F-Secure Anti-Virus for Microsoft Exchange
Total Page:16
File Type:pdf, Size:1020Kb
F-Secure Anti-Virus for Microsoft Exchange Administrator’s Guide "F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure product names and symbols/logos are either trademarks or registered trademarks of F-Secure Corporation. All product names referenced herein are trademarks or registered trademarks of their respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of others. Although F-Secure Corporation makes every effort to ensure that this information is accurate, F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure Corporation reserves the right to modify specifications cited in this document without prior notice. Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of F-Secure Corporation. Copyright © 1993-2008 F-Secure Corporation. All rights reserved. Portions Copyright © 1991-2006 Kaspersky Lab. This product includes software developed by the Apache Software Foundation (http:// www.apache.org/). Copyright © 2000-2006 The Apache Software Foundation. All rights reserved. This product includes PHP, freely available from http://www.php.net/. Copyright © 1999-2006 The PHP Group. All rights reserved. This product includes code from SpamAssassin. The code in the files of the SpamAssassin distribution are Copyright © 2000-2002 Justin Mason and others, unless specified otherwise in that particular file. All files in the SpamAssassin distribution fall under the same terms as Perl itself, as described in the “Artistic License”. This product may be covered by one or more F-Secure patents, including the following: GB2353372 GB2366691 GB2366692 GB2366693 GB2367933 GB2368233 GB2374260 12000040-7B15 Contents About This Guide 7 How This Guide Is Organized .............................................................................................. 8 Conventions Used in F-Secure Guides................................................................................ 9 Symbols ...................................................................................................................... 9 Chapter 1 Introduction 11 1.1 Overview ....................................................................................................................12 1.2 How F-Secure Anti-Virus for Microsoft Exchange Works...........................................13 1.3 Key Features..............................................................................................................15 1.4 F-Secure Anti-Virus Mail Server and Gateway Products ...........................................17 Chapter 2 Requirements 19 2.1 Which SQL Server to Use for the Quarantine Database?..........................................20 2.2 Network Requirements...............................................................................................21 2.3 Web Browser Software Requirements .......................................................................22 2.4 Improving Reliability and Performance ......................................................................23 2.5 Configuring the Product After the Installation.............................................................24 Chapter 3 Using F-Secure Anti-Virus for Microsoft Exchange 25 3.1 Administering F-Secure Anti-Virus for Microsoft Exchange .......................................26 3.1.1 Logging in for the First Time...........................................................................26 3.2 Checking the Product Status......................................................................................29 3.3 Configuring the Web Console ....................................................................................32 3 3.4 Modifying Settings and Viewing Statistics..................................................................33 3.5 Manually Processing Mailboxes and Public Folders ..................................................34 3.5.1 Stand-alone Mode ..........................................................................................34 3.5.2 Creating Scanning Operations .......................................................................34 3.6 Configuring Alert Forwarding .....................................................................................67 3.7 Viewing Alerts ............................................................................................................69 Chapter 4 Administration with Web Console 70 4.1 Overview ....................................................................................................................71 4.2 F-Secure Anti-Virus for Microsoft Exchange Settings ................................................71 4.2.1 Summary ........................................................................................................72 4.2.2 Virus Scanning ...............................................................................................74 4.2.3 Stripping Attachments ....................................................................................90 4.2.4 Content Filtering ...........................................................................................100 4.2.5 Manual Scanning..........................................................................................107 4.2.6 Quarantine....................................................................................................111 4.2.7 Advanced......................................................................................................121 4.2.8 Internal Domains ..........................................................................................127 4.3 F-Secure Content Scanner Server Settings.............................................................129 4.3.1 Summary ......................................................................................................129 4.3.2 Database Updates........................................................................................136 4.3.3 Scan Engines ...............................................................................................138 4.3.4 Proxy Configuration......................................................................................143 4.3.5 Archive Scanning..........................................................................................146 4.3.6 Advanced......................................................................................................149 4.3.7 Interface........................................................................................................151 4.4 F-Secure Automatic Update Agent Settings ............................................................152 4.4.1 Summary ......................................................................................................153 4.4.2 Automatic Updates .......................................................................................156 4.5 F-Secure Management Agent Settings ....................................................................157 Chapter 5 Quarantine Management 160 5.1 Introduction ..............................................................................................................161 5.2 Configuring Quarantine Options...............................................................................162 5.3 Searching the Quarantined Content.........................................................................163 4 5.4 Query Results Page .................................................................................................167 5.5 Viewing Details of a Quarantined Message .............................................................169 5.6 Reprocessing the Quarantined Content...................................................................171 5.7 Releasing the Quarantined Content.........................................................................172 5.8 Removing the Quarantined Content.........................................................................174 5.9 Deleting Old Quarantined Content Automatically.....................................................174 5.10 Quarantine Logging..................................................................................................175 5.11 Quarantine Statistics ................................................................................................176 5.12 Moving the Quarantine Storage ...............................................................................177 Chapter 6 Administering F-Secure Spam Control 179 6.1 Overview ..................................................................................................................180 6.2 Spam Control Settings in Web Console...................................................................180 6.3 Realtime Blackhole List Configuration .....................................................................185 6.3.1 Enabling Realtime Blackhole Lists ...............................................................185 6.3.2 Optimizing F-Secure Spam Control Performance ........................................187 Chapter 7 Updating Virus and Spam Definition Databases 189 7.1 Overview ..................................................................................................................190 7.2 Automatic Updates with F-Secure Automatic Update Agent....................................190