4.3.4
Proxy Configuration
Action on connection
failure
Trusted networks
You can specify proxy server parameters that Content Scanner Server
uses when it connects to the threat detection center on the Proxy
Configuration page.
Administration with Web Console
Specify the action for messages when the threat
detection center cannot be contacted and the
threat detection engine cannot classify the
message.
Pass through - The message is passed through
without scanning it for spam.
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use '*'
wildcard to match any number and '-' to define a
range of numbers (172.16.*.1, 172.16.4.10-110).
CHAPTER 4
143
Need help?
Do you have a question about the ANTI-VIRUS FOR MICROSOFT EXCHANGE and is the answer not in the manual?