APPENDIX A
345
Deploying the Product on a Cluster
A.1
System and Network Recommendations
F-Secure Policy Manager
When F-Secure Anti-Virus for Microsoft Exchange is installed on
a cluster, you have to use F-Secure Policy Manager to administer
it. F-Secure Policy Manager must be installed on a separate
server, it cannot be installed on the cluster. It is recommended to
use F-Secure Policy Manager version 6.01 or later.
Microsoft SQL Server
Microsoft SQL Server is required for the quarantine database.
Microsoft SQL Server must be installed on a separate computer.
It is recommended to use Microsoft SQL Server 2000 or 2005
(Standard or Enterprise Edition). Microsoft SQL Server 2005
Express Edition can be used, but is not recommended if your
organization sends and receives a large amount of e-mail
messages. Microsoft SQL Server 2000 Desktop Edition (MSDE)
cannot be used with the product installed on a cluster.
Server for the quarantine storage
if you plan to deploy the product on an active-active cluster, the
quarantine storage requires a dedicated server. The server must
belong in the same domain with Microsoft Exchange Servers. If
you plan to install the product on an active-passive cluster, you
can have the quarantine storage on the cluster or on a dedicated
server.
Sample Active-Passive Cluster Deployment
The following diagram displays how the product can be deployed and
used on the active-passive cluster environment.
The quarantine storage can be created on the same server
running Microsoft SQL Server or F-Secure Policy Manager
Server as long as it belongs to the same domain as your
Microsoft Exchange Servers and it has sufficient disk
space.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......