276
11.1
Introduction
After you have configured basic settings and you are sure that F-Secure
Internet Gatekeeper is running properly, you can modify settings to
optimize security and performance.
11.2
Optimizing Security
For maximum security, you should remove all unnecessary system
services, file shares and user accounts from computers on which you
install F-Secure Internet Gatekeeper.
Make sure that access rights to files in working, logging and quarantine
directories are adjusted so that only the operating system, the product
itself and authorized administrators can access them. If you make
changes to file locations and directories, make sure that the new directory
has the same rights as the old one.
11.2.1 Virus Scanning
Make sure that F-Secure Internet Gatekeeper is configured to disinfect or
block all files and e-mails that may carry viruses. As Trojans and other
malicious code can disguise themselves with filename extensions which
are usually considered safe to use, you should use File Type Recognition.
If File Type Recognition is enabled, F-Secure Anti-Virus for Internet
Gateways can recognize the real file and content type and use it while
processing the file.
For increased security, configure F-Secure Internet Gatekeeper to drop all
files that it is unable to scan, for example password-protected archives or
malformed e-mail messages.
Summary of Contents for INTERNET GATEKEEPER WINDOWS 2000-2003 SERVER 6.61...
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361...
Page 414: ...414...