144
Figure 4-31 Proxy Configuration page
Proxy Configuration
Use proxy server
Specify whether F-Secure Content Scanner
Server uses a proxy server when it connects to
the threat detection center.
Proxy server address Specify the address of the proxy server.
Proxy server port
Specify the port number of the proxy server.
Authentication
method
Specify the authentication method to use to
authenticate to the proxy server.
NoAuth
- The proxy server does not require
authentication.
Basic
- The proxy uses the basic authentication
scheme.
Содержание ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Administrator s Guide...
Страница 7: ...7 ABOUT THIS GUIDE How This Guide Is Organized 8 Conventions Used in F Secure Guides 13...
Страница 108: ...108 Figure 4 15 Manual Processing page...
Страница 112: ...112 Quarantine Thresholds Figure 4 17 Quarantine thresholds settings...
Страница 192: ...192 A APPENDIX Variables in Warning Messages List of Variables 193 Outbreak Management Alert Variables 195...
Страница 218: ...218 Technical Support F Secure Online Support Resources 219 Web Club 220 Virus Descriptions on the Web 221...
Страница 222: ...222...
Страница 224: ...224...