CHAPTER 6
271
Administration with Web Console
Editing F-Secure Content Scanner Server Addresses
To add new F-Secure Content Scanner Server IP addresses or
host names to the list, click
Add
.
To delete a address from the list, click on
column to select
addresses that you want to delete. Click
Clear
to delete the
currently marked addresses permanently.
Scanning servers
Primary Content
Scanner Servers
Specify all F-Secure Content Scanner Servers
where F-Secure Anti-Virus for Microsoft
Exchange should send files to be processed. If
you list more than one F-Secure Content
Scanner Server, F-Secure Anti-Virus for
Microsoft Exchange uses load sharing between
them.
Backup Content
Scanner Servers
Specify F-Secure Content Scanner Servers that
act as backup servers for primary servers. If
F-Secure Anti-Virus for Microsoft Exchange
cannot contact primary F-Secure Content
Scanner Servers, it interacts with backup
servers.
Connection timeout
Enter the time interval (in seconds) that
specifies how long F-Secure Anti-Virus for
Microsoft Exchange should wait for a response
from F-Secure Content Scanner Server before
stopping attempts to send or receive data.
Restore connection
interval
Enter the time interval (in seconds) that
specifies how long F-Secure Anti-Virus for
Microsoft Exchange will wait before attempting
a new connection with the primary F-Secure
Content Scanner Servers, in case the previous
connection attempt failed or a connection with
the server was lost.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......