CHAPTER 3
41
Installation
If you already use F-Secure Policy Manager to administer other F-Secure
products, it is recommended to install F-Secure Anti-Virus for Microsoft
Exchange in centralized administration mode.
The quarantined mails are managed using the F-Secure Anti-Virus for
Microsoft Exchange Web Console in both centrally administered and
stand-alone installations. In centrally managed environments all other
features are managed with F-Secure Policy Manager.
3.6
Installation Overview
F-Secure Anti-Virus for Microsoft Exchange can be installed to the same
computer that runs F-Secure Anti-Virus for Servers 9.0. When both
products are installed on the same computer, they can be managed with
the common Web Console.
You should uninstall any potentially conflicting products, such as other
anti-virus, file encryption, and disk encryption software, which employ
low-level device drivers, before you install F-Secure Anti-Virus for
Microsoft Exchange.
To administer F-Secure Anti-Virus for Microsoft Exchange in centralized
administration mode, you need to install F-Secure Policy Manager
Console and F-Secure Policy Manager Server. Detailed information on
F-Secure Policy Manager Console and F-Secure Policy Manager Server
is provided in the F-Secure Policy Manager Administrator's Guide.
You need to log in with administrator-level privileges to install F-Secure
Anti-Virus for Microsoft Exchange.
Follow these steps to set up F-Secure Anti-Virus for Microsoft Exchange:
Centralized Administration mode:
1.
Run F-Secure Policy Manager setup to set up F-Secure Policy
Manager Server. See F-Secure Policy Manager Administrator’s
Guide for instructions.
2.
Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “
Содержание ANTI-VIRUS - FOR MICROSOFT EXCHANGE
Страница 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide ...
Страница 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6 ...
Страница 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20 ...
Страница 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64 ...
Страница 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105 ...
Страница 110: ...108 Technical Support F Secure Online Support Resources 109 Web Club 111 Virus Descriptions on the Web 111 ...
Страница 115: ......