CHAPTER 6
157
Administering F-Secure Anti-Virus for Internet Mail
E-mail messages and infected, suspicious
and disallowed attachments are stored and
counted as separate items in the quarantine
storage. For example, if a message has
three attachments and only one of them has
been found infected, two items will be
created in the quarantine storage. These
items still have the same quarantine ID in the
quarantine database.
Notify when quarantine
threshold is reached
Specify how the administrator should be
notified when the Quarantine Size Threshold
and/or Quarantined Items Threshold are
reached. No alert is sent if both thresholds
are set to zero (0). The options available are:
Send informational alert
Send warning alert
Send error alert
Send security alert
Quarantine worms
Specify whether the product should
quarantine files infected with mass worms or
mail viruses such as Sobig or Bagle.
Quarantine problematic
messages
Specify if messages that contain malformed
or broken attachments should be
quarantined for later analysis or recovery.
This setting works together with the
Security
Options/Action on Malformed Mails
setting in
the inbound and outbound mail settings.
Automatically Process
Unsafe Messages
Specify how often the product tries to
reprocess unsafe messages that are
retained in the quarantine. Set the value to
Disabled
to keep all unsafe to process
unsafe messages manually.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...