CHAPTER 3
39
Installation
F-Secure Anti-Virus for Microsoft Exchange can be installed to the same
computer that runs F-Secure Anti-Virus for Servers 5.50. You should
uninstall any potentially conflicting products, such as other anti-virus, file
encryption, and disk encryption software, which employ low-level device
drivers, before you install F-Secure Anti-Virus for Microsoft Exchange.
To administer F-Secure Anti-Virus for Microsoft Exchange in centralized
administration mode, you need to install F-Secure Policy Manager
Console and F-Secure Policy Manager Server. Detailed information on
F-Secure Policy Manager Console and F-Secure Policy Manager Server
is provided in the F-Secure Policy Manager Administrator's Guide.
Follow these steps to set up F-Secure Anti-Virus for Microsoft Exchange:
Centralized Administration mode:
1.
Run F-Secure Policy Manager setup to set up F-Secure Policy
Manager Server. See F-Secure Policy Manager Administrator’s
Guide for instructions.
2.
Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Installing F-Secure Anti-Virus for Microsoft
3.
Import the product MIB files to F-Secure Policy Manager, if they
cannot be uploaded there during the installation. For more
information, see “
Importing Product MIB files to F-Secure Policy
.
4.
Check that F-Secure Automatic Update Agent can retrieve the latest
virus definition databases. For more information, see “
If you want to run F-Secure Anti-Virus for Servers 5.50 on the same
computer where you install F-Secure Anti-Virus for Microsoft
Exchange, make sure that F-Secure Anti-Virus for Servers 5.50 is
installed before you install F-Secure Anti-Virus for Microsoft
Exchange.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Page 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Page 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Page 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Page 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Page 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Page 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Page 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Page 254: ...254 Figure 6 15 Manual Processing page ...
Page 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Page 397: ......