Operation of the application
In order to create protection of Microsoft Exchange Server, installed on
the cluster, against malware and SPAM:
1.
Install the Security Server component on each node of the cluster.
The installation shall be performed from the distribution kit
individually for each server.
2.
Install the Management Console on a computer within the
corporate network.
3.
Create the list of managed servers by adding all cluster nodes as
servers (see section 4.3, page 30).
4.
Connect the Management Console to the servers (see section 4.4,
page 31).
5.
Configure the anti-virus protection system for each server using
identical settings values taking into consideration the following:
•
•
•
Specify a folder on a local disk of the server file system as
the installation folder.
Shared disks should not be used for this purpose as when
the Microsoft Exchange Server application is moved to a dif-
ferent node of the cluster, the shared disk will be moved
along with the application.
When adding managed servers and configuring connection
of Management Console to the Server, use the names of
physical servers on which the Security Server is installed.
The use of a virtual Exchange server name may cause an
addressing error when the Microsoft Exchange Server is
moved to a different node of the cluster.
As the backup storage folder, select a folder located on the
physical server where the Security Server component is
installed (see section 9.7, page 83).
As a folder to be used to store reports and logs, select folders
located on the physical server where the Security Server
component is installed (see section 12.1.2, page 107 and
section 13.2, page 114).
The list of unprotected storage areas on all servers must match
(see section 14.5, page 122).
19
Need help?
Do you have a question about the SECURITY 5.5 - FOR MICROSOFT EXCHANGE SERVER 2003 and is the answer not in the manual?