APPENDIX A
93
Deploying the Product on a Cluster
11. Click
OK
to continue.
After you have configured the quarantine storage, make sure that it is
accessible. Follow these instructions:
1.
Log on as the domain administrator to any node of the cluster.
2.
Open
\\<Server>\FSAVMSEQS$\
with Windows Explorer, where
<Server> is the name of the server where you created the quarantine
storage share.
Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Page 115: ......