APPENDIX A
347
Deploying the Product on a Cluster
A.2
Installation Overview
Follow these steps to deploy and use F-Secure Anti-Virus for Microsoft
Exchange on a cluster.
1.
Install F-Secure Policy Manager on a dedicated server. If you already
have F-Secure Policy Manager installed in the network, you can use it
to administer F-Secure Anti-Virus for Microsoft Exchange. For more
information, see F-Secure Policy Manager Administrator’s Guide.
2.
Install Microsoft SQL Server 2000 or 2005 on a dedicated server.
Microsoft SQL Server must be installed with the mixed authentication
mode (Windows Authentication and SQL Server Authentication).
After the installation, make sure that
Named Pipes
and
TCP/IP
protocols
are enabled in SQL Server network configuration.
3.
Create the quarantine storage for quarantined e-mail messages and
attachments.
If you plan to install the product on an active-passive cluster, see
“
Quarantine Storage in Active-Passive Cluster
. If you plan to install
the product on an active-active cluster, see “
4.
Install the product on each node.
If you plan to install the product on an active-passive cluster, see
“
Installing on Active-Passive Cluster
. If you plan to install the
product on an active-active cluster, see “
.
5.
Create a policy domain for the cluster in F-Secure Policy Manager
and import cluster nodes there. For more information, see
“
Administering the Cluster Installation with F-Secure Policy Manager
6.
Log on each node and configure the F-Secure Anti-Virus for Microsoft
Exchange Web Console to accept connections from authorized hosts.
IMPORTANT: Install the product completely on one node before
you install it on another node.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......