CHAPTER 7
217
Administering F-Secure Content Scanner Server
Click
Reset Statistics
to reset the statistics for the scan engines.
Version
Displays the version of the scan engine.
Custom Settings
Displays the custom settings for the scan
engine.
Excluded extensions
Specify a space-separated list of file
extensions excluded from scanning by the
engine. You can also use wildcards: '?'
matches exactly one character, '*' matches
any number of characters, including zero (0)
characters. For example: "PP? PDF X*".
Scan inside archives
Select whether F-Secure Content Scanner
Server should scan files inside the archives for
possible infections. The supported archive
formats are: ARJ, BZ2, CAB, GZ, JAR, LZH,
MSI, RAR, TAR, TGZ, Z and ZIP.
The archive itself is scanned if that is configured
with the other scanning settings. This is the
case, for example, if the product is configured to
scan all files.
Scanning inside archive files takes time and
uses more system resources. Disabling this
setting increases performance, but it is not
recommended as it causes a security risk.
Max levels in nested
archives
Nested archives are archives inside other
archives. Set the number of levels in nested
archives F-Secure Content Scanner Server
should scan. Note that nested archives can be
used in denial-of-service attacks, so it is not
recommended to set the maximum value to a
very high number.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...