
110
To delete a content type permanently, select
the corresponding row, and then click
Clear
Row
.
Click
Clear All
to clear the whole table. Click
Defaults
to restore default log formats to the
table.
Restoring the default list deletes all other
entries from the table. The default list of
scanned content types includes all
recommended entries. You should not
remove any default entry without careful
consideration.
Action on infected
content
Specify whether infected files should be
disinfected or dropped.
Disinfect
- Try to disinfect the infected file. If
the disinfection succeeds, F-Secure
Anti-Virus for Internet Gateways sends the
disinfected file to the requesting client
instead of the original, infected file. If the
disinfection fails, the infected file is dropped
and it is not delivered to the requesting
client.
Drop
- Do not disinfect or deliver infected
files. All infected files are dropped.
If the downloaded web content is
successfully disinfected, the end-user does
not see any difference whether the content
was clean or disinfected. Only the
administrator receives a notification about
the disinfected file.
Action on unable to scan
Specify whether F-Secure Anti-Virus for
Internet Gateways should drop or pass files
that it is unable to scan.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...