12
Administering F-Secure Management Agent
. Instructions on
how to configure F-Secure Management Agent.
. Instructions on how to manage
and search quarantined content.
. Instructions on how to optimize
security and performance.
Updating Virus and Spam Definition Databases
.
Instructions on how to keep virus definition databases up-to-date.
. Instructions on how to check that
F-Secure Internet Gatekeeper is running and answers to frequently asked
questions.
. Lists variables that can be included in
virus warning messages.
. Instructions on how to specify hosts in
F-Secure Anti-Virus for Internet Gateways.
. Lists variables that can be used in
the access log.
. Lists variables that can be used in the
F-Secure Anti-Virus for Internet Mail mail log.
. Instructions on how to configure
mail servers to work with F-Secure Internet Gatekeeper.
. Information about different
methods that you can use when setting up a transparent proxy and HTTP
load balancing services.
. Lists services and processes that
are running on the system after the installation.
. Describes error codes.
. Contains the contact information for assistance.
. Describes the company background and
products.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...