 2007/2010. Microsoft SQL Server is installed on a dedicated server or on the server running F-Secure Policy Manager Server.
  • Page 29 Microsoft SQL Server 2005 Express Edition included in F-Secure Anti-Virus for Microsoft Exchange, the Quarantine database size is limited to 4 GB. You can use F-Secure Anti-Virus for Microsoft Exchange Web  Console to manage and search quarantined content. For more information, consulft F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
  • Page 30 Follow these steps to change the authentication mode: 1. Open Microsoft SQL Server Management Studio or Microsoft SQL Server Management Studio Express. If you do not have Microsoft SQL Server Management Studio installed, you can freely download Management Studio Express from Microsoft web site.
  • Page 31: Installation

    Centralized Management Requirements........35 Other System Component Requirements........35 Improving Reliability and Performance........38 Installation Overview ..............40 Installing F-Secure Anti-Virus for Microsoft Exchange ....41 After the Installation..............54 Upgrading from Previous Product Versions........ 57 Upgrading the Evaluation Version ..........59...
  • Page 32: System Requirements

    System Requirements F-Secure Anti-Virus for Microsoft Exchange is installed on the computer running Microsoft Exchange Server. The release notes document contains the latest information about the product and might have changes to system requirements and the installation procedure. It is highly recommended to read the release notes before you proceed with the installation.
  • Page 33 CHAPTER 3 Installation For performance and security reasons, it is not possible to install the product on any other than an NTFS partition. Disk space for 10 GB or more. The required disk space processing: depends on the number of mailboxes, amount of data traffic and the size of the Information Store.
  • Page 34: Installation On Microsoft Exchange Server 2007

    3.1.2 Installation on Microsoft Exchange Server 2007 The product can be installed on a computer running one of the following Microsoft Exchange Server versions: Microsoft® Exchange Server 2007 (64-bit version) with the latest  service pack Microsoft® Small Business Server 2008 ...
  • Page 35 CHAPTER 3 Installation For performance and security reasons, it is not possible to install the product on any other than an NTFS partition. Disk space for 10 GB or more. The required disk space processing: depends on the number of mailboxes, amount of data traffic and the size of the Information Store.
  • Page 36: Installation On Microsoft Exchange Server 2010

    3.1.3 Installation on Microsoft Exchange Server 2010 The product can be installed on a computer running the following Microsoft Exchange Server version: Microsoft® Exchange Server 2010  Microsoft® Windows Server 2008, Operating system:  Standard Edition Microsoft® Windows Server 2008, ...
  • Page 37: Centralized Management Requirements

    2010 high-availability solutions based on Database Availability Groups (DAG). Centralized Management Requirements F-Secure Policy Manager 9.00 or later is required if you plan to install the product in the centralized administration mode and manage it with F-Secure Policy Manager Console.
  • Page 38: Sql Server Requirements

     Express edition) Microsoft SQL Server 2005 Express Edition Service Pack 3 is distributed with the product and can be installed during F-Secure Anti-Virus for Microsoft Exchange Setup. When centralized quarantine management is used, the SQL server must be reachable from the network and file sharing must be enabled.
  • Page 39 Exchange installations. Microsoft SQL Server 2005 Express Edition is delivered together with F-Secure Anti-Virus for Microsoft Exchange, and you can install it during the F-Secure Anti-Virus for Microsoft Exchange Setup. Microsoft SQL If your organization sends a large amount of e-mails, it is ...
  • Page 40: Additional Windows Components

    Framework can be downloaded from the Microsoft Download Center. 3.3.3 Web Browser Software Requirements In order to administer the product with F-Secure Anti-Virus for Microsoft Exchange Web Console, one of the following web browsers is required: Microsoft Internet Explorer 6.0 or later ...
  • Page 41: Centrally Administered Or Stand-Alone Installation

    If the system load is high, a fast processor on the Microsoft Exchange Server speeds up the e-mail message processing. As Microsoft Exchange Server handles a large amount of data, a fast processor alone is not enough to guarantee a fast operation of F-Secure Anti-Virus for Microsoft Exchange. Memory...
  • Page 42: Installation Overview

    If you already use F-Secure Policy Manager to administer other F-Secure products, it is recommended to install F-Secure Anti-Virus for Microsoft Exchange in centralized administration mode. The quarantined mails are managed using the F-Secure Anti-Virus for Microsoft Exchange Web Console in both centrally administered and stand-alone installations.
  • Page 43: Installing F-Secure Anti-Virus For Microsoft Exchange

    CHAPTER 3 Installation Import the product MIB files to F-Secure Policy Manager, if they cannot be uploaded there during the installation. For more information, see “Importing Product MIB files to F-Secure Policy Manager Console”, 54. Check that F-Secure Automatic Update Agent can retrieve the latest virus and spam definition databases.
  • Page 44 Step 2. Read the information in the Welcome screen. Click Next to continue. Step 3. Read the license agreement. If you accept the agreement, check the I accept this agreement checkbox and click Next to continue.
  • Page 45 CHAPTER 3 Installation Step 4. Enter the product keycode. Click Next to continue. Step 5. Choose the components to install. For more information about F-Secure Spam Control, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide. Click Next.
  • Page 46 Click Next to continue. Step 7. Choose the administration method. If you install F-Secure Anti-Virus for Microsoft Exchange in stand-alone mode, you cannot configure settings and receive alerts and status information in F-Secure Policy Manager Console. Click Next to continue.
  • Page 47 If you selected the stand-alone installation, continue to Step 10., 46. If you select the stand-alone mode, use the F-Secure Anti-Virus for Microsoft Exchange Web Console to change product settings and to view statistics. For more information, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
  • Page 48 Next to continue. Step 10. Enter an SMTP address that will be used by F-Secure Anti-Virus for Microsoft Exchange to send warning and informational messages to end-users. The SMTP address should be a valid, existing address that is allowed to send messages.
  • Page 49 CHAPTER 3 Installation Step 11. Specify the Quarantine management method. If you want to manage the Quarantine database locally, select Local quarantine management. Select Centralized quarantine management if you install the product on multiple servers. Click Next to continue. Step 12. Specify the location of the Quarantine database.
  • Page 50 Click Next to continue to either (a) or (b) based on your selection. Specify the installation and the database directory for Microsoft SQL Server 2005 Express Edition. Enter the password for the database server administrator account that will be used to create the new database. Click Next continue.
  • Page 51 CHAPTER 3 Installation Step 13. Specify the name for the SQL database that stores information about the quarantined content. Enter the user name and the password that you want to use to connect to the quarantine database. • Use a different account than the server administrator account.
  • Page 52 F-Secure World Map service. If you agree to send statistics to F-Secure World Map, select Yes and click Next to continue. If you enable F-Secure World Map support, make sure that the server can relay messages properly. For more information, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
  • Page 53 CHAPTER 3 Installation Step 15. If you selected the centralized administration mode, specify the DNS name or IP address of the F-Secure Policy Manager Server and the administration port. Click Next to continue. Step 16. If you selected the centralized administration mode, the installation...
  • Page 54 If you want to skip installing MIB files, click Cancel. You can install MIB files later either manually or by running the Setup again. If the product MIB files cannot be uploaded to F-Secure Policy Manager during installation, you can import them manually.
  • Page 55 CHAPTER 3 Installation Step 18. The installation status of the components is displayed. Click Next to continue. Step 19. The installation is complete. Click Finish to close the Setup wizard.
  • Page 56: After The Installation

    F-Secure Anti-Virus for Microsoft Exchange MIB JAR file cannot be uploaded to F-Secure Policy Manager Server during the installation. In these cases you will have to import the MIB files to F-Secure Policy Manager. You will have to import the MIB files if: F-Secure Anti-Virus for Microsoft Exchange is located in a ...
  • Page 57: Configuring The Product

    For more information, see “Network Requirements”, 19. If F-Secure Anti-Virus for Microsoft Exchange is installed on the  same computer with Microsoft Exchange Server 2010, which is in the Mailbox server role, specify the primary SMTP address for the account which is used to scan items in public folders.
  • Page 58: Network Configuration

    If e-mail messages come from internal SMTP sender hosts and contain both internal and external recipients, messages are split and processed as internal and outbound respectively. If F-Secure Anti-Virus for Microsoft Exchange has been installed in the centralized administration mode, configure the mail direction with F-Secure Policy Manager Console.
  • Page 59: Upgrading From Previous Product Versions

    %Program Files%\F-Secure\Anti-Virus Agent for Microsoft Exchange\msemigrpt.htm. Check the product configuration to finish the upgrade. Centralized Before you install the latest version of the product, upgrade F-Secure Administration Policy Manager to version 9.0 or later. Mode We recommend that you back up your policy data (select Save...
  • Page 60 “Installing F-Secure Anti-Virus for Microsoft Exchange”, 41. The setup program imports the JAR package that contains the product MIB files and the migration tool to F-Secure Policy Manager automatically. If the JAR package could not be imported, import it manually after the installation.
  • Page 61: Upgrading The Evaluation Version

    Eenter the new keycode you have received and click Register Keycode. If you do not want to continue to use F-Secure Anti-Virus for Microsoft Exchange after your evaluation license expires, you should uninstall the software. When the license expires, F-Secure Anti-Virus for Microsoft Exchange stops processing e-mails and messages posted to public folders.
  • Page 62: Uninstalling F-Secure Anti-Virus For Microsoft Exchange

    3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange To uninstall F-Secure Anti-Virus for Microsoft Exchange, select Add/ Remove Programs from the Windows Control Panel. To uninstall F-Secure Anti-Virus for Microsoft Exchange completely, uninstall the components in the following order: 1. F-Secure Spam Control (if it was installed)
  • Page 63: Chapter 4 Configuring F-Secure Spam Control

    ONFIGURING ECURE ONTROL Overview..................62 Realtime Blackhole List Configuration........63...
  • Page 64: Overview

    Overview When F-Secure Spam Control is enabled, incoming messages that are considered as spam can be marked as spam automatically. The product can add an X-header with the spam flag or predefined text in the message header and end users can then create filtering rules that direct the messages marked with the spam flag header into a junk mail folder.
  • Page 65: Realtime Blackhole List Configuration

    Configuring F-Secure Spam Control Realtime Blackhole List Configuration This section describes how to enable and disable Realtime Blackhole Lists, how to optimize F-Secure Spam Control performance, and how to specify blocked and safe recipients and senders by using black- and whitelisting.
  • Page 66 F-Secure Content Scanner Server through F-Secure Anti-Virus for Microsoft Exchange Web Console. You can force F-Secure Spam Control to use a specific DNS server (not necessarily configured in Microsoft Windows networking) by adding a new system environment variable as described in the instructions below.
  • Page 67: Optimizing F-Secure Spam Control Performance

    CHAPTER 4 Configuring F-Secure Spam Control To force F-Secure Spam Control to use a specific DNS server, do the following: 1. Right-click the My Computer icon and select Properties. Select Advanced and click the Environment Variables.. button. In the System variables panel click New.
  • Page 68 'spam-scanner-instances' (oid=1.3.6.1.4.1.2213.18.1.35.500) has been set to 5. To take the new setting into use, restart F-Secure Content Scanner Server. IMPORTANT: Each additional instance of the Spam Scanner takes approximately 25Mb of memory (process fsavsd.exe). Typically you should not need more than 5 instances.
  • Page 69: Appendix A Deploying The Product On A Cluster

    Deploying the Product on a Cluster Installation Overview ..............68 Creating Quarantine Storage............70 Administering the Cluster Installation with F-Secure Policy Manager ..................98 Using the Quarantine in the Cluster Installation ......99 Using the Product with High Availability Architecture in Microsoft Exchange Server 2010.............
  • Page 70: Installation Overview

    Follow these steps to deploy and use F-Secure Anti-Virus for Microsoft Exchange on a cluster. 1. Install F-Secure Policy Manager on a dedicated server. If you already have F-Secure Policy Manager installed in the network, you can use it to administer F-Secure Anti-Virus for Microsoft Exchange. For more information, see F-Secure Policy Manager Administrator’s Guide.
  • Page 71 “ Installing on Clusters with Quarantine on a ”, 96. Dedicated Computer 5. Create a policy domain for the cluster in F-Secure Policy Manager and import cluster nodes there. See “ Administering the Cluster ”, 98. Installation with F-Secure Policy Manager 6.
  • Page 72: Creating Quarantine Storage

    Creating Quarantine Storage Follow instructions in this section to create the Quarantine Storage in the cluster environment. A.2.1 Quarantine Storage in Active-Passive Cluster For active-passive cluster, the Quarantine Storage can be created on a dedicated computer or as a cluster resource. For more information on how to to install the Quarantine Storage on a dedicated computer, see “...
  • Page 73 APPENDIX A Deploying the Product on a Cluster Enter the following information: Name: F-Secure Quarantine Storage  Resource Type: File Share  Group: make sure that your Exchange Virtual Server is selected.  Click Next. 5. Possible Owners dialog opens.
  • Page 74 6. Verify that all nodes that are running Exchange Server are listed under Possible owners and click Next. 7. Dependencies dialog opens.
  • Page 75 Windows Explorer.) Enter the directory name you created on step 2 as Path (for  example, D:\Quarantine). In the Comment box, type F-Secure Quarantine Storage.  Make sure that User limit is set to Maximum allowed.  Click Permissions 9.
  • Page 76 Full Control, Change and Read permissions for Administrator account. Click OK. 10. In File Share Parameters dialog, click Advanced. Make sure that Normal share is selected in Advanced File Share Properties. Click OK. 11. In File Share Parameters dialog, click Finish to create F-Secure Quarantine Storage resource.
  • Page 77: Quarantine Storage In Active-Active Cluster

    APPENDIX A Deploying the Product on a Cluster 12. Right-click the F-Secure Quarantine Storage resource and click Bring Online. A.2.2 Quarantine Storage in Active-Active Cluster For an active-active cluster installation, the quarantine storage must be set on a dedicated computer. This computer should be the member of the same domain as your Exchange Servers.
  • Page 78 Type FSAVMSEQS$ as Share name and make sure that User limit is set to Maximum Allowed. Click Permissions 5. Permissions dialog opens. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names. Remove Everyone account. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM, and Full Control, Change and Read permissions for Administrator account.
  • Page 79 APPENDIX A Deploying the Product on a Cluster Remove all existing groups and users and add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names. Grant all except Full Control permissions for Exchange Domain Servers and SYSTEM. Grant all permissions for Administrator.
  • Page 80: Creating The Quarantine Storage For A Single Copy Cluster Environment

    A.2.3 Creating the Quarantine Storage for a Single Copy Cluster Environment For single copy cluster, the Quarantine Storage can be created on a dedicated computer or as a cluster resource. For more information on how to to install the Quarantine Storage on a dedicated computer, see “...
  • Page 81 APPENDIX A Deploying the Product on a Cluster a. Type F-Secure Quarantine Storage as the name of the new resource. b. In the Resource Type list, select File Share. c. In the Group list, make sure that your Exchange Virtual Server is selected.
  • Page 82 Next to continue. 8. Use the following settings as the File Share parameters. a. Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as comment. The dollar ($) character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer.
  • Page 83 APPENDIX A Deploying the Product on a Cluster Click Permissions to change permissions. 9. Change permissions as follows: a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Remove the Everyone account. c. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM.
  • Page 84 Click to continue. 10. Click Advanced to open Advanced File Share Properties. Make sure that Normal share is selected. Click to continue. 11. Click Finish to create the F-Secure Quarantine Storage resource.
  • Page 85 APPENDIX A Deploying the Product on a Cluster 12. Right-click the F-Secure Quarantine Storage resource and select Bring Online. Windows 2008 based cluster 1. Log on to the active node of the cluster with the domain administrator account. 2. Create a directory for the quarantine storage on the physical disk shared by the cluster nodes.
  • Page 86 Add Administrators, Exchange Servers and SYSTEM with Contributor permission levels. Press Share to close the window and enable the share. 4. Check that everything is configured correctly. The Failover Cluster Manager view should look like this:...
  • Page 87: Creating The Quarantine Storage For A Continuous Cluster Replication Environment

    APPENDIX A Deploying the Product on a Cluster 5. During the F-Secure Anti-Virus for Microsoft Exchange installation, select the quarantine share you just created when the installation asks for the quarantine path. Use the UNC path in form of \\CLUSTERNAME\QUARANTINE. (In the example above, \\LHCLUMB\Quarantine.)
  • Page 88 4. Go to the Sharing tab. a. Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as comment. The dollar ($) character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer.
  • Page 89 APPENDIX A Deploying the Product on a Cluster 5. Change permissions as follows: a. Remove all existing groups and users. a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM.
  • Page 90 6. Go to the Security tab. a. Remove all existing groups and users. a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Grant all except Full Control permissions for Exchange Domain Servers and SYSTEM. c.
  • Page 91: Creating The Quarantine Storage For A Database Availability Group Environment

    APPENDIX A Deploying the Product on a Cluster A.2.5 Creating the Quarantine Storage for a Database Availability Group Environment For the Database Availability Group (DAG) installation, the quarantine storage must be set on a dedicated computer. This computer has to be a member in the same domain with Exchange Servers.
  • Page 92 Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as a comment. The dollar ($) character at the end of the share name hides the share when you view the network resources of the cluster with Windows Explorer.
  • Page 93 APPENDIX A Deploying the Product on a Cluster 9. Click to continue. 10. Go to the Security tab and click Edit. a. Remove all existing groups and users. b. Add Administrator, Exchange Servers and SYSTEM to the Group or user names list. c.
  • Page 94 11. Click to continue. After you have configured the quarantine storage, make sure that it is accessible. Follow these instructions: 1. Log on as the domain administrator to any node of the cluster. 2. Open \\<Server>\FSAVMSEQS$\ with Windows Explorer, where <Server>...
  • Page 95: Installing The Product

    1. Log on to the active node of the cluster using a domain administrator account. 2. Run F-Secure Anti-Virus for Microsoft Exchange setup wizard. Install the product in the centralized management mode. Specify the IP address of F-Secure Policy Manager Server and admin.pub that you created during the F-Secure Policy Manager installation.
  • Page 96 Specify the UNC path to the Quarantine Storage share that you created before the installation as the Quarantine Directory. For example, \\<EVSName>\FSAVMSEQS$, where <EVSName> is the network name of your Exchange Virtual Server. 4. The setup program asks to specify the SQL Server to use for the quarantine database.
  • Page 97 APPENDIX A Deploying the Product on a Cluster Specify the name for the database and enter user name and password that will be used to access the database. 6. Complete the installation on the active node. 7. Log on to the passive node of the cluster using a domain administrator account.
  • Page 98: Installing On Clusters With Quarantine On A Dedicated Computer

    1. Log on to the first node of the cluster using a domain administrator account. 2. Run F-Secure Anti-Virus for Microsoft Exchange setup wizard. Install the product in the centralized management mode. Specify the IP address of F-Secure Policy Manager Server and admin.pub that you created during the F-Secure Policy Manager installation.
  • Page 99 APPENDIX A Deploying the Product on a Cluster 4. The setup program asks to specify the SQL Server to use for the quarantine database. Select the server running Microsoft SQL Server. 5. The setup program asks to specify the database name where quarantined items are stored.
  • Page 100: Administering The Cluster Installation With F-Secure Policy Manager

    Select Use the existing database. 9. Complete the installation on the second node. Administering the Cluster Installation with F-Secure Policy Manager To administer the product installed on a cluster, create a new subdomain under your organization or network domain. Import all cluster nodes to this subdomain.
  • Page 101: Using The Quarantine In The Cluster Installation

    APPENDIX A Deploying the Product on a Cluster 3. Distribute the policy. 4. All nodes receive new settings next time they poll the F-Secure Policy Manager Server. If you need to change settings on a particular node, follow these instructions: 1.
  • Page 102 Even though the Exchange organization may contain more than one Hub Transport Role server, F-Secure Anti-Virus for Microsoft Exchange supports only one Pickup folder. After you have specified one Hub Transport Role Server with a Pickup folder,...
  • Page 103: Using The Product With High Availability Architecture In Microsoft Exchange Server 2010

    Architecture in Microsoft Exchange Server 2010 New high-availability solutions in Microsoft Exchange Server 2010 support online mailbox moves. As it takes some time for F-Secure Anti-Virus for Microsoft Exchange to enumerate mailbox changes on nodes, manual and scheduled scans might not scan the moved mailbox but the mailbox copy on the former node instead, if the scan is started right after the move.
  • Page 104: Uninstallation

    SYSTEM and Exchange Domain Servers, and full control is allowed for Administrator. To change the location of the quarantine storage from F-Secure  Policy Manager Console, use the Final flag to override the setting...
  • Page 105: Appendix B Services And Processes

    APPENDIX: Services and Processes List of Services and Processes ..........104...
  • Page 106: List Of Services And Processes

    List of Services and Processes The following tables list the services and processes that are running on the system after the installation: Service Process Description F-Secure Anti-Virus fshkmngr.exe This is the main service that for Microsoft (in Microsoft takes care of other product...
  • Page 107 F-Secure Network fnrb32.exe The service handles the Request Broker communication with F-Secure Policy Manager via HTTP interface. fsmb32.exe F-Secure Message Broker provides the inter-process communication interface for integrated services and applications. fch32.exe...
  • Page 108 F-Secure Policy Manager Console, LogFile.log, Windows event log and SMTP server. fsm32.exe The F-Secure Settings and Statistics User Interface. The process is not running unless the user is logged in to the system. fih32.exe...
  • Page 109 APPENDIX B Services and Processes...
  • Page 110: Technical Support

    Technical Support F-Secure Online Support Resources........109 Web Club.................. 111 Virus Descriptions on the Web ..........111...
  • Page 111: F-Secure Online Support Resources

    If you have questions about F-Secure Anti-Virus for Microsoft Exchange not covered in this manual or on the F-Secure support web pages, you can contact your local F-Secure distributor or F-Secure Corporation directly.
  • Page 112 You can also find and run the FSDiag.exe utility under the F-Secure\Common folder, if you prefer not to do it through the F-Secure Anti-Virus for Microsoft Exchange Web Console. The tool generates a file called FSDiag.tar.gz.
  • Page 113: Web Club

    Technical Support Web Club The F-Secure Web Club provides assistance and updated versions of the F-Secure products. To connect to the Web Club on our Web site, open the F-Secure Anti-Virus for Microsoft Exchange Web Console, and click the Web Club link in the banner.
  • Page 114: About F-Secure Corporation

    This is substantiated by the company’s independently proven ability to respond faster to new threats than its main competitors. Founded in 1988 and headquartered in Finland, F-Secure has been listed on the OMX Nordic Exchange Helsinki since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry.

Table of Contents