Proxy Configuration - F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 Administrator's Manual

Table of Contents

Advertisement

CHAPTER 5
205
Centrally Managed Administration
Heuristic Scanning - F-Secure Content Scanner
Server checks the message using spam
heuristics.
Trusted Networks
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use '*'
wildcard to match any number and '-' to define a
range of numbers (172.16.*.1, 172.16.4.10-110).
5.4.7

Proxy Configuration

Figure 5-32 Proxy configuration

Advertisement

Table of Contents
loading

This manual is also suitable for:

Anti-virus for microsoft exchange

Table of Contents