
CHAPTER D
377
Troubleshooting
If you get the cursor blinking in the upper left corner, it means that the
connection has been established and F-Secure Content Scanner
Server can accept incoming connections.
If you get "Connection to the host lost" or other error message or if the
cursor does not go to the upper left corner, it means that the
connection attempt was unsuccessful.
If your connection attempt was unsuccessful, (1) make sure that
F-Secure Content Scanner Server is up and running, and (2) check
the physical connection between F-Secure Anti-Virus for Microsoft
Exchange and F-Secure Content Scanner Server.
The connection must be direct (without firewalls or scanners in
between) and at least 100 Mbps fast. If the computer running
F-Secure Anti-Virus for Microsoft Exchange has two or more network
interfaces (including dial-up modem connection), make sure that all
files forwarded to F-Secure Content Scanner Server use the right
network interface. Edit the routing table if needed.
Checking F-Secure Content Scanner Server
Problem:
When the F-Secure Anti-Virus for Microsoft Exchange tries to send an
attachment to F-Secure Content Scanner Server, the attachment is not
scanned and the e-mail does not reach the recipient.
Solution:
The problem is that F-Secure Anti-Virus for Microsoft Exchange is unable
to contact F-Secure Content Scanner Server(s).
There are several possible causes for this:
1.
Incorrect keycode might have been used when installing F-Secure
Content Scanner Server. When installing F-Secure Content Scanner
Server you should use the keycode for F-Secure Anti-Virus for
Microsoft Exchange, and not the keycode for F-Secure Content
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......