56
3.8.2
Configuring the Product
After the installation, F-Secure Anti-Virus for Microsoft Exchange is
functional, but it is using mostly default values. It is highly recommended
to go through all the settings of all installed components.
Configure F-Secure Anti-Virus for Microsoft Exchange.
If F-Secure Anti-Virus for Microsoft Exchange has been installed
in the centralized administration mode, use F-Secure Policy
Manager Console to configure the settings for F-Secure Content
Scanner Server and F-Secure Anti-Virus for Microsoft Exchange
and distribute the policy.
If F-Secure Anti-Virus for Microsoft Exchange has been installed
in stand-alone mode, use the F-Secure Anti-Virus for Microsoft
Exchange Web Console to configure the settings of F-Secure
Anti-Virus for Microsoft Exchange.
Specify the IP addresses of hosts that belong to your
organization. For more information, see “
Verify that the product is able to retrieve the virus and spam
definition database updates.
If necessary, reconfigure your firewalls or other devices that may
block the database downloads. For more information, see
“
.
If F-Secure Anti-Virus for Microsoft Exchange is installed on the
same computer with Microsoft Exchange Server 2010, which is in
the Mailbox server role, specify the primary SMTP address for the
account which is used to scan items in public folders. The user
account must have permissions to access and modify items in the
public folders.
If the organization has multiple Microsoft Exchange Server
installations and Mailbox servers are deployed on dedicated
servers, you have to configure the Hub Transport Role and
Mailbox Role Servers so that quarantined messages can be
delivered: For more information, see “
Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Page 115: ......