CHAPTER 5
129
Centrally Managed Administration
5.4.7
Proxy Configuration
Specify proxy server parameters that Content Scanner Server uses when
it connects to the threat detection center.
Heuristic Scanning
- F-Secure Content Scanner
Server checks the message using spam
heuristics.
Trusted Networks
Specify networks and hosts in the mail relay
network which can be trusted not to be operated
by spammers and do not have open relays or
open proxies.
Define the network as a network/netmask pair
(10.1.0.0/255.255.0.0), with the network/nnn
CIDR specification (10.1.0.0/16), or use ‘*’
wildcard to match any number and ‘-’ to define a
range of numbers (172.16.*.1, 172.16.4.10-110).
Use Proxy Server
Specify whether F-Secure Content Scanner
Server uses a proxy server when it connects to
the threat detection center.
Proxy Server Address
Specify the address of the proxy server.
Proxy Server Port
Specify the port number of the proxy server.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Page 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Page 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...