
2
Chapter 3 Installation 30
3.1 System Requirements................................................................................................31
3.1.1 Installation on Microsoft Exchange Server 2003............................................31
3.1.2 Installation on Microsoft Exchange Server 2007............................................33
3.1.3 Installation on Microsoft Exchange Server 2010............................................35
3.2 Centralized Management Requirements....................................................................36
3.3 Other System Component Requirements ..................................................................36
3.3.1 SQL Server Requirements .............................................................................37
3.3.2 Additional Windows Components...................................................................39
3.3.3 Web Browser Software Requirements ...........................................................39
3.4 Improving Reliability and Performance ......................................................................39
3.5 Centrally Administered or Stand-alone Installation? ..................................................40
3.6 Installation Overview..................................................................................................41
3.7 Installing F-Secure Anti-Virus for Microsoft Exchange...............................................42
3.8 After the Installation ...................................................................................................55
3.8.1 Importing Product MIB files to F-Secure Policy Manager Console.................55
3.8.2 Configuring the Product..................................................................................56
3.9 Upgrading from Previous Product Versions...............................................................58
3.10 Upgrading the Evaluation Version..............................................................................60
3.11 Uninstalling F-Secure Anti-Virus for Microsoft Exchange ..........................................61
Chapter 4 Configuring F-Secure Spam Control 62
4.1 Overview....................................................................................................................63
4.2 Realtime Blackhole List Configuration .......................................................................64
4.2.1 Configuring Realtime Blackhole Lists.............................................................64
4.2.2 Optimizing F-Secure Spam Control Performance..........................................66
AppendixA Deploying the Product on a Cluster 68
A.1 Installation Overview................................................................................................. 69
A.2 Creating Quarantine Storage.....................................................................................71
A.2.1 Quarantine Storage in Active-Passive Cluster ...............................................71
A.2.2 Quarantine Storage in Active-Active Cluster..................................................76
A.2.3 Creating the Quarantine Storage for a Single Copy Cluster Environment .....79