36
Microsoft SQL
Server 2000/2005
If your organization sends a large amount of e-mails, it is
recommended to use Microsoft SQL Server 2000/2005.
It is recommended to use Microsoft SQL Server 2000/2005 if you
are planning to use centralized quarantine management with
multiple F-Secure Anti-Virus for Microsoft Exchange installations.
For more information, see “
Performance-Critical Installation
Note that the product does not support Windows Authentication
when connecting to Microsoft SQL Server 2000/2005. The
Microsoft SQL Server 2000/2005 that the product will use for the
Quarantine database should be configured to use Mixed Mode
authentication.
3.1.3
Web Browser Software Requirements
In order to administer the product with F-Secure Anti-Virus for Microsoft
Exchange Web Console, one of the following web browsers is required:
Microsoft Internet Explorer 6.0 or later
Netscape Communicator 8.1 or later
Mozilla Firefox 1.5 or later
Opera 9.00 or later
Konqueror 3.5 or later
Any other web browser supporting HTTP 1.0, SSL, Java scripts and
cookies may be used as well. Microsoft Internet Explorer 5.5 or earlier
cannot be used to administer the product.
If you plan to use Microsoft SQL Server 2005, you must
purchase it and obtain your own license before you start to
deploy F-Secure Anti-Virus for Microsoft Exchange. To
purchase Microsoft SQL Server 2005, contact your Microsoft
reseller.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......