CHAPTER 4
75
Using F-Secure Anti-Virus for Microsoft Exchange
4.7
Modifying Settings and Viewing Statistics
This section describes how you can modify product settings and view
product statistics in both centrally administered and stand-alone mode.
4.7.1
Centrally Administered Mode
To change F-Secure Anti-Virus for Microsoft Exchange settings in the
centrally administered mode, select
F-Secure Anti-Virus for Microsoft
Exchange
from the
Properties
pane. Make sure the
Policy
tab is selected
and assign values to variables under the
Settings
branch. Modify settings
by assigning new values to the basic leaf node variables (marked by the
leaf icons) shown in the
Policy
tab of the
Properties
pane. Initially, every
variable has a default value, which is displayed in gray. Select the
variable from the
Properties
pane and enter the new value in the
Editor
pane to change it. You can either type the new value or select it from a list
box. If you enter an invalid value, it will be displayed in red in the
Properties
pane. Click
Clear
to revert to the default value or
Undo
to
cancel the most recent change that has not been distributed. For detailed
explanations of all variables, see “
F-Secure Anti-Virus for Microsoft
.
Select the
Status
tab of the
Properties
pane to view statistics and the
settings that were configured during the installation of F-Secure Content
Scanner Server and F-Secure Anti-Virus for Microsoft Exchange.
Statistics are updated periodically and can be reset by choosing
Reset
Statistics
on the
Policy
tab of the
Properties
pane. For more information,
F-Secure Anti-Virus for Microsoft Exchange Statistics
Settings that are configured during the installation and the initial
setup require that you select the Final check box from the Product
View pane. These settings include Primary and Backup Content
Scanner Servers and Quarantine settings.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......