4
Kaspersky Security 5.5 for Microsoft Exchange Server 2003
4.7.1. Testing the anti-virus protection system ...................................................... 35
4.7.2. Testing the anti-spam protection system..................................................... 36
CHAPTER 5. UPDATING THE ANTI-VIRUS AND THE CONTENT FILTRATION
DATABASES.............................................................................................................. 38
5.1. Manual updating.................................................................................................. 39
5.2. Automatic updates............................................................................................... 40
5.3. Selecting the updates source.............................................................................. 41
5.4. Configuring the connection settings.................................................................... 43
5.5. Running updates under a different user account ............................................... 45
CHAPTER 6. ANTI-VIRUS PROTECTION .................................................................. 47
6.1. Anti-virus protection levels................................................................................... 49
6.2. Enabling and disabling the anti-virus server protection. Selecting anti-virus
protection level ................................................................................................... 51
6.3. Scanning attachments......................................................................................... 53
6.4. Scanning of routed e-mail traffic ......................................................................... 56
6.5. Selecting actions to be performed with objects.................................................. 57
6.6. Background scan................................................................................................. 62
CHAPTER 7. ANTI-SPAM PROTECTION................................................................... 65
7.1. Enabling/disabling anti-spam protection............................................................. 66
7.2. Selecting the action to be performed with the message .................................... 67
7.3. Configuring TCP/IP settings................................................................................ 70
7.4. Configuring e-mail filtration.................................................................................. 70
CHAPTER 8. APPLICATION'S OPERATION EFFICIENCY....................................... 72
8.1. Anti-virus protection efficiency............................................................................. 72
8.2. Anti-spam protection efficiency ........................................................................... 73
CHAPTER 9. BACKUP COPYING ............................................................................... 74
9.1. Viewing backup storage...................................................................................... 75
9.2. Backup storage filter............................................................................................ 77
9.3. Restoring objects from the backup storage........................................................ 80
9.4. Sending e-mails to addressees .......................................................................... 81
9.5. Sending objects for analysis ............................................................................... 81
9.6. Deleting objects from the backup storage .......................................................... 82
9.7. Configuring the backup storage settings ............................................................ 83