Proxy Configuration - F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE Administrator's Manual

Hide thumbs Also See for ANTI-VIRUS FOR MICROSOFT EXCHANGE:
Table of Contents

Advertisement

4.3.4

Proxy Configuration

Action on connection
failure
Trusted networks
You can specify proxy server parameters that Content Scanner Server
uses when it connects to the threat detection center on the Proxy
Configuration page.
Administration with Web Console
Specify the action for messages when the threat
detection center cannot be contacted and the
threat detection engine cannot classify the
message.
Pass through - The message is passed through
without scanning it for spam.
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use '*'
wildcard to match any number and '-' to define a
range of numbers (172.16.*.1, 172.16.4.10-110).
CHAPTER 4
143

Advertisement

Table of Contents
loading

Table of Contents