background image

CHAPTER 4

 

63

Configuring F-Secure Spam Control

4.1

Overview

When F-Secure Spam Control is enabled, incoming messages that are 
considered as spam can be marked as spam automatically. The product 
can add an X-header with the spam flag or predefined text in the 
message header and end users can then create filtering rules that direct 
the messages marked with the spam flag header into a junk mail folder.

F-Secure Spam Control databases can be updated with F-Secure 
Automatic Update Agent. Database updates are digitally signed for 
maximum security, and you can use only these updates for updating the 
F-Secure Spam Control spam definition databases.

In Microsoft Exchange 2007 and 2010 environments, the Microsoft 
Exchange server can move messages to the Junk mail folder based on 
the spam confidence level value. This feature is available immediately 
after the product has been installed, if the end user has activated this 
functionality. For more information on how to configure this functionality at 
the end-user’s workstations, consult the documentation of the used e-mail 
client.

F-Secure Spam Control databases are needed for the heuristic 
spam scanning only.

Summary of Contents for ANTI-VIRUS - FOR MICROSOFT EXCHANGE

Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...

Page 2: ... in any form or by any means electronic or mechanical for any purpose without the express written permission of F Secure Corporation Copyright 1993 2010 F Secure Corporation All rights reserved Portions Copyright 2003 Commtouch Software Ltd Copyright 1997 2009 BitDefender This product includes software developed by the Apache Software Foundation http www apache org Copyright 2000 2007 The Apache S...

Page 3: ... 13 1 4 Scanning Methods 15 1 5 F Secure Anti Virus Mail Server and Gateway Products 16 Chapter 2 Deployment 17 2 1 Installation Modes 18 2 2 Network Requirements 19 2 3 Deployment Scenarios 20 2 3 1 Single Exchange Server 2003 2007 2010 21 2 3 2 Multiple Exchange 2003 Servers 22 2 3 3 Multiple Exchange Server 2007 2010 Roles 23 2 3 4 Large organization using Exchange 2007 2010 25 2 3 5 Centralize...

Page 4: ...Exchange 42 3 8 After the Installation 55 3 8 1 Importing Product MIB files to F Secure Policy Manager Console 55 3 8 2 Configuring the Product 56 3 9 Upgrading from Previous Product Versions 58 3 10 Upgrading the Evaluation Version 60 3 11 Uninstalling F Secure Anti Virus for Microsoft Exchange 61 Chapter 4 Configuring F Secure Spam Control 62 4 1 Overview 63 4 2 Realtime Blackhole List Configura...

Page 5: ...ntine on a Dedicated Computer 97 A 4 Administering the Cluster Installation with F Secure Policy Manager 99 A 5 Using the Quarantine in the Cluster Installation 100 A 6 Using the Product with High Availability Architecture in Microsoft Exchange Server 2010 102 A 7 Uninstallation 103 A 8 Troubleshooting 103 Appendix B Services and Processes 104 B 1 List of Services and Processes 105 Technical Suppo...

Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...

Page 7: ...n how to configure F Secure Spam Control Appendix A Deploying the Product on a Cluster Instructions how to deploy and use F Secure Anti Virus for Microsoft Exchange on a cluster Appendix B Services and Processes Describes services devices and processes of F Secure Anti Virus for Microsoft Exchange Technical Support Contains the contact information for assistance About F Secure Corporation Describe...

Page 8: ...older names for figure and table captions and for directory tree names Courier New is used for messages on your computer screen Courier New bold is used for information that you must type WARNING The warning symbol indicates a situation with a risk of irreversible destruction to data IMPORTANT An exclamation mark provides important information that you need to consider REFERENCE A book refers you ...

Page 9: ...and printing using Adobe Acrobat Reader When printing the manual please print the entire manual including the copyright and disclaimer statements For More Information Visit F Secure at http www f secure com for documentation training courses downloads and service and support contacts In our constant attempts to improve our documentation we would welcome your feedback If you have any questions comm...

Page 10: ...8 1 INTRODUCTION Overview 9 How F Secure Anti Virus for Microsoft Exchange Works 10 Key Features 13 Scanning Methods 15 F Secure Anti Virus Mail Server and Gateway Products 16 ...

Page 11: ...d the company network from any malicious code that travels in HTTP or SMTP traffic In addition they protect your company network against spam The protection can be implemented on the gateway level to screen all incoming and outgoing e mail SMTP web surfing HTTP and FTP over HTTP and file transfer FTP traffic Furthermore it can be implemented on the mail server level so that it does not only protec...

Page 12: ...ed Stripped attachments can also be placed in the Quarantine for further examination Flexible and Scalable Anti Virus Protection F Secure Anti Virus for Microsoft Exchange is installed on Microsoft Exchange Server and it intercepts mail traveling to and from mailboxes and public folders The messages and documents are scanned with the scanning component F Secure Content Scanner Server which also di...

Page 13: ...for Microsoft Exchange can be installed either in stand alone or centrally administered mode Depending on how it has been installed F Secure Anti Virus for Microsoft Exchange is managed either with the F Secure Anti Virus for Microsoft Exchange Web Console or F Secure Policy Manager Scalability and Reliability F Secure Policy Manager provides a scalable way to manage the security of multiple appli...

Page 14: ...nication between F Secure Anti Virus for Microsoft Exchange and F Secure Policy Manager Console It exchanges security policies software updates status information statistics alerts and other information between F Secure Policy Manager Console and all managed systems Figure 1 1 1 E mail arrives from the Internet to F Secure Anti Virus for Microsoft Exchange which 2 filters malicious content from ma...

Page 15: ...ecursive scanning of ARJ BZ2 CAB GZ JAR LZH MSI RAR TAR TGZ Z and ZIP archive files Automatic and consistent virus definition database updates Suspicious and unsafe attachments can be stripped away from e mails Password protected archives can be treated as unsafe Intelligent file type recognition Message filtering based on keywords in message subjects and text Virus Outbreak Detection The virus ou...

Page 16: ... Microsoft Exchange Web Console Possibility to configure and manage stand alone installations with the convenient F Secure Anti Virus for Microsoft Exchange Web Console You can manage and search quarantined content with the F Secure Anti Virus for Microsoft Exchange Web Console When F Secure Anti Virus for Windows Servers is installed on the same computer both products can be administered with the...

Page 17: ...irus patterns and security threats All possibly harmful messages are quarantined as unsafe The proactive virus threat detection can detect new viruses during the first minutes of the outbreak Grayware Scanning The grayware scan detects applications that have annoying or undesirable behavior that can reduce the performance of computers on the network and introduce significant security risks to your...

Page 18: ...eper for Linux provides a high performance solution at the Internet gateway level stopping viruses and other malicious code before they spread to end users desktops or corporate servers The product scans SMTP HTTP FTP and POP3 traffic for viruses worms and trojans and blocks and filters out specified file types ActiveX and Java code can also be scanned or blocked The product receives updates autom...

Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...

Page 20: ...ecure Policy Manager components F Secure Policy Manager Server and F Secure Policy Manager Console To administer F Secure Anti Virus for Microsoft Exchange in the centrally administered mode you have to install the following components F Secure Policy Manager Server on a dedicated machine F Secure Policy Manager Console on the administrator s machine or on the same machine with F Secure Policy Man...

Page 21: ...3 UDP and TCP 1433 TCP only with the dedicated SQL server F Secure Automatic Update Agent ProgramFiles F Secure FSA UA program fsaua exe DNS 53 UDP and TCP HTTP 80 and or another port used to connect to F Secure Policy Manager Server F Secure Network Request Broker ProgramFiles F Secure Com mon fnrb32 exe DNS 53 UDP TCP HTTP 80 or another port used to connect to F Secure Policy Manager Server F Se...

Page 22: ...0 21 If you have multiple Microsoft Exchange Servers see Multiple Exchange 2003 Servers 22 If you have multiple Microsoft Exchange Servers with Exchange Edge and Mailbox Server roles see Multiple Exchange Server 2007 2010 Roles 23 If you have multiple Microsoft Exchange Servers deployed on dedicated servers with server roles and possibly clustered mailbox servers see Large organization using Excha...

Page 23: ... outbound messages over SMTP Usually the server is located behind the firewall or router Installing F Secure Anti Virus for Microsoft Exchange Install F Secure Anti Virus for Microsoft Exchange to the server running Microsoft Exchange Server or Microsoft Small Business Server Administration Modes You can install the product in stand alone mode and administer it with the Web Console The product rec...

Page 24: ...d servers may be clustered Installing F Secure Anti Virus for Microsoft Exchange Install F Secure Anti Virus for Microsoft Exchange to both front end and back end Exchange servers In addition the front end server can be protected with F Secure Spam Control Administration Modes Install F Secure Policy Manager Server on a dedicated server or on the same server with one of Exchange servers You can ad...

Page 25: ...er is deployed either on a separate server or on the same server with the Mailbox Server The Edge Server handles incoming and outgoing messages using SMTP and Mailbox Server holds all mailboxes and public folders and Hub Server routes mail traffic between Exchange servers Installing F Secure Anti Virus for Microsoft Exchange Install F Secure Anti Virus for Microsoft Exchange to all servers where E...

Page 26: ... You can administer the product with F Secure Policy Manager Console When you install the product configure each installation to connect to the same F Secure Policy Manager Server The product installations receive anti virus and spam database updates from F Secure Policy Manager Server which receives updates from F Secure Update Server ...

Page 27: ... Install F Secure Anti Virus for Microsoft Exchange to the server where Exchange Edge Hub and Mailbox Server roles are deployed In addition the Edge server can be protected with F Secure Spam Control Do not install the product to Client Access or Unified Messaging Server roles Installing F Secure Spam Control If you have a license for F Secure Spam Control you can install it on the Edge server Thi...

Page 28: ...oduct with F Secure Policy Manager Console When you install the product configure each installation to connect to the same F Secure Policy Manager Server The product installations receive anti virus and spam database updates from F Secure Policy Manager Server which receives updates from F Secure Update Server ...

Page 29: ...hange Server installations For example you have front end and back end servers running Exchange Server 2003 or a network configuration with Edge and Mailbox roles running Exchange Server 2007 2010 Microsoft SQL Server is installed on a dedicated server or on the server running F Secure Policy Manager Server ...

Page 30: ...uded in F Secure Anti Virus for Microsoft Exchange the Quarantine database size is limited to 4 GB You can use F Secure Anti Virus for Microsoft Exchange Web Console to manage and search quarantined content For more information consulft F Secure Anti Virus for Microsoft Exchange Administrator s Guide Enabling the mixed mode authentication in the Microsoft SQL Server If you install Microsoft SQL Se...

Page 31: ...Open the General page and change the password Confirm the new password that you entered 6 Open the Status page and select Enabled in the Login section 7 Click OK 8 In Object Explorer right click on the server name and select Properties 9 On the Security page select SQL Server and Windows Authentication mode under Server authentication 10 Click OK 11 Right click on the server name and select Restar...

Page 32: ... Requirements 36 Improving Reliability and Performance 39 Installation Overview 41 Installing F Secure Anti Virus for Microsoft Exchange 42 After the Installation 55 Upgrading from Previous Product Versions 58 Upgrading the Evaluation Version 60 Uninstalling F Secure Anti Virus for Microsoft Exchange 61 ...

Page 33: ...s to system requirements and the installation procedure It is highly recommended to read the release notes before you proceed with the installation Operating system Microsoft Windows Server 2003 Standard Edition with the latest service pack Microsoft Windows Server 2003 Enterprise Edition with the latest service pack Microsoft Windows Server 2003 R2 Standard Edition Microsoft Windows Server 2003 R...

Page 34: ...duct on a cluster see Deploying the Product on a Cluster 68 For performance and security reasons it is not possible to install the product on any other than an NTFS partition Disk space for processing 10 GB or more The required disk space depends on the number of mailboxes amount of data traffic and the size of the Information Store Other A CD ROM drive is required if you are installing the produc...

Page 35: ...ating system Microsoft Windows Server 2003 Standard x64 Edition with the latest service pack Microsoft Windows Server 2003 Enterprise x64 Edition with the latest service pack Microsoft Windows Server 2003 R2 Standard x64 Edition Microsoft Windows Server 2003 R2 Enterprise x64 Edition Microsoft Windows Server 2008 Standard Edition Microsoft Windows Server 2008 Enterprise Edition Microsoft Small Bus...

Page 36: ... Continuous Replication CCR Single Copy Cluster SCC For detailed instructions how to deploy and install the product on a cluster see Deploying the Product on a Cluster 68 For performance and security reasons it is not possible to install the product on any other than an NTFS partition Disk space for processing 10 GB or more The required disk space depends on the number of mailboxes amount of data ...

Page 37: ...Microsoft Windows Server 2008 R2 Enterprise Edition Processor Intel x64 processor with Extended Memory 64 Technology EM64T AMD processor that supports the AMD64 platform Memory 4 GB minimum Disk space to install 300 MB For performance and security reasons it is not possible to install the product on any other than an NTFS partition Disk space for processing 10 GB or more The required disk space de...

Page 38: ...anagement Requirements F Secure Policy Manager 9 00 or later is required if you plan to install the product in the centralized administration mode and manage it with F Secure Policy Manager Console 3 3 Other System Component Requirements The product requires Microsoft SQL Server for the quarantine management Depending on the selected deployment and administration method you may need have some addi...

Page 39: ...t SQL Server 2000 with Service Pack 4 and Microsoft SQL Server 2000 Desktop Engine MSDE with Service Pack 4 Which SQL Server to Use for the Quarantine Database As a minimum requirement the Quarantine database should have the capacity to store information about all inbound and outbound mail to and from your organization that would normally be sent during 2 3 days When centralized quarantine managem...

Page 40: ...er 2000 2005 or 2008 It is recommended to use Microsoft SQL Server if you are planning to use centralized quarantine management with multiple F Secure Anti Virus for Microsoft Exchange installations Note that the product does not support Windows Authentication when connecting to Microsoft SQL Server The Microsoft SQL Server that the product will use for the Quarantine database should be configured...

Page 41: ...re Anti Virus for Microsoft Exchange Microsoft NET Framework can be downloaded from the Microsoft Download Center 3 3 3 Web Browser Software Requirements In order to administer the product with F Secure Anti Virus for Microsoft Exchange Web Console one of the following web browsers is required Microsoft Internet Explorer 6 0 or later Mozilla Firefox 2 0 or later Opera 9 00 or later Any other web b...

Page 42: ...t might be enough to increase the size of the virtual memory In this case large messages will slow the system down Hard Drive Hard drive size is an important reliability factor Hard drive performance is crucial for Microsoft Exchange Server to perform well For best performance a RAID system is recommended for servers with only moderate load SCSI hard disks are adequate If your server has an IDE ha...

Page 43: ... other anti virus file encryption and disk encryption software which employ low level device drivers before you install F Secure Anti Virus for Microsoft Exchange To administer F Secure Anti Virus for Microsoft Exchange in centralized administration mode you need to install F Secure Policy Manager Console and F Secure Policy Manager Server Detailed information on F Secure Policy Manager Console an...

Page 44: ...ft Exchange For more information see Installing F Secure Anti Virus for Microsoft Exchange 42 2 Check that F Secure Automatic Update Agent can retrieve the latest virus and spam definition databases For more information consult F Secure Anti Virus for Microsoft Exchange Administrator s Guide After the installation is complete check and configure the product settings 3 7 Installing F Secure Anti Vi...

Page 45: ...stallation Step 2 Read the information in the Welcome screen Click Next to continue Step 3 Read the license agreement If you accept the agreement check the I accept this agreement checkbox and click Next to continue ...

Page 46: ... the product keycode Click Next to continue Step 5 Choose the components to install For more information about F Secure Spam Control consult F Secure Anti Virus for Microsoft Exchange Administrator s Guide Click Next ...

Page 47: ...lation Click Next to continue Step 7 Choose the administration method If you install F Secure Anti Virus for Microsoft Exchange in stand alone mode you cannot configure settings and receive alerts and status information in F Secure Policy Manager Console Click Next to continue ...

Page 48: ... Policy Manager Console setup You can transfer the public key in various ways use a shared folder on the file server a USB device or send the key as an attachment in an e mail message Click Next to continue If you select the stand alone mode use the F Secure Anti Virus for Microsoft Exchange Web Console to change product settings and to view statistics For more information consult F Secure Anti Vi...

Page 49: ...olicy Manager Server you installed earlier Click Next to continue Step 10 Enter an SMTP address that will be used by F Secure Anti Virus for Microsoft Exchange to send warning and informational messages to end users The SMTP address should be a valid existing address that is allowed to send messages Click Next to continue ...

Page 50: ... multiple servers Click Next to continue Step 12 Specify the location of the Quarantine database If you want to install Microsoft SQL Server 2005 Express Edition and the Quarantine database on the same server as the product installation select a Install and use Microsoft SQL Server 2005 Express Edition If you are using Microsoft SQL Server already select b Use the existing installation of MIcrosof...

Page 51: ... SQL Server 2005 Express Edition Enter the password for the database server administrator account that will be used to create the new database Click Next to continue b Specify the computer name of the SQL Server where you want to create the Quarantine database Enter the password for the sa account that you use to log on to the server Click Next to continue ...

Page 52: ... password that you want to use to connect to the quarantine database Use a different account than the server administrator account If the new account does not exist the product creates it during the installation The password should be strong enough to comply with your current Windows password security policy Click Next to continue ...

Page 53: ...ect whether you want to install the product with F Secure World Map Support The product can collect and send statistics about viruses and other malware to the F Secure World Map service If you agree to send statistics to F Secure World Map select Yes and click Next to continue If you enable F Secure World Map support make sure that the server can relay messages properly For more information consul...

Page 54: ...e Anti Virus for Microsoft Exchange MIB files If the installation program cannot connect to F Secure Policy Manager Server the following dialog opens Make sure that the computer where you are installing F Secure Anti Virus for Microsoft Exchange is allowed to connect to the administration port by default 8080 on F Secure Policy Manager Server or if you use proxy make sure that the connection is al...

Page 55: ...ing the Setup again Step 17 The list of components that will be installed is displayed Click Start to install listed components If the product MIB files cannot be uploaded to F Secure Policy Manager during installation you can import them manually For more information see Importing Product MIB files to F Secure Policy Manager Console 55 ...

Page 56: ...54 Step 18 The installation status of the components is displayed Click Next to continue Step 19 The installation is complete Click Finish to close the Setup wizard ...

Page 57: ... will have to import the MIB files if F Secure Anti Virus for Microsoft Exchange is located in a different network segment than F Secure Policy Manager and there is a firewall between them blocking access to Policy Manager s administrative port 8080 F Secure Policy Manager Server has been configured so that administrative connections from anywhere else than the localhost are blocked To import the ...

Page 58: ...cify the IP addresses of hosts that belong to your organization For more information see Network Configuration 57 Verify that the product is able to retrieve the virus and spam definition database updates If necessary reconfigure your firewalls or other devices that may block the database downloads For more information see Network Requirements 19 If F Secure Anti Virus for Microsoft Exchange is in...

Page 59: ...that come from hosts that are not defined as internal SMTP sender hosts are considered inbound 4 E mail messages submitted via MAPI or Pickup Folder are treated as if they are sent from the internal SMTP sender host If F Secure Anti Virus for Microsoft Exchange has been installed in the centralized administration mode configure the mail direction with F Secure Policy Manager Console If F Secure An...

Page 60: ...he policy migration report The link to the report is in the Getting Started page 3 Check the product configuration to finish the upgrade Centralized Administration Mode Before you install the latest version of the product upgrade F Secure Policy Manager to version 9 0 or later IMPORTANT F Secure Anti Virus for Microsoft Exchange 9 0 does not support Microsoft Exchange Server 2000 nor Microsoft Win...

Page 61: ...e 4 F Secure Policy Manager Console prompts you to migrate the previous policy settings to the new version 5 To migrate policy settings click Yes If you want to migrate policy settings later follow these instructions a Open F Secure Policy Manager Console b Go to F Secure F Secure Anti Virus for Microsoft Exchange Operations Policy Migration c Click Migrate 6 After the policy migration is complete...

Page 62: ...2 or register the new keycode from F Secure Settings and Statistics To register the new keycode 8 Log in to the F Secure Anti Virus for Microsoft Exchange Web Console The evaluation screen is opened 9 Eenter the new keycode you have received and click Register Keycode If you do not want to continue to use F Secure Anti Virus for Microsoft Exchange after your evaluation license expires you should u...

Page 63: ...ct Add Remove Programs from the Windows Control Panel To uninstall F Secure Anti Virus for Microsoft Exchange completely uninstall the components in the following order 1 F Secure Spam Control if it was installed 2 F Secure Anti Virus for Microsoft Exchange Some files and directories may remain after the uninstallation and can be removed manually ...

Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...

Page 65: ...te Agent Database updates are digitally signed for maximum security and you can use only these updates for updating the F Secure Spam Control spam definition databases In Microsoft Exchange 2007 and 2010 environments the Microsoft Exchange server can move messages to the Junk mail folder based on the spam confidence level value This feature is available immediately after the product has been insta...

Page 66: ...er should be configured to allow recursive DNS queries DNS protocol is used to make the DNSBL RBL queries 2 Make sure you do not have a firewall preventing DNS access from the host where F Secure Spam Control is running 3 Test the DNS functionality by running the nslookup command at Microsoft Windows command prompt on the host running F Secure Spam Control An example C nslookup 2 0 0 127 sbl xbl s...

Page 67: ... correctly you should see this kind of headers in messages classified as spam X Spam Status YES database version 2005 04 06_1 hits 9 required 5 tests RCVD_IN_DSBL RCVD_IN_NJABL_PROXY RCVD_IN_SORBS_DUL Tests like RCVD_IN_DSBL RCVD_IN_NJABL RCVD_IN_SORBS RCVD_IN_BL_SPAMCOP_NET RCVD_IN_DSBL RCVD_IN_XBL indicate that DNSBL RBL was successfully used to classify the mail 2 If DNS functionality is not op...

Page 68: ...ncreases when DNS queries are made If needed the performance can be improved by increasing the number of mails being processed concurrently by F Secure Spam Control By default the product processes a maximum of three e mails at the same time because there can be three Spam Scanner engine instances running simultaneously The number of Spam Scanner instances can be controlled by using a command line...

Page 69: ... 6 1 4 1 2213 18 1 35 500 has been set to 5 To take the new setting into use restart F Secure Content Scanner Server IMPORTANT Each additional instance of the Spam Scanner takes approximately 25Mb of memory process fsavsd exe Typically you should not need more than 5 instances ...

Page 70: ...ing Quarantine Storage 71 Administering the Cluster Installation with F Secure Policy Manager 99 Using the Quarantine in the Cluster Installation 100 Using the Product with High Availability Architecture in Microsoft Exchange Server 2010 102 Uninstallation 103 Troubleshooting 103 ...

Page 71: ...the installation make sure that Named Pipes and TCP IP protocols are enabled in SQL Server network configuration 3 Create the quarantine storage where the product will place quarantined e mail messages and attachments In the active passive cluster environment continue to Quarantine Storage in Active Passive Cluster 71 In the active active cluster environment continue to Quarantine Storage in Activ...

Page 72: ...rce 94 In the environment with Quarantine on dedicated computer see more information on Installing on Clusters with Quarantine on a Dedicated Computer 97 5 Create a policy domain for the cluster in F Secure Policy Manager and import cluster nodes there See Administering the Cluster Installation with F Secure Policy Manager 99 6 Log on each node and configure the Web Console to accept connections f...

Page 73: ...ated computer see Quarantine Storage in Active Active Cluster 76 To install Quarantine as a cluster resource follow these instructions 1 Log on to the active node of the cluster with the domain administrator account 2 Create a directory for the quarantine storage on the physical disk shared by the cluster nodes You can create it on the same disk with Microsoft Exchange Server storage and log files...

Page 74: ...72 Enter the following information Name F Secure Quarantine Storage Resource Type File Share Group make sure that your Exchange Virtual Server is selected Click Next 5 Possible Owners dialog opens ...

Page 75: ...APPENDIX A 73 Deploying the Product on a Cluster 6 Verify that all nodes that are running Exchange Server are listed under Possible owners and click Next 7 Dependencies dialog opens ...

Page 76: ... opens Type FSAVMSEQS as Share name Note the dollar character at the end of the share name makes the share hidden when you view network resources of the cluster with Windows Explorer Enter the directory name you created on step 2 as Path for example D Quarantine In the Comment box type F Secure Quarantine Storage Make sure that User limit is set to Maximum allowed Click Permissions 9 Permissions d...

Page 77: ...and Read permissions for Exchange Domain Servers and SYSTEM and Full Control Change and Read permissions for Administrator account Click OK 10 In File Share Parameters dialog click Advanced Make sure that Normal share is selected in Advanced File Share Properties Click OK 11 In File Share Parameters dialog click Finish to create F Secure Quarantine Storage resource ...

Page 78: ...ed computer This computer should be the member of the same domain as your Exchange Servers 1 Log on to the server where you plan to create the quarantine storage for example APPSERVER with a domain administrator account 2 Create a directory for example C Quarantine for the quarantine storage on the local hard disk 3 Right click the directory in the Windows Explorer and select Sharing and Security ...

Page 79: ...ions 5 Permissions dialog opens Add Administrator Exchange Domain Servers and SYSTEM to the Group or user names Remove Everyone account Grant Change and Read permissions for Exchange Domain Servers and SYSTEM and Full Control Change and Read permissions for Administrator account Click OK 6 In the directory properties dialog go to the Security tab ...

Page 80: ...permissions for Exchange Domain Servers and SYSTEM Grant all permissions for Administrator Click OK 7 To verify that the quarantine storage is accessible log on as the domain administrator to any node in the cluster and try to open Server FSAVMSEQS with Windows Explorer where Server is the name of the server where you created the quarantine storage share ...

Page 81: ...ter resource follow the instructions for either Windows 2003 Based Cluster 79 or Windows 2008 based cluster 84 Windows 2003 Based Cluster 1 Log on to the active node of the cluster with the domain administrator account 2 Create a directory for the quarantine storage on the physical disk shared by the cluster nodes You can create it on the same disk where the Exchange Server storage and logs are lo...

Page 82: ...ce b In the Resource Type list select File Share c In the Group list make sure that your Exchange Virtual Server is selected Click Next to continue 6 Make sure that all nodes that are running Exchange Server are listed in the Possible owners list Click Next to continue ...

Page 83: ...rce dependencies list Click Next to continue 8 Use the following settings as the File Share parameters a Type FSAVMSEQS as the share name and F Secure Quarantine Storage as comment b Make sure that User Limit is set to Maximum allowed The dollar character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer ...

Page 84: ...ws a Add Administrator Exchange Domain Servers and SYSTEM to the Group or user names list b Remove the Everyone account c Grant Change and Read permissions for Exchange Domain Servers and SYSTEM d Grant Full Control Change and Read permissions for the Administrator account ...

Page 85: ...e Product on a Cluster Click OK to continue 10 Click Advanced to open Advanced File Share Properties Make sure that Normal share is selected Click OK to continue 11 Click Finish to create the F Secure Quarantine Storage resource ...

Page 86: ...directory for the quarantine storage on the physical disk shared by the cluster nodes You can create it on the same disk where the Exchange Server storage and logs are located 3 After the quarantine directory is created it has to be shared When you share the quarantine directory it becomes visible in the Failover Cluster Manager To share the directory right click the quarantine folder and select S...

Page 87: ...uster Add Administrators Exchange Servers and SYSTEM with Contributor permission levels Press Share to close the window and enable the share 4 Check that everything is configured correctly The Failover Cluster Manager view should look like this ...

Page 88: ...lication Environment For a Continuous Cluster Replication CCR cluster installation the quarantine storage must be set on a dedicated computer This computer has to be a member in the same domain with Exchange Servers 1 Log on to the server where you plan to create the quarantine storage for example APPSERVER with the domain administrator account 2 Open Windows Explorer and create a directory for ex...

Page 89: ...the share name and F Secure Quarantine Storage as comment b Make sure that User Limit is set to Maximum allowed Click Permissions to set permissions The dollar character at the end of the share name makes the share hidden when you view the network resources of the cluster with Windows Explorer ...

Page 90: ... users a Add Administrator Exchange Domain Servers and SYSTEM to the Group or user names list b Grant Change and Read permissions for Exchange Domain Servers and SYSTEM c Grant Full Control Change and Read permissions for the Administrator account Click OK to continue ...

Page 91: ...ll Control permissions for Exchange Domain Servers and SYSTEM c Grant all permissions for the Administrator account Click OK to finish To make sure that the quarantine storage is accessible follow these instructions 1 Log on as the domain administrator to any node of the cluster 2 Try to open Server FSAVMSEQS with Windows Explorer where Server is the name of the server where you just created the q...

Page 92: ...r in the same domain with Exchange Servers 1 Log on to the server where you will create the quarantine storage for example APPSERVER with the domain administrator account 2 Open Windows Explorer and create a directory for example C Quarantine for the quarantine storage 3 Right click the directory and select Properties from the menu 4 Go to the Sharing tab 5 Click Advanced Sharing to share the dire...

Page 93: ...he share 8 Change permissions as follows a Remove all existing groups and users b Add Administrator Exchange Servers and SYSTEM to the Group or user names list c Grant Change and Read permissions for Exchange Servers and SYSTEM d Grant Full Control Change and Read permissions for the Administrator account The dollar character at the end of the share name hides the share when you view the network r...

Page 94: ...lick Edit a Remove all existing groups and users b Add Administrator Exchange Servers and SYSTEM to the Group or user names list c Grant all except Full Control permissions for Exchange Servers and SYSTEM d Grant all permissions for the Administrator account ...

Page 95: ... configured the quarantine storage make sure that it is accessible Follow these instructions 1 Log on as the domain administrator to any node of the cluster 2 Open Server FSAVMSEQS with Windows Explorer where Server is the name of the server where you created the quarantine storage share ...

Page 96: ...configured as cluster resource in Exchange Virtual Server 1 Log on to the active node of the cluster using a domain administrator account 2 Run F Secure Anti Virus for Microsoft Exchange setup wizard Install the product in the centralized management mode Specify the IP address of F Secure Policy Manager Server and admin pub that you created during the F Secure Policy Manager installation For more ...

Page 97: ...as the Quarantine Directory For example EVSName FSAVMSEQS where EVSName is the network name of your Exchange Virtual Server 4 The setup program asks to specify the SQL Server to use for the quarantine database Select the server running Microsoft SQL Server 5 The setup program asks to specify the database name where quarantined items are stored ...

Page 98: ...l be used to access the database 6 Complete the installation on the active node 7 Log on to the passive node of the cluster using a domain administrator account Repeat steps 2 4 8 After you specify the SQL Server to use the setup wizard asks you to specify the quarantine database ...

Page 99: ...e Anti Virus for Microsoft Exchange setup wizard Install the product in the centralized management mode Specify the IP address of F Secure Policy Manager Server and admin pub that you created during the F Secure Policy Manager installation For more information see Centralized Management Requirements 36 3 The setup wizard asks for the location of the quarantine directory Specify the UNC path to the...

Page 100: ...the quarantine database Select the server running Microsoft SQL Server 5 The setup program asks to specify the database name where quarantined items are stored Specify the name for the database and enter user name and password that will be used to access the database ...

Page 101: ...arantine database Select Use the existing database 9 Complete the installation on the second node A 4 Administering the Cluster Installation with F Secure Policy Manager To administer the product installed on a cluster create a new subdomain under your organization or network domain Import all cluster nodes to this subdomain To change product configuration on all cluster nodes follow these instruc...

Page 102: ...st one node of the cluster is currently online Configuring Mailbox Role Servers However as the clustered Exchange 2007 can have the mailbox role only and not all members of Exchange 2010 Database Availability Group may have Hub Transport Role you need to configure the hub transport role and mailbox role servers so that quarantined messages can be delivered Hub Transport Role Server 1 Share the Pic...

Page 103: ...eate it 2 Under the Parameters subkey create PickupFolderPath string value that points to the Pickup Folder share of the hub server that has been created earlier HubServerName Pickup After these steps have been completed the quarantine works properly on the Mailbox Role only servers as well The registry value has to be changed on all cluster nodes You do not have to reboot or restart the server th...

Page 104: ...Folders on one node the scan goes through all Public Folders the account can access including those Public Folder Databases that are located on other nodes To avoid collisions where one item would be edited by several on demand scanners simultaneously make sure that manual and scheduled Public Folders scans are started only on one node at a time The real time Public Folder scan scans only Public F...

Page 105: ...he product from passive nodes 3 After the product has been uninstalled from every node reboot computers one at the time A 8 Troubleshooting If the product fails to quarantine a file or reports that the quarantine storage is not accessible make sure that directory sharing and security permissions are set as follows change write and read operations are allowed for SYSTEM and Exchange Domain Servers ...

Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...

Page 107: ... interfaces for reading and writing policy settings statistics and sending alerts F Secure Automatic Update Agent fsaua exe This service takes care of fetching updates from FSPM or FS Update server F Secure Content Scanner Server Daemon fsavsd exe Provides anti virus scanning service for Simple Content Inspection Protocol SCIP compliant agents fsdbuh exe The Database Update Handler process verifie...

Page 108: ...MA service responsible for starting other services and monitoring them F Secure Network Request Broker fnrb32 exe The service handles the communication with F Secure Policy Manager via HTTP interface fsmb32 exe F Secure Message Broker provides the inter process communication interface for integrated services and applications fch32 exe F Secure Configuration Handler that works with FSPM driver and ...

Page 109: ...icy Manager Console LogFile log Windows event log and SMTP server fsm32 exe The F Secure Settings and Statistics User Interface The process is not running unless the user is logged in to the system fih32 exe F Secure Installation Handler enables the remote installation and updating of integrated F Secure products Service Process Description ...

Page 110: ...108 Technical Support F Secure Online Support Resources 109 Web Club 111 Virus Descriptions on the Web 111 ...

Page 111: ...om If there is no authorized F Secure Anti Virus Business Partner in your country you can submit a support request directly to F Secure There is an online Web submit form accessible through F Secure support web pages under the Contact Support page Fill in all the fields and describe the problem as accurately as possible Please include the FSDiag report taken from the problematic server with the su...

Page 112: ... the version number of the operating system on which F Secure products and protected systems are running For Windows include the build number and Service Pack number The version number and the configuration of your Microsoft Exchange Server If possible describe your network configuration and topology A detailed description of the problem including any error messages displayed by the program and an...

Page 113: ...the banner Alternatively right click on the F Secure icon in the Window taskbar and choose the Web Club command To connect to the Web Club directly from within your Web browser go to http www f secure com en_EMEA downloads product updates Virus Descriptions on the Web F Secure Corporation maintains a comprehensive collection of virus related information on its Web site To view the Virus Informatio...

Page 114: ...der in the market of internet and computer security The solutions are also available as licensed products through thousands of resellers globally F Secure aspires to be the most reliable mobile and computer security provider helping make computer and smartphone users networked lives safe and easy This is substantiated by the company s independently proven ability to respond faster to new threats t...

Page 115: ......

Reviews: