CHAPTER 2
19
Deployment
2.2
Network Requirements
This network configuration is valid for all scenarios described in this
chapter. Make sure that the following network traffic can pass through:
Service
Process
Inbound ports
Outbound ports
F-Secure Content Scanner
Server
%ProgramFiles%\F-Secure\Cont
ent Scanner Server\fsavsd.exe
18971 (TCP) (on
localhost only)
DNS (53, UDP/TCP),
HTTP (80) or another
known port used for
HTTP proxy
F-Secure Anti-Virus for
Microsoft Exchange Web
Console
%ProgramFiles%\F-Secure\Web
User Interface\bin\fswebuid.exe
25023
DNS (53, UDP and TCP),
1433 (TCP), only with the
dedicated SQL server
F-Secure
Automatic
Update Agent
%ProgramFiles%\F-Secure\FSA
UA\program\fsaua.exe
-
DNS (53, UDP and TCP),
HTTP (80) and/or another
port used to connect to
F-Secure
Policy Manager
Server
F-Secure Network Request
Broker
%ProgramFiles%\F-Secure\Com
mon\fnrb32.exe
-
DNS (53, UDP/TCP),
HTTP (80) or another port
used to connect to
F-Secure Policy Manager
Server
F-Secure Management
Agent
%ProgramFiles%\F-Secure\Com
mon\fameh32.exe
-
DNS (53, UDP/TCP),
SMTP (25)
F-Secure Quarantine
Manager
%ProgramFiles%\F-Secure\Quar
antine Manager\fqm.exe
-
DNS (53, UDP/TCP),
1433 (TCP), only with the
dedicated SQL server
F-Secure World Map
Reporting Service
%ProgramFiles%\F-Secure\Cont
ent Scanner
Server\fswmrsvc.exe
-
DNS (53, UDP/TCP),
SMTP (25)
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105...
Page 115: ......