F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 Administrator's Manual page 7

Hide thumbs Also See for ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00:
Table of Contents

Advertisement

8.4
Realtime Blackhole List Configuration .....................................................................289
8.4.1 Configuring Realtime Blackhole Lists ...........................................................289
8.4.2 Optimizing F-Secure Spam Control Performance ........................................291
9.1
Overview ..................................................................................................................294
9.2
Automatic Updates with F-Secure Automatic Update Agent....................................294
9.3
Configuring Automatic Updates ...............................................................................294
List of Variables................................................................................................................ 297
B.1 List of Services and Processes ............................................................................... 300
C.1 Installation Overview ............................................................................................... 304
C.2 Creating Quarantine Storage ...................................................................................305
C.2.1 Quarantine Storage in Active-Passive Cluster .............................................305
C.2.2 Quarantine Storage in Active-Active Cluster ................................................310
C.3 Installing the Product................................................................................................323
C.3.1 Installing on Active-Passive Cluster .............................................................323
C.3.2 Installing on Active-Active Cluster ................................................................325
C.5 Using the Quarantine in the Cluster Installation.......................................................329
C.6 Uninstallation............................................................................................................331
C.7 Troubleshooting .......................................................................................................331
D.1 Overview ................................................................................................................. 333
D.2 Solution ....................................................................................................................333
ment..............................................................................................................319
7
293
296
299
303
332

Advertisement

Table of Contents
loading

This manual is also suitable for:

Anti-virus for microsoft exchange

Table of Contents