CHAPTER 3
63
Installation
5.
Configure F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Centrally Managed Administration
. If you
installed F-Secure Anti-Virus for Microsoft Exchange in stand-alone
mode, see “
Administration with Web Console
.
6.
that F-Secure Automatic Update Agent can retrieve the latest virus
definition databases. For more information, see “
3.8
Upgrading the Evaluation Version
If you want to use F-Secure Anti-Virus for Microsoft Exchange after your
evaluation period expires, you need a new keycode. Contact your
software vendor or renew your license online.
After you have received the new keycode, you can either reinstall
F-Secure Anti-Virus for Microsoft Exchange with your new keycode (see
“
Installing F-Secure Anti-Virus for Microsoft Exchange
) or register the
new keycode from
F-Secure Settings and Statistics.
To register the new keycode from F-Secure Settings and Statistics
1.
Open
F-Secure Settings and Statistics
by double-clicking the
F-Secure icon in the Windows system tray and select
F-Secure
Anti-Virus for Microsoft Exchange
to open the evaluation screen.
2.
Click
Register Keycode...
and enter the new keycode you have
received.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Page 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Page 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Page 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Page 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Page 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Page 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Page 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Page 254: ...254 Figure 6 15 Manual Processing page ...
Page 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Page 397: ......