68
A
APPENDIX:
Deploying the Product
on a Cluster
Installation Overview .................................................................. 69
Creating Quarantine Storage...................................................... 71
Administering the Cluster Installation with F-Secure Policy
Manager ..................................................................................... 99
Using the Quarantine in the Cluster Installation ....................... 100
Using the Product with High Availability Architecture in Microsoft
Exchange Server 2010............................................................. 102
Uninstallation............................................................................ 103
Troubleshooting........................................................................ 103
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Anti Virus for Microsoft Exchange Deployment Guide...
Page 6: ...4 ABOUT THIS GUIDE How This Guide Is Organized 5 Conventions Used in F Secure Guides 6...
Page 19: ...17 2 DEPLOYMENT Installation Modes 18 Network Requirements 19 Deployment Scenarios 20...
Page 64: ...62 4 CONFIGURING F SECURE SPAM CONTROL Overview 63 Realtime Blackhole List Configuration 64...
Page 106: ...104 B APPENDIX Services and Processes List of Services and Processes 105...
Page 115: ......