Technical Support
393
F-Secure Online Support Resources
F-Secure Technical Support is available through F-Secure support web
pages, e-mail and by phone. Support requests can be submitted through
a form on F-Secure support web pages directly to F-Secure support.
F-Secure support web pages for any F-Secure product can be accessed
at
. All support issues, frequently asked
questions and hotfixes can be found under the support pages.
If you have questions about F-Secure Anti-Virus for Microsoft Exchange
not covered in this manual or on the F-Secure support web pages, you
can contact your local F-Secure distributor or F-Secure Corporation
directly.
For technical assistance, please contact your local F-Secure Business
Partner. Send your e-mail to:
Anti-Virus-<country>@f-secure.com
Example: [email protected]
If there is no authorized F-Secure Anti-Virus Business Partner in your
country, you can submit a support request directly to F-Secure. There is
an online "Web submit form" accessible through F-Secure support web
pages under the "Contact Support" page. Fill in all the fields and describe
the problem as accurately as possible. Please include the FSDiag report
taken from the problematic server with the support request.
Before contacting support, please run the F-Secure Diagnostic utility
FSDiag.exe
on each of the hosts running F-Secure Anti-Virus for
Microsoft Exchange and F-Secure Content Scanner Server. This utility
gathers basic information about hardware, operating system, network
configuration and installed F-Secure and third-party software. You can run
the F-Secure Diagnostics tool from the F-Secure Anti-Virus for Microsoft
Exchange Web Console as follows:
1.
Log in to the Web Console.
2.
Type
https://127.0.0.1:25023/fsdiag/
in the browser’s address field.
3.
The F-Secure Diagnostics tool starts and the dialog window displays
the progress of the data collection.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......