CHAPTER 4
67
Using F-Secure Anti-Virus for Microsoft Exchange
4.3
Using the Web Console
In centrally managed installations of F-Secure Anti-Virus for Microsoft
Exchange, the F-Secure Anti-Virus for Microsoft Exchange Web Console
can be used for monitoring the system status and statistics. It can also be
used for viewing the settings currently in use and executing some
operations. However, in centrally managed installations it cannot be used
for configuring the system or scanning settings; use F-Secure Policy
Manager for this instead.
4.3.1
Logging in for the First Time
Microsoft Internet Explorer 6.0 users:
The address of the F-Secure Anti-Virus for Microsoft Exchange Web
Console, https://127.0.0.1:25023/, should be added to the
Trusted sites
in
Internet Explorer 6.0 Security Options
. This ensures that the F-Secure
Anti-Virus for Microsoft Exchange Web Console works properly in all
environments.
Before you log in the F-Secure Anti-Virus for Microsoft Exchange Web
Console for the first time, check that Java script and cookies are enabled
in the browser you use.
When you log in for the first time, your browser will display a Security Alert
dialog window about the security certificate for F-Secure Anti-Virus for
Microsoft Exchange Web Console. You can create a security certificate
for F-Secure Anti-Virus for Microsoft Exchange Web Console before
logging in, and then install the certificate during the login process.
F-Secure Anti-Virus for Microsoft Exchange Web Console does not
support Microsoft Internet Explorer 5.5 or older.
If your company has an established process for creating and
storing certificates, you can follow that process to create and store
the security certificate for F-Secure Anti-Virus for Microsoft
Exchange Web Console.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......