46
Microsoft SQL Server
2000
If your organization sends a large amount of e-mails, it is
recommended to use Microsoft SQL Server 2000.
It is recommended to use Microsoft SQL Server 2000 if you are
planning to use centralized quarantine management with multiple
F-Secure Internet Gatekeeper installations. For more information,
see “
Scenario 4: Multiple F-Secure Internet Gatekeeper
installations with Centralized Quarantine Management
Note that the product does not support Windows Authentication
when connecting to Microsoft SQL Server 2000. The Microsoft
SQL Server 2000 that the product will use for the quarantine
database should be configured to use Mixed Mode
authentication.
3.1.2
Web Browser Software Requirements
In order to administer the product with F-Secure Internet Gatekeeper Web
Console, one of the following web browsers is required:
Microsoft Internet Explorer 6.0 or later
Netscape Communicator 7.1 or later
Mozilla 1.2 or later
Mozilla Firefox 1.5 or later
Opera 7.2 or later
Konqueror 2.1 or later
Any other web browser supporting HTTP 1.0, SSL, Java scripts and
cookies may be used as well. Microsoftc Internet Explorer 5.5 or earlier
cannot be used to administer the product.
If you plan to use Microsoft SQL Server 2000, you must
purchase it and obtain your own license before you start to
deploy F-Secure Internet Gatekeeper. To purchase Microsoft
SQL Server 2000, please contact your Microsoft reseller.
Summary of Contents for Internet Gatekeeper
Page 1: ...F Secure Internet Gatekeeper Windows 2000 2003 Server Administrator s Guide ...
Page 10: ...10 ABOUT THIS GUIDE How This Guide is Organized 11 Conventions Used in F Secure Guides 13 ...
Page 26: ...26 2 DEPLOYMENT Overview 27 Deployment Scenarios 29 ...
Page 58: ...58 Step 10 Enter the IP address of the F Secure Policy Manager Server Click Next to continue ...
Page 261: ...CHAPTER10 261 Quarantine Management Figure 10 1 Quarantine Query page ...
Page 296: ...296 A APPENDIX Warning Messages HTTP Warning Messages 297 SMTP Warning Messages 298 ...
Page 304: ...304 C APPENDIX Access Log Variables List of Access Log Variables 305 ...
Page 309: ...309 D APPENDIX Mail Log Variables List of Mail Log Variables 310 ...
Page 360: ...360 G APPENDIX Services and Processes List of Services and Processes 361 ...
Page 414: ...414 ...