![F-SECURE INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61... Administrator'S Manual Download Page 172](http://html1.mh-extra.com/html/f-secure/internet-gatekeeper-windows-2000-2003-server-6-61/internet-gatekeeper-windows-2000-2003-server-6-61_administrators-manual_3082641172.webp)
172
When importing the CSV file, select the setting you want to import to, and
click
Import...
in the Restriction Editor. When the Import Table Content
from CSV dialog opens, you can change the delimiter character by
clicking the
Options...
button.
6.3.3
Spam Control
For information on configuring Spam Control, see “
6.3.4
Blocking
You can block attachments with specified file names and/or extensions so
that they are not delivered to end-users.
Figure 6-11 Inbound Mail / Blocking settings
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...