278
C.1
Installation Overview
Follow these steps to deploy and use F-Secure Anti-Virus for Microsoft
Exchange on a cluster.
1.
Install F-Secure Policy Manager on a dedicated server. If you already
have F-Secure Policy Manager installed in the network, you can use it
to administer F-Secure Anti-Virus for Microsoft Exchange. For more
information, see F-Secure Policy Manager Administrator’s Guide.
2.
Install Microsoft SQL Server 2000 or 2005 on a dedicated server.
Microsoft SQL Server must be installed with the mixed authentication
mode (Windows Authentication and SQL Server Authentication).
After the installation, make sure that
Named Pipes
and
TCP/IP
protocols
are enabled in SQL Server network configuration.
3.
Create the quarantine storage where the product will place
quarantined e-mail messages and attachments.
In the Single Copy Cluster (SCC) environment, continue to “
the Quarantine Storage for a Single Copy Cluster Environment
.
In the Continuous Cluster Replication (CCR) environment, continue
to ““
Creating the Quarantine Storage for a Continuous Cluster Replication
.
4.
Install the product on one node at the time, starting from the active
node. Make sure the product is fully up and running before starting
the installation on the passive node.
5.
In the Single Copy Cluster (SCC) environment, create a policy
domain for the cluster in F-Secure Policy Manager and import cluster
nodes there. See “
Administering the Cluster Installation with F-Secure
.
6.
Log on each node and configure the Web Console to accept
connections from authorized hosts.
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 7.10 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Страница 214: ...214 6 7 1 Options Database Updates Configure Database Update options to set notification alerts when virus...
Страница 216: ...216 Proxy Server F Secure Content Scanner Server can use a proxy server to connect to the threat detection center...
Страница 236: ...236 Send timeout Specify the time in seconds how long the product waits for the sample submission to complete...
Страница 270: ...270 A APPENDIX Variables in Warning Messages List of Variables 271...
Страница 273: ...273 B APPENDIX Services and Processes List of Services and Processes 274...
Страница 293: ...293 D APPENDIX Sending E mail Alerts And Reports Overview 294 Solution 294...
Страница 305: ...305 Technical Support F Secure Online Support Resources 306 Web Club 308 Virus Descriptions on the Web 308...