"F-Secure" and the triangle symbol are registered trademarks of F-Secure Corporation and F-Secure
product names and symbols/logos are either trademarks or registered trademarks of F-Secure
Corporation. All product names referenced herein are trademarks or registered trademarks of their
respective companies. F-Secure Corporation disclaims proprietary interest in the marks and names of
others. Although F-Secure Corporation makes every effort to ensure that this information is accurate,
F-Secure Corporation will not be liable for any errors or omission of facts contained herein. F-Secure
Corporation reserves the right to modify specifications cited in this document without prior notice.
Companies, names and data used in examples herein are fictitious unless otherwise noted. No part of
this document may be reproduced or transmitted in any form or by any means, electronic or
mechanical, for any purpose, without the express written permission of F-Secure Corporation.
F-Secure Online Support Resources ............................................................................... 393
Web Club ....................... ... ...............................................................................................395
Virus Descriptions on the Web .........................................................................................395
8
Page 9
ABOUT THIS GUIDE
How This Guide Is Organized.................................................... 10
Conventions Used in F-Secure Guides..................................... 13
9
Page 10
10
How This Guide Is Organized
F-Secure Anti-Virus for Microsoft Exchange Administrator's Guid e is
divided into the following chapters:
Chapter 1. Introduction. General information about F-Secure Anti-V irus
for Microsoft Exchange and other F-Secure Anti-Virus Mail Server and
Gateway products.
Chapter 2. Deployment. Instructions and examples how to set up your
network environment before you can install F-Secure Anti-Virus for
Microsoft Exchange.
Chapter 3. Installation. Instructions how to install and set up F-Secure
Anti-Virus for Microsoft Exchange.
Chapter 4. Using F-Secure Anti-Virus for Microsoft Exchange.
Instructions how to use and administer F-Secure Anti-Virus for Microsoft
Exchange.
Chapter 9. Updating V irus and Sp am Definition Databases . Instructions
how to update your virus definition database.
Chapter 5. Centrally Managed Administration. Instructions how to
remotely administer F-Secure Anti-Virus for Microsoft Exchange and
F-Secure Content Scanner Server when they have been installed in
centralized administration mode.
Chapter 6. Administration with Web Console. Instructions how to
administer F-Secure Anti-Virus for Microsoft Exchange with the Web
Console.
Chapter 8. Administering F-Secure Spam Control. General information
about and instructions on how to configure F-Secure Spam Control.
Appendix A. Deploying the Product on a Cluster. Describes how the
product can be deployed and used on the cluster environment.
Appendix B. Variables in Warning Messages. Lists variables that can
be included in virus warning messages.
Appendix C. Services and Processes. Describes services, devices and
processes of F-Secure Anti-Virus for Microsoft Exchange.
Page 11
About This Guide11
Chapter D. Troubleshooting. Solutions to some common problems.
Technical Support. Contains the contact information for assistance.
About F-Secure Corporation. Describes the company backgrou nd and
products.
See the F-Secure Policy Manager Administrator's Guide for detailed
information about installing and using the F-Secure Policy Manager
components:
F-Secure Policy Manager Console, the tool for remote
administration of F-Secure Anti-Virus for Microsoft Exchange.
F-Secure Policy Manager Server, which enables communication
between F-Secure Policy Manager Console and the managed
systems.
Page 12
12
Conventions Used in F-Secure Guides
This section describes the symbols, fonts, and terminology used in this
manual.
Symbols
WARNING: The warning symbol indicates a situation with a
risk of irreversible destruction to data.
IMPORTANT: An exclamation mark provides important information
that you need to consider.
REFERENCE - A book refers you to related information on the
topic available in another document.
NOTE - A note provides additional information that you should
consider.
l
Fonts
TIP - A tip provides information that can help you perf or m a task
more quickly or easily.
⇒ An arrow indicates a one-step procedure.
Arial bold (blue) is used to refer to menu names and commands, to
buttons and other items in a dialog box.
Arial Italics (blue) is used to refer to other chapters in the manual, book
titles, and titles of other manuals.
Arial Italics (black) is used for file and folder names, for figure and table
captions, and for directory tree names.
Courier New is used for messages on your compute r screen.
Page 13
Courier New bold is used for information that you must type.
SMALLCAPS (BLACK) is used for a key or key combination on your
keyboard.
13
PDF Document
For More Information
Arial underlined (blue)
Arial italics is used for window and dialog box names.
This manual is provided in PDF (Portable Document Format). The PDF
document can be used for online viewing and printing using Adobe®
Acrobat® Reader. When pr inting the manual, please print the entire
manual, including the copyright and disclaimer statements.
Visit F-Secure at http://www.f-secure.com for documentation, training
courses, downloads, and service and supp o rt contacts.
In our constant attempts to improve our documentation, we would
welcome your feedback. If you have any questions, comments, or
suggestions about this or any other F-Secure document, please conta ct
us at documentation@f-secure.com
F-Secure Anti-Virus Mail Server and Gateway Products............ 21
14
Page 15
1.1Overview
CHAPTER 115
Introduction
Malicious code, such as computer viruses, is one of the main threats for
companies today. In the past, malicious code spread mainly via disks and
the most common viruses were the ones that infected disk boot sectors.
When users began to use office applications with macro capabilities such as Microsoft Office - to write documen t s and distribu te them via mail
and groupware servers, macro viruses started spreading rapidly.
After the millennium, the most common spreading mechanism has been
the e-mail. Today about 90% of viruses arrive via e-mail. E-mails provide
a very fast and efficient way for viruses to spread themselves without any
user intervention and that is why e-mail worm outbreaks, like Sober,
Netsky and Bagle, have caused a lot of damage around the world.
F-Secure Anti-Virus Mail Server and Gateway products are designed to
protect your company's mail and groupware servers and to shield the
company network from any malicious code that travels in HTTP or SMTP
traffic. In addition, they protect your company network against spam. The
protection can be implemented on the gateway level to screen all
incoming and outgoing e-mail (SMTP), web surfing (HTTP and
FTP-over-HTTP) and file transfer (FTP) traffic. Furthermore, it can be
implemented on the mail server level so that it does not only protect
inbound and outbound traffic but also internal mail traffic and public
sources, such as Public Folders on Microsoft Exchange servers.
Providing the protection already on the gateway level has plenty of
advantages. The protection is easy and fast to set up and install,
compared to rolling out antivirus protection on hundreds or thousands of
workstations. The protection is also invisible to the end users which
ensures that the system cannot be by-passed and makes it easy to
maintain. Of course, protecting the gateway level alone is not enough to
provide a complete antivirus solution; file server and workstation level
protection is needed, also.
Why clean 1000 workstations when you can clean one attachment at the
gateway level?
Page 16
16
1.2How F-Secure Anti-Virus for Microsoft Exchange
Works
F-Secure Anti-Virus for Microsoft Exchange is designed to detect and
disinfect viruses and other malicious code from e-mail transmissions
through Microsoft Exchange 2000/2003 Server. Scanning is done in real
time as the mail passes through Microsoft Exchange Server. On-demand
scanning of user mailboxes and Public Folders is also available.
Scanning
Attachments and
Message Bodies
Flexible and Scalable
Anti-Virus Protection
F-Secure Anti-Virus for Microsoft Exchange scans attachments and
message bodies for malicious code. It can also be instructed to remove
particular attachments according to the file name or the file extension. In
addition, it can filter out messages containing keywords that have been
defined as disallowed.
If the intercepted mail contains malicious code, F-Secure Anti-Virus for
Microsoft Exchange can be configured to disinfect or drop the content.
Any malicious code found during the scan process can be placed in the
Quarantine, where it can be further examined. Stripped attachments can
also be placed in the Quarantine for further examination.
F-Secure Anti-Virus for Microsoft Exchange is installed on Microsoft
Exchange 2000/2003 Server and it intercepts mail traveling through
mailboxes and Public folders. Intercepted attachments and documents
are sent to F-Secure Content Scanner Server, which returns disinfected
files back to F-Secure Anti-Virus for Microsoft Exchange.
The two-component product architecture ensures that the anti-virus
protection does not increase the load on the protected system and that
the infected data is never stored on the production network. It also
enables you to implement a server pool, so you can share the traffic load
between multiple F-Secure Content Scanner Servers and have backup
servers if the traffic to primary servers stops for some reason.
Page 17
AlertingF-Secure Anti-Virus for Microsoft Exchange has extensive alerting
functions, which means that the system administrator can specify a
recipient inside the company network to be notified about the infection
found in the data content. Of course, the network administrator can be
notified about the infection also.
CHAPTER 117
Introduction
Powerful and Always
Up-to-date
Virus and Spam
Outbreak Detection
Stand-alone and
Centralized
Administration Modes
F-Secure Anti-Virus for Microsoft Exchange uses the award-winning
F-Secure Anti-Virus scanner to ensure the highe st possible detection rate
and disinfection capability. The daily F-Secure Anti-Virus signature
database updates provide F-Secure Anti-Virus for Microsof t Exchange an
always up-to-date protection capability.
F-Secure Anti-Virus scanner consistently r anks at the top when compar ed
to competing products. Our team of dedicated virus resea rchers is on call
24-hours a day responding to new and emerging threats. In fact,
F-Secure is one of the only companies to release tested virus definition
updates on a daily basis, to make sure our customers are receiving the
highest quality service and protection.
Massive spam and virus outbreaks consist of millions of messages which
share at least one identifiable pattern that can be used to distinguish the
outbreak. Any message that contains one or more of these patterns can
be assumed to be a part of the same spam or virus outbreak.
F-Secure Anti-Virus for Microsoft Exchange can identify these patterns
from the message envelope, headers and body, in any language,
message format and encoding type. It can detect spam messages and
new viruses during the first minutes of the outbreak.
F-Secure Anti-Virus for Microsoft Exchange can be installed either in
stand-alone or centrally administered mode. Depending on how it has
been installed, F-Secure Anti-Virus for Microsoft Exchange is managed
either with the Web Console or F-Secure Policy Manager.
Scalability and
Reliability
F-Secure Policy Manager provides a scalable way to manage the security
of multiple applications on multiple operating systems, from one central
location.F-Secure Policy Manager is comprised of two components,
F-Secure Policy Manager Console and F-Secure Policy Manager Server,
Page 18
18
which are used to administer applications. They are seamlessly
integrated with the F-Secure Management Agents that handle all
management functions on local hosts.
Easy to AdministerIf F-Secure Anti-Virus for Microsoft Exchange is installed in stand-alone
mode it can be managed with the web-based user interface. With Web
Console, you can configure F-Secure Anti-Virus for Microsoft Exchange
settings, set up scheduled scans or run manual processes any time you
want.
If F-Secure Anti-Virus for Microsoft Exchange has been installed in
centrally administered configuration, it is managed with F-Secure Policy
Manager. With its graphical user interface, F-Secure Policy Manager
Console provides a centralized view of the domains and hosts in your
network and lets you configure the security policies for all F-Secure
components. F-Secure Policy Manager receives status information from
F-Secure Anti-Virus for Microsoft Exchange.
F-Secure Policy Manager Server is the server side component that
handles communication between F-Secure Anti-Virus for Microsoft
Exchange and F-Secure Policy Manager Console. It exchanges security
policies, software updates, status information, statistics, alerts, and other
information between F-Secure Policy Manager Console and all managed
systems.
Figure 1-1 (1) E-mail arrives from the Internet to F-Secure Anti-Virus for Microsoft
Exchange, which (2) filters malicious content from mails and attachments, and (3)
delivers cleaned files forward.
Page 19
1.3Key Features
F-Secure Anti-Virus for Microsoft Exchange provides the following
features and capabilities.
Superior ProtectionSuperior detection rate with multiple scanning engines.
Automatic malicious code detection and disinfection.
Heuristic scanning detects also unknown Windows and macro
viruses.
Recursive scanning of ARJ, BZ2, CAB, GZ, JAR, LZH, MSI,
RAR, TAR, TGZ, Z and ZIP archive files.
Automatic daily virus definition database updates.
Suspicious and unsafe attachments can be stripped away from
e-mails.
Password protected archives can be treated as unsafe.
Intelligent file type recognition.
Message filtering based on keywords in message subjects and
text.
Utilizes the low-level Anti-Virus API (AV API 2.0) for Microsoft
Exchange 2000 Server, and AV AP 2.5 for Microsoft Exchange
2003 Server.
CHAPTER 119
Introduction
Virus Outbreak
Detection
The virus outbreak detection is an additional active layer of
protection that automatically detects virus outbreaks and
quarantines suspicious messages.
Virus outbreaks are transparen tly detected and infected
messages are quarantined before the outbreak becomes
widespread.
The product can notify the administrator about virus outbreaks.
Quarantined unsafe messages can be reprocessed
automatically.
Page 20
20
Transparen cy and
Scalability
Viruses are intercepted before they can enter the network and
spread out on workstations and servers.
Real-time scanning of internal, inbound and outbound mail
messages and Public Folder notes.
Automatic protection of new mailboxes and Public Folders.
Total transparency to end-users. Users cannot bypass the
system, which means that messages and documents cannot be
exchanged without scanning.
Support for Windows 2000 Advanced Server or Windows Server
2003 clusters. Both Active-Passive and Active-Active clusters are
supported.
ManagementControlling and monitoring the behavior of the products remotely.
Starting predefined operations remotely.
Monitoring statistics provided by the products remotely with
F-Secure Policy Manager or F-Secure Anti-Virus for Microsoft
Exchange Web Console.
Possibility to configure and manage stand-alone installations with
the convenient F-Secure Anti-Virus for Microsoft Exchange Web
Console.
Contains new quarantine managemen t features: you can manage
and search quarantined content with the F-Secure Anti-Virus for
Microsoft Exchange Web Console.
Protection against
Spam
Possible spam messages are transparently detected before they
become widespread.
Efficient spam detection based on different analyses on the
e-mail content.
Multiple filtering mechanisms guarantee the high accuracy of
spam detection.
Spam detection works in every language and message format.
Page 21
1.4F-Secure Anti-Virus Mail Server and Gateway
Products
The F-Secure Anti-Virus product line consists of workstation, file server,
mail server, gateway and mobile products.
F-Secure Internet Gatekeeper is a high performance, totally
automated web (HTTP and FTP-over-HTTP) and e-mail (SMTP)
virus scanning solution for the gateway level. F-Secure Internet
Gatekeeper works independently of firewall and e-mail server
solutions, and does not affect their performance.
F-Secure Anti-Virus for Microsoft Exchange™ protects your
Microsoft Exchange users from malicious code contained within
files they receive in mail messages and documents they open
from shared databases. Malicious code is also stopped in
outbound messages and in notes being posted on Public Folders.
The product operates transparently and scans files in the
Exchange Server Information Store in real-time. Manual and
scheduled scanning of user mailboxes and Public Folders is a lso
supported.
F-Secure Anti-Virus for MIMEsweeper™ provides a powerful
anti-virus scanning solution that tightly integrates with Clearswift
MIMEsweeper for SMTP and MIMEsweeper for Web products.
F-Secure provides top-class anti-virus software with fast and
simple integration to Clearswift MAILsweeper and WEBsweeper,
giving the corporation the powerful combination of complete
content security.
F-Secure Internet Gatekeeper for Linux™ provides a
high-performance solution at the Internet gateway level, stopping
viruses and other malicious code before the spread to end users
desktops or corporate servers. The product scans SMTP, HTTP,
FTP and POP3 traffic for viruses, worms and trojans, and blocks
and filters out specified file types. ActiveX and Java code can
also be scanned or blocked. The product receives updates
CHAPTER 121
Introduction
Page 22
22
automatically from F-Secure, keeping the virus protection always
up to date. A powerful and easy-to-use management console
simplifies the installation and configuration of the product.
F-Secure Messaging Security Gateway™ delivers the
industry’s most complete and effective security for e-mail. It
combines a robust enterprise-class messaging platform with
perimeter security, antispam, antivirus, secure messaging and
outbound content security capabilities in an easy-to-deploy,
hardened appliance.
F-Secure Anti-Virus for Microsoft Exchange can be installed either in
stand-alone or centrally administered mode. In stand-alone installation,
F-Secure Anti-Virus for Microsoft Exchange is managed with Web
Console. In centrally administered mode, it is managed centrally with
F-Secure Policy Manager components: F-Secure Policy Manager Server
and F-Secure Policy Manager Console.
To administer F-Secure Anti-Virus for Microsoft Exchange in the centrally
administered mode, you have to install the following components:
F-Secure Policy Manager Server (on a dedicated machine)
F-Secure Policy Manager Console (on the administ ra to r's
machine)
2.2Network Requirements
This network configuration is valid for all scenarios described in this
chapter. Make sure that the following network traffic can travel:
ServiceProcessInbound portsOutbound ports
F-Secure Content Scanner
Server
F-Secure Anti-Virus for
Microsoft Exchange Web
Console
Depending on the number of protected systems and the amount of data
traffic, you might consider various scenarios of deploying F-Secure
Anti-Virus for Microsoft Exchange. There are various ways to deploy
F-Secure Anti-Virus for Microsoft Exchange that are suitable to different
environments.
If the mail traffic is not very heavy, see “Minimum Installation”, 25.
If the mail traffic is rather heavy, see “Medium to Large
Installation”, 27.
For very large, performance-critical installations, see
“Performance-Critical Installation”, 28.
For Microsoft Exchange Cluster Environments, see “Microsoft
Exchange Cluster Environment”, 30.
-DNS (53, UDP/TCP),
HTTP (80)
-DNS (53, UDP/TCP),
SMTP (25)
-DNS (53, UDP/TCP),
1433 (TCP), only with the
dedicated SQL server
2.3.1Minimum Installation
If the mail traffic is not very heavy, you can install F-Secure Content
Scanner Server on the same machine that runs Microsoft Exchange
Server. In this case, both F-Secure Content Scanner Server and
F-Secure Anti-Virus for Microsoft Exchange will reside on the Microsoft
Exchange Server.
Page 26
26
You can administer F-Secure Anti-Virus for Microsoft Exchange and
F-Secure Content Scanner Server by using the F-Secure Anti-Virus for
Microsoft Exchange Web Console.
Figure 2-1 F-Secure Anti-Virus for Microsoft Exchange minimum installation
Alternatively, you can choose to install F-Secure Policy Manager to
enable centralized administration of F-Secure Content Scanner Server
and F-Secure Anti-Virus for Microsoft Exchan ge.
Page 27
2.3.2Medium to Large Installation
If the mail traffic is rather heavy, F-Secure Content Scanner Server should
be installed on a dedicated machine. This minimizes the extr a load on the
Microsoft Exchange Server.
You should install F-Secure Anti-V irus for Microsoft Exchange in
centralized administration mode on each Microsoft Exchange Server.
CHAPTER 227
Deployment
Figure 2-2 F-Secure Anti-Virus for Microsoft Exchange, medium to large
installation
Page 28
28
2.3.3Performance-Critical Installation
In very large, performance-critical installations you should use multiple
F-Secure Content Scanner Server installations. Each F-Secure Content
Scanner Server should be installed on a dedicated machine. F-Secure
Anti-Virus for Microsoft Exchange can share the virus scanning load
between multiple F-Secure Content Scanner Servers.
Figure 2-3 F-Secure Anti-Virus for Microsoft Exchange with multiple F-Secure
Content Scanner Servers
Page 29
CHAPTER 229
Deployment
F-Secure Anti-Virus for Microsoft Exchange should be installed in
centralized administration mode on each Microsoft Exchange Server.
Figure 2-4 F-Secure Anti-Virus for Microsoft Exchange installed on each
Microsoft Exchange Server
Page 30
30
2.3.4Microsoft Exchange Cluster Environment
F-Secure Anti-Virus for Microsoft Exchange can be installed on a
Windows 2000 Advanced Server or Windows Server 2003 Enterprise
Edition cluster. The product supports standard two-node Active-Passive
and Active-Active clusters.
Microsoft Exchange need s to be properly configured and running in
the cluster before installing F-Secure Anti-Virus for Microsoft
Exchange.
F-Secure Anti-Virus for Microsoft Exchange needs to be installed
separately on both cluster nodes. When installing in Microsoft Exchange
cluster environment, the product must be installed in centrally managed
mode, so that you can configure and manage the product with F-Secure
Policy Manager. Changing the product settings with F-Secure Anti-Virus
for Microsoft Exchange Web Console is not supported in cluster
environments, but it can be used for some quarantine management
functions.
The settings on both cluster nodes must be identical. To ensure this,
place the servers as their own domain in the F-Secure Policy Manager
Console and configure all the settings on the domain level, not on th e
host level.
It is recommended to install a local F-Secure Content Scanner Server on
both cluster nodes. However, if a remote F-Secure Content Scanner
Server is used, the dedicated IP address of each cluster node must be
visible to the remote F-Secure Content Scanner Server.
When installing the product, the setup program detects Microsoft
Exchange Cluster automatically. The setup program also creates a cluster
resource for the product automatically. The cluster resource makes it
possible to use the product in the cluster, by giving the control of the
resource to the cluster service. This and other resources together
guarantee that the product works properly in the clu ster in ever y situa tion.
Y ou can che ck the state of the re source in Micro soft Cluster Administrator
console, under the same branch where th e Exch an g e reso ur ce s res i de .
For detailed instructions, see “Deploying the Product on a Cluster”, 344.
Page 31
CHAPTER 231
Deployment
A Note about Installing on Active-Passive Cluster
The product can be installed either on an active or a p assive cluster node.
When installing on a passive node (which does not have active Microsoft
Exchange services), the setup program may display a notification about
missing Microsoft Exchange components, but the installation can be
continued.
Page 32
3
INSTALLATION
System Requirements................................................................ 33
Improving Reliability and Performance....................................... 37
Installing F-Secure Anti-Virus for Microsoft Exchange............... 40
After the Installation.................................................................... 59
Upgrading the Previous Version................................................. 60
Upgrading the Evaluation Version.............................................. 63
Uninstalling F-Secure Anti-Virus for Microsoft Exchange........... 64
32
Page 33
3.1System Requirements
F-Secure Anti-Virus for Microsoft Exchange is installed on the computer
running Microsoft Exchange Server and requires the following hardware
and software.
3.1.1Minimum System Requirements
F-Secure Anti-Virus for Microsoft Exchange has to be installed to the
same machine that runs Microsoft Exchange Server. You need to log in
with administrator-level privileges to install F-Secure Anti-Virus for
Microsoft Exchange.
In order to install the product successfully on a non-en glish version
of the operating system, your default system loca le sh ou ld be the
same as the language of the operating system. You can set the
locale in Control Panel > Regional Options > General > Y our locale
(location).
CHAPTER 333
Installation
Operating system:
Microsoft® Windows 2000 Server with
the latest service pack
Microsoft® Windows 2000 Advanced
Server with the latest service pack
Microsoft® Windows Server 2003,
Stan dard Edition with late st service p ack
Microsoft® Windows Server 2003,
Enterprise Edition with latest service
pack
Microsoft® Windows Server 2003 R2,
Standard Edition
Microsoft® Windows Server 2003 R2,
Enterprise Edition
Microsoft Exchange
Server:
Microsoft® Exchange Server 2000 with
Service Pack 3 or later
Microsoft® Exchange Server 2003
Processor:Intel Pentium 4 2GHz or faster
Page 34
34
Memory:1 GB
Disk space to install:260 MB
Disk space for
processing:
SQL server (for
quarantine
database):
F-Secure Policy
Manager version:
10 GB or more. The required disk space
depends on the number of mailboxes, amount of
data traffic and the size of the Information Store.
Microsoft SQL Server 2000 (Enterprise,
Standard or Workgroup edition) with
Service Pack 4
Microsoft SQL Server 2000 Desktop
Engine (MSDE) with Service Pack 4
Microsoft SQL Server 2005 (Enterprise,
Standard, Workgroup or Express
edition)
For more information, see “Which SQL Server to
Use for the Quarantine Database?”, 35.
When centralized quarantine management is
used, the SQL server must be reachable from
the network and file sharing must be enabled.
F-Secure Policy Manager 6.0 or newer.
F-Secure Policy Manager is required only in
centrally managed environments.
For Microsoft Windows Server 200 3 Service Pack 1 related support
information, see
The release notes document contains the latest information about
the product and might have changes to system requirements and
the installation procedure. It is highly recommended to read the
release notes before you proceed with the installation.
Page 35
CHAPTER 335
Installation
3.1.2Which SQL Server to Use for the Quarantine Database?
As a minimum requirement, the Quarantine database should have the
capacity to store information about all inbound and outbound mail to and
from your organization that would normally be sent during 2-3 days.
Take into account the following SQL server specific considerations when
deciding which SQL server to use:
Microsoft SQL Server
Desktop Engine and
SQL Server 2005
Express Edition
When using Microsoft SQL Server Desktop Engine (MSDE), the
Quarantine database size is limited to 2 GB.
MSDE includes a concurrent workload governor that limits the
It is not recommended to use MSDE or SQL Server 2005
Express Edition if you are planning to use centralized quarantine
management with multiple F-Secure Anti-Virus for Microsoft
Exchange installations.
MSDE is delivered together with F-Secure Anti-Virus for
Microsoft Exchange, and you can inst all it dur ing the F-Secure
Internet Anti-Virus for Microsoft Exchange Setup. For more
information, see “Installation Overview”, 38.
Page 36
36
Microsoft SQL
Server 2000/2005
If your organization sends a large amount of e-mails, it is
recommended to use Microsoft SQL Server 2000/2005.
It is recommended to use Microsof t SQL Server 2000/2005 if you
are planning to use centralized quarantine management with
multiple F-Secure Anti-Virus for Microsoft Exchange installations.
For more information, see “Performance-Critical Installation”, 28.
Note that the product does not support Windows Authentication
when connecting to Microsoft SQL Server 2000/2005. The
Microsoft SQL Server 2000/2005 that the product will use for the
Quarantine database should be configured to use Mixed Mode
authentication.
If you plan to use Microsoft SQL Server 2005, you must
purchase it and obtain your own license before you start to
deploy F-Secure Anti-Virus for Microsoft Exchange. To
purchase Microsoft SQL Server 2005, contact your Microsoft
reseller.
3.1.3Web Browser Software Requirements
In order to administer the product with F-Secure Anti-Virus for Microsoft
Exchange Web Console, one of the following web browsers is required:
Microsoft Internet Explorer 6.0 or later
Netscape Communicator 8.1 or later
Mozilla Firefox 1.5 or later
Opera 9.00 or later
Konqueror 3.5 or later
Any other web browser supporting HTTP 1.0, SSL, Java scripts and
cookies may be used as well. Microsoft Internet Explorer 5.5 or earlier
cannot be used to administer the product.
Page 37
3.2Improving Reliability and Performance
You can improve the system reliability and overall performance by
upgrading the following components.
ProcessorIf the system load is high, a fast processor on the Microsoft Exchange
Server speeds up the e-mail message processing. As Microsoft
Exchange Server handles a large amount of data, a fast processor alone
is not enough to guarantee a fast operation of F-Secure Anti-Virus for
Microsoft Exchange.
MemoryMemory consumption is directly proportional to the size of processed
mails - scanning a single mail may use memory in amounts up to three
times the size of the mail concerned. If the average size of mail messages
is big, or Microsoft Exchange Server has to process large messages
regularly , increasing the amo unt of physical memory increa ses the overall
performance.
If large messages are processed only now and then, it might be enough
to increase the size of the virtual memory. In this case, large messages
will slow the system down.
CHAPTER 337
Installation
Hard DriveHard drive size is an important reliability factor. Hard drive performance is
crucial for Microsoft Exchange Server to perform well. For best
performance, a RAID system is recommended; for servers with only
moderate load, SCSI hard disks are adequate. If your server has an IDE
hard disk, DMA access support is recommended.
Operating SystemIt is highly recommended to have the latest service packs for the
operating system being used. These fixes make the platfo rm mo re stable
and thus increase the reliability of the system.
Page 38
38
3.3Centrally Administered or Stand-alone
Installation?
F-Secure Anti-Virus for Microsoft Exchange can be managed either with
F-Secure Anti-Virus for Microsoft Exchange Web Console or F-Secure
Policy Manager Console. You can select the management method when
you install the product.
If you already use F-Secure Policy Manager to administer oth er F-Secure
products, it is recommended to install F-Secure An ti-Virus for Microsoft
Exchange in centralized administration mode.
The quarantined mails are managed using the F-Secure Anti-Virus for
Microsoft Exchange Web Console in both centrally administered and
stand-alone installations. In centrally managed environments all other
features are managed with F-Secure Policy Manager.
When installing in Microsoft Exchange cluster environment, the
product must be installed in centrally managed mode, so that you
can configure and manage the product with F-Secure Policy
Manager.
3.4Installation Overview
Before you start to install F-Secure Anti-Virus for Micro soft Exchange,
uninstall any potentially conflicting products, such as anti-virus, file
encryption, and disk encryption software that employ low-level device
drivers. Close all Windows applications before starting the installation.
Page 39
CHAPTER 339
Installation
F-Secure Anti-Virus for Microsoft Exchange can be installed to the same
computer that runs F-Secure Anti-Virus for Servers 5.50. You should
uninstall any potentially conflicting products, such as other anti-virus, file
encryption, and disk encryption software, which employ low-level device
drivers, before you install F-Secure Anti-Virus for Microsoft Exchange.
If you want to run F-Secure Anti-Virus for Servers 5.50 on the same
computer where you install F-Secure Anti-Virus for Microsoft
Exchange, make sure that F-Secure Anti-Virus for Servers 5.50 is
installed before you install F-Secure Anti-Virus for Microsoft
Exchange.
To administer F-Secure Anti-Virus for Microsoft Exchange in centralized
administration mode, you need to install F-Secure Policy Manager
Console and F-Secure Policy Manager Server. Detailed information on
F-Secure Policy Manager Console and F-Secure Policy Manager Server
is provided in the F-Secure Policy Manager Administrator's Guide.
Follow these steps to set up F-Secure Anti-Virus for Microsoft Exchange:
Centralized Administration mode:
1. Run F-Secure Policy Manager setup to set up F-Secure Policy
Manager Server. See F-Secure Policy Manager Administrator’s
Guide for instructions.
2. Install F-Secure Anti-Virus for Microso ft Exchange. For more
information, see “Installing F-Secure Anti-Virus for Microsoft
Exchange”, 40.
3. Import the product MIB files to F-Secure Policy Manager, if they
cannot be uploaded there during the installation. For more
information, see “Importing Product MIB files to F-Secure Policy
Manager Console”, 59.
4. Check that F-Secure Automatic Update Agent can retrieve the latest
virus definition databases. For more informatio n, se e “Updating Virus
and Spam Definition Databases”, 340.
Page 40
40
Stand-alone mode:
1. Install F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “Installing F-Secure Anti-Virus for Microsoft
Exchange”, 40.
2. Check that F-Secure Automatic Update Agent can retrieve the latest
virus definition databases. For more informatio n, se e “Updating Virus
and Spam Definition Databases”, 340.
After the installation is complete, check and configure settings for
F-Secure Content Scanner Server, F-Secure Anti-Virus for Microsoft
Exchange and F-Secure Management Agent.
3.5Installing F-Secure Anti-Virus for Microsoft
Exchange
Follow these instructions to install F-Secure Content Scanner Server and
F-Secure Anti-Virus for Microsoft Exchange.
Step 1. 1. Insert the F-Secure CD in your CD-ROM drive.
2. Select F-Secure Anti-Virus for Microsoft Exchange from the Install
Software menu.
Step 2. Read the information in the Welcome screen.
Page 41
Click Next to continue.
Step 3. Read the licence agreement.
CHAPTER 341
Installation
Page 42
42
If you accept the agreement, check the I accept the agreement
checkbox and click Next to continue.
Step 4. Enter the product keycode.
Click Next to continue.
Page 43
Step 5. Choose the components to install.
If you want to install F-Secure Content Scanner Server and F-Secure
Anti-Virus for Microsoft Exchange on the Microsoft Exchange Server
computer, select all components. Click Next to continue.
CHAPTER 343
Installation
When you install F-Secure Spam Control, or F-Secure Content
Scanner Server in stand-alone mode, F-Secure Automatic Update
Agent is automatically installed to provide virus definition dat abase
updates. For more information, see “Automatic Updates with
F-Secure Automatic Update Agent”, 341.
Page 44
44
Step 6. Choose the destination folder for the installation.
Click Next to continue.
Page 45
Step 7. Choose the administration method.
If you install F-Secure Anti-Virus for Microsoft Exchange in stand-alone
mode, you cannot configure settings and receive alerts and status
information in F-Secure Policy Manager Console. Click Next to continue.
If you selected the stand-alone installation, continue to Step 10. , 48.
CHAPTER 345
Installation
If you select the stand-alone mode, use the F-Secure Anti-V irus for
Microsoft Exchange Web Console to change product settings and
statistics. For more information, see “Administration with Web
Console”, 216.
Page 46
46
Step 8. Enter the path to the public management key file admin.pub that was
created during F-Secure Policy Manager Console setup.
You can transfer the public key in various ways (use a shared folder on
the file server, a floppy disk, or send the key as an attachment in an
e-mail message). Click Next to continue.
Page 47
CHAPTER 347
Installation
Step 9. Enter the IP address or URL of the F-Secure Policy Manager Server you
installed earlier.
Click Next to continue.
If the product MIB files cannot be uploaded to F-Secure Policy
Manager during installation, you can import them manually.
For more information, see “Importing Product MIB files to F-Secure
Policy Manager Console”, 59.
Page 48
48
Step 10. Enter an SMTP address that will be used by F-Secure Anti-Virus for
Microsoft Exchange to send warning and informational messages to
end-users.
The SMTP address should be a valid, existing address that is allowed to
send messages. Click Next to continue.
Page 49
CHAPTER 349
Installation
Step 11. Sele ct the user account that F-Secure Outbreak Manager should use.
Select either the local system account or enter the name and password
for the user account that F-Secure Outbreak Manager should use. The
account is used to run the outbreak handler scripts or programs.
If you do need to see the outbreak handler script running on the desktop
select Allow to interact with desktop. By default, the script or program
runs in the background.
For more information, see “Outbreak Management”, 156. Click Nextto
continue.
If you want to use the default \SYSTEM account, do not enter any
password.
Make sure that the account has all the necessary privileges to run
the outbreak handler script.
Page 50
50
Step 12. Specify the Quarantine management method.
If you want to manage quarantines locally, select Local quarantine
management. Select Centralized quarantine management if you install
the product on multiple instances. For more information, see “Microsoft
Exchange Cluster Environment”, 30.
Click Next to continue.
Page 51
Step 13. Specify the location of the Quarantine database.
If you want to install the Quarantine database on the same server as the
product installation, select (a) Install and use Microsoft SQL Server Desktop Engine.
If you are using Microsoft SQL Server or Microsoft SQL Server Desktop
Engine already, select (b) Use the existing inst allation of MIcrosoft SQL Server or MSDE.
CHAPTER 351
Installation
Click Next to continue.
Page 52
52
aSpecify the installation directory for Microsoft SQL Server
Desktop Engine and data files.
Enter the username and password for the server administrator
account. Click Next to continue.
bSpecify the computer name of the SQL Server where you wan t to
create the Quarantine database.
Enter the username and password to log on to the server. Click
Next to continue.
Page 53
CHAPTER 3 53
Installation
If the server has a database with the same name, you can either
use the existing database, remove the existin g da tabase and
create a new one or keep the existing database and cre ate a new
one with a new name.
Page 54
54
Step 14. Select whether you want to install the product with F-Secure World Map
Support.
The product can collect and send statistics about viruses and other
malware to the F-Secure World Map service. if you agree to send
statistics to F-Secure World Map, select Yes and click Next to continue.
Page 55
Step 15. If you selected the centralized administration mode, the installation
program connects to specified F-Secure Policy Manager Se rver
automatically to install F-Secure Anti-Virus for Microsoft Exchange MIB
files. If the installation program cannot connect to F-Secure Policy
Manager Server, the following dialog opens.
Make sure that the computer where you are inst alling F-Secure Anti-V irus
for Microsoft Exchange is allowed to connect to the administration port on
F-Secure Policy Manager Server, or if you use proxy, make sure that the
connection is allowed from the proxy to the server. Check that any firewall
does not block the connection.
If you want to skip installing MIB files, click Cancel. You can install MIB
files later either manually or by running the Setup again.
CHAPTER 355
Installation
Page 56
56
Step 16. The list of components that will be installed is displayed.
Click Start to install listed components.
Page 57
Step 17. The installation status of the components is displayed.
Click Next to continue.
CHAPTER 357
Installation
Page 58
58
Step 18. The installation is completed.
Click Finish to close the Setup wizard.
Step 19. If you are installing F-Secure Spam Control, the setup prompts you to
select whether to restart the Microsoft Exchange Information Store
service automatically to complete the installation. Click Yes to restart the
Information Store service automatically.
Page 59
CHAPTER 359
Installation
3.6After the Installation
This section describes what you have to do after the installation. These
steps include:
Importing product MIBs to F-Secure Policy Manager (if that is
required), and
Initial configuration of the product.
3.6.1Importing Product MIB files to F-Secure Policy Manager
Console
If you are using the product in centrally managed mode, there are cases
when the F-Secure Anti-Virus for Microsof t Exchange MIB JAR file cannot
be uploaded to F-Secure Policy Manager Server during the in stallation. In
these cases you will have to import the MIB files to F-Secure Policy
Manager. You will have to import the MIB files if:
F-Secure Anti-Virus for Microsoft Exchange is located in a
different network segment than F-Secure Policy Manager, and
there is a firewall between them blocking access to Policy
Manager’s administrative port (8080).
F-Secure Policy Manager Server has been configured so that
administrative connections from anywhere else than the localhost
are blocked.
The recommended way is to import the MIBs via F-Secure Policy
Manager Console Tools menu. You can do it as follows:
1. Open the Tools menu and se lect the Installation packages... op tion.
2. Click Import....
3. When the Import Installation Packages dialog opens, browse to
locate the fsavmse660.mib.jar file located under the Jars subdirectory
in the setup package. Then click Open.
4. After importing the new MIB files, restart F-Secure Policy Manager
Console.
Page 60
60
3.6.2Configuring the Product
After the installation, F-Secure Anti-Virus for Microsoft Exchange is
functional, but it is using mostly default values. It is highly recommended
to go through all the settings of all installed components. You should also
retrieve the latest virus definition database updates.
Configure F-Secure Anti-Virus for Microsoft Exchange.
If F-Secure Anti-Virus for Microsoft Exchange has been installed
in the centralized administration mode, use F-Secure Policy
Manager Console to configure the settings for F-Secure Content
Scanner Server and F-Secure Anti-Virus for Microsoft Exchange
and distribute the policy. For more information, see “Centrally
Managed Administration”, 125.
If F-Secure Anti-Virus for Microsoft Exchange has been installed
in stand-alone mode, use the F-Secure Anti-Virus for Microsoft
Exchange Web Console to configure the settings of F-Secure
Anti-Virus for Microsoft Exchange. For more information, see
“Administration with Web Console”, 216.
Specify the domains which should be considered to be internal
domains. For more information, see “Internal Domains”, 159.
Retrieve virus definition database updates. For more information,
see “Updating Virus and Spam Definition Databases”, 340.
3.7Upgrading the Previous Version
If you have a previous version of F-Secure Anti-Virus for Microsoft
Exchange installed on your computer, you can upgrade it easily. You do
not need to remove your previous version, F-Secure Setup uninstalls it
automatically.
Page 61
CHAPTER 361
During upgrade the setup will stop and restart Microsoft Exchange
Information Store, IIS Admin Service and all services that depend on
them:
Microsoft Exchange Information Store
World Wide Web Publishing Service
Simple Mail Transport Protocol (SMTP)
Microsoft Exchange Routing Engine
Microsoft Exchange POP3
Network News Transport Protocol (NNTP)
Microsoft Exchange MTA Stacks
Microsoft Exchange Information Store
Microsoft Exchange IMAP4
IIS Admin Service
Installation
Page 62
62
Follow these instructions to upgrade F-Secure Anti-Virus for
Microsoft Exchange:
1. Run the Setup program. For more information, see “Installing
F-Secure Anti-Virus for Microsoft Exchange”, 40.
2. Depending on the installed F-Secure products, F-Secure Setup will
suggest upgrading one or more components.
Select the components you want to upgrade.
3. The setup needs to stop and restart Micr osoft Exchange Server
related services during the upgrade.
Click OK to continue.
4. After the Setup finishes, restart the computer if the Setup program
prompts you to do so.
Page 63
5. Configure F-Secure Anti-Virus for Microsoft Exchange. For more
information, see “Centrally Managed Administration”, 125. If you
installed F-Secure Anti-Virus for Microsoft Exchange in stand-alone
mode, see “Administration with Web Console”, 216.
6. that F-Secure Automatic Update Agent can retrieve the latest virus
definition databases. For more information, see “Updating Virus and
Spam Definition Databases”, 340.
3.8Upgrading the Evaluation Version
If you want to use F-Secure Anti-Virus for Microsoft Exchange af ter your
evaluation period expires, you need a new keycode. Contact your
software vendor or renew your license online.
After you have received the new keycode, you can either reinstall
F-Secure Anti-Virus for Microsoft Exchange with your new keycode (see
“Installing F-Secure Anti-Virus for Microsoft Exchange”, 40) or register the
new keycode from F-Secure Settings and Statistics.
To register the new keycode from F-Secure Settings and Statistics
1. Open F-Secure Settings and Statistics by double-clicking the
F-Secure icon in the Windows system tray and select F-Secure Anti-Virus for Microsoft Exchange to open the evaluation screen.
CHAPTER 363
Installation
2. Click Register Keycode... and enter the new keycode you have
received.
Page 64
64
If you do not want to continue to use F-Secure Anti-Virus for Microsoft
Exchange after your evaluation license expires, you should uninstall the
software.
3.9Uninstalling F-Secure Anti-Virus for Microsoft
Exchange
To uninstall F-Secure Anti-Virus for Microsoft Exchange, select Add/
Remove Programs from the Windows Control Panel. To uninstall
F-Secure Anti-Virus for Microsoft Exchange completely, uninstall the
components in the following order:
1. F-Secure Anti-Virus for Microsoft Exchange
2. F-Secure SNMP Support (if it was installed)
3. F-Secure Spam Control
4. F-Secure Content Scanner Server
5. F-Secure Automatic Update Agent
IMPORTANT: If there is another F-Secure Anti-Virus product
installed on the same computer, check whether it uses F-Secure
Automatic Update Agent or F-Secure Policy Manager for getting
virus definition database updates. If the other product gets the
updates from F-Secure Policy Manager, you can uninstall F-Secure
Automatic Update Agent.
F-Secure Anti-Virus for Microsoft Exchange can be used either in the
stand-alone mode, or in the centrally administered mode, based on your
selections during the installation and the initial setup.
4.2Administering F-Secure Anti-Virus for Microsoft
Exchange
In the centralized administration mode, you can administer F-Secure
Anti-Virus for Microsoft Exchange and F-Secure Content Scanner
Servers with F-Secure Policy Manager. You can use the F-Secure
Anti-Virus for Microsoft Exchange Web Console to start and stop
F-Secure Anti-Virus for Microsoft Exchange, check its curren t status and
to connect to F-Secure Web Club for support, but you cannot change any
settings with it.
In the stand-alone mode, you use the F-Secure Anti-Virus for Microsoft
Exchange Web Console to start and stop F-Secure Anti- Virus for
Microsoft Exchange, modify its settings, edit scheduled tasks and start
manual processing.
To open the F-Secure Anti-Virus for Microsoft Exchange Web Console,
start it from F-Secure Settings and Sta tistics or select F-Secure Anti-Virus
for Microsoft Exchange from the Windows Start menu > Programs >
F-Secure Anti-Virus for Microsoft Exchange > F-Secure Anti-Virus for
Microsoft Exchange Web Console. You can open F-Secure Settings and
Statistics by double-clicking the F-Secure icon in the Windows system
tray.
Page 67
4.3Using the Web Console
In centrally managed installations of F-Secure Anti-Virus for Microsoft
Exchange, the F-Secure Anti-Virus for Microsoft Exchange Web Console
can be used for monitoring the system status and st atistics. It can also be
used for viewing the settings currently in use and executing some
operations. However, in centrally managed installations it cannot be used
for configuring the system or scanning settings; use F-Secure Policy
Manager for this instead.
4.3.1Logging in for the First Time
F-Secure Anti-Virus for Microsof t Exchange W eb Console does not
support Microsoft Internet Explorer 5.5 or older.
Microsoft Internet Explorer 6.0 users:
The address of the F-Secure Anti-Virus for Microsoft Exchange Web
Console, https://127.0.0.1:25023/, should be add ed to the Trusted sites in Internet Explorer 6.0 Security Options. This ensures that the F-Secure
Anti-Virus for Microsoft Exchange Web Console works properly in all
environments.
CHAPTER 467
Using F-Secure Anti-Virus for Microsoft Exchange
Before you log in the F-Secure Anti-Virus for Microsoft Exchange Web
Console for the first time, check that Java script and cookies are enabled
in the browser you use.
When you log in for the first time, your browser will display a Security Alert
dialog window about the security certificate for F-Secure Anti-Virus for
Microsoft Exchange Web Console. You can create a security certificate
for F-Secure Anti-Virus for Microsoft Exchange Web Console before
logging in, and then install the certificate during the login process.
If your company has an established process for creating and
storing certificates, you can follow that process to create and store
the security certificate for F-Secure Anti-Virus for Microso ft
Exchange Web Console.
Page 68
68
Step 1. Create the security certificate
1. Browse to the F-Secure Anti-Virus for Microsoft Exchange Web
Console installation directory, for example:
C:\Program Files\F-Secure\Web User Interface\bin\
2. Locate the certificate creation utility, makecert.bat, and double click it
to run the utility.
3. The utility creates a certificate that will be issued to all local IP
addresses, and restarts the F-Secure Anti-Virus for Microsoft
Exchange Web Console service to take the certificate into use. Wait
until the utility completes, and the window closes. Now you can
proceed to logging in.
Step 2. Log in and install the security certificate
1. Select Programs>F-Secure Anti-Virus for Microsoft
Exchange>F-Secure Anti-Virus for Microsoft Exchange W eb Console,
or enter the address of the F-Secure Anti-Virus for Microsoft
Exchange and the port number in your web browser. Note, that the
protocol used is https. For example:
https://127.0.0.1:25023
2. The Security Alert about the F-Secure Anti-Virus for Microsoft
Exchange Web Console certificate is displayed. If you install the
certificate now, you will not see the Security Alert window again. Click
View Certificate to view the certificate information and to install the
certificate.
3. The Certificate window opens. Click Install Certificate to proceed to
the Certificate Import Wizard.
4. Follow the instructions in the Certificate Import Wizard. When the
wizard has completed, you are prompted to add the new certificate in
the Certificate Root Store. Click Yes.
5. If the Security Alert window is still displayed, click Yes to proceed.
6. When the login page opens, en ter the user name and the password.
Note, that you must have administrator rights to the host. Then click
Log In.
Page 69
CHAPTER 4 69
Using F-Secure Anti-Virus for Microsoft Exchange
Figure 4-1 F-Secure Anti-Virus for Microsoft Exchange Web Console Login
page
7. You will be forwarded to the home page, which displays a summary of
the system status.
Figure 4-2 F-Secure Anti-Virus for Microsoft Exchange Home page
Page 70
70
4.4Checking the Product Status
You can check the overall product status on the Home page. The Home
page displays an overview of each compon ent status and most important
statistics of the installed F-Secure Anti-Virus for Microsoft Exchange
components. From the Home page you can also open the product logs
and proceed to configure the product components.
This section describes the statistics and operations available on the
Home page.
F-Secure Anti-Virus for Microsoft Exchange
The Home page displays the status the F-Secure Anti-Virus for Microsoft
Exchange as well as a summary of the F-Secure Anti-Virus for Microsoft
Exchange statistics.
Status indicatorDisplays the status of F-Secure Anti-Virus for
Microsoft Exchange.
Processed messages Displays the total number of messages that
have been processed.
Infected messagesDisplays the number of infected messages
found since the last reset of statistics.
Stripped attachments Displays the number of attachments that have
been stripped.
Click Configure to configure F-Secure Anti-V irus for Microsof t Exchange.
For more information, see “Overview”, 217.
Page 71
CHAPTER 471
Using F-Secure Anti-Virus for Microsoft Exchange
F-Secure Content Scanner Server
The Home page displays the status the F-Secure Content Scanner
Server as well as a summary of the F-Secure Content Scanner Server
statistics.
Status indicatorDisplays the status of F-Secure Content
Scanner Server.
Last time virus definition
databases updated
Database update version Displays the version of the virus definition
Scanned filesDisplays the number of files the server has
Last time infection foundDisplays the last infection detected by the
Click Configure to configure F-Secure Content Scanner Server. For more
information, see “F-Secure Content Scanner Server Settings”, 275.
Displays the last date and time when the
virus definition databases were updated.
database update.
The version is shown in YYYY-MM-DD_NN
format, where YYYY-MM-DD is the release
date of the update and NN is the number of
the update for that day.
scanned for viruses.
server.
F-Secure Automatic Update Agent
Status indicatorDisplays the status of F-Secure Automatic
Update Agent.
Communication methodDisplays the currently used client protocol.
Last connection to the
server
Displays the last date and time when
F-Secure Automatic Update Agen t polled the
F-Secure Automatic Update Server for new
updates.
Page 72
72
Click Configure to configure F-Secure Automatic Update Agent. For
more information, see “Updating Vi rus and Spam Definition Databases”,
340.
F-Secure Management Agent
Status indicatorDisplays the status of F-Secure
Management Agent.
Management methodDisplays if the host is standalone (configured
locally) or networked (at least sometimes
connected through a network or a temporar y
link).
Click Configure to configure the F-Secure Manage ment Agen t. For more
information, see “F-Secure Management Agent Settings”, 304.
Toolbar Buttons
Click Show F-Secure Log to view the F-Secure log file (LogFile.log) in a
new Internet browser window. Click Download to download and save the
LogFile.log for later use.
Click Export Settings to open a list of all F-Secure Anti-Virus for
Microsoft Exchange settings in a new Internet browser window. Select
File > Save As... to save the file for later use.
Click Export Statistics to open a list of all F-Secure Anti-Virus for
Microsoft Exchange statistics in a new Internet browser window. Select
File > Save As... to save or print the file for later use.
Click Configure Console to configure the F-Secure Anti-Virus for
Microsoft Exchange Web Console. For instructions, see “Configuring the
Web Console”, 73.
Click Help to open the online help.
Page 73
Using F-Secure Anti-Virus for Microsoft Exchange
4.5Configuring the Web Console
On the F-Secure Anti-Virus for Microsoft Exchange Web Console
Configuration page you can specify setti ngs for connections to the server.
You can also open the F-Secure Anti-Virus for Microsoft Exchange Web
Console access log from this page.
Limit session timeoutSpecify the length of time a client can be
connected to the server. When the session
expires, the F-Secure Anti-Virus for
Microsoft Exchange Web Console displays a
warning. The default value is 60 minutes.
Click Show Access Log to view the F-Secure Anti-Virus for Microsoft
Exchange Web Console access log. Note that the Web Console access
log differs from standard web server access logs, as it logs only the first
request per session.
Listen on addressSpecify the IP address of the F-Secure
Anti-Virus for Microsoft Exchange Web
Console Server.
CHAPTER 473
PortSpecify the port where the server listens for
connections. The default port is 25023.
Accept connections from
the following hosts
To add a new host in the list, click Add to add new a new line in the table
and then enter the IP address of the host.
Specify a list of hosts which are allowed to
connect to F-Secure Anti-Virus for Microsoft
Exchange Web Console.
Page 74
74
4.6Using F-Secure Policy Manager Console
In the centralized administration mode, you can open F-Secure Anti-V irus
for Microsoft Exchange components from the Windows Start menu > Programs > F-Secure Policy Manager Console. When the Policy
Manager Console opens, go to the Advanced Mode user interface by
selecting View > Advanced Mode (this step is required in F-Secure Policy
Manager version 5.50 and later). Then select the Policy tab to view the
F-Secure Anti-Virus for Microsoft Exchange components.
F-Secure Policy Manager Console is used to create policies for F-Secure
Anti-Virus for Microsoft Exchange installations that are running on
selected hosts or groups of hosts. Policies are created by assigning
values to variables shown on the Policy tab of the Properties pane (the
middle pane) in F-Secure Policy Manager Console. To assign a value,
select a variable – marked by the leaf icon – in the Properties pane and
enter the value in the Editor pane (the right pane).
After a policy is created, it must be distributed to hosts by choosing
Distribute from the File menu.
After changing the settings and distributing the po licy, you have to wait for
F-Secure Anti-Virus for Microsoft Exchange to poll the policy.
For testing purposes you may also want to change the polling
intervals. T o do that, select the domain in F-Secure Policy Manager
console and set the Incoming Packages Polling Interval and
Outgoing Packages Update Interval variables to 30-45 seconds.
The variables are located under each of the two trees in the
F-Secure Management Agent / Settings / Communications branch.
Note that since the default polling interval is 10 minutes, it might
take up to 10 minutes for the new setting to take effect.
Alternatively, you can click Poll the server now in F-Secure
Management Agent.
For detailed information on installing and using F-Secure Policy Manager
console, see the F-Secure Policy Manager Administrator’s Guide.
Page 75
Using F-Secure Anti-Virus for Microsoft Exchange
4.7Modifying Settings and Viewing Statistics
This section describes how you can modify product settings and view
product statistics in both centrally administered and stand-alone mode.
4.7.1Centrally Administered Mode
To change F-Secure Anti-Virus for Microsoft Exchange settings in the
centrally administered mode, select F-Secure Anti-Virus for Microsoft Exchange from the Properties pane. Make sure the Policy t ab is selected
and assign values to variables under the Settings branch. Modify settings
by assigning new values to the basic leaf node variables (marked by the
leaf icons) shown in the Policy tab of the Properties pane. Initially, every
variable has a default value, which is displayed in gray. Select the
variable from the Properties pane and enter the new value in the Editor
pane to change it. You can either type the new value or select it from a list
box. If you enter an invalid value, it will be displayed in red in the
Properties pane. Click Clear to revert to the default value or Undo to
cancel the most recent change that has not been distributed. For detailed
explanations of all variables, see “F-Secure Anti-Virus for Microsoft
Exchange Settings”, 126.
CHAPTER 4 75
Settings that are configured during the installation and the initial
setup require that you select the Final check box from the Product
View pane. These settings include Primary and Backup Content
Scanner Servers and Quarantine settings.
Select the Status tab of the Properties pane to view statistics and the
settings that were configured during the installation of F-Secur e Content
Scanner Server and F-Secure Anti-Virus for Microsoft Exchange.
Statistics are updated periodically and can be reset by choosing Reset Statistics on the Policy tab of the Properties pane. For more information,
see “F-Secure Anti-Virus for Microsoft Exchange Statistics”, 184.
Page 76
76
Changing Settings That Have Been Modified During Installation
or Upgrade
If you want to change a setting that has been modified locally du ring
installation or upgrade, you need to mark the setting as Final in the
restriction editor. The settings descriptions in this manual indicate the
settings for which you need to use the Final restriction. You can also
check in F-Secure Policy Manager Console whether you need to use the
Final restriction for a setting. Do the following:
1. Select the Policy tab and then select the setting you want to check.
2. Now select the Status tab to see if the setting has been modified
locally.
If the setting is not shown in grayed font in the Status view, then
the product uses the setting from the base po licy an d th er ef or e
the Final restriction is not needed.
If the setting is shown in normal black font, then the setting has
been modified locally. You must mark the setting as Final when
you change it.
4.7.2Stand-alone Mode
To change F-Secure Anti-Virus for Microsoft Exchange settings in
stand-alone mode, open the F-Secure Anti-Virus for Microsoft Exchange
Web Console and select the variables you want to change from the
options tree. For detailed explanations of all variables, see
“Administration with Web Console”, 216.
To view statistics for real-time scanning, select Summary on the options
tree. To reset all counters to zero, click Reset Statistics.
To view statistics for the latest manual scan, select Manual Scanning on
the options tree. The Manual Scanning property page displays the
following statistics: the number of processed mailboxes, the number of
processed Public Folders, the numbers of processed, infected, and
suspicious messages in mailboxes and in the Public Folders. Manual
scanning statistics are reset every time a new manual scan is performed.
Page 77
Using F-Secure Anti-Virus for Microsoft Exchange
4.8Manually Processing Mailboxes and Public
Folders
You can scan mailboxes and Public Folders for viruses and strip
attachments manually at any time. You can also create scheduled scan
tasks to scan mailboxes and Public Folders periodically.
4.8.1Centrally Administered Mode
You can perform virus scans and strip attachments manually by using
controls under the F-Secure Anti-Virus for Microsoft Exchange / Operations branch.
To start a manual scan, select Start under F-Secure Anti-Virus for
Microsoft Exchange / Operations / Manual Scanning. Click Startin the Editor pane. Choose Distribute from the File menu.
To stop a manual scan, select Stop under F-Secure Anti-Virus for
Microsoft Exchange / Operations / Manual Scanning. Click Stopin the Editor pane. Choose Distribute for the File menu.
To view the scanning report - the total numbers of mailboxes and
Public Folders, and the numbers of processed mailboxes and
Public Folders, open the Reports tab.
For information how to configure options for manual scans, see
“Manual Processing”, 159.
CHAPTER 477
Creating Scheduled Operation
Open F-Secure Anti-V irus for Microsof t Exchange > Settings > Sch eduled Processing settings branch and click Add to start the Scheduled
Operation Wizard.
Page 78
78
Step 1. Enter the name for the new task and select how frequently you want the
operation to be performed.
Once - Only once at the specified time.
Daily - Every day at the specified time, starting from the specified
date.
Weekly - Every week at the specified time on the same day when
the first operation is scheduled to start.
Monthly - Every month at the specified time on the same date
when the first operation is scheduled to start.
Do not use any special characters in the task name.
Click Next to continue.
Step 2. Specify whether you want to process all messages or only those
messages that have not been processed previously during the manual
processing.
Page 79
CHAPTER 479
Using F-Secure Anti-Virus for Microsoft Exchange
Specify how many concurrent transactions the scanner can have with
F-Secure Content Scanner Server.
Click Next to continue.
Page 80
80
Step 3. Choose mailboxes that should be processed during the scheduled
operation.
Do not scan mailboxes - Do not process any mailboxes.
Scan all mailboxes - Process all mailboxes.
Scan only included mailboxes - Process all mailboxes specified in
the list.
Scan all except excluded mailboxes - Process all except those
mailboxes specified in the list.
Click Add to add a new mailbox to the list. Click Edit to edit a previously
created entry. Click Remove to remove the selected folder or Remove All
to remove all entries from the list.
By default, F-Secure Anti-Virus for Microsoft Exchange examines all
mailboxes.
Click Next to continue.
Page 81
CHAPTER 481
Using F-Secure Anti-Virus for Microsoft Exchange
Step 4. Choose settings for virus scanning of mailboxes during the scheduled
operation, and Click Next to continue.
For settings descriptions, see “Virus Scanning”, 130.
Page 82
82
Step 5. Choose settings for stripping attachments during the scheduled
operation, and click Next to continue.
For settings descriptions, see “Stripping Attachments”, 147.
Page 83
CHAPTER 483
Using F-Secure Anti-Virus for Microsoft Exchange
Step 6. Select Public Folders that should be processed during the scheduled
operation.
Do not scan Public Folders - Do not process any Public Folders.
Scan all Public Folders - Process all notes posted to all Public
Folders.
Scan only included Public Folders - Process all notes posted to
Public Folders specified in the list.
Scan all except excluded Public Folders - Process all notes
posted to all Public Folders, except those specified in the list.
Click Add to add a new Public Folder to the list. Click Edit to edit a
previously created entry. Click Remove to remove the selected folder or
Remove All to remove all entries from the list.
By default, F-Secure Anti-Virus for Microsoft Exchange processes all
Public Folders.
Click Next to continue.
Page 84
84
Step 7. Choose settings for virus scanning of Public Folders during the scheduled
operation, and click Next to continue.
For settings descriptions, see “Virus Scanning”, 130.
Page 85
Using F-Secure Anti-Virus for Microsoft Exchange
Step 8. Choose settings for stripping attachments during the scheduled
operation, and click Next to continue.
CHAPTER 4 85
Page 86
86
Step 9. The Scheduled Operation Wizard displays the summary of created
operation. Click Finish accept the new scheduled operation and to exit
the wizard.
4.8.2Stand-alone Mode
Specify the manual scanning settings on the Manual Scanning property
pages. After you have specified the manual scanning settings, select the
Manual Processing and click Start.
Under Progress, you can view the pr ogress of the manu al scan - the total
numbers of mailboxes and Public Folders, and the numbers of processed
mailboxes and Public Folders. In the bottom of the property page, the
results of the previous manual scan are shown - the numbers of
processed, infected and suspicious messages in the mailboxes and in the
Public Folders.
Page 87
Using F-Secure Anti-Virus for Microsoft Exchange
4.8.3Creating Scanning Operations
To process mailboxes manually, you need to set up a manual processing
task. For more information, see “Creating Manual Scanning Operation”,
87.
If you want to run scanning tasks frequently, you can set up scheduled
operations. For more information, see “Creating Scheduled Operation”,
102.
Creating Manual Scanning Operation
Start the Manual Scanning Wizard by clicking the Configure... button on
the Manual Scanning page.
Step 1. Specify Messages to Process
CHAPTER 487
1. Specify whether you want to process all messages or only those
messages that have not been processed previously.
2. Specify how many concurrent transactions the scanner can have with
F-Secure Content Scanner Server.
Page 88
88
3. Click Next to continue.
If F-Secure Anti-Virus for Microsoft Exchange is operating on a
system that has multiple processors or you are using a
high-performance computer, you can increase performance by
increasing the number of concurrent transactions.
If you want to use the default settings for most of the scanning
settings, click Last to proceed to the last page of the Manual
Scanning wizard where you can see a summary of the scanning
task settings.
Step 2. Select Mailboxes to Process
1. Choose mailboxes that should be processed during the manual
scanning operation.
Do not process mailboxes - Do not process any mailboxes.
Process all mailboxes - Process all mailboxes.
Process only these mailboxes - Process all specified mailboxes.
Process all except these mailboxes - Process all except specified
mailboxes.
Page 89
Using F-Secure Anti-Virus for Microsoft Exchange
Click Add... to a dd a new mailbox to the list. Click the checkb ox in
the column to mark a mailbox to be removed. Click Clear
to remove all currently marked entries from the list.
By default, F-Secure Anti-Virus for Microsoft Exchang e examines all
mailboxes.
2. Click Next to continue.
Step 3. Specify Virus Scanning Settings for Mailboxes
CHAPTER 4 89
Page 90
90
1. Choose settings for virus scanning of mailboxes.
Attachments to scanSpecify which message attachments are
checked for viruses.
Do not scan attachments for viruses - Process
messages without scanning any attachment s for
viruses.
Scan all attachments - Scan all message
attachments regardless of filename extension.
Scan all attachments with these extensions Scan all attachments with specified filename
extensions.
Scan all attachments except with these
extensions - Scan all attachments except those
with specified filename extensions.
You can add new file types on the extensions
lists by typing the file extensions in the file
extensions text boxes. Separate the extensions
by spaces.
Scan mail message
body
Specify whether the body of the e-mail message
should be scanned for malicious code.
By default, F-Secure Anti-Virus for Microsoft
Exchange scans message bodies.
Although scanning message bodies can slow
down the performance, it is recommended as a
virus can be carried inside a message body.
Page 91
CHAPTER 491
Using F-Secure Anti-Virus for Microsoft Exchange
Enable File Type
Recognition
Action
Action on infected
attachments
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition ca n recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
By default, Intelligent File Type Recognition is
disabled during the real-time processing.
Intelligent File T ype Recognition strengthens the
security - you can block unsafe content that has
a safe filename extension (for example, a
Microsoft Word document using the ‘r tf’ filename
extension) and you do not accidentally block
safe content that has unsafe filename extension
(for example, a text file using the ‘doc’ filena m e
extension). Intelligent File T ype Recognition can
degrade the system performance.
Specify whether infected attachments should be
disinfected or dropped.
Disinfect attachment - Try to disinfect the
infected attachment. If the disinfection
succeeds, the recipient receives the dis infected
file instead of the original one. If the disinfection
fails, the infected attachment is dropped, and it
is not delivered to the recipient.
Drop attachment - Do not disinfect or deliver
infected attachments. All infected attachments
are dropped.
Page 92
92
By default, F-Secure Anti-Virus for Microsoft
Exchange tries to disinfect infected attachments.
Quarantine infected
attachments
Send warning
message to mailbox
owner
Specify whether infected attachments should be
placed in the Quarantine or not. For more
information, see “Quarantine Management”,
307.
Specify whether to send a message to the
mailbox owner when an infected attachment is
found. Click Edit... to edit the informational text
file that replaces the infected attachment if it is
dropped.
2. Click Next to continue.
Step 4. Specify Attachment Stripping Settings for Mailboxes
Page 93
CHAPTER 493
Using F-Secure Anti-Virus for Microsoft Exchange
1. Choose settings for stripping attachments.
Strip attachmentsSpecify which attachments should be stripped
from messages and public folder notes.
Do not strip - Do not strip any attachments.
Strip all att achments - Strip all attachments from
all messages and notes.
Strip all attachme nts except these allowed - S trip
all except specified attachments.
Strip only these disallowed attachments - Strip
only specified attachments.
You can add new file types on the attachments
lists by typing the file extensions in the allowed
and disallowed attachments text boxes.
Separate the extensions by spaces.
Enable File Type
Recognition
Action
Action on stripped
attachment
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition can recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
Specify whether stripped attachments should be
quarantined or dropped.
Quarantine attachment - All stripped
attachments are placed in the Quarantine. For
more information, see “Quarantine
Management”, 307.
Drop attachment - All stripped attachments are
deleted automatically.
Page 94
94
By default, F-Secure Anti-Virus for Microsoft
Exchange quarantines stripped attachments.
Send informational
message to the
mailbox owner
Notify administratorSpecify whether the administrator should be
Specify whether an informational message
should be sent to the owner of the mailbox when
an attachment is stripped. Click Edit to edit the
message.
notified when F-Secure Anti-Virus for Microsoft
Exchange strips an attachment.
Do not notify - Do not send any notification to the
administrator.
Send informational alert - Send an informational
alert to the administrator.
Send warning alert - Send a warning alert to the
administrator.
Send security alert - Send a security alert to the
administrator.
2. Click Next to continue.
Page 95
Using F-Secure Anti-Virus for Microsoft Exchange
Step 5. Select Public Folders to Process
1. Select Public Folders that should be processed.
Do not process public folders - Do not process any Public
Folders.
Process all public folders - Process all notes posted to all Public
Folders.
Process only included public folders - Process all notes posted to
the listed Public Folders.
Process all except excluded public folders - Process all notes
posted to all Public Folders, except the listed ones.
CHAPTER 495
The notes and attachments to be processed in the selected
folders are defined with the Attachments to Scan and Scan
Mail Message Body settings.
Click Add to add a new Public Folder to the list. Click Clear to
remove the selected folder or Clear All to re move all en tries fr om th e
list. By default, F-Secure Anti-Virus for Microso ft Exchange processes
all Public Folders.
2. Click Next to continue.
Page 96
96
Step 6. Specify Virus Scanning Settings for Public Folders
1. Choose settings for virus scanning of Public Folders.
Attachments to s canSpecify which message attachments are
checked for viruses.
Do not scan attachments for viruses - Do not
scan any attachments.
Scan all attachments - Scan all message
attachments.
Scan all attachments with these extensions -
Scan all attachments with specified filename
extensions.
Scan all attachments except with these
extensions - Scan all attachments except those
with specified filename extensions.
Page 97
CHAPTER 497
Using F-Secure Anti-Virus for Microsoft Exchange
You can add new file types on the extensions
lists by typing the file extensions in the file
extensions text boxes. Separate the extensions
by spaces.
Scan mail message
body
Enable File Type
Recognition
Action
Specify whether the body of the e-mail message
should be scanned for malicious code.
By default, F-Secure Anti-Virus for Microsoft
Exchange scans message bodies.
Although scanning message bodies can slow
down the performance, it is recommended as a
virus can be carried inside a message body.
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition can recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
By default, Intelligent File Type Recognition is
disabled during the real-time processing.
Intelligent File T ype Recognition strengthens the
security - you can block unsafe content that has
a safe filename extension (for example, a
Microsoft Word document using the ‘rtf’ filename
extension) and you do not accidentally block
safe content that has unsafe filename extension
(for example, a text file using the ‘doc’ filename
extension). Intelligent File Ty pe Recognition can
degrade the system performance.
Action on infected
attachments
Specify whether infected attachments should be
disinfected or dropped.
Page 98
98
Disinfect attachment - Try to disinfect the
infected attachment. If the disinfection
succeeds, the recipient receives the disinfected
file instead of the original one. If the disinfection
fails, the infected attachment is dropped, and it
is not delivered to the recipient.
Drop attachment - Do not disinfect or deliver
infected attachments. All infected attachments
are dropped.
By default, F-Secure Anti-Virus for Microsoft
Exchange tries to disinfect infected attachments.
Quarantine infected
attachments
Send warning
message to the
originator
Specify whether infecte d attachments should be
placed in the Quarantine or not. For more
information, see “Quarantine Management”,
307.
Specify whether to send a war ning message to
the originator of the public folder message,
which contained an infected attachment. Click
Edit to edit the message.
2. Click Next to continue.
Page 99
Using F-Secure Anti-Virus for Microsoft Exchange
Step 7. Specify Attachment Stripping Settings for Public
Folders
CHAPTER 499
1. Choose settings for stripping attachments.
Strip attachmentsSpecify which attachments should be stripped
from messages and public folder notes.
Do not strip - Do not strip any attachments.
Strip all att achments - Strip all attachments from
all messages and notes.
Strip all attachme nts except these allowed - S trip
all except specified attachments.
Strip only these disallowed attachments - Strip
only specified attachments.
Page 100
100
You can add new file types on the attachments
lists by typing the file extensions in the allowed
and disallowed attachments text boxes.
Separate the extensions by spaces.
Enable File Type
Recognition
Action
Action on stripped
attachments
Send the
informational
message to the
originator
Trojans and other malicious code can disguise
themselves with filename extensions which are
usually considered safe to use. Intelligent File
Type Recognition can recognize the real file type
of the message attachment and use that while
the attachment is processed. Specify whether
you want to use Intelligent File Type Recognition
or not.
Specify whether stripped attachments should be
quarantined or dropped.
Quarantine attachment - All stripped
attachments are placed in the Quarantine. For
more information, see “Quarantine
Management”, 307.
Drop attachment - All stripped attachments ar e
deleted automatically.
By default, F-Secure Anti-Virus for Microsoft
Exchange quarantines stripped attachments.
Specify whether an informational message
should be sent to the originator of the message
when an attachment is stripped. Click Edit to
edit the message.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.