"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
Copyright © 1993-2009 F-Secure Corporation. All rights reserved.
Portions Copyright © 1991-2007 Kaspersky Lab.
This product includes software developed by the Apache Software Foundation (http://
www.apache.org/). Copyright © 2000-2007 The Apache Software Foundation. All rights reserved.
This product includes PHP, freely available from http://www.php.net/. Copyright © 1999-2007 The PHP
Group. All rights reserved.
This product includes code from SpamAssassin. The code in the files of the SpamAssassin distribution
are Copyright © 2000-2002 Justin Mason and others, unless specified otherwise in that particular file.
All files in the SpamAssassin distribution fall under the same terms as Perl itself, as described in the
“Artistic License”.
This product may be covered by one or more F-Secure patents, including the following:
12000040-9B02
GB2353372
GB2366691
GB2366692
GB2366693
GB2367933
GB2368233
GB2374260
Содержание ANTI-VIRUS FOR MICROSOFT EXCHANGE 8.00 -
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Страница 9: ...9 ABOUT THIS GUIDE How This Guide Is Organized 10 Conventions Used in F Secure Guides 13...
Страница 23: ...23 2 DEPLOYMENT Installation Modes 24 Network Requirements 25 Deployment Scenarios 26...
Страница 59: ...CHAPTER3 59 Installation Step 18 The installation is complete Click Finish to close the Setup wizard...
Страница 296: ...296 A APPENDIX Variables in Warning Messages List of Variables 297...
Страница 299: ...299 B APPENDIX Services and Processes List of Services and Processes 300...
Страница 332: ...332 D APPENDIX Sending E mail Alerts And Reports Overview 333 Solution 333...
Страница 344: ...344 Technical Support F Secure Online Support Resources 345 Web Club 347 Virus Descriptions on the Web 347...
Страница 349: ......