308
7.1
Introduction
You can manage and search quarantined mails with the F-Secure
Anti-Virus for Microsoft Exchange Web Console. You can search for
quarantined content by using different search criteria, including the
quarantine ID, recipient and sender address, the time period during which
the message was quarantined, and so on. You can reprocess and delete
messages, and specify storage and automatic deletion times based on
the reason for quarantining the message.
If you have multiple F-Secure Anti-Virus for Microsoft Exchange
installations, you can manage the quarantined content on all of them from
one single F-Secure Anti-Virus for Microsoft Exchange Web Console. For
more information, see “
Performance-Critical Installation
and
Microsoft Exchange Cluster Environment
.
The quarantine consists of:
Quarantine database
Quarantine storage.
Quarantine Database
The quarantine database contains information about the quarantined
messages. If there are several F-Secure Anti-Virus for Microsoft
Exchange installations in the network, they can either have their own
quarantine databases, or they can use a common quarantine database.
An SQL database server is required for the quarantine database.
The following SQL databases can be used for storing information about
the quarantined content:
Microsoft SQL Server 2000 Desktop Engine (MSDE)
Microsoft SQL Server 2000
Microsoft SQL Server 2005
MSDE is delivered together with the product. If you want to use another
database (Microsoft SQL Server 2000), you must buy it and get your own
license before you start to deploy F-Secure Anti-Virus for Microsoft
Exchange.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......