CHAPTER 5
93
Administering F-Secure Anti-Virus for Internet Gateways
5.1
Overview - HTTP Scanning
F-Secure Anti-Virus for Internet Gateways takes care of HTTP traffic
scanning. This chapter describes how to configure and administer
F-Secure Anti-Virus for Internet Gateways.
F-Secure Anti-Virus for Internet Gateways is an HTTP proxy server and
acts as a gateway between the corporate network and the Internet.
Before you start using F-Secure Anti-Virus for Internet Gateways,
configure the general settings under the
Network Configuration
and
Logging
branches to make sure that F-Secure Anti-Virus for Internet
Gateways works properly. You should modify the general settings when
your network infrastructure changes or when you want to optimize the
security or the performance of F-Secure Anti-Virus for Internet Gateways.
If you want to configure the virus scanning and access control settings to
specify the type of traffic you want to scan and sites you want to deny
access, see “
Configuring Web Traffic Scanning
In centrally managed mode you can open F-Secure Internet Gatekeeper
components from the
Windows Start menu > Programs > F-Secure Policy
Manager Console.
When the Policy Manager Console opens, go to the
Advanced Mode user interface by selecting
View > Advanced Mode
.
Then select the Policy tab and the
F-Secure Anti-Virus for Internet
Gateways
component.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...