CHAPTER 3
41
Installation
If you already use F-Secure Policy Manager to administer other F-Secure
products, it is recommended to install F-Secure Anti-Virus for Microsoft
Exchange in centralized administration mode.
The quarantined mails are managed using the F-Secure Anti-Virus for
Microsoft Exchange Web Console in both centrally administered and
stand-alone installations. In centrally managed environments all other
features are managed with F-Secure Policy Manager.
3.6
Installation Overview
F-Secure Anti-Virus for Microsoft Exchange can be installed to the same
computer that runs F-Secure Anti-Virus for Servers 9.0. When both
products are installed on the same computer, they can be managed with
the common Web Console.
You should uninstall any potentially conflicting products, such as other
anti-virus, file encryption, and disk encryption software, which employ
low-level device drivers, before you install F-Secure Anti-Virus for
Microsoft Exchange.
To administer F-Secure Anti-Virus for Microsoft Exchange in centralized
administration mode, you need to install F-Secure Policy Manager
Console and F-Secure Policy Manager Server. Detailed information on
F-Secure Policy Manager Console and F-Secure Policy Manager Server
is provided in the F-Secure Policy Manager Administrator's Guide.
You need to log in with administrator-level privileges to install F-Secure
Anti-Virus for Microsoft Exchange.
Follow these steps to set up F-Secure Anti-Virus for Microsoft Exchange:
Centralized Administration mode:
1.
Run F-Secure Policy Manager setup to set up F-Secure Policy
Manager Server. See F-Secure Policy Manager Administrator’s
Guide for instructions.
2.
Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Page 115: ......