3
A.2.4 Creating the Quarantine Storage for a Continuous
A.2.5 Creating the Quarantine Storage for a Database
Installing the Product.................................................................................................. 94
A.3.1 Installing on Clusters with Quarantine as Cluster Resource .......................... 94
A.3.2 Installing on Clusters with Quarantine on a Dedicated Computer .................. 97
Administering the Cluster Installation with F-Secure Policy Manager ........................ 99
Using the Product with High Availability
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105...
Page 115: ......