CHAPTER 4
107
Using F-Secure Anti-Virus for Microsoft Exchange
Scan all attachments except with these
extensions
- Scan all attachments except those
with specified filename extensions.
You can add new file types on the extensions
lists by typing the file extensions in the file
extensions text boxes. Separate the extensions
by spaces.
Scan mail message
bod
y
Specify whether the body of the e-mail message
should be scanned for malicious code.
By default, F-Secure Anti-Virus for Microsoft
Exchange scans message bodies.
Although scanning message bodies can slow
down the performance, it is recommended as a
virus can be carried inside a message body.
Enable File Type
Recognition
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition can recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
By default, Intelligent File Type Recognition is
disabled during the real-time processing.
Intelligent File Type Recognition strengthens the
security - you can block unsafe content that has
a safe filename extension (for example, a
Microsoft Word document using the ‘rtf’ filename
extension) and you do not accidentally block
safe content that has unsafe filename extension
(for example, a text file using the ‘doc’ filename
extension). Intelligent File Type Recognition can
degrade the system performance.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......