148
All Disallowed Attachments
- Strip all
attachments specified in the
Disallowed
Attachments
setting.
All Attachments Except Allowed
- Strip all
attachments except those specified in the
Allowed Attachments
setting.
By default, F-Secure Anti-Virus for Microsoft
Exchange strips all disallowed attachments.
Allowed Attachments
Specify attachments that should not be
stripped if the
Strip Attachments
setting is
set to
All Attachments Except Allowed
.
Disallowed Attachments
Specify attachments that should be stripped
if the
Strip Attachments
setting is set to
All
Disallowed Attachments
.
You can modify Allowed Attachments and
Disallowed Attachments lists as needed.
Separate each extension by a comma (‘,‘).
Wildcards * and ? can be used. To specify
the files that have no extension, type a dot
('.').
Intelligent File Type
Recognition
Trojans and other malicious code can
disguise themselves with filename
extensions which are usually considered
safe to use. Intelligent File Type Recognition
can recognize the real file type of the
message attachment and use that while the
attachment is processed. Specify whether
you want to use Intelligent File Type
Recognition or not.
By default, the Intelligent File Type
Recognition is disabled during the real-time
processing and enabled during the manual
processing.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......