![F-SECURE INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61... Administrator'S Manual Download Page 277](http://html1.mh-extra.com/html/f-secure/internet-gatekeeper-windows-2000-2003-server-6-61/internet-gatekeeper-windows-2000-2003-server-6-61_administrators-manual_3082641277.webp)
CHAPTER 11
277
Security and Performance
11.2.2 Access Control
F-Secure Anti-Virus for Internet Gateways should allow outbound
connections only from the intranet hosts. To specify which hosts are
allowed to connect to F-Secure Anti-Virus for Internet Gateways, see
“
Connections to F-Secure Anti-Virus for Internet Gateways
. To
configure F-Secure Anti-Virus for Internet Mail to send e-mails only to
verified e-mail addresses, see “
11.2.3 Data Trickling
As there is a chance that a part of the malicious code passes through
F-Secure Internet Gatekeeper before the virus scanner can detect it, it is
not recommended to use large values in the
Trickle Packet Size
setting.
Use small values for optimized security. For more information, see “
.
11.3
Optimizing Performance
For the best performance, you should keep all working directories on a
local hard disk and make sure that there is enough free disk space for
temporary files in all situations.
11.3.1 Virus Scanning
For optimized performance, configure F-Secure Internet Gatekeeper to
disinfect or block only those files and e-mails that may carry viruses and
not to scan all files. The disinfection can take some time, so you may want
to block all infected files and e-mails straight away.
If you enable
Scan inside archive files
, F-Secure Internet Gatekeeper
scans files inside archived files which takes time. You can improve the
performance by disabling archive scanning, but then all users in the
corporate network need up-to-date virus protection on their workstations.
For more information, see “
.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...