7
Configuring Realtime Blackhole Lists ........................................................... 266
Optimizing F-Secure Spam Control Performance ........................................ 268
Appendix A Variables in Warning Messages
Appendix B Services and Processes
Appendix C Deploying the Product on a Cluster
Creating Quarantine Storage ................................................................................... 279
C.2.1 Creating the Quarantine Storage for a Single Copy Cluster Environment ... 279
C.2.2 Creating the Quarantine Storage for a Continuous Cluster Replication Environ-
Administering the Cluster Installation with F-Secure Policy Manager ...................... 290
Appendix D Sending E-mail Alerts And Reports
D.2.1 Creating a Scoped Receive Connector ........................................................ 295
D.2.2 Grant the Relay Permission on the New Scoped Connector........................ 296
D.2.3 Specify SMTP Server for Alerts and Reports ............................................... 296
E.4.1 Installing Service Packs................................................................................ 302
E.4.2 Securing the Quarantine............................................................................... 303
E.4.3 Administration Issues ................................................................................... 303
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Page 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Page 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...