![F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator'S Manual Download Page 338](http://html1.mh-extra.com/html/f-secure/anti-virus-for-microsoft-exchange-8-00/anti-virus-for-microsoft-exchange-8-00_administrators-manual_3073830338.webp)
338
E.3
Viewing the Log File
F-Secure Anti-Virus for Microsoft Exchange uses the log file
Logfile.log
that is maintained by F-Secure Management Agent and contains all alerts
generated by F-Secure components installed on the host.
Logfile.log
can
be found on all hosts running F-Secure Management Agent. You can view
the
Logfile.log
with any text editor, for example Windows Notepad. Open
the
logfile.log
from
F-Secure Settings and Statistics / F-Secure
Management Agent properties / Show log file,
or from the
Summary
page
of F-Secure Anti-Virus for Microsoft Exchange Web Console by clicking
View F-Secure Log
.
F-Secure Management Agent uses
Logfile.log
(in
F-Secure / Common
directory) for logging of all the alerts on the host.
Logfile.log
contains all the alerts generated by the host, regardless of the
severity. Logfile.log file size can be configured in
F-Secure Management
Agent / Settings / Alerting / Alert Agents / Logfile / Maximum File Size
.
Quarantine Logs
Quarantine logs are not stored in
Logfile.log
. By default, quarantine logs
are stored in the quarantine log directory. You can view quarantine logs
with any text editor.
To specify the path to the directory where Quarantine logfiles are placed,
change the
Quarantine > Quarantine Log Directory
setting in F-Secure
Policy Manager or
Quarantine > Options > Logging > Quarantine log
directory
setting in F-Secure Anti-Virus for Microsoft Exchange Web
Console. For more information, see “
and “
E.4
Common Problems and Solutions
If you think that you have some problem with F-Secure Anti-Virus for
Microsoft Exchange, check that both F-Secure Anti-Virus for Microsoft
Exchange and F-Secure Content Scanner Server are up and running.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 296: ...296 A APPENDIX Variables in Warning Messages List of Variables 297...
Page 299: ...299 B APPENDIX Services and Processes List of Services and Processes 300...
Page 332: ...332 D APPENDIX Sending E mail Alerts And Reports Overview 333 Solution 333...
Page 349: ......