102
A.6
Using the Product with High Availability
Architecture in Microsoft Exchange Server 2010
New high-availability solutions in Microsoft Exchange Server 2010
support online mailbox moves. As it takes some time for F-Secure
Anti-Virus for Microsoft Exchange to enumerate mailbox changes on
nodes, manual and scheduled scans might not scan the moved mailbox
but the mailbox copy on the former node instead, if the scan is started
right after the move. However, the real-time scan works without these
limitations.
To scan Public Folders manually or with scheduled scanning, you have to
specify an administrator’s mailbox if the product settings. Manual and
scheduled scans scan all Public Folders that the specified administrator
account can access.
Once you start the manual scan of Public Folders on one node, the scan
goes through all Public Folders the account can access, including those
Public Folder Databases that are located on other nodes. To avoid
collisions where one item would be edited by several on-demand
scanners simultaneously, make sure that manual and scheduled Public
Folders scans are started only on one node at a time.
The real-time Public Folder scan scans only Public Folders that are
located together with F-Secure Anti-Virus for Microsoft Exchange on the
same node.
If Public Folders in Microsoft Exchange 2010 are replicated, the
attachment replacement text file is added only to the Public Folder
Database replica that is located on the same node, but infections are
detected and quarantined if needed from all replicas.
If an infected item was edited (an infection was disinfected or
quarantined) during the manual or scheduled Public Folder scan, the
edited item is marked as "read" for the administrator's mailbox which is
specified in the product settings.
Содержание ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Страница 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Страница 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Страница 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Страница 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Страница 110: ...108 Technical Support F Secure Online Support Resources 109 Web Club 111 Virus Descriptions on the Web 111 ...
Страница 115: ......