CHAPTER 6
173
Administering F-Secure Anti-Virus for Internet Mail
Strip attachments
Specify whether attachments are stripped
from the e-mails.
Disabled
- Attachments are not stripped.
All files
- All attachments are stripped from
e-mail messages.
All disallowed attachments
- Specified
attachments are stripped.
All attachments except allowed
- All
attachments except the ones you specify are
stripped.
Allowed attachments
Specify a comma-separated list of file names
and/or file extensions which are allowed. For
example:
*.txt, *.pdf, *.vcf
.
Disallowed attachments
Specify a comma-separated list of file names
and/or file extensions which are not allowed.
For example:
*.vb?, i love you.*, kiss_me.*
.
The default disallowed attachments include
*.bat, *.cmd, *.com, *.exe, *.pif, *.scr, *.vbs
.
You can use wildcards in attachment file
names: '?' to match exactly one character, '*'
to match any number of characters. The
match is not case-sensitive.
The syntax used for stripping attachments is
different from the syntax used for virus
scanning.
Excluded Objects
Specify a comma-separated list of file names
and/or file extensions which are never
stripped. Excluded objects override stripping
All files
and
All disallowed attachments
settings. For example:
*.txt, report.xl?
.
Содержание INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Страница 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Страница 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Страница 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Страница 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Страница 200: ...200 Figure 6 17 Summary of SMTP scanning statistics in F Secure Internet Gatekeeper Web Console...
Страница 251: ...251 9 ADMINISTERING F SECURE MANAGEMENT AGENT F Secure Management Agent Settings 252 Configuring Alert Forwarding 254...
Страница 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Страница 275: ...275 11 SECURITY AND PERFORMANCE Introduction 276 Optimizing Security 276 Optimizing Performance 277...
Страница 280: ...280 12 UPDATING VIRUS AND SPAM DEFINITION DATABASES Overview 281 Automatic Updates 281 Configuring Automatic Updates 282...
Страница 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Страница 300: ...300 B APPENDIX Specifying Hosts Introduction 301 Domain 301 Subnet 301 IP Address 302 Hostname 302...
Страница 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Страница 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Страница 312: ...312 E APPENDIX Configuring Mail Servers Configuring the Network 313 Configuring Mail Servers 314...
Страница 318: ...318 6 Change the TCP port to some other unused port for example 26 7 Click OK for all the windows and reboot the server...
Страница 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Страница 414: ...414...