Connection properties..................................................................................................46
Changing communication preferences........................................................................46
Managing domains and hosts.................................................................................................48
Adding policy domains.................................................................................................48
Adding hosts...........................................................................................................................49
Adding hosts in Windows domains..............................................................................49
Importing autoregistered hosts....................................................................................49
Push installations.........................................................................................................51
Policy-based installation..............................................................................................53
Local installation and updates with pre-configured packages.....................................55
Local installation and Policy Manager....................................................................................58
System requirements...................................................................................................58
Uninstall other antivirus programs...............................................................................58
Installation steps..........................................................................................................59
Installing on an infected host..................................................................................................60
Checking that the management connections work.................................................................61
Chapter 5: Configuring virus and spyware protection...................63
Configuring automatic updates...............................................................................................64
How do automatic updates work?................................................................................64
Automatic update settings ...........................................................................................64
Configuring automatic updates from Policy Manager Server......................................64
Configuring Policy Manager Proxy..............................................................................65
Configuring clients to download updates from each other...........................................65
Configuring real-time scanning...............................................................................................67
Real-time scanning settings.........................................................................................67
Enabling real-time scanning for the whole domain......................................................68
Forcing all hosts to use real-time scanning.................................................................69
Excluding Microsoft Outlooks's .pst file from real-time scanning.................................69
Configuring DeepGuard..........................................................................................................70
DeepGuard settings.....................................................................................................70
DeepGuard server queries...........................................................................................70
Configuring rootkit scanning (Blacklight)................................................................................72
Rootkit scanning settings.............................................................................................72
Launching a rootkit scan for the whole domain...........................................................72
Configuring e-mail scanning...................................................................................................73
E-mail scanning settings..............................................................................................73
Enabling e-mail scanning for incoming and outgoing e-mails......................................74
Configuring web traffic (HTTP) scanning................................................................................75
Web traffic scanning settings.......................................................................................75
Enabling web traffic scanning for the whole domain....................................................75
Excluding a web site from HTTP scanning..................................................................75
Configuring spyware scanning................................................................................................77
Spyware control settings..............................................................................................77
4
| F-Secure Client Security | TOC
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 2: ......
Page 8: ...8 F Secure Client Security TOC...
Page 44: ......
Page 62: ......
Page 86: ......
Page 114: ......
Page 118: ......
Page 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Page 148: ......
Page 158: ......