277
C
APPENDIX:
Deploying the Product
on a Cluster
Installation Overview ................................................................ 278
Creating Quarantine Storage.................................................... 279
Administering the Cluster Installation with F-Secure Policy
Manager ................................................................................... 290
Using the Quarantine in the Cluster Installation ....................... 290
Uninstallation............................................................................ 292
Troubleshooting........................................................................ 292
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Page 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Page 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...