290
Figure 6-31 Proxy Configuration page
Proxy Configuration
Use proxy server
Specify whether F-Secure Content Scanner
Server uses a proxy server when it connects to
the threat detection center.
Proxy server address Specify the address of the proxy server.
Proxy server port
Specify the port number of the proxy server.
Authentication
method
Specify the authentication method to use to
authenticate to the proxy server.
NoAuth
- The proxy server does not require
authentication.
Basic
- The proxy uses the basic authentication
scheme.
NTLM
- The proxy uses NTLM authentication
scheme.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Page 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Page 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Page 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Page 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Page 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Page 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Page 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Page 254: ...254 Figure 6 15 Manual Processing page ...
Page 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Page 397: ......