APPENDIX C
281
Deploying the Product on a Cluster
7.
Select the Exchange Server Network Name and the Physical Disk
under
Available resources
and click
Add
to move them to the
Resource dependencies
list.
Click
Next
to continue.
8.
Use the following settings as the File Share parameters.
a.
Type
FSAVMSEQS$
as the share name and
F-Secure
Quarantine Storage
as comment.
b.
Make sure that
User Limit
is set to
Maximum allowed
.
The dollar ($) character at the end of the share name
makes the share hidden when you view the network
resources of the cluster with Windows Explorer.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Страница 214: ...214 6 7 1 Options Database Updates Configure Database Update options to set notification alerts when virus...
Страница 216: ...216 Proxy Server F Secure Content Scanner Server can use a proxy server to connect to the threat detection center...
Страница 236: ...236 Send timeout Specify the time in seconds how long the product waits for the sample submission to complete...
Страница 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Страница 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Страница 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...
Страница 305: ...305 Technical Support F Secure Online Support Resources 306 Web Club 308 Virus Descriptions on the Web 308...