![F-SECURE ANTI-VIRUS - FOR MICROSOFT EXCHANGE Administrator'S Manual Download Page 78](http://html1.mh-extra.com/html/f-secure/anti-virus-for-microsoft-exchange/anti-virus-for-microsoft-exchange_administrators-manual_3072145078.webp)
78
Enable File Type
Recognition
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition can recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
By default, Intelligent File Type Recognition is
disabled during the real-time processing.
Intelligent File Type Recognition strengthens the
security - you can block unsafe content that has
a safe filename extension (for example, a
Microsoft Word document using the ‘rtf’ filename
extension) and you do not accidentally block
safe content that has unsafe filename extension
(for example, a text file using the ‘doc’ filename
extension). Intelligent File Type Recognition can
degrade the system performance.
Max level of nested
messages
Set the maximum number of levels of messages
inside messages that F-Secure Anti-Virus for
Microsoft Exchange should scan.
If the number of levels exceeds the specified
limit, F-Secure Anti-Virus for Microsoft Exchange
performs the action specified in the
Action on
messages with exceeding nesting levels
setting.
Action
Action on infected
attachments
Specify whether infected attachments should be
disinfected or dropped.
Disinfect attachment
- Try to disinfect the
infected attachment. If the disinfection
succeeds, the recipient receives the disinfected
file instead of the original one. If the disinfection
fails, the infected attachment is dropped, and it
is not delivered to the recipient.
Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Page 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Page 7: ...7 ABOUT THIS GUIDE How This Guide Is Organized 8 Conventions Used in F Secure Guides 13...
Page 108: ...108 Figure 4 15 Manual Processing page...
Page 112: ...112 Quarantine Thresholds Figure 4 17 Quarantine thresholds settings...
Page 222: ...222...
Page 224: ...224...