Technical Support
109
F-Secure Online Support Resources
F-Secure Technical Support is available through F-Secure support web
pages, e-mail and by phone. Support requests can be submitted through
a form on F-Secure support web pages directly to F-Secure support.
F-Secure support web pages for any F-Secure product can be accessed
at
. All support issues, frequently asked
questions and hotfixes can be found under the support pages.
If you have questions about F-Secure Anti-Virus for Microsoft Exchange
not covered in this manual or on the F-Secure support web pages, you
can contact your local F-Secure distributor or F-Secure Corporation
directly.
For technical assistance, please contact your local F-Secure Business
Partner. Send your e-mail to:
Anti-Virus-<country>@f-secure.com
Example: [email protected]
If there is no authorized F-Secure Anti-Virus Business Partner in your
country, you can submit a support request directly to F-Secure. There is
an online "Web submit form" accessible through F-Secure support web
pages under the "Contact Support" page. Fill in all the fields and describe
the problem as accurately as possible. Please include the FSDiag report
taken from the problematic server with the support request.
F-Secure
Support
Tool
Before contacting support, please run the F-Secure Support Tool
FSDiag.exe
on each of the hosts running F-Secure Anti-Virus for
Microsoft Exchange and F-Secure Content Scanner Server. This utility
gathers basic information about hardware, operating system, network
configuration and installed F-Secure and third-party software. You can run
the F-Secure Support Tool from the F-Secure Anti-Virus for Microsoft
Exchange Web Console as follows:
1.
Log in to the Web Console.
2.
Type
https://127.0.0.1:25023/fsdiag/
in the browser’s address field or
or click
F-Secure support tool
on
General Server Properties
page.
Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Page 115: ......