![F-SECURE ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 - Administrator'S Manual Download Page 63](http://html1.mh-extra.com/html/f-secure/anti-virus-for-microsoft-exchange-8-00/anti-virus-for-microsoft-exchange-8-00_administrators-manual_3073830063.webp)
CHAPTER 3
63
Installation
3.8
Upgrading from the Version 6.62
Backup your current configuration before starting the upgrade.
Standalone
Mode
1.
Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Installing F-Secure Anti-Virus for Microsoft
•
Your previous settings are migrated to the new version during the
installation.
•
You may need to reboot the system to complete the installation.
2.
After the installation, open F-Secure Anti-Virus for Microsoft
Exchange Web Console and check the policy migration report. The
link to the report is in the
Getting Started
page.
3.
Check the product configuration to finish the upgrade.
Centralized
Administration
Mode
Before you install the latest version of the product, upgrade F-Secure
Policy Manager to version 8.11.
1.
Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Installing F-Secure Anti-Virus for Microsoft
2.
The setup program imports the JAR package that contains the
product MIB files and the migration tool to F-Secure Policy Manager
automatically. If the JAR package could not be imported, import it
manually after the installation.
Close F-Secure Policy Manager Console after the JAR package has
been imported.
We recommend that you upgrade your Microsoft SQL Server to the
latest version. If you are using MSDE, upgrade it to Microsoft SQL
Server 2005 Express Edition.
The report file is located on the local disk in:
%Program Files%\F-Secure\Anti-Virus Agent for Microsoft
Exchange\msemigrpt.htm.
We recommend that you back up your policy data (select Save
Policy As in the Policy Manager Console) before the upgrade.
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Page 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Page 296: ...296 A APPENDIX Variables in Warning Messages List of Variables 297...
Page 299: ...299 B APPENDIX Services and Processes List of Services and Processes 300...
Page 332: ...332 D APPENDIX Sending E mail Alerts And Reports Overview 333 Solution 333...
Page 349: ......