APPENDIX C
331
Deploying the Product on a Cluster
C.6
Uninstallation
Follow these instructions to uninstall the product in the cluster
environment.
1.
Uninstall the product from the active node with Add/Remove
Programs in Windows 2003 or Programs and Features in Windows
2008. The uninstallation removes the cluster resource automatically.
2.
After the uninstallation in the active node is finished, uninstall the
product from passive nodes.
3.
After the product has been uninstalled from every node, reboot
computers one at the time.
C.7
Troubleshooting
If the product fails to quarantine a file or reports that the
quarantine storage is not accessible, make sure that directory
sharing and security permissions are set as follows:
change
,
write
and
read
operations are allowed for
SYSTEM
and
Exchange
Domain Servers
, and
full control
is allowed for
Administrator
.
To change the location of the quarantine storage from F-Secure
Policy Manager Console, use the
Final
flag to override the setting
set during product installation on the host.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 296: ...296 A APPENDIX Variables in Warning Messages List of Variables 297...
Page 299: ...299 B APPENDIX Services and Processes List of Services and Processes 300...
Page 332: ...332 D APPENDIX Sending E mail Alerts And Reports Overview 333 Solution 333...
Page 349: ......