CHAPTER 8
337
Administering F-Secure Spam Control
5.
Find the sample configuration file
fssc_example.cfg
in F-Secure
Spam Control installation directory:
<F-Secure Installation Directory>\Spam Control\fssc_example.cfg
6.
Copy the file to the same directory with the name
fssc.cfg
7.
Open
fssc.cfg
in a text editor (like Windows Notepad).
8.
The configuration file has instructions inside. For typical use, you can
leave the settings like they are. However, it is recommended to
configure at least the
trusted_networks
setting to identify the public
IP address(es) of your network. For more information, see the
instructions in
fssc_example.cfg
.
9.
When the configuration file is ready, restart F-Secure Content
Scanner Server through F-Secure Anti-Virus for Microsoft Exchange
Web Console.
To verify that DNSBL/RBL is working correctly:
1.
If DNSBL/RBL is operating correctly, you should see this kind of
headers in messages classified as spam:
X-Spam-Status: YES, database-version=2005-04-06_1 hits=9
required=5 tests=RCVD_IN_DSBL, RCVD_IN_NJABL_PROXY,
RCVD_IN_SORBS_DUL
Tests like
RCVD_IN_DSBL
,
RCVD_IN_NJABL
,
RCVD_IN_SORBS
,
RCVD_IN_BL_SPAMCOP_NET
,
RCVD_IN_DSBL
,
RCVD_IN_XBL
indicate that
DNSBL/RBL was successfully used to classify the mail.
2.
If DNS functionality is not operating correctly, you may see a
significant decrease in the product throughput. In that case, disable
the DNSBL/RBL functionality by changing the
dns_available
setting
in
fssc.cfg
to:
dns_available no
and restarting F-Secure Content Scanner Server through F-Secure
Anti-Virus for Microsoft Exchange Web Console.
You can force F-Secure Spam Control to use a specific DNS server (not
necessarily configured in Microsoft Windows networking) by adding a new
system environment variable as described in the instructions below.
However, this should be needed only in troubleshooting situations.
Normally it is best to use the Windows networking settings.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......