F-Secure Anti-Virus for Microsoft Exchange Deployment Guide...
Page 2
Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice.
Introduction Overview ........................9 How F-Secure Anti-Virus for Microsoft Exchange Works........... 10 Key Features......................13 Scanning Methods ..................... 15 F-Secure Anti-Virus Mail Server and Gateway Products ........... 16 Chapter 2 Deployment Installation Modes ...................... 18 Network Requirements....................19 Deployment Scenarios ....................20 2.3.1 Single Exchange Server (2003/2007/2010)............21...
Page 4
Installation Overview ....................40 Installing F-Secure Anti-Virus for Microsoft Exchange..........41 After the Installation ....................54 3.8.1 Importing Product MIB files to F-Secure Policy Manager Console....54 3.8.2 Configuring the Product.................. 55 Upgrading from Previous Product Versions ............... 57 3.10 Upgrading the Evaluation Version................59 3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange ..........
Page 5
A.3.1 Installing on Clusters with Quarantine as Cluster Resource ......93 A.3.2 Installing on Clusters with Quarantine on a Dedicated Computer ....96 A.4 Administering the Cluster Installation with F-Secure Policy Manager......98 A.5 Using the Quarantine in the Cluster Installation............99 A.6 Using the Product with High Availability...
F-Secure Spam Control. Appendix A. Deploying the Product on a Cluster. Instructions how to deploy and use F-Secure Anti-Virus for Microsoft Exchange on a cluster. Appendix B. Services and Processes. Describes services, devices and processes of F-Secure Anti-Virus for Microsoft Exchange.
Conventions Used in F-Secure Guides This section describes the symbols, fonts, and terminology used in this manual. Symbols WARNING: The warning symbol indicates a situation with a risk of irreversible destruction to data. IMPORTANT: An exclamation mark provides important information that you need to consider.
In our constant attempts to improve our documentation, we would welcome your feedback. If you have any questions, comments, or suggestions about this or any other F-Secure document, please contact us at documentation@f-secure.com.
NTRODUCTION Overview..................9 How F-Secure Anti-Virus for Microsoft Exchange Works ... 10 Key Features ................13 Scanning Methods..............15 F-Secure Anti-Virus Mail Server and Gateway Products.... 16...
Sober, Netsky and Bagle, have caused a lot of damage around the world. F-Secure Anti-Virus Mail Server and Gateway products are designed to protect your company's mail and groupware servers and to shield the company network from any malicious code that travels in HTTP or SMTP traffic.
How F-Secure Anti-Virus for Microsoft Exchange Works F-Secure Anti-Virus for Microsoft Exchange is designed to detect and disinfect viruses and other malicious code from e-mail transmissions through Microsoft Exchange Server. Scanning is done in real time as the mail passes through Microsoft Exchange Server. On-demand scanning of user mailboxes and public folders is also available.
Page 13
Our team of dedicated virus researchers is on call 24-hours a day responding to new and emerging threats. In fact, F-Secure is one of the only companies to release tested virus definition updates continuously, to make sure our customers are receiving the highest quality service and protection.
Page 14
F-Secure Policy Manager Console and all managed systems. Figure 1-1 (1) E-mail arrives from the Internet to F-Secure Anti-Virus for Microsoft Exchange, which (2) filters malicious content from mails and attachments, and (3) delivers cleaned files forward.
CHAPTER 1 Introduction Key Features F-Secure Anti-Virus for Microsoft Exchange provides the following features and capabilities. Superior Protection Superior detection rate with multiple scanning engines. Scanning engines updated automatically with the latest versions. Automatic malicious code detection and disinfection.
Page 16
You can manage and search quarantined content with the F-Secure Anti-Virus for Microsoft Exchange Web Console. When F-Secure Anti-Virus for Windows Servers is installed on the same computer, both products can be administered with the common web-based user interface.
CHAPTER 1 Introduction Scanning Methods Virus Scanning The virus scan uses virus definition databases to detect and disinfect viruses. Virus definition databases are updated typically multiple times a day and they provide an always up-to-date protection capability. Heuristic Scanning The heuristic scan analyzes files for suspicious code behavior so that the product can detect unknown malware.
F-Secure Anti-Virus Mail Server and Gateway Products The F-Secure Anti-Virus product line consists of workstation, file server, mail server, gateway and mobile products. F-Secure Anti-Virus for Microsoft Exchange™ protects your Microsoft Exchange users from malicious code contained within files they receive in mail messages and documents they open from shared databases.
Installation Modes F-Secure Anti-Virus for Microsoft Exchange can be installed either in stand-alone or centrally administered mode. In stand-alone installation, F-Secure Anti-Virus for Microsoft Exchange is managed with Web Console. In centrally administered mode, it is managed centrally with F-Secure Policy Manager components: F-Secure Policy Manager Server and F-Secure Policy Manager Console.
This network configuration is valid for all scenarios described in this chapter. Make sure that the following network traffic can pass through: Service Process Inbound ports Outbound ports F-Secure Content Scanner %ProgramFiles%\F-Secure\Cont 18971 (TCP) (on DNS (53, UDP/TCP), Server ent Scanner Server\fsavsd.exe...
Depending on how the Microsoft Exchange Server roles are deployed in your environment, you might consider various scenarios of deploying F-Secure Anti-Virus for Microsoft Exchange. There are various ways to deploy F-Secure Anti-Virus for Microsoft Exchange that are suitable to...
SMTP. Usually, the server is located behind the firewall or router. Installing F-Secure Anti-Virus for Microsoft Exchange Install F-Secure Anti-Virus for Microsoft Exchange to the server running Microsoft Exchange Server or Microsoft Small Business Server. Administration Modes You can install the product in stand-alone mode and administer it with the Web Console.
Exchange servers. In addition, the front-end server can be protected with F-Secure Spam Control. Administration Modes Install F-Secure Policy Manager Server on a dedicated server or on the same server with one of Exchange servers. You can administer the product with F-Secure Policy Manager Console.
Exchange servers. Installing F-Secure Anti-Virus for Microsoft Exchange Install F-Secure Anti-Virus for Microsoft Exchange to all servers where Exchange Edge, Hub and Mailbox Server roles are deployed. In addition, the Edge server can be protected with F-Secure Spam Control.
Administration Modes Install F-Secure Policy Manager Server on a dedicated server or on the same server with one of Exchange servers. You can administer the product with F-Secure Policy Manager Console. When you install the product, configure each installation to connect to the same F-Secure Policy Manager Server.
Page 27
F-Secure Spam Control can be installed on the Edge server. Administration Modes Install F-Secure Policy Manager Server on a dedicated server. You can administer the product with F-Secure Policy Manager Console. When you install the product, configure each installation to connect to the same F-Secure Policy Manager Server.
For example, you have front-end and back-end servers running Exchange Server 2003, or a network configuration with Edge and Mailbox roles running Exchange Server 2007/2010. Microsoft SQL Server is installed on a dedicated server or on the server running F-Secure Policy Manager Server.
Page 29
Microsoft SQL Server 2005 Express Edition included in F-Secure Anti-Virus for Microsoft Exchange, the Quarantine database size is limited to 4 GB. You can use F-Secure Anti-Virus for Microsoft Exchange Web Console to manage and search quarantined content. For more information, consulft F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
Page 30
Follow these steps to change the authentication mode: 1. Open Microsoft SQL Server Management Studio or Microsoft SQL Server Management Studio Express. If you do not have Microsoft SQL Server Management Studio installed, you can freely download Management Studio Express from Microsoft web site.
Centralized Management Requirements........35 Other System Component Requirements........35 Improving Reliability and Performance........38 Installation Overview ..............40 Installing F-Secure Anti-Virus for Microsoft Exchange ....41 After the Installation..............54 Upgrading from Previous Product Versions........ 57 Upgrading the Evaluation Version ..........59...
System Requirements F-Secure Anti-Virus for Microsoft Exchange is installed on the computer running Microsoft Exchange Server. The release notes document contains the latest information about the product and might have changes to system requirements and the installation procedure. It is highly recommended to read the release notes before you proceed with the installation.
Page 33
CHAPTER 3 Installation For performance and security reasons, it is not possible to install the product on any other than an NTFS partition. Disk space for 10 GB or more. The required disk space processing: depends on the number of mailboxes, amount of data traffic and the size of the Information Store.
3.1.2 Installation on Microsoft Exchange Server 2007 The product can be installed on a computer running one of the following Microsoft Exchange Server versions: Microsoft® Exchange Server 2007 (64-bit version) with the latest service pack Microsoft® Small Business Server 2008 ...
Page 35
CHAPTER 3 Installation For performance and security reasons, it is not possible to install the product on any other than an NTFS partition. Disk space for 10 GB or more. The required disk space processing: depends on the number of mailboxes, amount of data traffic and the size of the Information Store.
3.1.3 Installation on Microsoft Exchange Server 2010 The product can be installed on a computer running the following Microsoft Exchange Server version: Microsoft® Exchange Server 2010 Microsoft® Windows Server 2008, Operating system: Standard Edition Microsoft® Windows Server 2008, ...
2010 high-availability solutions based on Database Availability Groups (DAG). Centralized Management Requirements F-Secure Policy Manager 9.00 or later is required if you plan to install the product in the centralized administration mode and manage it with F-Secure Policy Manager Console.
Express edition) Microsoft SQL Server 2005 Express Edition Service Pack 3 is distributed with the product and can be installed during F-Secure Anti-Virus for Microsoft Exchange Setup. When centralized quarantine management is used, the SQL server must be reachable from the network and file sharing must be enabled.
Page 39
Exchange installations. Microsoft SQL Server 2005 Express Edition is delivered together with F-Secure Anti-Virus for Microsoft Exchange, and you can install it during the F-Secure Anti-Virus for Microsoft Exchange Setup. Microsoft SQL If your organization sends a large amount of e-mails, it is ...
Framework can be downloaded from the Microsoft Download Center. 3.3.3 Web Browser Software Requirements In order to administer the product with F-Secure Anti-Virus for Microsoft Exchange Web Console, one of the following web browsers is required: Microsoft Internet Explorer 6.0 or later ...
If the system load is high, a fast processor on the Microsoft Exchange Server speeds up the e-mail message processing. As Microsoft Exchange Server handles a large amount of data, a fast processor alone is not enough to guarantee a fast operation of F-Secure Anti-Virus for Microsoft Exchange. Memory...
If you already use F-Secure Policy Manager to administer other F-Secure products, it is recommended to install F-Secure Anti-Virus for Microsoft Exchange in centralized administration mode. The quarantined mails are managed using the F-Secure Anti-Virus for Microsoft Exchange Web Console in both centrally administered and stand-alone installations.
CHAPTER 3 Installation Import the product MIB files to F-Secure Policy Manager, if they cannot be uploaded there during the installation. For more information, see “Importing Product MIB files to F-Secure Policy Manager Console”, 54. Check that F-Secure Automatic Update Agent can retrieve the latest virus and spam definition databases.
Page 44
Step 2. Read the information in the Welcome screen. Click Next to continue. Step 3. Read the license agreement. If you accept the agreement, check the I accept this agreement checkbox and click Next to continue.
Page 45
CHAPTER 3 Installation Step 4. Enter the product keycode. Click Next to continue. Step 5. Choose the components to install. For more information about F-Secure Spam Control, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide. Click Next.
Page 46
Click Next to continue. Step 7. Choose the administration method. If you install F-Secure Anti-Virus for Microsoft Exchange in stand-alone mode, you cannot configure settings and receive alerts and status information in F-Secure Policy Manager Console. Click Next to continue.
Page 47
If you selected the stand-alone installation, continue to Step 10., 46. If you select the stand-alone mode, use the F-Secure Anti-Virus for Microsoft Exchange Web Console to change product settings and to view statistics. For more information, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
Page 48
Next to continue. Step 10. Enter an SMTP address that will be used by F-Secure Anti-Virus for Microsoft Exchange to send warning and informational messages to end-users. The SMTP address should be a valid, existing address that is allowed to send messages.
Page 49
CHAPTER 3 Installation Step 11. Specify the Quarantine management method. If you want to manage the Quarantine database locally, select Local quarantine management. Select Centralized quarantine management if you install the product on multiple servers. Click Next to continue. Step 12. Specify the location of the Quarantine database.
Page 50
Click Next to continue to either (a) or (b) based on your selection. Specify the installation and the database directory for Microsoft SQL Server 2005 Express Edition. Enter the password for the database server administrator account that will be used to create the new database. Click Next continue.
Page 51
CHAPTER 3 Installation Step 13. Specify the name for the SQL database that stores information about the quarantined content. Enter the user name and the password that you want to use to connect to the quarantine database. • Use a different account than the server administrator account.
Page 52
F-Secure World Map service. If you agree to send statistics to F-Secure World Map, select Yes and click Next to continue. If you enable F-Secure World Map support, make sure that the server can relay messages properly. For more information, consult F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide.
Page 53
CHAPTER 3 Installation Step 15. If you selected the centralized administration mode, specify the DNS name or IP address of the F-Secure Policy Manager Server and the administration port. Click Next to continue. Step 16. If you selected the centralized administration mode, the installation...
Page 54
If you want to skip installing MIB files, click Cancel. You can install MIB files later either manually or by running the Setup again. If the product MIB files cannot be uploaded to F-Secure Policy Manager during installation, you can import them manually.
Page 55
CHAPTER 3 Installation Step 18. The installation status of the components is displayed. Click Next to continue. Step 19. The installation is complete. Click Finish to close the Setup wizard.
F-Secure Anti-Virus for Microsoft Exchange MIB JAR file cannot be uploaded to F-Secure Policy Manager Server during the installation. In these cases you will have to import the MIB files to F-Secure Policy Manager. You will have to import the MIB files if: F-Secure Anti-Virus for Microsoft Exchange is located in a ...
For more information, see “Network Requirements”, 19. If F-Secure Anti-Virus for Microsoft Exchange is installed on the same computer with Microsoft Exchange Server 2010, which is in the Mailbox server role, specify the primary SMTP address for the account which is used to scan items in public folders.
If e-mail messages come from internal SMTP sender hosts and contain both internal and external recipients, messages are split and processed as internal and outbound respectively. If F-Secure Anti-Virus for Microsoft Exchange has been installed in the centralized administration mode, configure the mail direction with F-Secure Policy Manager Console.
%Program Files%\F-Secure\Anti-Virus Agent for Microsoft Exchange\msemigrpt.htm. Check the product configuration to finish the upgrade. Centralized Before you install the latest version of the product, upgrade F-Secure Administration Policy Manager to version 9.0 or later. Mode We recommend that you back up your policy data (select Save...
Page 60
“Installing F-Secure Anti-Virus for Microsoft Exchange”, 41. The setup program imports the JAR package that contains the product MIB files and the migration tool to F-Secure Policy Manager automatically. If the JAR package could not be imported, import it manually after the installation.
Eenter the new keycode you have received and click Register Keycode. If you do not want to continue to use F-Secure Anti-Virus for Microsoft Exchange after your evaluation license expires, you should uninstall the software. When the license expires, F-Secure Anti-Virus for Microsoft Exchange stops processing e-mails and messages posted to public folders.
3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange To uninstall F-Secure Anti-Virus for Microsoft Exchange, select Add/ Remove Programs from the Windows Control Panel. To uninstall F-Secure Anti-Virus for Microsoft Exchange completely, uninstall the components in the following order: 1. F-Secure Spam Control (if it was installed)
Overview When F-Secure Spam Control is enabled, incoming messages that are considered as spam can be marked as spam automatically. The product can add an X-header with the spam flag or predefined text in the message header and end users can then create filtering rules that direct the messages marked with the spam flag header into a junk mail folder.
Configuring F-Secure Spam Control Realtime Blackhole List Configuration This section describes how to enable and disable Realtime Blackhole Lists, how to optimize F-Secure Spam Control performance, and how to specify blocked and safe recipients and senders by using black- and whitelisting.
Page 66
F-Secure Content Scanner Server through F-Secure Anti-Virus for Microsoft Exchange Web Console. You can force F-Secure Spam Control to use a specific DNS server (not necessarily configured in Microsoft Windows networking) by adding a new system environment variable as described in the instructions below.
CHAPTER 4 Configuring F-Secure Spam Control To force F-Secure Spam Control to use a specific DNS server, do the following: 1. Right-click the My Computer icon and select Properties. Select Advanced and click the Environment Variables.. button. In the System variables panel click New.
Page 68
'spam-scanner-instances' (oid=1.3.6.1.4.1.2213.18.1.35.500) has been set to 5. To take the new setting into use, restart F-Secure Content Scanner Server. IMPORTANT: Each additional instance of the Spam Scanner takes approximately 25Mb of memory (process fsavsd.exe). Typically you should not need more than 5 instances.
Deploying the Product on a Cluster Installation Overview ..............68 Creating Quarantine Storage............70 Administering the Cluster Installation with F-Secure Policy Manager ..................98 Using the Quarantine in the Cluster Installation ......99 Using the Product with High Availability Architecture in Microsoft Exchange Server 2010.............
Follow these steps to deploy and use F-Secure Anti-Virus for Microsoft Exchange on a cluster. 1. Install F-Secure Policy Manager on a dedicated server. If you already have F-Secure Policy Manager installed in the network, you can use it to administer F-Secure Anti-Virus for Microsoft Exchange. For more information, see F-Secure Policy Manager Administrator’s Guide.
Page 71
“ Installing on Clusters with Quarantine on a ”, 96. Dedicated Computer 5. Create a policy domain for the cluster in F-Secure Policy Manager and import cluster nodes there. See “ Administering the Cluster ”, 98. Installation with F-Secure Policy Manager 6.
Creating Quarantine Storage Follow instructions in this section to create the Quarantine Storage in the cluster environment. A.2.1 Quarantine Storage in Active-Passive Cluster For active-passive cluster, the Quarantine Storage can be created on a dedicated computer or as a cluster resource. For more information on how to to install the Quarantine Storage on a dedicated computer, see “...
Page 73
APPENDIX A Deploying the Product on a Cluster Enter the following information: Name: F-Secure Quarantine Storage Resource Type: File Share Group: make sure that your Exchange Virtual Server is selected. Click Next. 5. Possible Owners dialog opens.
Page 74
6. Verify that all nodes that are running Exchange Server are listed under Possible owners and click Next. 7. Dependencies dialog opens.
Page 75
Windows Explorer.) Enter the directory name you created on step 2 as Path (for example, D:\Quarantine). In the Comment box, type F-Secure Quarantine Storage. Make sure that User limit is set to Maximum allowed. Click Permissions 9.
Page 76
Full Control, Change and Read permissions for Administrator account. Click OK. 10. In File Share Parameters dialog, click Advanced. Make sure that Normal share is selected in Advanced File Share Properties. Click OK. 11. In File Share Parameters dialog, click Finish to create F-Secure Quarantine Storage resource.
APPENDIX A Deploying the Product on a Cluster 12. Right-click the F-Secure Quarantine Storage resource and click Bring Online. A.2.2 Quarantine Storage in Active-Active Cluster For an active-active cluster installation, the quarantine storage must be set on a dedicated computer. This computer should be the member of the same domain as your Exchange Servers.
Page 78
Type FSAVMSEQS$ as Share name and make sure that User limit is set to Maximum Allowed. Click Permissions 5. Permissions dialog opens. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names. Remove Everyone account. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM, and Full Control, Change and Read permissions for Administrator account.
Page 79
APPENDIX A Deploying the Product on a Cluster Remove all existing groups and users and add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names. Grant all except Full Control permissions for Exchange Domain Servers and SYSTEM. Grant all permissions for Administrator.
A.2.3 Creating the Quarantine Storage for a Single Copy Cluster Environment For single copy cluster, the Quarantine Storage can be created on a dedicated computer or as a cluster resource. For more information on how to to install the Quarantine Storage on a dedicated computer, see “...
Page 81
APPENDIX A Deploying the Product on a Cluster a. Type F-Secure Quarantine Storage as the name of the new resource. b. In the Resource Type list, select File Share. c. In the Group list, make sure that your Exchange Virtual Server is selected.
Page 82
Next to continue. 8. Use the following settings as the File Share parameters. a. Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as comment. The dollar ($) character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer.
Page 83
APPENDIX A Deploying the Product on a Cluster Click Permissions to change permissions. 9. Change permissions as follows: a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Remove the Everyone account. c. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM.
Page 84
Click to continue. 10. Click Advanced to open Advanced File Share Properties. Make sure that Normal share is selected. Click to continue. 11. Click Finish to create the F-Secure Quarantine Storage resource.
Page 85
APPENDIX A Deploying the Product on a Cluster 12. Right-click the F-Secure Quarantine Storage resource and select Bring Online. Windows 2008 based cluster 1. Log on to the active node of the cluster with the domain administrator account. 2. Create a directory for the quarantine storage on the physical disk shared by the cluster nodes.
Page 86
Add Administrators, Exchange Servers and SYSTEM with Contributor permission levels. Press Share to close the window and enable the share. 4. Check that everything is configured correctly. The Failover Cluster Manager view should look like this:...
APPENDIX A Deploying the Product on a Cluster 5. During the F-Secure Anti-Virus for Microsoft Exchange installation, select the quarantine share you just created when the installation asks for the quarantine path. Use the UNC path in form of \\CLUSTERNAME\QUARANTINE. (In the example above, \\LHCLUMB\Quarantine.)
Page 88
4. Go to the Sharing tab. a. Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as comment. The dollar ($) character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer.
Page 89
APPENDIX A Deploying the Product on a Cluster 5. Change permissions as follows: a. Remove all existing groups and users. a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Grant Change and Read permissions for Exchange Domain Servers and SYSTEM.
Page 90
6. Go to the Security tab. a. Remove all existing groups and users. a. Add Administrator, Exchange Domain Servers and SYSTEM to the Group or user names list. b. Grant all except Full Control permissions for Exchange Domain Servers and SYSTEM. c.
APPENDIX A Deploying the Product on a Cluster A.2.5 Creating the Quarantine Storage for a Database Availability Group Environment For the Database Availability Group (DAG) installation, the quarantine storage must be set on a dedicated computer. This computer has to be a member in the same domain with Exchange Servers.
Page 92
Type FSAVMSEQS$ as the share name and F-Secure Quarantine Storage as a comment. The dollar ($) character at the end of the share name hides the share when you view the network resources of the cluster with Windows Explorer.
Page 93
APPENDIX A Deploying the Product on a Cluster 9. Click to continue. 10. Go to the Security tab and click Edit. a. Remove all existing groups and users. b. Add Administrator, Exchange Servers and SYSTEM to the Group or user names list. c.
Page 94
11. Click to continue. After you have configured the quarantine storage, make sure that it is accessible. Follow these instructions: 1. Log on as the domain administrator to any node of the cluster. 2. Open \\<Server>\FSAVMSEQS$\ with Windows Explorer, where <Server>...
1. Log on to the active node of the cluster using a domain administrator account. 2. Run F-Secure Anti-Virus for Microsoft Exchange setup wizard. Install the product in the centralized management mode. Specify the IP address of F-Secure Policy Manager Server and admin.pub that you created during the F-Secure Policy Manager installation.
Page 96
Specify the UNC path to the Quarantine Storage share that you created before the installation as the Quarantine Directory. For example, \\<EVSName>\FSAVMSEQS$, where <EVSName> is the network name of your Exchange Virtual Server. 4. The setup program asks to specify the SQL Server to use for the quarantine database.
Page 97
APPENDIX A Deploying the Product on a Cluster Specify the name for the database and enter user name and password that will be used to access the database. 6. Complete the installation on the active node. 7. Log on to the passive node of the cluster using a domain administrator account.
1. Log on to the first node of the cluster using a domain administrator account. 2. Run F-Secure Anti-Virus for Microsoft Exchange setup wizard. Install the product in the centralized management mode. Specify the IP address of F-Secure Policy Manager Server and admin.pub that you created during the F-Secure Policy Manager installation.
Page 99
APPENDIX A Deploying the Product on a Cluster 4. The setup program asks to specify the SQL Server to use for the quarantine database. Select the server running Microsoft SQL Server. 5. The setup program asks to specify the database name where quarantined items are stored.
Select Use the existing database. 9. Complete the installation on the second node. Administering the Cluster Installation with F-Secure Policy Manager To administer the product installed on a cluster, create a new subdomain under your organization or network domain. Import all cluster nodes to this subdomain.
APPENDIX A Deploying the Product on a Cluster 3. Distribute the policy. 4. All nodes receive new settings next time they poll the F-Secure Policy Manager Server. If you need to change settings on a particular node, follow these instructions: 1.
Page 102
Even though the Exchange organization may contain more than one Hub Transport Role server, F-Secure Anti-Virus for Microsoft Exchange supports only one Pickup folder. After you have specified one Hub Transport Role Server with a Pickup folder,...
Architecture in Microsoft Exchange Server 2010 New high-availability solutions in Microsoft Exchange Server 2010 support online mailbox moves. As it takes some time for F-Secure Anti-Virus for Microsoft Exchange to enumerate mailbox changes on nodes, manual and scheduled scans might not scan the moved mailbox but the mailbox copy on the former node instead, if the scan is started right after the move.
SYSTEM and Exchange Domain Servers, and full control is allowed for Administrator. To change the location of the quarantine storage from F-Secure Policy Manager Console, use the Final flag to override the setting...
List of Services and Processes The following tables list the services and processes that are running on the system after the installation: Service Process Description F-Secure Anti-Virus fshkmngr.exe This is the main service that for Microsoft (in Microsoft takes care of other product...
Page 107
F-Secure Network fnrb32.exe The service handles the Request Broker communication with F-Secure Policy Manager via HTTP interface. fsmb32.exe F-Secure Message Broker provides the inter-process communication interface for integrated services and applications. fch32.exe...
Page 108
F-Secure Policy Manager Console, LogFile.log, Windows event log and SMTP server. fsm32.exe The F-Secure Settings and Statistics User Interface. The process is not running unless the user is logged in to the system. fih32.exe...
If you have questions about F-Secure Anti-Virus for Microsoft Exchange not covered in this manual or on the F-Secure support web pages, you can contact your local F-Secure distributor or F-Secure Corporation directly.
Page 112
You can also find and run the FSDiag.exe utility under the F-Secure\Common folder, if you prefer not to do it through the F-Secure Anti-Virus for Microsoft Exchange Web Console. The tool generates a file called FSDiag.tar.gz.
Technical Support Web Club The F-Secure Web Club provides assistance and updated versions of the F-Secure products. To connect to the Web Club on our Web site, open the F-Secure Anti-Virus for Microsoft Exchange Web Console, and click the Web Club link in the banner.
This is substantiated by the company’s independently proven ability to respond faster to new threats than its main competitors. Founded in 1988 and headquartered in Finland, F-Secure has been listed on the OMX Nordic Exchange Helsinki since 1999. The company has consistently been one of the fastest growing publicly listed companies in the industry.
Need help?
Do you have a question about the ANTI-VIRUS - FOR MICROSOFT EXCHANGE and is the answer not in the manual?
Questions and answers