CHAPTER 3
59
Installation
3.6
After the Installation
This section describes what you have to do after the installation. These
steps include:
Importing product MIBs to F-Secure Policy Manager (if that is
required), and
Initial configuration of the product.
3.6.1
Importing Product MIB files to F-Secure Policy Manager
Console
If you are using the product in centrally managed mode, there are cases
when the F-Secure Anti-Virus for Microsoft Exchange MIB JAR file cannot
be uploaded to F-Secure Policy Manager Server during the installation. In
these cases you will have to import the MIB files to F-Secure Policy
Manager. You will have to import the MIB files if:
F-Secure Anti-Virus for Microsoft Exchange is located in a
different network segment than F-Secure Policy Manager, and
there is a firewall between them blocking access to Policy
Manager’s administrative port (8080).
F-Secure Policy Manager Server has been configured so that
administrative connections from anywhere else than the localhost
are blocked.
The recommended way is to import the MIBs via F-Secure Policy
Manager Console
Tools
menu. You can do it as follows:
1.
Open the
Tools
menu and select the
Installation packages...
option.
2.
Click
Import...
.
3.
When the Import Installation Packages dialog opens, browse to
locate the
fsavmse660.mib.jar
file located under the Jars subdirectory
in the setup package. Then click
Open
.
4.
After importing the new MIB files, restart F-Secure Policy Manager
Console.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......