198
Max Levels in Nested
Archives
If
Scan Inside Archives
is enabled, F-Secure
Content Scanner Server can scan files
inside archives that may exist inside of other
archives. Furthermore, these nested
archives can contain other archives.
Specify the number of levels F-Secure
Content Scanner Server goes through
before the action selected in
Suspect Max
Nested Archives
takes place. The default
setting is 3.
Increasing the value increases the load on
the system and thus decreases the overall
system performance. This means that the
system becomes more vulnerable for denial
of service attacks.
Suspect Max Nested
Archives
If the amount of nested archives exceeds the
value specified in the
Max Levels in Nested
Archives
, the file is stopped if
Treat as
Unsafe
is selected. If
Treat as Safe
is
selected, the archive file is sent to the user.
Suspect Password
Protected Archives
Compressed archive files can be protected
with passwords. These archives can be
opened only with a valid password, so
F-Secure Content Scanner Server cannot
scan their content. Password protected
archives can be stopped by selecting
Treat
as Unsafe
. If
Treat as Safe
is selected,
password protected archives are delivered to
recipient.
Acceptable Unpacked
Size Threshold
Specify the acceptable unpacked size (in
kilobytes) for archive files. If the unpacked
size of an archive file exceeds this threshold,
the server will consider the archive
suspicious and corresponding action will be
taken.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......