CHAPTER 4
65
Using F-Secure Anti-Virus for Microsoft Exchange
To manage the quarantined content, use F-Secure Anti-Virus for Microsoft
Exchange Web Console. For more information, see “
Changing Settings That Have Been Modified During Installation
or Upgrade
If you want to change a setting that has been modified locally during
installation or upgrade, you need to mark the setting as
Final
in the
restriction editor. The settings descriptions in this manual indicate the
settings for which you need to use the
Final
restriction. You can also
check in F-Secure Policy Manager Console whether you need to use the
Final restriction for a setting. Do the following:
1.
Select the
Policy
tab and then select the setting you want to check.
2.
Select the
Status
tab to see if the setting has been modified locally.
If the setting is not shown in grayed font in the Status view, then
the product uses the setting from the base policy and therefore
the Final restriction is not needed.
If the setting is shown in normal black font, then the setting has
been modified locally. You must mark the setting as Final when
you change it.
4.4
Selecting Scanning Methods to Use
Virus Scanning
The virus scan uses virus definition databases to detect and disinfect
viruses. Virus definition databases are updated typically multiple times a
day and they provide an always up-to-date protection capability.
Heuristic Scanning
The heuristic scan analyzes files for suspicious code behavior so that the
product can detect unknown malware.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Страница 214: ...214 6 7 1 Options Database Updates Configure Database Update options to set notification alerts when virus...
Страница 216: ...216 Proxy Server F Secure Content Scanner Server can use a proxy server to connect to the threat detection center...
Страница 236: ...236 Send timeout Specify the time in seconds how long the product waits for the sample submission to complete...
Страница 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Страница 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Страница 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...
Страница 305: ...305 Technical Support F Secure Online Support Resources 306 Web Club 308 Virus Descriptions on the Web 308...