74
4.6
Using F-Secure Policy Manager Console
In the centralized administration mode, you can open F-Secure Anti-Virus
for Microsoft Exchange components from the
Windows Start menu >
Programs > F-Secure Policy Manager Console
. When the Policy
Manager Console opens, go to the Advanced Mode user interface by
selecting
View > Advanced Mode
(this step is required in F-Secure Policy
Manager version 5.50 and later). Then select the Policy tab to view the
F-Secure Anti-Virus for Microsoft Exchange components.
F-Secure Policy Manager Console is used to create policies for F-Secure
Anti-Virus for Microsoft Exchange installations that are running on
selected hosts or groups of hosts. Policies are created by assigning
values to variables shown on the
Policy
tab of the
Properties
pane (the
middle pane) in F-Secure Policy Manager Console. To assign a value,
select a variable – marked by the leaf icon – in the
Properties
pane and
enter the value in the
Editor
pane (the right pane).
After a policy is created, it must be distributed to hosts by choosing
Distribute
from the
File
menu.
After changing the settings and distributing the policy, you have to wait for
F-Secure Anti-Virus for Microsoft Exchange to poll the policy.
For detailed information on installing and using F-Secure Policy Manager
console, see the F-Secure Policy Manager Administrator’s Guide.
For testing purposes you may also want to change the polling
intervals. To do that, select the domain in F-Secure Policy Manager
console and set the Incoming Packages Polling Interval and
Outgoing Packages Update Interval variables to 30-45 seconds.
The variables are located under each of the two trees in the
F-Secure Management Agent / Settings / Communications branch.
Note that since the default polling interval is 10 minutes, it might
take up to 10 minutes for the new setting to take effect.
Alternatively, you can click Poll the server now in F-Secure
Management Agent.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 6.62 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide ...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13 ...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 24 Deployment Scenarios 25 ...
Страница 41: ...CHAPTER3 41 Installation Click Next to continue Step 3 Read the licence agreement ...
Страница 44: ...44 Step 6 Choose the destination folder for the installation Click Next to continue ...
Страница 56: ...56 Step 16 The list of components that will be installed is displayed Click Start to install listed components ...
Страница 57: ...CHAPTER3 57 Installation Step 17 The installation status of the components is displayed Click Next to continue ...
Страница 134: ...134 Inbound Mail Figure 5 4 Real Time Processing Virus Scanning Inbound Mail settings ...
Страница 138: ...138 Outbound Figure 5 5 Real Time Processing Virus Scanning Outbound Mail settings ...
Страница 142: ...142 Figure 5 6 Real Time Processing Virus Scanning Public Folders settings ...
Страница 152: ...152 Figure 5 9 Real Time Processing Content Blocking Inbound Mail Content Filtering settings ...
Страница 178: ...178 5 2 5 Quarantine Figure 5 17 Quarantine settings ...
Страница 254: ...254 Figure 6 15 Manual Processing page ...
Страница 258: ...258 Quarantine Thresholds Figure 6 17 Quarantine thresholds settings ...
Страница 364: ...364 B APPENDIX Variables in Warning Messages List of Variables 365 Outbreak Management Alert Variables 367 ...
Страница 392: ...392 Technical Support F Secure Online Support Resources 393 Web Club 395 Virus Descriptions on the Web 395 ...
Страница 397: ......