CHAPTER 4
75
Using F-Secure Anti-Virus for Microsoft Exchange
4.7
Modifying Settings and Viewing Statistics
This section describes how you can modify product settings and view
product statistics in both centrally administered and stand-alone mode.
4.7.1
Centrally Administered Mode
To change F-Secure Anti-Virus for Microsoft Exchange settings in the
centrally administered mode, select
F-Secure Anti-Virus for Microsoft
Exchange
from the
Properties
pane. Make sure the
Policy
tab is selected
and assign values to variables under the
Settings
branch. Modify settings
by assigning new values to the basic leaf node variables (marked by the
leaf icons) shown in the
Policy
tab of the
Properties
pane. Initially, every
variable has a default value, which is displayed in gray. Select the
variable from the
Properties
pane and enter the new value in the
Editor
pane to change it. You can either type the new value or select it from a list
box. If you enter an invalid value, it will be displayed in red in the
Properties
pane. Click
Clear
to revert to the default value or
Undo
to
cancel the most recent change that has not been distributed. For detailed
explanations of all variables, see “
F-Secure Anti-Virus for Microsoft
.
Select the
Status
tab of the
Properties
pane to view statistics and the
settings that were configured during the installation of F-Secure Content
Scanner Server and F-Secure Anti-Virus for Microsoft Exchange.
Statistics are updated periodically and can be reset by choosing
Reset
Statistics
on the
Policy
tab of the
Properties
pane. For more information,
F-Secure Anti-Virus for Microsoft Exchange Statistics
Settings that are configured during the installation and the initial
setup require that you select the Final check box from the Product
View pane. These settings include Primary and Backup Content
Scanner Servers and Quarantine settings.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Page 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Page 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Page 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Page 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Page 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Page 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Page 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Page 254: ...254 Figure 6 15 Manual Processing page ...
Page 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Page 397: ......