
68
Step 1.
Create the security certificate
1.
Browse to the F-Secure Anti-Virus for Microsoft Exchange Web
Console installation directory, for example:
C:\Program Files\F-Secure\Web User Interface\bin\
2.
Locate the certificate creation utility,
makecert.bat
, and double click it
to run the utility.
3.
The utility creates a certificate that will be issued to all local IP
addresses, and restarts the F-Secure Anti-Virus for Microsoft
Exchange Web Console service to take the certificate into use. Wait
until the utility completes, and the window closes. Now you can
proceed to logging in.
Step 2.
Log in and install the security certificate
1.
Select
Programs
>
F-Secure Anti-Virus for Microsoft
Exchange>F-Secure Anti-Virus for Microsoft Exchange Web Console
,
or enter the address of the F-Secure Anti-Virus for Microsoft
Exchange and the port number in your web browser. Note, that the
protocol used is https. For example:
https://127.0.0.1:25023
2.
The Security Alert about the F-Secure Anti-Virus for Microsoft
Exchange Web Console certificate is displayed. If you install the
certificate now, you will not see the Security Alert window again. Click
View Certificate
to view the certificate information and to install the
certificate.
3.
The Certificate window opens. Click
Install Certificate
to proceed to
the Certificate Import Wizard.
4.
Follow the instructions in the Certificate Import Wizard. When the
wizard has completed, you are prompted to add the new certificate in
the Certificate Root Store. Click
Yes
.
5.
If the Security Alert window is still displayed, click
Yes
to proceed.
6.
When the login page opens, enter the user name and the password.
Note, that you must have administrator rights to the host. Then click
Log In
.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......